CN110135176B - Encryption method for printing data transmission - Google Patents
Encryption method for printing data transmission Download PDFInfo
- Publication number
- CN110135176B CN110135176B CN201910345968.0A CN201910345968A CN110135176B CN 110135176 B CN110135176 B CN 110135176B CN 201910345968 A CN201910345968 A CN 201910345968A CN 110135176 B CN110135176 B CN 110135176B
- Authority
- CN
- China
- Prior art keywords
- key
- random password
- encryption
- printing
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The invention relates to the technical field of printing data transmission, in particular to an encryption method for printing data transmission; the method specifically comprises the following steps: a user selects a print file at a platform end, triggers and generates a random password c and a random numerical value e at the platform end, and triggers and generates a random password a at a printing end; after inputting a verification random password a, calling a verification code function M to generate a verification code b, and calling a key function N to generate a key K; the platform end equally divides the file stream character string into e groups of character arrays with equal character length; calling an encryption function M to randomly place the key K in each character array to form a new key character array; encrypting according to the encryption logic sequence of the encryption function W to form a key character array, and sequentially encrypting to form an encrypted file d; and sending the encrypted file d, the random password c and the verification code b to a printing end. The invention overcomes the defect that the existing printing data is easy to leak, and achieves the aim of safely and quickly transmitting the printing data.
Description
Technical Field
The invention relates to the technical field of printing data transmission, in particular to an encryption method for printing data transmission.
Background
In recent years, the advent of network printers has enabled more computers to implement shared printing, optimizing office demand. However, when the printing data is transmitted between the computer and the printer through the network plaintext, the listener can easily know the printing content by intercepting the network data packet. Thus, business secrets or personal information are likely to be compromised.
In order to solve this problem, there is a secure printing system which is composed of a printer and a computer equipped with a print driver, and the computer can encrypt document data to be printed and then transmit the encrypted document data to the printer for printing. The specific process of the security imaging method is shown in figure 1, and a printing driver on a computer generates a random number c after a user selects a document to be printed, and generates a key D by adopting an algorithm M. And then, the printing driver encrypts the document data to be printed by using the key D and combining with the algorithm N, and then sends the encrypted document data to be printed and the random number c to the printer. And the printer generates a key D based on the received random number c in combination with the algorithm M, and then decrypts the printed document data by using the key D and the algorithm M to complete the printing operation. Under the above-mentioned safe printing system, the print data is transmitted after being encrypted, but because the information for generating the key is generated by the computer and needs to be transmitted to the printer through the network, the listener can decipher the print data by intercepting the random number and the encrypted print data, or by trying to adopt a plurality of algorithms to operate, so as to obtain the print content, or the problem that the print data is easy to intercept in the process of transmission and printing exists, so that the data printed by the user is leaked, and the security of the print data of the user is influenced.
Disclosure of Invention
In view of this, the present invention provides an encryption method for print data transmission, so as to solve the defect that the existing print data is easy to leak.
An encryption method for printing data transmission is characterized in that a user selects a printing file at a platform end, triggers and generates a random password c and a random numerical value e at the platform end, and triggers and generates a random password a at the printing end; a user inputs a verification random password a at a platform end; the platform terminal calls a verification code function M to generate a verification code b according to the random password a; the platform terminal calls a random password a, a verification code b and a random password c to a key function N to generate a key K; the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length; the platform side calls an encryption function M to randomly place the secret key K in each character array to form a new secret key character array on the basis of the secret key K; the platform end inputs the key character array into the encryption function W according to the encryption logic sequence of the encryption function W, the encryption function W firstly carries out 0 th round key addition operation on the key character array according to a key forming method of a feedback working mode, then sequentially generates 1-10 rounds of keys in an online mode, sequentially encrypts the key character array formed after the previous round of encryption operation in sequence to form a corresponding encrypted file and outputs the encrypted file to obtain an encrypted file d; and sending the encrypted file d, the random password c and the verification code b to a printing end.
As a preferred scheme of the present invention, the encryption process of the encryption function W sequentially includes operations of byte replacement, row shifting, column mixing and key addition, and the steps of column mixing and key addition of each round are combined to form one step, and the steps of column mixing and key addition are sequentially performed by using three exclusive or gates to complete each round of key addition processing; the encryption process of round 10 includes operations of byte replacement, line shifting, and key addition.
As a preferred scheme of the present invention, the encryption function W is sequentially generated online in a logical order by using an input seed key and a key expansion algorithm, and the seed key participates in the 1 st round of key addition operation as an input.
As a preferred embodiment of the present invention, the generation of each of the 1-10 rounds of keys of the encryption function W employs the following steps: establishing 4 rows of 4 multiplied by 11 columns of two-dimensional arrays, wherein each array unit is a byte, and each column of the two-dimensional arrays is used as a word for storing a seed key and ten rounds of keys; the seed key is copied into the first four words of the key schedule table, then the keys generated by the first round of key expansion occupy the next four words, and the four words are arranged according to the order, after ten rounds of expansion, the key schedule table is filled, and the key expansion process is finished, wherein each round of key generation is formed by the sequential operations of word cyclic shift, byte replacement and round constant exclusive-or, and each round of encryption operation and each round of byte replacement in each round of key expansion operation are realized by an S-box lookup table.
As a preferable aspect of the present invention, the encryption method for print data transmission further includes: and the printing end prompts to input a random password c and an authentication code b, receives the encrypted file d after the verification is correct, and calls the random password a, the random password c and the authentication code b.
As a preferable aspect of the present invention, the encryption method for print data transmission further includes: and the printing end calls a secret key function N to generate a secret key K based on the random password a, the verification code b and the random password c, and compares and judges whether the secret key K is equal to the secret key K, if not, the printing end destroys the encrypted file d, and if the secret key K is equal to the secret key K, the printing end calls a decryption function M to decrypt the encrypted file d.
According to the technical scheme, the invention has the beneficial effects that: the method comprises the steps that a user triggers and generates a random password a, a random password c and a random numerical value e at a printing end and a platform end at the same time, then a verification code function M is called through the random password a to generate a verification code b, and then a secret key function N is called through the random password a, the verification code b and the random password c to generate a secret key K; the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length; the platform side calls an encryption function M based on the key K, randomly places the key K in each character array to form a new key character array, and finally encrypts the key character array through the encryption function M to form an encrypted file d; obviously, in the invention, because the random passwords are generated at the printing end and the platform end at the same time and are not transmitted in the network, the random connection between the printing end and the platform end is utilized, and the initial random passwords of the printing end and the platform end are not transmitted along with the network, an illegal user is difficult to intercept the network or break the password generation algorithm of the computing equipment to obtain the random passwords at the same time, the illegal user is prevented from cracking the printed file, and the safety performance of printing data transmission is greatly improved; in addition, the file stream character string is evenly divided into e groups of character arrays with equal character length by using a random numerical value e, and based on the key K, an encryption function M is called to randomly distribute the key K into each character array to form a new key character array, and then the key character arrays are encrypted and integrated, so that the encryption rigidness of the key character arrays is enhanced, the printed file is further prevented from being cracked by an illegal user, the safety performance of printed data transmission is enhanced, the defect that the existing printed data is easy to leak is overcome, and the aim of safely and quickly transmitting the printed data is fulfilled.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart of a security imaging method of the prior art;
fig. 2 is a flowchart of an encryption method for print data transmission according to the present invention.
Detailed Description
The following examples are intended to illustrate the invention in further detail, but are not intended to limit the invention in any way, and unless otherwise specified, the reagents, methods and apparatus used in the invention are conventional in the art, and are not intended to limit the invention in any way.
The first embodiment is as follows: the invention discloses an encryption method for printing data transmission, and particularly relates to a method for generating a random password a by a user through triggering at a platform end, generating a random password c and a random numerical value e through triggering at the platform end and generating the random password a through triggering at a printing end; a user inputs a verification random password a at a platform end; the platform terminal calls a verification code function M to generate a verification code b according to the random password a; the platform terminal calls a random password a, a verification code b and a random password c to a key function N to generate a key K; the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length; the platform side calls an encryption function M to randomly place the secret key K in each character array to form a new secret key character array on the basis of the secret key K; the platform end inputs the key character array into the encryption function W according to the encryption logic sequence of the encryption function W, the encryption function W firstly carries out 0 th round key addition operation on the key character array according to a key forming method of a feedback working mode, then sequentially generates 1-10 rounds of keys in an online mode, sequentially encrypts the key character array formed after the previous round of encryption operation in sequence to form a corresponding encrypted file and outputs the encrypted file to obtain an encrypted file d; and sending the encrypted file d, the random password c and the verification code b to a printing end. In the embodiment of the invention, a user triggers and generates a random password a, a random password c and a random numerical value e at the printing end and the platform end simultaneously, then calls a verification code function M through the random password a to generate a verification code b, and then calls a key function N through the random password a, the verification code b and the random password c to generate a key K; the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length; the platform side calls an encryption function M based on the key K, randomly places the key K in each character array to form a new key character array, and finally encrypts the key character array through the encryption function M to form an encrypted file d; obviously, in the invention, because the random passwords are generated at the printing end and the platform end at the same time and are not transmitted in the network, the random connection between the printing end and the platform end is utilized, and the initial random passwords of the printing end and the platform end are not transmitted along with the network, an illegal user is difficult to intercept the network or break the password generation algorithm of the computing equipment to obtain the random passwords at the same time, the illegal user is prevented from cracking the printed file, and the safety performance of printing data transmission is greatly improved; in addition, the file stream character string is evenly divided into e character arrays with equal character length by using a random numerical value e, the encryption function M is called based on the secret key K to randomly distribute the secret key K in each character array to form a new secret key character array, and then the secret key character arrays are encrypted and integrated, so that the encryption rigor of the secret key character arrays is enhanced, the printed file is further prevented from being cracked by an illegal user, the safety performance of printed data transmission is enhanced, the defect that the existing printed data is easy to leak is overcome, and the purpose of safely and quickly transmitting the printed data is achieved.
More specifically, the embodiment of the invention comprises a printing end processing flow and a platform end printing flow; wherein, the platform end processing flow is as follows: when the print file is selected, the printer executes steps S11 and S12, that is, the printer generates a random password a by user triggering, stores the random password a and displays the random password aDisplaying the operation screen; the platform end executes the steps S21 and S22, namely the platform end generates a random password c due to the triggering of a user, stores the random password c and displays the random password c on an operation screen; s23, a user selects a print file, a printing end triggers to generate a random password a, and a platform end triggers to generate a random password c; s24, inputting a verification random password a on a display screen of the platform end; s25, the platform terminal calls a verification code function M to generate a verification code b according to the random password a; in this step, the specific expression of the verification code function M isWherein, f (x) is a verification code b, and the value of the verification code b is the first six digits; pi is the circumference ratio, the value is 3.1415926 T The printing time parameter is specifically the sum of the year, month and day of the current printing time, a-T is the verification difference rate, and the specific value is the sum of the random password minus the current printing time; specifically, 20 minutes at 18, 18 and 15 months in 2019, then ^ 20>That is to say that the validation code b has a specific value->The verification code function M is specifically combined with the current printing time to obtain a specific verification code, the skilful property of an illegal user for obtaining and generating the verification code is reduced, the illegal user is further prevented from cracking a printed file, and the safety performance of printing data transmission is enhanced, so that the defect that the existing printing data is easy to leak is overcome, and the purpose of safely and quickly transmitting the printing data is achieved; s26, the platform terminal calls the random password a, the verification code b and the random password c to a key function N to generate a key K; the key function N can select the existing hash value key function according to actual requirements, the step further specifically combines the current printing time to obtain a specific verification code, and then synthesizes the hash value key function with higher current confidentiality degree to generate the key K, so that the skilful property of obtaining the generated key K by an illegal user is reduced, the printed file is further prevented from being cracked by the illegal user, and the printed number is enhancedAccording to the safety performance of transmission, the defect that the existing printing data is easy to leak is further overcome, and the purpose of safely and quickly transmitting the printing data is achieved. S27, based on the key K, calling an encryption function W to generate an encrypted file d, specifically: the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length; the platform side calls an encryption function M to randomly place the secret key K in each character array to form a new secret key character array on the basis of the secret key K; and the platform end inputs the key character array into the encryption function W according to the encryption logic sequence of the encryption function W, and the encryption function W firstly carries out 0 th round key addition operation on the key character array according to a key forming method of a feedback working mode, then sequentially generates 1-10 rounds of keys in an online mode, sequentially encrypts the key character array formed after the previous round of encryption operation to form a corresponding encrypted file and outputs the encrypted file to obtain an encrypted file d. And S28, sending the encrypted file d, the random password c and the verification code b to a printing end. The processing flow on the printing end is as follows: s13, prompting the printer end to input a random password c and a verification code b, receiving an encrypted file d after verification is correct, and calling the random password a, the random password c and the verification code b; S14-S15, calling a key function N to generate a key K by the printing end based on the random password a, the verification code b and the random password c, comparing and judging whether the key K is equal to the key K, destroying the encrypted file d by the printing end if the key K is not equal to the key K, and calling a decryption function M to decrypt the encrypted file d if the key K is equal to the key K; s16, calling a decryption function M adaptive to the encryption function W to decrypt the encrypted file d to obtain an original printed file; and S17, printing the original printing file, and automatically destroying the original printing file of the electronic file after printing to prevent the file from being leaked.
Specifically, the encryption process of the encryption function W sequentially comprises operations of byte replacement, row shifting, column mixing and key addition, each round of column mixing and key addition is combined to form a step, and the steps of column mixing and key addition are sequentially finished by three exclusive-OR gates; the 10 th round of encryption process includes operations of byte replacement, line shifting and key addition. The encryption function W is sequentially generated on line according to a logic sequence by utilizing an input seed key and a key expansion algorithm, and the seed key is used as an input to participate in the 1 st round of key addition operation. The generation of each round of keys of the 1-10 rounds of keys of the encryption function W adopts the following steps: establishing 4 rows of 4 multiplied by 11 columns of two-dimensional arrays, wherein each array unit is a byte, and each column of the two-dimensional arrays is used as a word for storing a seed key and ten rounds of keys; the seed key is copied into the first four words of the key schedule table, then the keys generated by the first round of key expansion occupy the next four words, and the four words are arranged according to the order, after ten rounds of expansion, the key schedule table is filled, and the key expansion process is finished, wherein each round of key generation is formed by the sequential operations of word cyclic shift, byte replacement and round constant exclusive-or, and each round of encryption operation and each round of byte replacement in each round of key expansion operation are realized by an S-box lookup table. Obviously, in the embodiment of the invention, the key character array formed by pre-segmentation is firstly subjected to the key encryption operation of the 0 th round, then the key character array formed after the previous round of encryption operation is sequentially encrypted by sequentially inputting 1-10 keys sequentially generated in an online mode according to the encryption logic sequence of an encryption algorithm to form corresponding ciphertext output, the steps of column mixing and key encryption of each round in the 1-9 rounds are combined to form a step, and the generation time of the key of the 1 st round is synchronous with the key encryption operation of the 0 th round, so that the performance of encryption processing is greatly improved.
Obviously, in the embodiment of the invention, on one hand, the invention obtains the specific verification code by specifically combining the verification code function M with the current printing time, reduces the skilful property of an illegal user for obtaining and generating the verification code, and then generates the key K by synthesizing the hash value key function with higher current confidentiality degree, reduces the skilful property of the illegal user for obtaining and generating the key K, avoids the illegal user from cracking the printed file, enhances the safety performance of printed data transmission, and further solves the defect that the existing printed data is easy to leak; in addition, the file stream character string is evenly divided into e groups of character arrays with equal character length by using a random numerical value e, and based on the key K, an encryption function M is called to randomly place the key K in each character array to form a new key character array, and then the key character arrays are encrypted and integrated, so that the encryption rigidness of the key character arrays is enhanced, an illegal user is further prevented from cracking the printed file, and the safety performance of printing data transmission is enhanced; and initial random passwords of the printing end and the platform end are not transmitted along with the network, so that an illegal user is difficult to intercept the network or break a password generation algorithm of the computing equipment to obtain the random passwords simultaneously, the condition that the illegal user breaks a printed file is avoided, the safety performance of printing data transmission is greatly improved, the defect that the existing printing data is easy to leak is overcome, and the aim of safely and quickly transmitting the printing data is fulfilled.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments can be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (6)
1. An encryption method for printing data transmission, characterized in that:
a user selects a print file at a platform end, triggers and generates a random password c and a random numerical value e at the platform end, and triggers and generates a random password a at a printing end;
a user inputs a verification random password a at a platform end;
the platform terminal calls a verification code function M to generate a verification code b according to the random password a;
the platform terminal calls a random password a, a verification code b and a random password c to a key function N to generate a key K;
the platform end translates the printed file to form a file stream character string, and according to a random numerical value e, the file stream character string is evenly divided into e groups of character arrays with equal character length;
the platform side calls an encryption function M to randomly place the secret key K in each character array to form a new secret key character array on the basis of the secret key K;
the platform end inputs the key character array into the encryption function W according to the encryption logic sequence of the encryption function W, the encryption function W firstly carries out 0 th round key addition operation on the key character array according to a key forming method of a feedback working mode, then sequentially generates 1-10 rounds of keys in an online mode, sequentially encrypts the key character array formed after the previous round of encryption operation in sequence to form a corresponding encrypted file and outputs the encrypted file to obtain an encrypted file d;
sending the encrypted file d, the random password c and the verification code b to a printing end;
after selecting the print file, the printing end executes the steps S11 and S12, namely, the printing end generates a random password a due to the triggering of a user, and stores and displays the random password a on an operation screen; the platform end executes the steps S21 and S22, namely the platform end generates a random password c due to the triggering of a user, stores the random password c and displays the random password c on an operation screen; s23, a user selects a print file, a printing end triggers to generate a random password a, and a platform end triggers to generate a random password c; s24, inputting a verification random password a on a display screen of the platform end; s25, the platform terminal calls a verification code function M to generate a verification code b according to the random password a; in this step, the verification code function M is specifically represented asWherein, f (x) is a verification code b, and the value of the verification code b is the first six digits; pi is the circumference ratio, the value is 3.1415926 T The specific value of the printing time parameter is the sum of the year, month and day of the current printing time, and a-T is the verification difference rate, and the specific value is the sum of the random password and the current printing time.
2. The encryption method for printing data transmission according to claim 1, wherein the encryption process of the encryption function W sequentially comprises operations of byte replacement, row shifting, column mixing and key adding, and the steps of column mixing and key adding of each round are combined to form one step, and the steps of column mixing and key adding are sequentially performed by three exclusive-or gates to complete the key adding process of each round; the encryption process of round 10 includes operations of byte replacement, line shifting, and key addition.
3. The encryption method for printing data transmission according to claim 2, wherein the encryption function W is sequentially generated on line in a logical order by using an input seed key and a key expansion algorithm, and the seed key is used as an input to participate in the 1 st round of key addition operation.
4. The encryption method for printing data transmission according to claim 3, wherein the generation of each of the 1-10 rounds of keys of the encryption function W comprises the following steps: establishing 4 rows of 4 multiplied by 11 columns of two-dimensional arrays, wherein each array unit is a byte, and each column of the two-dimensional arrays is used as a word for storing a seed key and ten rounds of keys; the seed key is copied into the first four words of the key schedule table, then the keys generated by the first round of key expansion occupy the next four words, and the four words are arranged according to the order, after ten rounds of expansion, the key schedule table is filled, and the key expansion process is finished, wherein each round of key generation is formed by the sequential operations of word cyclic shift, byte replacement and round constant exclusive-or, and each round of encryption operation and each round of byte replacement in each round of key expansion operation are realized by an S-box lookup table.
5. The encryption method for print data transmission according to claim 4, wherein said encryption method for print data transmission further comprises: and the printing end prompts to input a random password c and an authentication code b, receives the encrypted file d after the verification is correct, and calls the random password a, the random password c and the authentication code b.
6. The encryption method for print data transmission according to claim 5, further comprising: and the printing end calls a secret key function N to generate a secret key K based on the random password a, the verification code b and the random password c, and compares and judges whether the secret key K is equal to the secret key K, if not, the printing end destroys the encrypted file d, and if the secret key K is equal to the secret key K, the printing end calls a decryption function M to decrypt the encrypted file d.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910345968.0A CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910345968.0A CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN110135176A CN110135176A (en) | 2019-08-16 |
| CN110135176B true CN110135176B (en) | 2023-04-18 |
Family
ID=67575193
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910345968.0A Active CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110135176B (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110816089B (en) * | 2019-10-15 | 2021-11-05 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
| CN111062456A (en) * | 2019-12-25 | 2020-04-24 | 李蕴光 | Two-dimensional code encryption algorithm |
| CN111959139B (en) * | 2020-08-31 | 2022-05-13 | 湖南鼎一致远科技发展有限公司 | Encryption system of thermal transfer printer |
| CN114826789B (en) * | 2022-06-29 | 2022-09-16 | 北京辰光融信技术有限公司 | Printing control method and system for ensuring data safe transmission |
| CN114844728B (en) * | 2022-07-04 | 2022-09-06 | 道格特半导体科技(江苏)有限公司 | Serialized data secure communication method and big data platform |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105162803A (en) * | 2015-09-30 | 2015-12-16 | 深圳市金城保密技术有限公司 | Safe information output method and safe information output system of secret-relating network |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7251632B1 (en) * | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
| CN102013980A (en) * | 2009-05-06 | 2011-04-13 | 刘海云 | Random encryption method for decrypting by adopting exhaustion method |
| CN101872402A (en) * | 2010-05-26 | 2010-10-27 | 上海北大方正科技电脑系统有限公司 | Safe printing method |
| CN103777912B (en) * | 2014-01-27 | 2017-08-25 | 珠海赛纳打印科技股份有限公司 | A kind of imaging device and its safe imaging method, imaging system |
| CN105450408A (en) * | 2014-08-04 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password checking method and device |
| CN105939190A (en) * | 2016-06-23 | 2016-09-14 | 天津中安华典数据安全科技有限公司 | AES data encryption method for offline key generation based on FPGA |
-
2019
- 2019-04-26 CN CN201910345968.0A patent/CN110135176B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105162803A (en) * | 2015-09-30 | 2015-12-16 | 深圳市金城保密技术有限公司 | Safe information output method and safe information output system of secret-relating network |
Non-Patent Citations (2)
| Title |
|---|
| Ding Xiaodong 等.Security System for Internal Network Printing.《2012 Eighth International Conference on Computational Intelligence and Security》.2013,596-600. * |
| 李玲双.加密文档破解系统的设计与实现.《中国优秀硕士学位论文全文数据库》.2018,I138-190. * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN110135176A (en) | 2019-08-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110135176B (en) | Encryption method for printing data transmission | |
| US7571320B2 (en) | Circuit and method for providing secure communications between devices | |
| Kumar et al. | Development of modified AES algorithm for data security | |
| US10187200B1 (en) | System and method for generating a multi-stage key for use in cryptographic operations | |
| US5179591A (en) | Method for algorithm independent cryptographic key management | |
| JP6301471B2 (en) | ID authentication system, apparatus, method, and ID authentication request apparatus | |
| US7254232B2 (en) | Method and system for selecting encryption keys from a plurality of encryption keys | |
| EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
| CN108123794A (en) | The generation method and encryption method of whitepack key, apparatus and system | |
| Gautam et al. | An enhanced cipher technique using vigenere and modified caesar cipher | |
| CN113711564A (en) | Computer-implemented method and system for encrypting data | |
| US9430657B2 (en) | Data encryption system and method | |
| US20020159588A1 (en) | Cryptography with unconditional security for the internet, commercial intranets, and data storage | |
| US9363244B2 (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
| US20090010433A1 (en) | Schryption method and device | |
| CN116488810B (en) | Identity authentication method, identity authentication system, and readable storage medium | |
| EP2904731B1 (en) | Method and device for digital data blocks encryption and decryption | |
| Sermeno et al. | Modified Vigenere cryptosystem: An integrated data encryption module for learning management system | |
| CN111683061A (en) | Block chain-based Internet of things equipment access control method and device | |
| Kwon et al. | Efficient and secure password-based authentication protocols against guessing attacks | |
| KR20090118028A (en) | Authentication system | |
| CN111654859A (en) | Mobile block chain resource allocation method and device | |
| CN115296852B (en) | Data encryption and decryption methods, devices and data encryption and decryption system | |
| EP2940919A1 (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
| Asoro et al. | Development of A Honeyed Advanced Encryption Standard Algorithm (HAESA) |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |