CN101887713B - Encryption method and device for font library - Google Patents

Encryption method and device for font library Download PDF

Info

Publication number
CN101887713B
CN101887713B CN2009103022800A CN200910302280A CN101887713B CN 101887713 B CN101887713 B CN 101887713B CN 2009103022800 A CN2009103022800 A CN 2009103022800A CN 200910302280 A CN200910302280 A CN 200910302280A CN 101887713 B CN101887713 B CN 101887713B
Authority
CN
China
Prior art keywords
information
key
code
identifying code
character library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009103022800A
Other languages
Chinese (zh)
Other versions
CN101887713A (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN2009103022800A priority Critical patent/CN101887713B/en
Publication of CN101887713A publication Critical patent/CN101887713A/en
Application granted granted Critical
Publication of CN101887713B publication Critical patent/CN101887713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an encryption method and an encryption device for a font library in the field of character information processing. The font library comprises internal code information and dot matrix information. The encryption method comprises the following steps of: performing distributed computing on the internal code information with a first key to generate a secondary key; encrypting the dot matrix information with the secondary key to generate dot matrix data cipher text information; and encrypting the dot matrix data cipher text information or the combination of the internal code information and the dot matrix data cipher text information with the secondary key to generate a verification code. The encryption method and the encryption device for the font library provided by the embodiment of the invention have the advantages of preventing illegal users from replacing the font library and thus effectively improving the confidentiality of the font library.

Description

The encryption method of character library and device
Technical field
The present invention relates to field of character information processing, relate in particular to a kind of encryption method and device of character library.
Background technology
In the prior art, some equipment needs in equipment, to preserve in advance the character library of required character display like the USB safety equipment, embedded system etc. of band Presentation Function.Said character library has write down the internal code information and the lattice information of the character display of all supports, and said internal code information has write down the pairing binary code of character; Said lattice information has then write down color and brightness that character is shown in each corresponding point of display device, and said internal code information and lattice information are corresponding one by one.When application apparatus will show certain character, application program was at first searched the internal code information of this character, obtained the pairing lattice information of this character according to the internal code information that finds then, and then showed this character.
And at present in these are used, character library all is to deposit with clear-text way, does not have any secrecy provision; Illegal person can be easily through distorting internal code information or lattice information; Or the mode of directly replacing character library is changed character library, change application apparatus institute content displayed, thereby misleading user; Very easily cause user's private information to be revealed, cause potential safety hazard.Therefore, how to promote the confidentiality of character library, become letter problem to be solved.
Summary of the invention
One of the object of the invention is for a kind of encryption method and device of character library are provided, in order to have promoted the confidentiality of character library.
The present invention proposes a kind of encryption method of character library, and said character library comprises internal code information and lattice information, and the encryption method of said character library comprises step:
Disperse computing to generate secondary key with first key to internal code information;
With said secondary key lattice information is encrypted generation dot array data cipher-text information;
With the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information.
Preferably, said method also comprises the step of storing said identifying code.
Preferably, above-mentioned second key comprises the said secondary key that disperses computing to generate to internal code information.
Preferably, said method also comprises the step that said identifying code is tested.
Preferably, the above-mentioned step that said identifying code is tested specifically comprises step:
With the combined ciphering computing generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information;
More said check code and identifying code;
Said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
The present invention proposes a kind of encryption device of character library, and said character library comprises internal code information and lattice information, and the encryption device of said character library comprises:
The secondary key generation module is used for disperseing computing to generate secondary key to internal code information first key;
The lattice information encrypting module is used for said secondary key is encrypted generation dot array data cipher-text information to lattice information;
The identifying code generation module is used for the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information.
Preferably, said apparatus also comprises the identifying code memory module, is used to store said identifying code.
Preferably, above-mentioned second key comprises the said secondary key that disperses computing to generate to internal code information.
Preferably, said apparatus also comprises the identifying code inspection module, is used for said identifying code is tested.
Preferably, above-mentioned identifying code inspection module specifically comprises:
Check code cryptographic calculation unit is used for the combined ciphering computing generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information;
Comparing unit is used for more said check code and identifying code;
The assay processing unit is used for handling subsequent operation according to the comparative result of said check code and identifying code, and said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
From the above, the embodiment of the invention disperses computing to generate secondary key through providing with first key to internal code information; With said secondary key lattice information is encrypted generation dot array data cipher-text information; With character library encryption method and the device of second key to the combined ciphering generation identifying code of said dot array data cipher-text information or said internal code information and said dot array data cipher-text information, thereby the confidentiality of lifting character library further reaches anti-tamper purpose.
Description of drawings
Fig. 1 is the schematic flow sheet of the encryption method of one embodiment of the invention character library;
Fig. 2 is the schematic flow sheet of the encryption method of another embodiment of the present invention character library;
Fig. 3 is the schematic flow sheet of the encryption method of another embodiment of the present invention character library;
Fig. 4 is the schematic flow sheet of the step of in another embodiment of the present invention identifying code being tested;
Fig. 5 is the structural representation of the encryption device of the said character library of another embodiment of the present invention;
Fig. 6 is the structural representation of the encryption device of the said character library of another embodiment of the present invention;
Fig. 7 is the structural representation of the encryption device of the said character library of another embodiment of the present invention;
Fig. 8 is the structural representation of identifying code inspection module in another embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will combine embodiment, further specify with reference to accompanying drawing.
Embodiment
With reference to Fig. 1, the present invention proposes the encryption method of the character library of an embodiment, and said character library comprises internal code information and lattice information, and the encryption method of said character library comprises step:
S11 disperses computing to generate secondary key with first key to internal code information;
S12 encrypts generation dot array data cipher-text information with said secondary key to lattice information;
S13 is with the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information.
S11 is said like step, and available first key disperses computing to generate secondary key to each internal code information one by one, and said secondary key can be a kind of MAC sign indicating number (Message Authentication Code, a message authentication code).Above-mentioned first key can be kept in the memory block of device interior, can be the random key that generates in process of production, also can be the key that solidifies in process of production.Above-mentioned internal code information has write down the pairing binary code of character.Above-mentioned dispersion computing realizes through decentralized algorithm.Said decentralized algorithm can be an AES, can not be AES also, like the hmac algorithm based on cryptographic hash algorithm construction message authentication code.Above-mentioned decentralized algorithm can be DeriveKey=AlgDerive (Key; Info), be example with this algorithm, the Key in the above-mentioned algorithm can be first key, Info can be an internal code information, generates secondary key through after the above-mentioned algorithm computing.
S12 is said like step, can be one by one with said secondary key corresponding lattice information be with it encrypted to generate the dot array data cipher-text information.Said information recording lattice the character color and the brightness that are shown in each corresponding point of display device, the lattice information of each character and internal code information are corresponding one by one.Said dot array data cipher-text information is that lattice information is encrypted a kind of ciphertext that the back generates.All be inequality owing to the pairing secondary key of each internal code information as stated, thereby each internal code information lattice data corresponding cipher-text information is also all inequality, and the dot array data cipher-text information is associated with ISN.Above-mentioned encryption realizes that through AES said AES can be a symmetry algorithm, and above-mentioned AES can be EncData=AlgEnc (Key; Data).Wherein, the Key in the above-mentioned AES can be second key, and Data can be a lattice information, through generating the dot array data cipher-text information after the above-mentioned algorithm computing.
S13 is said like step, and available second key is encrypted said dot array data cipher-text information and generated identifying code, and also available second key generates identifying code to the combined ciphering of said internal code information and said dot array data cipher-text information.Said identifying code also can be a kind of MAC sign indicating number.Said second key can be same key with said first key, also can be different.Said second key can also be the said secondary key that disperses computing to generate to internal code information.With the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information; The encryption here realizes that through the identifying code generating algorithm said identifying code generating algorithm can generate the raw data of random length the authorization information of regular length; And any bit (Byte) of raw data is modified, and authorization information will be different.The identifying code generating algorithm can be MACData=AlgMAC (Key; Data), wherein the Key in this identifying code generating algorithm can be second key, and Data can be the dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm; Key in the above-mentioned identifying code generating algorithm can also be second key, and Data can be the combination of said internal code information and said dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm.
The embodiment of the invention generates secondary key through with first key internal code information being carried out cryptographic calculation; With said secondary key lattice information is encrypted generation dot array data cipher-text information; The combined ciphering of said dot array data cipher-text information or said internal code information and said dot array data cipher-text information is generated the method for identifying code with second key; Can prevent the illegal users from replacing character library, thereby effectively promote the confidentiality of character library.
With reference to Fig. 2, one embodiment of the invention is based on the encryption method of the character library of the foregoing description, and than said method, this method further comprises step:
S14 stores said identifying code.
S14 is said like step, and whether the identifying code that storage generates is used to check the internal code information of character library and lattice information to be distorted in the storer of device interior.
Be that the secondary key that said internal code information was generated is an example with second key below, details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Use the secondary key that generated pair to encrypt successively and generate the dot array data cipher-text information with the pairing lattice information of said internal code information; Carry out cryptographic calculation with said secondary key pair and said secondary key lattice data corresponding cipher-text information respectively and generate identifying code; Store said identifying code successively.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Pair encrypt with secondary key that internal code information generated successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; With first key cryptographic calculation is carried out in the combination of all said internal code informations and said dot array data cipher-text information and generate identifying code; Store said identifying code.
With reference to Fig. 3, one embodiment of the invention is based on the encryption method of the character library of the foregoing description, and than said method, this method further comprises step:
S15 tests to said identifying code.
With reference to Fig. 4, as one embodiment of the present of invention, step S15 can further comprise step:
S151 carries out cryptographic calculation with second key to the combination of said dot array data cipher-text information or said internal code information and said dot array data cipher-text information and generates check code;
S152, more said check code and identifying code;
S153, said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
S15 is said like step, and with the combined ciphering generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information, said check code also can be a kind of MAC sign indicating number.The encryption here realizes through above-mentioned identifying code generating algorithm.Generate check code after the above-mentioned identifying code generating algorithm of the combination process computing of said second key and said dot array data cipher-text information or said internal code information and said dot array data cipher-text information; More said check code and above-mentioned identifying code; Continue to carry out subsequent operation if the result is identical, otherwise return mistake.
The embodiment of the invention is through disperseing computing to generate secondary key with first key to internal code information; With said secondary key lattice information is encrypted generation dot array data cipher-text information, with the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information; To the character library encryption method that said identifying code is tested, can after the illegal users from replacing character library, remind the user, thereby the confidentiality of lifting character library further reaches anti-tamper purpose.
Following is that the secondary key that said internal code information was generated is an example with second key still, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Use the secondary key that generated pair to encrypt successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; Carry out cryptographic calculation with said secondary key pair and the pairing data cipher-text information of said secondary key respectively and generate identifying code; Store said identifying code successively.Launch character library, carry out cryptographic calculation with said secondary key pair and the pairing data cipher-text information of said secondary key respectively and generate check code; The identifying code that more said successively check code is corresponding with said check code; Said check code is that identical then the continuation carried out subsequent operation with the comparative result of its corresponding identifying code, otherwise returns mistake.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Pair encrypt with secondary key that internal code information generated successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; With first key cryptographic calculation is carried out in the combination of all said internal code informations and all said dot array data cipher-text information and generate identifying code; Store said identifying code.Launch character library, with first key cryptographic calculation is carried out in the combination of all said internal code informations and all said dot array data cipher-text information and generate check code; More said check code and said identifying code; Said check code is that identical then the continuation carried out subsequent operation with the comparative result of said identifying code, otherwise returns mistake.
With reference to Fig. 5, the present invention proposes the encryption device 10 of the character library of another embodiment, and said character library comprises internal code information and lattice information, and said character library encryption device comprises:
Secondary key generation module 11 is used for disperseing computing to generate secondary key to internal code information first key;
Lattice information encrypting module 12 is used for said secondary key is encrypted generation dot array data cipher-text information to lattice information;
Identifying code generation module 13 is used for the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said dot array data cipher-text information and said internal code information.
Said secondary key generation module 11 can be used for disperseing computing to generate secondary key to each internal code information one by one first key, and said secondary key can be a kind of MAC sign indicating number (Message Authentication Code, a message authentication code).Above-mentioned first key can be kept in the memory block of device interior, can be the random key that generates in process of production, also can be the key that solidifies in process of production.Above-mentioned internal code information has write down the pairing binary code of character.Above-mentioned dispersion computing realizes through decentralized algorithm.Said decentralized algorithm can be an AES, can not be AES also, like the hmac algorithm based on cryptographic hash algorithm construction message authentication code.Above-mentioned decentralized algorithm can be DeriveKey=AlgDerive (Key; Info), be example with this algorithm, the Key in the above-mentioned algorithm can be first key, Info can be an internal code information, generates secondary key through after the above-mentioned algorithm computing.
Said lattice information encrypting module 12 can be seriatim encrypted said secondary key and is generated the dot array data cipher-text information to corresponding lattice information with it.Said information recording lattice the character color and the brightness that are shown in each corresponding point of display device, the lattice information of each character and internal code information are corresponding one by one.Said dot array data cipher-text information is that lattice information is encrypted a kind of ciphertext that the back generates.All be inequality owing to the pairing secondary key of each internal code information as stated, thereby each internal code information lattice data corresponding cipher-text information is also all inequality, and the dot array data cipher-text information is associated with ISN.Above-mentioned encryption realizes that through AES said AES can be a symmetry algorithm.Above-mentioned AES can be EncData=AlgEnc (Key; Data).With this algorithm is example, and the Key in the above-mentioned algorithm can be second key, and Data can be a lattice information, through generating the dot array data cipher-text information after the above-mentioned algorithm computing.
Said identifying code generation module 13 can be encrypted second key and generate identifying code to said dot array data cipher-text information, also can be with the combined ciphering generation identifying code of second key to said internal code information and said dot array data cipher-text information.Said identifying code also can be a kind of MAC sign indicating number.Said second key can be same key with said first key, also can be different.Said second key can also be the said secondary key that disperses computing to generate to internal code information.With the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information; The encryption here realizes that through the identifying code generating algorithm said identifying code generating algorithm can generate the raw data of random length the authorization information of regular length; And any bit of raw data is modified, and authorization information will be different.The identifying code generating algorithm can be MACData=AlgMAC (Key; Data), be example with this algorithm, the Key in the above-mentioned identifying code generating algorithm can be second key, Data can be the dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm; Key in the above-mentioned identifying code generating algorithm can also be second key, and Data can be the combination of said internal code information and said dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm.
From the above, the embodiment of the invention effectively improves the confidentiality of character library through a kind of encryption device of character library is provided.
With reference to Fig. 6, another embodiment of the present invention, the encryption device 10 based on the foregoing description character library further comprises:
Identifying code memory module 14 is stored said identifying code;
Whether the identifying code that said identifying code memory module 14 storages generate is used to check the internal code information of character library and lattice information to be distorted in the storer of device interior.
With second key is that the secondary key that said internal code information was generated is an example, and details are as follows to present embodiment:
Secondary key generation module 11 is used for that first key is carried out cryptographic calculation to each internal code information of character library and generates secondary key; Lattice information encrypting module 12 is used for successively the secondary key that is generated pair encrypted with the pairing lattice information of internal code information and generates the dot array data cipher-text information; Identifying code generation module 13 carries out cryptographic calculation with said secondary key pair and the pairing data cipher-text information of said secondary key respectively and generates identifying code; Identifying code memory module 14 is stored said identifying code successively.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Secondary key generation module 11 disperses computing to generate secondary key to each internal code information in the character library first key; Lattice information encrypting module 12 is used the secondary key that generated pair to encrypt with the pairing lattice information of internal code information successively and is generated the dot array data cipher-text information; Identifying code generation module 13 carries out cryptographic calculation generation identifying code with first key to all said internal code informations and dot array data cipher-text information; Identifying code memory module 14 is stored said identifying code.
With reference to Fig. 7, another embodiment of the present invention also comprises identifying code inspection module 15 based on the foregoing description on the basis of the foregoing description, be used for said identifying code is tested.
With reference to Fig. 8, as one embodiment of the present of invention, said identifying code inspection module 15 comprises:
Check code cryptographic calculation unit 151 is used for the combined ciphering generation cryptographic calculation generation check code of said second key to said dot array data cipher-text information or said dot array data cipher-text information and said internal code information;
Comparing unit 152 is used for more said check code and identifying code;
Assay processing unit 153 is used for handling subsequent operation according to the comparative result of said check code and identifying code, and said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
Said inspection module 15 is used for the combined ciphering generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information, and said check code also can be a kind of MAC sign indicating number.The encryption here realizes through above-mentioned identifying code generating algorithm.As one embodiment of the present of invention; After generating check code after the above-mentioned identifying code generating algorithm of the combination process computing of check code cryptographic calculation unit 151 with said second key and said dot array data cipher-text information or said internal code information and said dot array data cipher-text information; Comparing unit 152 more said check codes and above-mentioned identifying code; Continue to carry out subsequent operation if the result is identical assay processing unit 153, otherwise return mistake.
Following is that the secondary key that said internal code information was generated is an example with second key still, and details are as follows to present embodiment:
Secondary key generation module 11 is used for disperseing computing to generate secondary key to each internal code information of character library first key; Lattice information encrypting module 12 is encrypted the pairing lattice information of secondary key that is generated pair and internal code information successively and is generated the dot array data cipher-text information; Identifying code generation module 13 is used for that respectively said secondary key pair is carried out cryptographic calculation with the pairing data cipher-text information of said secondary key and generates identifying code; Identifying code memory module 14 is stored said identifying code successively.Launch character library, check code cryptographic calculation unit 151 is used for that respectively said secondary key pair is carried out cryptographic calculation with the pairing data cipher-text information of said secondary key and generates check code; Comparing unit 152 is used for the more said successively check code identifying code corresponding with said check code; Assay processing unit 153 is used for handling subsequent operation according to the comparative result of said check code and identifying code, and said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Secondary key generation module 11 is used for that first key is carried out cryptographic calculation to each internal code information of character library and disperses computing to generate secondary key; Lattice information encrypting module 12 is encrypted the pairing lattice information of secondary key that is generated pair and internal code information successively and is generated the dot array data cipher-text information; Identifying code generation module 13 is used for that first key is carried out cryptographic calculation to all said internal code informations and all said dot array data cipher-text information and generates identifying code; Identifying code storage unit 14 is stored said identifying code.Launch character library, check code cryptographic calculation unit 151 is used for that first key is carried out cryptographic calculation to all said internal code informations and all said dot array data cipher-text information and generates check code; Comparing unit 152 is used for more said check code and said identifying code; Assay processing unit 153 is used for handling subsequent operation according to the comparative result of said check code and identifying code, and said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
By above-mentioned passable, the embodiment of the invention through a kind of encryption verification device of character library is provided, can after the illegal users from replacing character library, remind the user, thereby the confidentiality of lifting character library further reaches anti-tamper purpose.
The above is merely the preferred embodiments of the present invention; Be not so limit claim of the present invention; Every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to be done; Or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (10)

1. the encryption method of a character library, said character library comprises internal code information and lattice information, it is characterized in that, and the encryption method of said character library comprises step:
Disperse computing to generate secondary key with first key to internal code information;
With said secondary key lattice information is encrypted generation dot array data cipher-text information;
With the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information.
2. the encryption method of character library as claimed in claim 1 is characterized in that, said method also comprises step:
Store said identifying code.
3. according to claim 1 or claim 2 the encryption method of character library is characterized in that said second key comprises the said secondary key that disperses computing to generate to internal code information.
4. the encryption method of character library as claimed in claim 3 is characterized in that, said method also comprises step:
Said identifying code is tested.
5. the encryption method of character library as claimed in claim 4 is characterized in that, the step that said identifying code is tested comprises step:
With the combined ciphering computing generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information;
More said check code and identifying code;
Said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
6. the encryption device of a character library, said character library comprises internal code information and lattice information, it is characterized in that, and the encryption device of said character library comprises:
The secondary key generation module is used for disperseing computing to generate secondary key to internal code information first key;
The lattice information encrypting module is used for said secondary key is encrypted generation dot array data cipher-text information to lattice information;
The identifying code generation module is used for the combined ciphering generation identifying code of second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information.
7. the encryption device of character library as claimed in claim 6 is characterized in that, said device also comprises:
The identifying code memory module is used to store said identifying code.
8. like the encryption method of claim 6 or 7 described character libraries, it is characterized in that said second key comprises the said secondary key that disperses computing to generate to internal code information.
9. the encryption device of character library as claimed in claim 8 is characterized in that, said device also comprises:
The identifying code inspection module is used for said identifying code is tested.
10. the encryption device of character library as claimed in claim 9 is characterized in that, said identifying code inspection module comprises:
Check code cryptographic calculation unit is used for the combined ciphering computing generation check code of said second key to said dot array data cipher-text information or said internal code information and said dot array data cipher-text information;
Comparing unit is used for more said check code and identifying code;
The assay processing unit is used for handling subsequent operation according to the comparative result of said check code and identifying code, and said check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
CN2009103022800A 2009-05-13 2009-05-13 Encryption method and device for font library Active CN101887713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009103022800A CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009103022800A CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Publications (2)

Publication Number Publication Date
CN101887713A CN101887713A (en) 2010-11-17
CN101887713B true CN101887713B (en) 2012-01-25

Family

ID=43073603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009103022800A Active CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Country Status (1)

Country Link
CN (1) CN101887713B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102609648B (en) * 2012-02-02 2015-02-25 深圳市文鼎创数据科技有限公司 Method and device for using word stock safely
CN102637422B (en) * 2012-02-17 2014-06-04 天地融科技股份有限公司 Matrix obtaining method, character display device and system and electronic signature tool
CN102663297A (en) * 2012-04-06 2012-09-12 天地融科技股份有限公司 Font acquiring method, character displaying device, character displaying system and electronic signature tool
CN103268459A (en) * 2012-08-01 2013-08-28 天地融科技股份有限公司 Electronic device with secure character library, and electronic equipment with electronic device
CN103810580A (en) * 2012-11-13 2014-05-21 中兴通讯股份有限公司 Method and device for signing for goods and wireless signing-for terminal
CN104217012B (en) * 2014-09-22 2018-07-27 朱信 A kind of character library distributing method and character library protect system
CN105843782A (en) * 2016-03-21 2016-08-10 上海林果实业股份有限公司 Font library storage apparatus and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
US6917684B1 (en) * 1999-08-31 2005-07-12 Matsushita Electric Industrial Co., Ltd. Method of encryption and decryption with block number dependant key sets, each set having a different number of keys
US6975730B1 (en) * 2000-01-21 2005-12-13 Victor Company Of Japan, Ltd. Method and apparatus for contents information
CN1881382A (en) * 2005-06-17 2006-12-20 鸿富锦精密工业(深圳)有限公司 Text encryption system and method
US7237116B1 (en) * 2000-01-19 2007-06-26 International Business Machines Corporation Digital signature system and method based on hard lattice problem
CN101000604A (en) * 2007-01-16 2007-07-18 北京方正国际软件系统有限公司 Literal encipher method and system based on logical character

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6917684B1 (en) * 1999-08-31 2005-07-12 Matsushita Electric Industrial Co., Ltd. Method of encryption and decryption with block number dependant key sets, each set having a different number of keys
US7237116B1 (en) * 2000-01-19 2007-06-26 International Business Machines Corporation Digital signature system and method based on hard lattice problem
US6975730B1 (en) * 2000-01-21 2005-12-13 Victor Company Of Japan, Ltd. Method and apparatus for contents information
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN1881382A (en) * 2005-06-17 2006-12-20 鸿富锦精密工业(深圳)有限公司 Text encryption system and method
CN101000604A (en) * 2007-01-16 2007-07-18 北京方正国际软件系统有限公司 Literal encipher method and system based on logical character

Also Published As

Publication number Publication date
CN101887713A (en) 2010-11-17

Similar Documents

Publication Publication Date Title
CN101887713B (en) Encryption method and device for font library
US9397830B2 (en) Method and apparatus for encrypting and decrypting data
US20080297326A1 (en) Low Cost RFID Tag Security And Privacy System And Method
CN103067170B (en) encrypting method based on EXT2 file system
CN103914901A (en) Unlocking method and unlocking system
CN107800716B (en) Data processing method and device
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN106228076A (en) A kind of picture validation code guard method based on SGX and system
CN104732159A (en) File processing method and file processing device
CN111695097A (en) Login checking method and device and computer readable storage medium
HRP20150416T1 (en) Method and device for identifying objects
US11128455B2 (en) Data encryption method and system using device authentication key
CN115883052A (en) Data encryption method, data decryption method, device and storage medium
CN106408069B (en) User data write-in and read method and the system of EPC card
CN110889121A (en) Method, server and storage medium for preventing data leakage
CN102609648B (en) Method and device for using word stock safely
CN103501220A (en) Encryption method and device
CN102332978B (en) Lottery ticket off-line verification system
WO2009001053A1 (en) Randomisation
CN108234126B (en) System and method for remote account opening
CN110008724B (en) Solid state hard disk controller safe loading method and device and storage medium
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN105933303A (en) File tempering detection method and device
CN107889102B (en) Method and device for encrypting and decrypting information in short message
CN113672955B (en) Data processing method, system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Encryption method and device for font library

Effective date of registration: 20121121

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co., Ltd.

Pledgor: Shenzhen Wendingchuang Data Technology Co., Ltd.

Registration number: 2012990000710

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20131125

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co., Ltd.

Pledgor: Shenzhen Wendingchuang Data Technology Co., Ltd.

Registration number: 2012990000710

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Encryption method and device for font library

Effective date of registration: 20131125

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co., Ltd.

Pledgor: Shenzhen Wendingchuang Data Technology Co., Ltd.

Registration number: 2013990000896

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20160411

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co., Ltd.

Pledgor: Shenzhen Wendingchuang Data Technology Co., Ltd.

Registration number: 2013990000896

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model