CN103259652A - Information decryption method based on timeliness parameters - Google Patents

Information decryption method based on timeliness parameters Download PDF

Info

Publication number
CN103259652A
CN103259652A CN2012101394196A CN201210139419A CN103259652A CN 103259652 A CN103259652 A CN 103259652A CN 2012101394196 A CN2012101394196 A CN 2012101394196A CN 201210139419 A CN201210139419 A CN 201210139419A CN 103259652 A CN103259652 A CN 103259652A
Authority
CN
China
Prior art keywords
user
timeliness
parameter
memory cell
timeliness parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101394196A
Other languages
Chinese (zh)
Other versions
CN103259652B (en
Inventor
沈兵
刘建
冯涛
李晶
卢红洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Transport Telecommunications And Information Center
Original Assignee
China Transport Telecommunications & Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Transport Telecommunications & Information Center filed Critical China Transport Telecommunications & Information Center
Priority to CN201210139419.6A priority Critical patent/CN103259652B/en
Publication of CN103259652A publication Critical patent/CN103259652A/en
Application granted granted Critical
Publication of CN103259652B publication Critical patent/CN103259652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The invention discloses an information decryption method based on timeliness parameters and belongs to the technical field of decoding. The information decryption method comprises the following steps of (1) conducting compositional operation on a random code A and a random code B to obtain a seed code, and conducting compositional operation on the seed code to obtain a systematic timeliness parameter K; (2) generating a user timeliness parameter according to the systematic timeliness parameter; (3) generating a working timeliness parameter according to the user timeliness parameter; (4) serving the working timeliness parameter as a secrete key to conduct decryption processing on enciphered information. The information decryption method has the advantages that due to the fact that the working timeliness parameter is used for decrypting of the information, safety of information obtaining is enhanced, meanwhile a user can just obtain information within fixed time, and the possibility of information leakage is greatly reduced.

Description

A kind of decrypts information method based on the timeliness parameter
Technical field
The invention belongs to the decoding technique field, particularly a kind of decrypts information method based on the timeliness parameter.
Background technology
In satellite navigation system or other communication systems, can set up the flow process of encrypt and decrypt usually, can guarantee the data transmission security between user and the satellite (or other devices) like this.It is ciphered data that satellite or other devices are issued user's data, this moment the user handheld terminal corresponding decrypted program is installed, the user to above-mentioned decrypts information after, just can receive corresponding data.
In above-mentioned communication system, corresponding decrypted program does not have time restriction, and the user can use at any time; And in some cases, needing classification to set user's authority, the user has only official hour interior (by its authority) could use decrypted program that information is decrypted, and beyond official hour, the user haves no right to use decrypted program.At this moment, existing satellite navigation system or other communication systems can not satisfy this requirement.
Summary of the invention
The present invention is directed to above-mentioned defective and disclose a kind of decrypts information method based on the timeliness parameter, it may further comprise the steps:
1) A random code and B random code are carried out compose operation and obtain kind of a subcode, kind of subcode is carried out compose operation obtain system's timeliness parameter K;
2) according to the timeliness parameter generating user of system timeliness parameter;
First memory cell, second memory cell, the 3rd memory cell and the 4th memory cell order are successively arranged, more than the data of four cell stores arrange in proper order and just constitute user's timeliness parameter;
The X time is encoded, be about to X and be encoded to 16 ary codes: KLMN, this 16 ary codes is no symbol short, and its length is 2 bytes;
Above-mentioned 16 system sign indicating numbers are carried out cascade 8 times, constitute the character string that a length equals 16 bytes, use P here XExpression; Then, as working key, adopt aes algorithm to P system's timeliness parameter XBe encrypted the character string C that obtains 16 bytes X, i.e. C X=AES (P X, K); Deposit KLMN in first memory cell, second memory cell deposits data 00, the three storage in and singly deposits data 00, the four memory cell in and deposit data C in X, this moment, the data of four cell stores were arranged just formation year user's timeliness parameter in proper order;
To encoding in Y month, soon be encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: KLMNPQ, the length of PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade obtain a character string for 5 times, with afterbody cascade 16 system character string: the PQ of this character string, the character string that to obtain a length at last be 16 bytes is used PP here XYExpression;
With C XAs working key, adopt aes algorithm to PP XYBe encrypted the character string CC that obtains 16 bytes XY, i.e. CC XY=AES (PP XY, C X); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data 00, the four memory cell in and deposits data CC in XY, this moment, the data of four cell stores were arranged just formation month user's timeliness parameter in proper order;
To encoding in Z week, soon be encoded to 16 system character string: ST Z week, then 16 system character strings of X Y month Z week correspondence are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represented for the 1st thoughtful the 4th week respectively, and KLMNPQST is carried out cascade 4 times, the character string that to obtain a length be 16 bytes is used PPP here XYZExpression;
With CC XYAs working key, adopt aes algorithm to PPP XYZBe encrypted the character string CCC that obtains 16 bytes XYZ, i.e. CC XYZ=AES (PPP XYZ, CC XY); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data ST in, and the 4th memory cell deposits data CCC in XYZ, the data of four cell stores are arranged in proper order and are just constituted all user's timeliness parameters at this moment;
3) according to user's timeliness parameter generating work limitation parameter;
According to the current time, judge that user's timeliness parameter time corresponding whether in the effective time section, judges namely whether the current time belongs to user's timeliness parameter time corresponding;
If judged result then finishes for not; If judged result is for being, then according to step 2) user's timeliness parameter is carried out dispersion treatment, obtain year user's timeliness parameter, month user's timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, month user's timeliness parameter and all user's timeliness parameters are activated, obtain the work limitation parameter;
4) use the work limitation parameter as key, enciphered message is decrypted processing.
Described A random code and B random code are two composition variables of kind of subcode.
Described kind of subcode is the composition variable of system's timeliness parameter.
The length of the data of described the 4th cell stores is 16 bytes, 24 bytes or 32 bytes.
Beneficial effect of the present invention is: the present invention uses the work limitation parameter that information is decrypted, thereby has strengthened the fail safe that information is obtained, simultaneously, the invention enables the user can only be in official hour could acquired information; Greatly reduce the possibility of information leakage.
Description of drawings
Fig. 1 is workflow diagram of the present invention;
Fig. 2 is the memory cell schematic diagram of user's timeliness parameter.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
As shown in Figure 1, a kind of decrypts information method based on the timeliness parameter may further comprise the steps:
1) A random code and B random code are carried out compose operation and obtain kind of a subcode, kind of subcode is carried out compose operation obtain system's timeliness parameter K;
2) according to the timeliness parameter generating user of system timeliness parameter;
As shown in Figure 2, first memory cell, second memory cell, the 3rd memory cell and the 4th memory cell order are successively arranged, more than the data of four cell stores arrange in proper order and just constitute user's timeliness parameter;
The X time is encoded, be about to X and be encoded to 16 ary codes: KLMN, this 16 ary codes is no symbol short, and its length is 2 bytes;
Above-mentioned 16 system sign indicating numbers are carried out cascade 8 times, constitute the character string that a length equals 16 bytes, use P here XExpression; Then, as working key, adopt aes algorithm to P system's timeliness parameter XBe encrypted the character string C that obtains 16 bytes X, i.e. C X=AES (P X, K); Deposit KLMN in first memory cell, second memory cell deposits data 00, the three storage in and singly deposits data 00, the four memory cell in and deposit data C in X, this moment, the data of four cell stores were arranged just formation year user's timeliness parameter in proper order;
For example the production process of year user's Ageing Treatment parameter in 2007 is as follows:
X=”07D7”,?P X=”?07D707D707D707D707D707D707D707D7”
C X=AES(P X,K),
Then year user's Ageing Treatment parameter in 2007 is
07D7 00 00 C X
To encoding in Y month, soon be encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: KLMNPQ, the length of PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade obtain a character string for 5 times, with afterbody cascade 16 system character string: the PQ of this character string, the character string that to obtain a length at last be 16 bytes is used PP here XYExpression;
With C XAs working key, adopt aes algorithm to PP XYBe encrypted the character string CC that obtains 16 bytes XY, i.e. CC XY=AES (PP XY, C X); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data 00, the four memory cell in and deposits data CC in XY, this moment, the data of four cell stores were arranged just formation month user's timeliness parameter in proper order;
The for example generation of month user's Ageing Treatment parameter in March, 2007
PP XY=”?07D70307D70307D70307D70307D70303”
CC XY=AES(PP XY,?C X),
Then year user's Ageing Treatment parameter in 2007 is
07D7 03 00 CC XY
To encoding in Z week, soon be encoded to 16 system character string: ST Z week, then 16 system character strings of X Y month Z week correspondence are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represents the 1st thoughtful the 4th week (extending to last day of this month around setting the herein) respectively, and KLMNPQST is carried out cascade 4 times, the character string that to obtain a length be 16 bytes is used PPP here XYZExpression;
With CC XYAs working key, adopt aes algorithm to PPP XYZBe encrypted the character string CCC that obtains 16 bytes XYZ, i.e. CC XYZ=AES (PPP XYZ, CC XY); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data ST in, and the 4th memory cell deposits data CCC in XYZ, the data of four cell stores are arranged in proper order and are just constituted all user's timeliness parameters at this moment;
The for example generation of all user's Ageing Treatment parameters in the 1st week in March, 2007
PPP XYZ=”?07D7030107D7030107D7030107D70301”
CCC XYZ=AES(PPP XYZ,?C XY),
Then year user's Ageing Treatment parameter in 2007 is
07D7 03 01 CCC XYZ
3) according to user's timeliness parameter generating work limitation parameter;
According to the current time, judge that user's timeliness parameter time corresponding whether in the effective time section, judges namely whether the current time belongs to user's timeliness parameter time corresponding;
If judged result then finishes for not; If judged result is for being, then according to step 2) user's timeliness parameter is carried out dispersion treatment, obtain year user's timeliness parameter, month user's timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, month user's timeliness parameter and all user's timeliness parameters are activated, obtain the work limitation parameter;
4) use the work limitation parameter as key, enciphered message is decrypted processing.
A random code and B random code are two composition variables of kind of subcode.
Planting subcode is the composition variable of system's timeliness parameter.
The length of the data of the 4th cell stores is 16 bytes, 24 bytes or 32 bytes.

Claims (4)

1. decrypts information method based on the timeliness parameter is characterized in that it may further comprise the steps:
1) A random code and B random code are carried out compose operation and obtain kind of a subcode, kind of subcode is carried out compose operation obtain system's timeliness parameter K;
2) according to the timeliness parameter generating user of system timeliness parameter;
First memory cell, second memory cell, the 3rd memory cell and the 4th memory cell order are successively arranged, more than the data of four cell stores arrange in proper order and just constitute user's timeliness parameter;
The X time is encoded, be about to X and be encoded to 16 ary codes: KLMN, this 16 ary codes is no symbol short, and its length is 2 bytes;
Above-mentioned 16 system sign indicating numbers are carried out cascade 8 times, constitute the character string that a length equals 16 bytes, use P here XExpression; Then, as working key, adopt aes algorithm to P system's timeliness parameter XBe encrypted the character string C that obtains 16 bytes X, i.e. C X=AES (P X, K); Deposit KLMN in first memory cell, second memory cell deposits data 00, the three storage in and singly deposits data 00, the four memory cell in and deposit data C in X, this moment, the data of four cell stores were arranged just formation year user's timeliness parameter in proper order;
To encoding in Y month, soon be encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: KLMNPQ, the length of PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade obtain a character string for 5 times, with afterbody cascade 16 system character string: the PQ of this character string, the character string that to obtain a length at last be 16 bytes is used PP here XYExpression;
With C XAs working key, adopt aes algorithm to PP XYBe encrypted the character string CC that obtains 16 bytes XY, i.e. CC XY=AES (PP XY, C X); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data 00, the four memory cell in and deposits data CC in XY, this moment, the data of four cell stores were arranged just formation month user's timeliness parameter in proper order;
To encoding in Z week, soon be encoded to 16 system character string: ST Z week, then 16 system character strings of X Y month Z week correspondence are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represented for the 1st thoughtful the 4th week respectively, and KLMNPQST is carried out cascade 4 times, the character string that to obtain a length be 16 bytes is used PPP here XYZExpression;
With CC XYAs working key, adopt aes algorithm to PPP XYZBe encrypted the character string CCC that obtains 16 bytes XYZ, i.e. CC XYZ=AES (PPP XYZ, CC XY); Deposit KLMN in first memory cell, second memory cell deposits data PQ in, and the 3rd storage singly deposits data ST in, and the 4th memory cell deposits data CCC in XYZ, the data of four cell stores are arranged in proper order and are just constituted all user's timeliness parameters at this moment;
3) according to user's timeliness parameter generating work limitation parameter;
According to the current time, judge that user's timeliness parameter time corresponding whether in the effective time section, judges namely whether the current time belongs to user's timeliness parameter time corresponding;
If judged result then finishes for not; If judged result is for being, then according to step 2) user's timeliness parameter is carried out dispersion treatment, obtain year user's timeliness parameter, month user's timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, month user's timeliness parameter and all user's timeliness parameters are activated, obtain the work limitation parameter;
4) use the work limitation parameter as key, enciphered message is decrypted processing.
2. a kind of decrypts information method based on the timeliness parameter according to claim 1 is characterized in that, described A random code and B random code are two composition variables of kind of subcode.
3. a kind of decrypts information method based on the timeliness parameter according to claim 1 is characterized in that described kind of subcode is the composition variable of system's timeliness parameter.
4. a kind of decrypts information method based on the timeliness parameter according to claim 1 is characterized in that, the length of the data of described the 4th cell stores is 16 bytes, 24 bytes or 32 bytes.
CN201210139419.6A 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter Active CN103259652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210139419.6A CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210139419.6A CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Publications (2)

Publication Number Publication Date
CN103259652A true CN103259652A (en) 2013-08-21
CN103259652B CN103259652B (en) 2015-12-16

Family

ID=48963370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210139419.6A Active CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Country Status (1)

Country Link
CN (1) CN103259652B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0751646A2 (en) * 1995-06-30 1997-01-02 Canon Kabushiki Kaisha Method and apparatus for charging users in a cryptographic communications system
CN101833629A (en) * 2009-03-11 2010-09-15 南京理工大学 Software area authorization encryption method and implementing device therefor
CN102012993A (en) * 2010-11-29 2011-04-13 北京卓微天成科技咨询有限公司 Methods and devices for selectively encrypting and decrypting data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0751646A2 (en) * 1995-06-30 1997-01-02 Canon Kabushiki Kaisha Method and apparatus for charging users in a cryptographic communications system
CN101833629A (en) * 2009-03-11 2010-09-15 南京理工大学 Software area authorization encryption method and implementing device therefor
CN102012993A (en) * 2010-11-29 2011-04-13 北京卓微天成科技咨询有限公司 Methods and devices for selectively encrypting and decrypting data

Also Published As

Publication number Publication date
CN103259652B (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
CN102546181B (en) Cloud storage encrypting and deciphering method based on secret key pool
CN102012993B (en) Methods and devices for selectively encrypting and decrypting data
CN102594548B (en) Method capable of achieving data sectional encryption and decryption
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
US20120170740A1 (en) Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
CN105468990A (en) Sensitive information management control method and apparatus
CN105099652B (en) Data encryption, decryption method and device
CN105847005B (en) Encryption device and method
CN103067162A (en) Method and device of data transmission
CN101996298A (en) Encrypting method and decrypting method corresponding to same
CN104660590B (en) A kind of file encryption secure cloud storage scheme
CN102594549B (en) Multistage data encryption and decryption methods
CN102663325A (en) A method and system for binding of software and hardware
CN102571804B (en) Method for first logging in Internet of Things centre based on product identification code
CN103853943A (en) Program protection method and device
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN110704854A (en) Stream type encryption method aiming at text data reserved format
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN105379172B (en) Device and method for the key updating used in Tuber yield
CN103117850A (en) Cryptosystem based on random sequence database
CN103824197A (en) Anti-counterfeit code generating device
CN105357665A (en) Encryption method for sensitive data of mobile phone and off-line decryption method based on same
CN103259646B (en) A kind of information decryption method based on satellite navigation system
CN104954362A (en) Serial number encryption-decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220106

Address after: 101399 room 1115, 6 Anfu street, Houshayu Town, Shunyi District, Beijing

Patentee after: Jiaoxin Beidou Technology Co.,Ltd.

Patentee after: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

Address before: 100011 rear body of Chaoyang District foreign and foreign embassy in Beijing

Patentee before: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230425

Address after: 100011 No. 1, back of Andingmen Waiguan, Chaoyang District, Beijing

Patentee after: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

Address before: 101399 room 1115, 6 Anfu street, Houshayu Town, Shunyi District, Beijing

Patentee before: Jiaoxin Beidou Technology Co.,Ltd.

Patentee before: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER