[go: up one dir, main page]

CN110135176A - A kind of encryption method of print data transmission - Google Patents

A kind of encryption method of print data transmission Download PDF

Info

Publication number
CN110135176A
CN110135176A CN201910345968.0A CN201910345968A CN110135176A CN 110135176 A CN110135176 A CN 110135176A CN 201910345968 A CN201910345968 A CN 201910345968A CN 110135176 A CN110135176 A CN 110135176A
Authority
CN
China
Prior art keywords
key
encryption
secret key
random cipher
print data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910345968.0A
Other languages
Chinese (zh)
Other versions
CN110135176B (en
Inventor
张怿
黄智�
王伟聪
吴泽民
龙安川
唐忞旻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Castle Security Tech Co Ltd
Original Assignee
Shenzhen Castle Security Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Castle Security Tech Co Ltd filed Critical Shenzhen Castle Security Tech Co Ltd
Priority to CN201910345968.0A priority Critical patent/CN110135176B/en
Publication of CN110135176A publication Critical patent/CN110135176A/en
Application granted granted Critical
Publication of CN110135176B publication Critical patent/CN110135176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The present invention relates to print data transmission technique fields, are related to a kind of encryption method of print data transmission;Specifically: user selects mimeograph documents at platform end, triggers at platform end and generates and generate random cipher c and random number e, generates random cipher a in the triggering of printing end;It calls identifying code function M to generate identifying code b after input verifying random cipher a, and key function N is called to generate key K;The character array that this document stream character string is averagely divided into e group character length equal by platform end;It calls encryption function M that key K is placed at random and forms new key character array in each character array;And key character array is formed by the encryption logic ordered encryption of encryption function W, successively ordered encryption forms encryption file d;Encryption file d, random cipher c and identifying code b are sent to printing end.The present invention solves the defect that existing print data is easy to happen leakage, achievees the purpose that safely and fast transferring printing data.

Description

A kind of encryption method of print data transmission
Technical field
The present invention relates to print data transmission technique fields, more specifically to a kind of encryption of print data transmission Method.
Background technique
In recent years, the appearance of the network printer makes more computers can be realized shared printing, optimizes office demand. But when passing through network plaintext transferring printing data between computer and printer, listener can be by intercepting and capturing network data Packet, to be easy for knowing printing content.In this way, being likely to cause trade secret or leakage of personal information.
In order to solve this problem, there is a kind of secure printing system, by printer and the computer for printing and driving is installed Composition, computer can be printed printer is transmitted further to after document data encryption to be printed.Specific safe imaging method Process is shown in Fig. 1, and the printing driving on computer generates a random number c after user selects document to be printed, and uses algorithm M generates secret key D.Then, printing driving encrypts document data to be printed using secret key D combination algorithm N, then by it is encrypted to Printing document data and random number c are handed down to printer.Printer is generated close based on the random number c combination algorithm M received Then spoon D decrypts printing document data using algorithm M using secret key D, completes printing.In above-mentioned secure printing system Under, print data although be encryption after transmit again, but due to the information for generating secret key by computer generate and need to be through net Network is transferred to printer, so listener, which passes through, intercepts and captures random number and encrypted print data, or can be by attempting to use After many algorithms operation, print data is decrypted, knows printing content, still there is print data and be easy in transfer printing process There is leakage phenomenon in the problem of being intercepted, the data for causing user to be printed, influence the print data safety of user.
Summary of the invention
In view of this, being held the present invention provides a kind of encryption method of print data transmission with solving existing print data The defect easily leaked.
A kind of encryption method of print data transmission, specifically, user selects mimeograph documents at platform end, touches at platform end Hair generates and generates random cipher c and random number e, generates random cipher a in the triggering of printing end;User inputs at platform end Verify random cipher a;Identifying code function M is called to generate identifying code b according to random cipher a in platform end;Platform end is by random cipher A, identifying code b and random cipher c calls key function N to generate key K;Mimeograph documents are translated to form file stream in platform end Character string, according to random number e, the character array for being averagely divided into e group character length equal this document stream character string;Platform End group calls encryption function M that key K is placed at random and forms new key character array in each character array in key K; Key character array is input in encryption function W by platform end by the encryption logic sequence of encryption function W, encryption function W according to Key character array is first carried out the 0th wheel secret key add operation, then again by online by the key forming method of feedback working mode The 1-10 that mode successively sequentially generates takes turns secret key, and to the key character array formed after last round of cryptographic operation, successively sequence adds Close formation respective encrypted file output, obtains encryption file d;Encryption file d, random cipher c and identifying code b are sent to and beaten Print end.
As a preferred solution of the present invention, the ciphering process of encryption function W successively includes byte replacement, row displacement, column Mixing and the operation that adds of secret key, and every wheel column mixing and secret key the step of adding merge to form a step, the column mixing with The step of secret key adds, successively carries out completing every wheel secret key adding processing using three XOR gates;The ciphering process of 10th wheel includes byte The operation that replacement, row displacement and secret key add.
As a preferred solution of the present invention, encryption function W is using the seed key and key schedule of input by patrolling It collects sequence to sequentially generate online, the seed key participates in the 1st as input and takes turns InvAddRoundKey operation.
As a preferred solution of the present invention, encryption function W 1-10 wheel secret key each round secret key generation use with Lower step: establishing a two-dimensional array for 4 rows 4 × 11 column, and each array location is a byte, each column conduct of two-dimensional array One word is for saving seed secret key and ten wheel secret keys;The seed secret key is copied in the first four word of secret key dispatch list, Then four words after the secret key of first round secret key extension generation occupies, layout according to this, after ten wheel extensions, secret key dispatch list It can be filled, secret key expansion process terminates, wherein the generation of each round secret key is by word cyclic shift, byte replacement and wheel The sequence operation of the step of constant exclusive or is formed, and, the word in the cryptographic operation of each round and the secret key extended operation of each round Section replacement is realized by way of S box look-up table.
As a preferred solution of the present invention, the encryption method of print data transmission further includes having: the prompt input of printing end Random cipher c and identifying code b verifies errorless rear receive and encrypts file d, and transfers random cipher a, random cipher c and test Demonstrate,prove code b.
As a preferred solution of the present invention, the encryption method of print data transmission further includes having: printing end group is in random Password a, identifying code b and random cipher c call key function N to generate key k, and compare and whether judge key k and key K It is equal, end is printed if unequal and destroys encryption file d, if key k is equal with key K, calls decryption function M to encryption text Part d is decrypted.
It can be seen from the above technical scheme that the invention has the benefit that the present invention using user printing end and Platform end is triggered simultaneously generates random cipher a, random cipher c and random number e, is then tested again by random cipher a calling It demonstrate,proves code function M and generates identifying code b, then call key function N raw by random cipher a, identifying code b and random cipher c again At key K;Platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is put down It is divided into the equal character array of e group character length;Platform end group calls encryption function M to divide key K at random in key K It is placed in each character array and forms new key character array, key character array is encrypted into shape finally by encryption function M At encryption file d;Obviously, the present invention is due to generating random cipher and this is not passed in a network simultaneously at printing end and platform end The defeated random cipher using the connection randomness at printing end and platform end, and prints the initial random password of end peace end Not with Internet communication, illegal user is difficult to intercept network or cracks the password generation algorithm for calculating equipment while obtaining this at random Password avoids illegal user and cracks mimeograph documents, substantially increases the security performance of print data transmission;Also, the present invention The character array for being averagely divided into e group character length equal this document stream character string using random number e, and it is based on key K, It calls encryption function M that key K is placed at random and forms new key character array in each character array, then to key character Array carries out encryption integration, strengthens the encryption preciseness of key character array, further avoids illegal user and cracks printing File, the security performance for enhancing print data transmission reach to solve the defect that existing print data is easy to happen leakage To the purpose of safely and fast transferring printing data.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example and is used together to explain the present invention, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of safe imaging method in the prior art;
Fig. 2 is a kind of flow chart of the encryption method of print data transmission disclosed in this invention.
Specific embodiment
Following example is for present invention be described in more detail, but embodiment does not do any type of limit to the present invention Fixed, except illustrating, reagent that the present invention uses, method and apparatus are the conventional reagent of the art, method and apparatus, But the invention is not limited in any way.
Embodiment one: the invention discloses a kind of encryption methods of print data transmission, and specifically, user selects at platform end Mimeograph documents are selected, is triggered at platform end and generates and generate random cipher c and random number e, are generated in the triggering of printing end random Password a;User inputs verifying random cipher a at platform end;Identifying code function M generation is called to test according to random cipher a in platform end Demonstrate,prove code b;Key function N is called to generate key K random cipher a, identifying code b and random cipher c in platform end;It platform end will Mimeograph documents are translated to form file stream character string, and according to random number e, this document stream character string is averagely divided into e group character The character array of equal length;Platform end group calls encryption function M that key K is placed in each character array at random in key K It is interior to form new key character array;Key character array is input to by platform end by the encryption logic sequence of encryption function W to be added In close function W, it is close first to be carried out the 0th wheel according to the key forming method of feedback working mode by encryption function W for key character array Then spoon add operation takes turns secret key by the 1-10 that online mode successively sequentially generates again, to what is formed after last round of cryptographic operation Key character array, successively ordered encryption forms the output of respective encrypted file, obtains encryption file d;By encryption file d, at random Password c and identifying code b is sent to printing end.In embodiments of the present invention, the present invention is using user in printing end peace end It triggers simultaneously and generates random cipher a, random cipher c and random number e, identifying code letter is then called by random cipher a again Number M generates identifying code b, then calls key function N to generate key by random cipher a, identifying code b and random cipher c again K;Platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is averagely divided At the equal character array of e group character length;Platform end group calls encryption function M that key K is placed in often at random in key K New key character array is formed in one character array, encrypts key character array to form encryption finally by encryption function M File d;Obviously, the present invention due to printing end and platform end generate simultaneously random cipher and this transmission should be in a network Secret code using the connection randomness at printing end and platform end, and prints the initial random password of end peace end not with net Network is propagated, and illegal user is difficult to intercept network or cracks the password generation algorithm for calculating equipment while obtaining the random cipher, It avoids illegal user and cracks mimeograph documents, substantially increase the security performance of print data transmission;Also, the present invention utilize with The character array that this document stream character string is averagely divided into e group character length equal by machine numerical value e, and it is based on key K, it calls and adds Key K is placed in by close function M at random forms new key character array in each character array, then to key character array into Row encryption integration, strengthens the encryption preciseness of key character array, further avoids illegal user and crack mimeograph documents, increase The security performance of strong print data transmission reaches safety to solve the defect that existing print data is easy to happen leakage The purpose of quick transferring printing data.
More specifically, the embodiment of the present invention includes have printing end process flow peace end printing process;Wherein, platform end Process flow are as follows: after selecting mimeograph documents, printing end can execute step S11 and step S12, be printing end first because user touches Random cipher a occurs into, and random cipher a is stored and is shown to operator control panel;Platform end can execute step S21 and step S22, i.e. platform end first generate random cipher c because user triggers, and random cipher c is stored and is shown to operator control panel;S23, User selects mimeograph documents, and printing end, which can trigger, generates random cipher a, and also triggering generates random cipher c simultaneously at platform end;S24, Input verifying random cipher a on the display screen at platform end again;S25, platform end call identifying code function M raw according to random cipher a At identifying code b;In this step, identifying code function M is embodied asWherein, f (x) is identifying code B, value are the first six bit digital;π is pi, value 3.1415926, KTTo print moment parameter, specific value is to work as The summation that preceding date print time is added, a-T is verifying rate, when specific value is that random cipher subtracts the current print time The summation divided;Specifically, 20 divide when the print time is 18 days 15 April in 2019, thenAlso It is to say that identifying code b specific value isIdentifying code function M is specifically obtained in conjunction with the current print time To specific identifying code, reduces illegal user and obtain the resorting to trickery to serve oneself property for generating the identifying code, further avoid illegal user and crack Mimeograph documents enhance the security performance of print data transmission, so that solving existing print data is easy to happen lacking for leakage It falls into, achievees the purpose that safely and fast transferring printing data;S26, platform end by random cipher a, identifying code b and random cipher c, Key function N is called to generate key K;Key function N can select existing cryptographic Hash key function, this step according to actual needs Suddenly specific identifying code, then the comprehensive higher cryptographic Hash key of current secret degree specifically further are obtained in conjunction with the current print time Function generate key K, reduce illegal user obtain generate key K resorting to trickery to serve oneself property, further avoid illegal user crack beat Printed text part enhances the security performance of print data transmission, further solves existing print data and is easy to happen lacking for leakage It falls into, achievees the purpose that safely and fast transferring printing data.S27, it is based on key K, encryption function W is called to generate encryption file d, tool Body are as follows: platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is put down It is divided into the equal character array of e group character length;Platform end group calls encryption function M to divide key K at random in key K It is placed in each character array and forms new key character array;Platform end is by the encryption logic of encryption function W sequentially by key Character array is input in encryption function W, and encryption function W is according to the key forming method of feedback working mode, first by key word It accords with array and carries out the 0th wheel secret key add operation, secret key is then taken turns by the 1-10 that online mode successively sequentially generates again, to last round of The key character array formed after cryptographic operation, successively ordered encryption forms the output of respective encrypted file, obtains encryption file d. S28, encryption file d, random cipher c and identifying code b are sent to printing end.Process flow on printing end are as follows: S13, Print end prompt input random cipher c and identifying code b, verify it is errorless after receive encryption file d, and transfer random cipher a, with Secret code c and identifying code b;S14-S15, printing end group call key in random cipher a, identifying code b and random cipher c Function N generates key k, and compares and judge whether key k is equal with key K, and end is printed if unequal and destroys encryption file d, If key k is equal with key K, call decryption function M that encryption file d is decrypted;S16, calling and encryption function W phase are fitted The decryption function M answered is decrypted to obtain original print file to encryption file d;S17, printing original print file, have printed The original print file of electronics shelves auto-destruct is carried out after to divulge a secret to prevent depositing bottom.
Specifically, the ciphering process of encryption function W successively includes that byte replacement, row displacement, column mixing and secret key add Operation, and the step of the step of column mixing of every wheel adds with secret key merges to form a step, and the column mixing and secret key add adopts It successively carries out completing every wheel secret key with three XOR gates adding processing;10th wheel ciphering process include byte replacement, row displacement and The operation that secret key adds.Encryption function W is successively given birth to using the seed key and key schedule of input by logical order online At the seed key participates in the 1st wheel InvAddRoundKey operation as input.The each round of the 1-10 wheel secret key of encryption function W The generation of secret key uses following steps: establishing a two-dimensional array for 4 rows 4 × 11 column, each array location is a byte, two dimension Each column of array are as a word for saving seed secret key and ten wheel secret keys;The seed secret key is copied to secret key scheduling In the first four word of table, then first round secret key extends four words after the secret key generated occupies, according to this layout, ten wheel extensions Later, secret key dispatch list can be filled, and secret key expansion process terminates, wherein each round secret key generation be by word cyclic shift, The sequence operation of the step of byte replacement and wheel constant exclusive or is formed, and, the cryptographic operation of each round and the secret key of each round Byte replacement in extended operation is realized by way of S box look-up table.Obviously, in embodiments of the present invention, of the invention By the way that the secret key character array that segmentation is formed in advance is carried out the 0th wheel secret key add operation first, adding for Encryption Algorithm is pressed again later The last round of encryption of 1-10 secret key pair that close logical order input is successively sequentially generated by feedback working mode by online mode is grasped Successively ordered encryption forms the output of corresponding ciphertext to the secret key character array formed after work, and the column mixing of every wheel and close in 1-9 wheel The step of spoon adds, merges to form a step, and the generation moment of the secret key of the 1st wheel is synchronous with the 0th wheel secret key add operation, mentions significantly The high performance of encryption.
Obviously, in embodiments of the present invention, on the one hand, when the present invention specifically combines current printing by identifying code function M Between obtain specific identifying code, reduce illegal user and obtain the resorting to trickery to serve oneself property for generating the identifying code, then comprehensive current secret degree is more High cryptographic Hash key function generates key K, reduces illegal user and obtains the resorting to trickery to serve oneself property for generating key K, avoids illegal use Mimeograph documents are cracked at family, enhance the security performance of print data transmission, further solve existing print data and be easy to happen The defect of leakage;In addition, this document stream character string is averagely divided into e group character length equal by the present invention using random number e Character array, and be based on key K, call encryption function M key K is placed at random formed in each character array it is new close Key character array, then encryption integration is carried out to key character array, the encryption preciseness of key character array is strengthened, further It avoids illegal user and cracks mimeograph documents, enhance the security performance of print data transmission;And utilize printing end peace end Initial random password not with Internet communication, illegal user, which is difficult to intercept network or crack and calculates the password generation algorithm of equipment, to come The random cipher is obtained simultaneously, illegal user is avoided and cracks mimeograph documents, substantially increases the safety of print data transmission Can, to solve the defect that existing print data is easy to happen leakage, achieve the purpose that safely and fast transferring printing data.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment cross-reference.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized the present invention.To these A variety of modifications of embodiment will be readily apparent to those skilled in the art, general original as defined herein Reason can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not Be intended to be limited to the embodiments shown herein, and be to fit to it is consistent with the principles and novel features disclosed in this article most Wide range.

Claims (6)

1. a kind of encryption method of print data transmission, it is characterised in that:
User selects mimeograph documents at platform end, triggers generation at platform end and generates random cipher c and random number e, It prints end triggering and generates random cipher a;
User inputs verifying random cipher a at platform end;
Identifying code function M is called to generate identifying code b according to random cipher a in platform end;
Key function N is called to generate key K random cipher a, identifying code b and random cipher c in platform end;
Platform end translates mimeograph documents to form file stream character string, according to random number e, by this document stream character string average mark It is cut into the equal character array of e group character length;
Platform end group calls encryption function M that key K is placed at random in each character array and forms new key in key K Character array;
Key character array is input in encryption function W by platform end by the encryption logic sequence of encryption function W, encryption function W According to the key forming method of feedback working mode, key character array is first subjected to the 0th wheel secret key add operation, is then passed through again The 1-10 that online mode successively sequentially generates takes turns secret key, successively suitable to the key character array formed after last round of cryptographic operation Sequence encrypts to form the output of respective encrypted file, obtains encryption file d;
Encryption file d, random cipher c and identifying code b are sent to printing end.
2. a kind of encryption method of print data transmission according to claim 1, which is characterized in that the encryption function W Ciphering process successively include byte replacement, row displacement, column mixing and the operation that adds of secret key, and every wheel column mixing and secret key add The step of merge to form a step, the step of column mixing and secret key add, successively carries out completing every wheel using three XOR gates Secret key adds processing;The ciphering process of 10th wheel includes the operation that byte replacement, row displacement and secret key add.
3. a kind of encryption method of print data transmission according to claim 2, which is characterized in that the encryption function W It is sequentially generated online using the seed key and key schedule of input by logical order, the seed key is as input ginseng With the 1st wheel InvAddRoundKey operation.
4. a kind of encryption method of print data transmission according to claim 3, which is characterized in that the encryption function W The generation of each round secret key of 1-10 wheel secret key use following steps: establish a two-dimensional array for 4 rows 4 × 11 column, every number Group unit is a byte, and each column of two-dimensional array are as a word for saving seed secret key and ten wheel secret keys;Described kind Sub- secret key is copied in the first four word of secret key dispatch list, four after then the secret key of first round secret key extension generation occupies A word, layout according to this, after ten wheel extensions, secret key dispatch list can be filled, and secret key expansion process terminates, wherein each round is close Spoon generation is sequence operation formation the step of replacing by word cyclic shift, byte and take turns constant exclusive or, and, each round adds Byte replacement in close operation and the secret key extended operation of each round is realized by way of S box look-up table.
5. a kind of encryption method of print data transmission according to claim 4, which is characterized in that the print data passes Defeated encryption method further includes having: prompt input random cipher c and identifying code b in printing end receives encryption text after verifying is errorless Part d, and transfer random cipher a, random cipher c and identifying code b.
6. a kind of encryption method of print data transmission according to claim 5, which is characterized in that the print data passes Defeated encryption method further includes having: printing end group calls key function N raw in random cipher a, identifying code b and random cipher c It at key k, and compares and judges whether key k is equal with key K, end is printed if unequal and destroys encryption file d, if key k It is equal with key K, then call decryption function M that encryption file d is decrypted.
CN201910345968.0A 2019-04-26 2019-04-26 Encryption method for printing data transmission Active CN110135176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910345968.0A CN110135176B (en) 2019-04-26 2019-04-26 Encryption method for printing data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910345968.0A CN110135176B (en) 2019-04-26 2019-04-26 Encryption method for printing data transmission

Publications (2)

Publication Number Publication Date
CN110135176A true CN110135176A (en) 2019-08-16
CN110135176B CN110135176B (en) 2023-04-18

Family

ID=67575193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910345968.0A Active CN110135176B (en) 2019-04-26 2019-04-26 Encryption method for printing data transmission

Country Status (1)

Country Link
CN (1) CN110135176B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110816089A (en) * 2019-10-15 2020-02-21 佛山普瑞威尔科技有限公司 Safe burning method of printing program, chip and printing consumable
CN111062456A (en) * 2019-12-25 2020-04-24 李蕴光 Two-dimensional code encryption algorithm
CN111959139A (en) * 2020-08-31 2020-11-20 湖南鼎一致远科技发展有限公司 Encryption system of thermal transfer printer
CN114826789A (en) * 2022-06-29 2022-07-29 北京辰光融信技术有限公司 Printing control method and system for ensuring data safe transmission
CN114844728A (en) * 2022-07-04 2022-08-02 道格特半导体科技(江苏)有限公司 Serialized data secure communication method and big data platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7251632B1 (en) * 1999-10-18 2007-07-31 Stamps. Com Machine dependent login for on-line value-bearing item system
WO2010091565A1 (en) * 2009-02-12 2010-08-19 Liu Haiyun Random encryption method in need of using exhaustive method decryption
CN101872402A (en) * 2010-05-26 2010-10-27 上海北大方正科技电脑系统有限公司 Safe printing method
CN103777912A (en) * 2014-01-27 2014-05-07 珠海赛纳打印科技股份有限公司 Imaging equipment as well as safe imaging method and imaging system thereof
CN105162803A (en) * 2015-09-30 2015-12-16 深圳市金城保密技术有限公司 Safe information output method and safe information output system of secret-relating network
CN105450408A (en) * 2014-08-04 2016-03-30 阿里巴巴集团控股有限公司 Password checking method and device
CN105939190A (en) * 2016-06-23 2016-09-14 天津中安华典数据安全科技有限公司 AES data encryption method for offline key generation based on FPGA

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7251632B1 (en) * 1999-10-18 2007-07-31 Stamps. Com Machine dependent login for on-line value-bearing item system
WO2010091565A1 (en) * 2009-02-12 2010-08-19 Liu Haiyun Random encryption method in need of using exhaustive method decryption
CN101872402A (en) * 2010-05-26 2010-10-27 上海北大方正科技电脑系统有限公司 Safe printing method
CN103777912A (en) * 2014-01-27 2014-05-07 珠海赛纳打印科技股份有限公司 Imaging equipment as well as safe imaging method and imaging system thereof
CN105450408A (en) * 2014-08-04 2016-03-30 阿里巴巴集团控股有限公司 Password checking method and device
CN105162803A (en) * 2015-09-30 2015-12-16 深圳市金城保密技术有限公司 Safe information output method and safe information output system of secret-relating network
CN105939190A (en) * 2016-06-23 2016-09-14 天津中安华典数据安全科技有限公司 AES data encryption method for offline key generation based on FPGA

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DING XIAODONG 等: "Security System for Internal Network Printing" *
李玲双: "加密文档破解系统的设计与实现" *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110816089A (en) * 2019-10-15 2020-02-21 佛山普瑞威尔科技有限公司 Safe burning method of printing program, chip and printing consumable
CN111062456A (en) * 2019-12-25 2020-04-24 李蕴光 Two-dimensional code encryption algorithm
CN111959139A (en) * 2020-08-31 2020-11-20 湖南鼎一致远科技发展有限公司 Encryption system of thermal transfer printer
CN111959139B (en) * 2020-08-31 2022-05-13 湖南鼎一致远科技发展有限公司 Encryption system of thermal transfer printer
CN114826789A (en) * 2022-06-29 2022-07-29 北京辰光融信技术有限公司 Printing control method and system for ensuring data safe transmission
CN114844728A (en) * 2022-07-04 2022-08-02 道格特半导体科技(江苏)有限公司 Serialized data secure communication method and big data platform

Also Published As

Publication number Publication date
CN110135176B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN110135176A (en) A kind of encryption method of print data transmission
Kumar et al. Development of modified AES algorithm for data security
JP4712017B2 (en) Message authentication code generation method using stream cipher, authentication encryption method using stream cipher, and authentication decryption method using stream cipher
CN101064595B (en) Computer network safe input authentication system and method
US6189095B1 (en) Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
US7254232B2 (en) Method and system for selecting encryption keys from a plurality of encryption keys
TWI688250B (en) Method and device for data encryption and decryption
CN108768617B (en) Format-preserving encryption method based on traditional block cipher
CN108123794A (en) The generation method and encryption method of whitepack key, apparatus and system
KR20150090438A (en) White box encryption apparatus and encryption method
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
US20020159588A1 (en) Cryptography with unconditional security for the internet, commercial intranets, and data storage
CN114500006B (en) Query request processing method and device
CN113591117A (en) Social platform daily conversation encryption method and system, storage medium and computing device
JP6468567B2 (en) Key exchange method, key exchange system
CN114443718A (en) A data query method and system
Joshy et al. Text to image encryption technique using RGB substitution and AES
CN106789053A (en) Random ciphertext generation method and system, decryption method and system
CN112422278A (en) Byte-oriented random multi-table replacement encryption and decryption method
JP2008035305A (en) Encryption method and data concealing method
WO2020213114A1 (en) Mac tag list generation device, mac tag list verification device, method, and program
Toorani et al. A secure cryptosystem based on affine transformation
Fu et al. A fast chaos-based colour image encryption algorithm using a hash function
JP2010186075A (en) Integer encrypting and decoding method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant