CN112054890B - Screen configuration file export and import method and device and broadcasting control equipment - Google Patents

Screen configuration file export and import method and device and broadcasting control equipment Download PDF

Info

Publication number
CN112054890B
CN112054890B CN201910493409.4A CN201910493409A CN112054890B CN 112054890 B CN112054890 B CN 112054890B CN 201910493409 A CN201910493409 A CN 201910493409A CN 112054890 B CN112054890 B CN 112054890B
Authority
CN
China
Prior art keywords
screen configuration
file
configuration file
authentication
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910493409.4A
Other languages
Chinese (zh)
Other versions
CN112054890A (en
Inventor
张敏
韩丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Novastar Electronic Technology Co Ltd
Original Assignee
Xian Novastar Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Novastar Electronic Technology Co Ltd filed Critical Xian Novastar Electronic Technology Co Ltd
Priority to CN201910493409.4A priority Critical patent/CN112054890B/en
Publication of CN112054890A publication Critical patent/CN112054890A/en
Application granted granted Critical
Publication of CN112054890B publication Critical patent/CN112054890B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention discloses a screen configuration file export method and device, a screen configuration file import method and device and broadcasting control equipment. The screen configuration file deriving method includes, for example: responding to the export instruction to obtain an authentication password; performing encryption operation on the authentication password by using an exclusive OR code to obtain an encrypted authentication password; storing the encrypted authentication password to an authentication file, and encrypting the authentication file by using an encryption key to obtain an encrypted authentication file; reading a screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and exporting the encrypted authentication file and the encrypted screen configuration file to a target device. The embodiment of the invention can improve the high protection and high reliability of the display screen broadcast program update.

Description

Screen configuration file export and import method and device and broadcasting control equipment
Technical Field
The present invention relates to the field of file processing and media playing technologies, and in particular, to a method for exporting a screen configuration file, a device for exporting a screen configuration file, a method for importing a screen configuration file, a device for importing a screen configuration file, and a broadcasting device.
Background
The broadcasting device, such as a multimedia playing box, has a screen configuration file export and import function for updating screen configuration information of a display screen, such as an LED display screen. Typically, a screen administrator uses a usb disk to export a screen configuration file from another device (e.g., a PC) and import the screen configuration file into a broadcasting device to update the screen configuration. But this also gives the lawless person the possibility to tamper with the screen configuration of the display in the same way. The traditional method for solving the problem is to lock the broadcasting equipment in the closed box body so as to avoid illegal molecules from contacting the broadcasting equipment. However, the method still has the problems of poor protection performance and low reliability, and the screen configuration of the display screen is still possibly tampered.
Disclosure of Invention
The embodiment of the invention provides a screen configuration file export method and device, a screen configuration file import method and device and broadcasting control equipment, which can improve the high protection and high reliability of the screen configuration of a display screen.
In one aspect, a method for exporting a screen configuration file provided by an embodiment of the present invention includes: responding to the export instruction to obtain an authentication password; performing encryption operation on the authentication password by using an exclusive OR code to obtain an encrypted authentication password; storing the encrypted authentication password to an authentication file, and encrypting the authentication file by using an encryption key to obtain an encrypted authentication file; reading a screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and exporting the encrypted authentication file and the encrypted screen configuration file to a target device.
In one embodiment of the present invention, the screen configuration file includes a total screen load size, a number of screen loads per screen port, a screen routing manner, and/or a single screen size.
In one embodiment of the present invention, the encryption mode used for encrypting the authentication file by using the encryption key is a DES encryption mode, and/or the encryption mode used for encrypting the screen configuration file by using the encryption key is a DES encryption mode.
In one embodiment of the invention, the exclusive-or code and the encryption key are dynamically generated; after the encrypted authentication file and the encrypted screen configuration file are exported to the target device, the screen configuration file exporting method further includes: transmitting the exclusive-or code and the encryption key for the broadcasting control equipment to acquire; the target device is a mobile storage device used for importing the encrypted authentication file and the encrypted screen configuration file to the broadcasting device, or the target device is the broadcasting device.
In another aspect, an apparatus for deriving a screen configuration file provided in an embodiment of the present invention includes: the authentication password acquisition module is used for responding to the export instruction to acquire an authentication password; the authentication password encryption module is used for carrying out encryption operation on the authentication password by using the exclusive or code to obtain an encrypted authentication password; the authentication file encryption module is used for storing the encryption authentication password into an authentication file and encrypting the authentication file by using an encryption key to obtain an encryption authentication file; the screen configuration file encryption module is used for reading the screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and a file export module for exporting the encrypted authentication file and the encrypted screen configuration file to a target device.
In one embodiment of the present invention, the screen configuration file includes a total screen load size, a number of screen loads per screen port, a screen routing manner, and/or a single screen size.
In one embodiment of the present invention, the authentication file encryption module is specifically configured to encrypt the authentication file by using the encryption key and using a DES encryption method to obtain the encrypted authentication file, and/or the screen configuration file encryption module is specifically configured to encrypt the screen configuration file by using the encryption key and using a DES encryption method to obtain the encrypted screen configuration file.
In one embodiment of the invention, the exclusive-or code and the encryption key are dynamically generated; the screen configuration file deriving device further includes: the password sending module is used for sending the exclusive-or code and the encryption key to be obtained by broadcasting control equipment; the target device is a mobile storage device used for importing the encrypted authentication file and the encrypted screen configuration file to the broadcasting device, or the target device is the broadcasting device.
In still another aspect, a method for importing a screen configuration file provided by an embodiment of the present invention includes: responding to the imported instruction to read the encrypted authentication file on the target device; decrypting the encrypted authentication file by using a decryption key to obtain an authentication file; reading an encrypted authentication password in the authentication file, and decrypting the encrypted authentication password by using an exclusive or code to obtain an authentication password; and when the authentication password is consistent with the authentication password, reading the encrypted screen configuration file on the target device, and decrypting the encrypted screen configuration file by using the decryption key to obtain the screen configuration file for screen configuration.
In one embodiment of the present invention, the decryption mode used for decrypting the encrypted authentication file by using the decryption key to obtain the authentication file is a DES decryption mode, and/or the decryption mode used for decrypting the encrypted screen configuration file by using the decryption key is a DES decryption mode.
In still another aspect, an apparatus for importing a screen configuration file provided in an embodiment of the present invention includes: the encryption authentication file reading module is used for responding to the importing instruction to read the encryption authentication file on the target equipment; the encryption authentication file decryption module is used for decrypting the encryption authentication file by using the decryption key to obtain an authentication file; the authentication password decryption module is used for reading the encrypted authentication password in the authentication file and decrypting the encrypted authentication password by using the exclusive-or code to obtain an authentication password; and the screen configuration file decryption module is used for reading the encrypted screen configuration file on the target equipment when the authentication password is consistent with the authentication password, and decrypting the encrypted screen configuration file by using the decryption key to obtain the screen configuration file for screen configuration.
In still another aspect, the embodiment of the present invention provides a broadcasting control device, configured to perform screen configuration on a display screen; the broadcasting equipment comprises an embedded processor and a memory; the memory stores instructions for the embedded processor to execute, and the instructions cause the embedded processor to execute operations to implement the screen configuration file importing method as described above.
The above technical solution may have the following advantages or benefits: according to the embodiment of the invention, the authentication password is encrypted and decrypted twice, and the screen configuration file is encrypted and decrypted once, so that the screen configuration file can be exported and imported only by appointed personnel (display screen management personnel), the possibility that lawless persons tamper with the screen configuration information of the display screen is avoided, and the high protection and high reliability of the screen configuration file updating process of the broadcasting equipment are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for deriving a screen configuration file according to a first embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a screen configuration file deriving device according to a second embodiment of the present invention.
Fig. 3 is a flowchart of a screen configuration file importing method according to a third embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a screen configuration file importing apparatus according to a fourth embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a broadcasting control device according to a fifth embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
[ First embodiment ]
As shown in fig. 1, a method for deriving a screen configuration file according to a first embodiment of the present invention includes the following steps:
s11: responding to the export instruction to obtain an authentication password;
S13: performing encryption operation on the authentication password by using an exclusive OR code to obtain an encrypted authentication password; and
S15: storing the encrypted authentication password to an authentication file, and encrypting the authentication file by using an encryption key to obtain an encrypted authentication file;
S17: reading a screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and
S19: and exporting the encrypted authentication file and the encrypted screen configuration file to a target device.
In order to facilitate understanding of the present invention, each step of the screen configuration file derivation method of the present embodiment will be described in detail below.
The broadcasting device, such as a multimedia playing box, has a screen configuration file export and import function to update the screen configuration of the display screen. The screen configuration file herein includes, for example, a total screen load size, such as a total screen load size of a large screen formed by splicing a plurality of screens, a single screen port screen load number, a screen routing manner (or called a line connection manner between the screens), and/or a single screen size, such as resolution, etc. However, before the screen configuration file is imported into the broadcasting device, the screen configuration file needs to be exported from the host computer. The screen configuration file export method of this embodiment is generally implemented by using a screen configuration file export software on an upper computer, for example, by using multiple encryption passwords to encrypt and protect the screen configuration file to be exported. Then, when the screen configuration file is imported into the broadcasting device, the screen configuration file needs to be validated, for example, the screen configuration file can be imported after the corresponding multiple decryption passwords are validated. The passwords of the multiple encryption passwords and the corresponding passwords in the multiple decryption passwords can be the same or different, and only the paired passwords can be used. For example, the multiple encryption password includes, for example, an authentication password, an exclusive or code, and an encryption key. The exclusive or code and the encryption key in the multiple encryption password are used for encrypting the authentication password twice. The multiple decryption cipher includes, for example, an authentication cipher, an exclusive or code, and a decryption key. The exclusive or and the decryption key in the multiple decryption passwords are used for decrypting the encrypted file to obtain an authentication password. The authentication password in the multiple encryption passwords is the same as the authentication password of the multiple decryption passwords, and is used for identity verification when the screen configuration file is imported. The exclusive or code in the multiple encryption password is the same as the exclusive or code of the multiple decryption password. Whether the encryption key in the multiple encryption password is the same as the decryption key in the multiple decryption password can be determined according to different encryption and decryption modes, for example, when a DES (Data Encryption Standard ) mode is adopted, the encryption key is the same as the decryption key.
The exclusive-or code and the encryption key in the multiple encryption passwords can be configured or agreed in advance or can be configured dynamically. The advanced configuration refers to that the exclusive-or codes and the encryption keys in the multiple encryption passwords and the exclusive-or and decryption keys in the corresponding multiple decryption passwords are generated in advance and stored in the PC and the corresponding broadcasting control equipment in advance for acquisition and use, and the same multiple encryption passwords and multiple decryption passwords are used in each export and import operation in the later period.
The dynamic configuration refers to that the upper computer and the target broadcasting equipment are connected through the internet, a local area network, WIFI, bluetooth or lora and the like, the upper computer instantly generates an exclusive OR (exclusive OR) code and an encryption key in a multiple encryption password and a corresponding exclusive OR code and decryption key in a multiple decryption password, and sends the exclusive OR and decryption key in the multiple decryption password to a designated multimedia playing box such as an asynchronous playing box through the network. It should be noted that, the authentication password in the multiple encryption passwords and the authentication password of the multiple decryption passwords are preset or set on the PC and the broadcasting equipment. The upper computer encrypts the authentication password and the screen configuration file in the multiple encryption passwords by using the exclusive-or codes and the encryption keys, then exports the encrypted authentication password file and the screen configuration file to target equipment such as a USB flash disk, sends the exclusive-or and the decryption keys in the multiple decryption passwords to target broadcasting control equipment, decrypts the encrypted authentication password file and the encrypted screen configuration file in the USB flash disk, and imports the decrypted authentication password file and the encrypted screen configuration file to the target broadcasting control equipment. For another example, the upper computer encrypts the authentication password and the screen configuration file by using the exclusive-or code and the encryption key in the multiple encryption passwords, then exports the encrypted authentication password file and the screen configuration file to a target device such as a usb disk, and then sends the exclusive-or and the decryption key in the multiple decryption passwords to the server; when a screen manager connects a U disk storing the encrypted authentication password file and the screen configuration file to target broadcasting equipment, the target broadcasting equipment acquires an exclusive OR code and a decryption key in the multiple decryption passwords from a server, decrypts the screen configuration file to be imported and then imports the screen configuration file to the target broadcasting equipment. It should be mentioned here that the exclusive-or code and the encryption key in the multiple encryption passwords and the corresponding multiple encryption passwords, and the exclusive-or code and the decryption key in the multiple decryption passwords are randomly generated, so that confidentiality of the passwords and high protection and high reliability of the screen configuration file can be improved. In addition, as the multiple encryption passwords generated each time and the corresponding multiple decryption passwords can be different from the passwords generated other times, namely the exclusive or codes and the encryption keys in the multiple encryption passwords used by each time of export and import operation and the exclusive or code decryption keys of the multiple decryption passwords are different, the high protection and the high reliability of the screen configuration file are further improved.
The method for exporting the screen configuration file provided by the embodiment of the invention is described below by taking the fact that the authentication password in the multiple encryption password is the same as the authentication password in the multiple decryption password, the exclusive-or code in the multiple encryption password is the same as the exclusive-or code in the multiple decryption password, and the encryption key in the multiple encryption password is the same as the decryption key in the multiple decryption key.
First, an instruction is exported in response to a screen configuration file to obtain an authentication password. When the screen configuration file needs to be exported, a screen administrator performs screen configuration file export operation on screen configuration file export software, and the screen configuration file export software responds to a screen configuration file export instruction to obtain an authentication password. Specifically, the screen configuration file export software responds to the screen configuration file export instruction to automatically display an input interface for the user to input a pre-agreed authentication password. After the user inputs the authentication password and confirms, the authentication password is read in response to the user operation instruction. The authentication password is used for checking the identity legitimacy of the screen administrator when the screen configuration file is imported into the broadcasting control device.
And then, the exclusive OR code is utilized to carry out encryption operation on the authentication password to obtain an encrypted authentication password. The method specifically comprises the following steps: and performing exclusive-or operation on the authentication password and the exclusive-or code to finish one-time encryption of the authentication password. Of course, the exclusive or code may be used to perform other encryption operations on the authentication code to obtain an encrypted authentication code.
And then, storing the encryption authentication password into a file to obtain an authentication file, and encrypting the authentication file by using an encryption key to obtain an encryption authentication file. Thus, the secondary encryption of the authentication password is completed. The encryption method used here may be, for example, a symmetric encryption method such as DES encryption method, but other encryption methods may be used.
And secondly, reading the screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file. The encryption method used here may be, for example, a symmetric encryption method such as DES encryption method, but other encryption methods may be used.
And finally, the encrypted authentication file and the encrypted screen configuration file are exported to the target device. The target device herein may be, for example, a mobile storage device such as a usb disk, a mobile hard disk, or the like. Of course, the target device may also be a broadcasting device that needs to be updated in screen configuration, for example, the PC is connected to the broadcasting device through a network cable, so that the PC may directly send the encrypted authentication file and the encrypted screen configuration file, and the xor code and the decryption key to the broadcasting device through the network.
Further, after the encrypted authentication file and the encrypted screen configuration file are exported to the target device, the exclusive-or code and the encryption key are sent for the target broadcasting device to acquire. It can be understood that the PC may directly send the xor code and the encryption key to the target broadcasting device, or may send the xor code and the encryption key to the server, so that the target broadcasting device connected to the server may acquire the xor code and the encryption key at any time. The target broadcasting device here is, for example, a broadcasting device that needs to update a screen configuration.
In summary, the embodiment of the invention can ensure high protection and high reliability in the process of exporting the screen configuration file by encrypting the authentication password twice and encrypting the screen configuration file once. In addition, the exclusive-or codes and the encryption keys in the multiple encryption passwords and the exclusive-or and decryption keys in the multiple decryption passwords are dynamically and randomly generated, and the exclusive-or and decryption keys are sent to the target broadcasting control equipment through the network after the encrypted screen configuration file is derived, so that the high protection and the high reliability of the screen configuration file can be further improved. In addition, different passwords are dynamically generated in each importing and exporting operation, so that confidentiality and protection of the screen configuration file are further facilitated.
[ Second embodiment ]
As shown in fig. 2, a second embodiment of the present invention provides a screen configuration file deriving apparatus 100. The screen profile derivation apparatus 100 includes, for example: an authentication password acquisition module 110, an authentication password encryption module 130, an authentication file encryption module 150, a screen configuration file encryption module 170, and a file export module 190.
The authentication password acquisition module 110 is configured to acquire an authentication password in response to the export instruction.
The authentication password encryption module 130 is configured to perform an encryption operation on the authentication password by using an exclusive or code to obtain an encrypted authentication password.
And the authentication file encryption module 150 is configured to store the encrypted authentication password into an authentication file, and encrypt the authentication file with an encryption key to obtain an encrypted authentication file.
The screen configuration file encryption module 170 is configured to read the screen configuration file and encrypt the screen configuration file with the encryption key to obtain an encrypted screen configuration file. And
And the file export module 190 is configured to export the encrypted authentication file and the encrypted screen configuration file to a target device.
Further, the screen configuration file deriving device 100 further includes a password transmitting module 120. The password sending module 120 is configured to send the xor code and the encryption key for the broadcasting control device to obtain; the target device is a mobile storage device used for importing the encrypted authentication file and the encrypted screen configuration file to the broadcasting device, or the target device is the broadcasting device.
The specific working procedure and technical effects between the modules in the screen profile derivation apparatus 100 in this embodiment are described in the foregoing first embodiment.
[ Third embodiment ]
As shown in fig. 3, a method for importing a screen configuration file according to a third embodiment of the present invention includes the following steps:
S31: responding to the imported instruction to read the encrypted authentication file on the target device;
S33: decrypting the encrypted authentication file by using a decryption key to obtain an authentication file;
s35: reading an encrypted authentication password in the authentication file, and decrypting the encrypted authentication password by using an exclusive or code to obtain an authentication password; and
S37: and when the authentication password is consistent with the authentication password, reading the encrypted screen configuration file on the target device, and decrypting the encrypted screen configuration file by using the decryption key to obtain the screen configuration file for screen configuration.
In order to facilitate understanding of the present invention, each step of the screen configuration file importing method of the present embodiment will be described in detail below.
When the screen body of the LED display screen connected with the broadcasting equipment needs to be updated, the screen body administrator imports the new screen body configuration file from the target equipment to the broadcasting equipment so as to update the screen body configuration through the broadcasting equipment. The target device herein may be, for example, a mobile storage device such as a usb disk, a mobile hard disk, or the like. In addition, the target device may also be a PC that stores a new screen configuration file. For example, the broadcasting equipment is connected with the PC through a network, so that the broadcasting equipment can directly import the screen configuration file from the PC through the network to update the screen configuration. In order to ensure the legitimacy of the imported screen configuration file, the imported screen configuration file needs to be subjected to legitimacy verification, so that high protection and high reliability of the imported screen configuration file are ensured. The screen configuration file importing method of the embodiment can be realized through terminal software on broadcasting control equipment, for example, the legitimacy of the file needing importing is verified through a used password. The method for importing the screen configuration file provided in the embodiment is described below by taking a USB flash disk as an example.
And reading the encrypted authentication file on the target device in response to the screen configuration file import instruction. When the screen configuration file needs to be imported, a screen administrator connects the U disk with the target broadcasting equipment. After the screen administrator performs corresponding operations on the broadcasting equipment, for example, clicking a screen configuration file import button, a terminal program on the broadcasting equipment responds to a user operation instruction to read an encrypted authentication file in the U disk. The encrypted authentication file here may be, for example, the encrypted authentication file in the first embodiment of the present invention. Of course, before reading the encrypted authentication file on the target device, the authentication password needs to be preset or agreed, and the xor code and the decryption key need to be obtained. The exclusive or and decryption keys are received, for example, from a PC or server by means such as internet, local area network, WIFI, bluetooth or lora. The xor and decryption keys here are in one-to-one correspondence with the xor codes and encryption keys, respectively, in the first embodiment of the present invention, and even the same.
And decrypting the encrypted authentication file by using the decryption key to obtain the authentication file. The decryption method used here may be, for example, a DES decryption method, but other decryption methods may be used. This completes one decryption of the authentication password.
Reading the encrypted authentication password in the authentication file, and decrypting the encrypted authentication password by using an exclusive or code, wherein the method specifically comprises the following steps: and carrying out exclusive-or operation on the encryption authentication password and a preset exclusive-or code. This completes the secondary decryption of the authentication password.
And judging whether the decrypted authentication password is consistent with the authentication password received or stored by the broadcasting control equipment. When the authentication password is inconsistent with the authentication password, the identity verification is failed, which means that the screen configuration file importing operation is not executed by a screen administrator, and the terminal program immediately terminates the screen configuration file importing flow. And when the authentication password is consistent with the authentication password, indicating that the authentication is successful, meaning that the screen configuration file importing operation is executed by a screen administrator, then reading the encrypted screen configuration file in the U disk, and decrypting the encrypted screen configuration file by using a decryption key. The decryption method used here may be, for example, a DES decryption method, but other decryption methods may be used. And when the encrypted screen configuration file is successfully decrypted to obtain the screen configuration file, importing the screen configuration file, and then configuring the LED display screen by the broadcasting equipment according to the screen configuration file. And when the encrypted screen configuration file is decrypted and the screen configuration file is not obtained, indicating that the screen configuration file is illegal, and immediately terminating the screen configuration file importing flow by the terminal program.
In summary, the embodiment of the invention can ensure that the screen configuration file importing operation can only be completed by appointed personnel (display screen management personnel) through target equipment by decrypting the authentication password twice and decrypting the screen configuration file once, thereby avoiding the possibility of illegal molecules tampering with the display screen to play programs and improving the high protection and high reliability of the screen configuration file updating process of the broadcasting control equipment.
[ Fourth embodiment ]
As shown in fig. 4, a screen configuration file importing apparatus 300 is provided in a fourth embodiment of the present invention. The screen profile importing device 300 includes, for example: an encrypted authentication file reading module 310, an encrypted authentication file decrypting module 330, an authentication password decrypting module 350 and a screen configuration file decrypting module 370.
An encrypted authentication file reading module 310 for responding to the import instruction to read the encrypted authentication file on the target device;
an encrypted authentication file decrypting module 330 for decrypting the encrypted authentication file using a decryption key to obtain an authentication file;
an authentication password decrypting module 350, configured to read an encrypted authentication password in the authentication file, and decrypt the encrypted authentication password by using an exclusive or code to obtain an authentication password; and
And the screen configuration file decryption module 370 is configured to read the encrypted screen configuration file on the target device when the authentication password is consistent with the authentication password, and decrypt the encrypted screen configuration file by using the decryption key to obtain a screen configuration file for screen configuration.
Further, the screen configuration file importing apparatus 300 further includes a password obtaining module (not shown in the figure). The password acquisition module is used for acquiring the exclusive-or code and the encryption key.
The specific operation and technical effects of the screen profile importing apparatus 300 in this embodiment are described in the foregoing third embodiment.
[ Fifth embodiment ]
As shown in fig. 5, a fifth embodiment of the present invention provides a broadcasting device 500 for configuring a LED display screen, such as an asynchronous multimedia playing box. The playback device 500 includes, for example, an embedded processor 510 and a memory 530. Wherein the memory 530 stores instructions 531 for execution by the embedded processor 510. The embedded processor 510 executes the instructions 531 to implement the screen profile import method as provided in the aforementioned third embodiment.
The specific working process and technical effects of the broadcasting device 500 in this embodiment are referred to the description of the foregoing third embodiment, and are not repeated here.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the partitioning of elements is merely a logical functional partitioning, and there may be additional partitioning in actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not implemented. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. The screen configuration file exporting method is characterized by comprising the following steps:
responding to the export instruction to obtain an authentication password;
performing encryption operation on the authentication password by using an exclusive OR code to obtain an encrypted authentication password;
storing the encrypted authentication password to an authentication file, and encrypting the authentication file by using an encryption key to obtain an encrypted authentication file;
Reading a screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and
Exporting the encrypted authentication file and the encrypted screen configuration file to a target device;
wherein the exclusive-or code and the encryption key are dynamically generated.
2. The screen configuration file derivation method of claim 1, wherein the screen configuration file comprises a screen total load size, a single portal screen load number, a screen routing manner, and/or a single screen size.
3. The screen configuration file deriving method according to claim 1, wherein the encryption mode adopted by the authentication file encrypted by the encryption key is a DES encryption mode, and/or the encryption mode adopted by the screen configuration file encrypted by the encryption key is a DES encryption mode.
4. The screen profile derivation method of claim 1, wherein after the deriving the encrypted authentication file and the encrypted screen profile to a target device, the screen profile derivation method further comprises:
Transmitting the exclusive-or code and the encryption key for the broadcasting control equipment to acquire; the target device is a mobile storage device used for importing the encrypted authentication file and the encrypted screen configuration file to the broadcasting device, or the target device is the broadcasting device.
5. A screen profile derivation device, comprising:
the authentication password acquisition module is used for responding to the export instruction to acquire an authentication password;
The authentication password encryption module is used for carrying out encryption operation on the authentication password by using the exclusive or code to obtain an encrypted authentication password;
The authentication file encryption module is used for storing the encryption authentication password into an authentication file and encrypting the authentication file by using an encryption key to obtain an encryption authentication file;
The screen configuration file encryption module is used for reading the screen configuration file and encrypting the screen configuration file by using the encryption key to obtain an encrypted screen configuration file; and
The file export module is used for exporting the encrypted authentication file and the encrypted screen configuration file to the target device;
wherein the exclusive-or code and the encryption key are dynamically generated.
6. The screen configuration file deriving device according to claim 5, wherein said screen configuration file comprises a total screen load size, a number of individual portal load screens, a screen routing pattern and/or a single screen size.
7. The screen configuration file deriving device according to claim 5, wherein the authentication file encrypting module is specifically configured to encrypt the authentication file using the encryption key and using DES encryption to obtain the encrypted authentication file, and/or the screen configuration file encrypting module is specifically configured to encrypt the screen configuration file using the encryption key and using DES encryption to obtain the encrypted screen configuration file.
8. The screen profile derivation apparatus of claim 5, wherein the screen profile derivation apparatus further comprises:
The password sending module is used for sending the exclusive-or code and the encryption key to be obtained by broadcasting control equipment; the target device is a mobile storage device used for importing the encrypted authentication file and the encrypted screen configuration file to the broadcasting device, or the target device is the broadcasting device.
9. The screen configuration file importing method is characterized by being executed in broadcasting control equipment and comprising the following steps of:
responding to the imported instruction to read the encrypted authentication file on the target device;
decrypting the encrypted authentication file by using a decryption key to obtain an authentication file;
Reading an encrypted authentication password in the authentication file, and decrypting the encrypted authentication password by using an exclusive or code to obtain an authentication password; and
When the authentication password is consistent with the authentication password received or stored by the broadcasting control equipment, reading an encrypted screen configuration file on the target equipment, and decrypting the encrypted screen configuration file by using the decryption key to obtain a screen configuration file for screen configuration;
wherein the exclusive-or code and the decryption key are dynamically generated.
10. The screen configuration file importing method according to claim 9, wherein a decryption mode adopted by the encrypted authentication file decrypted by the decryption key to obtain the authentication file is a DES decryption mode, and/or a decryption mode adopted by the encrypted screen configuration file decrypted by the decryption key is a DES decryption mode.
11. A screen profile importation apparatus, executing on a broadcast control device, comprising:
The encryption authentication file reading module is used for responding to the importing instruction to read the encryption authentication file on the target equipment;
the encryption authentication file decryption module is used for decrypting the encryption authentication file by using the decryption key to obtain an authentication file;
The authentication password decryption module is used for reading the encrypted authentication password in the authentication file and decrypting the encrypted authentication password by using the exclusive-or code to obtain an authentication password; and
The screen configuration file decryption module is used for reading the encrypted screen configuration file on the target equipment and decrypting the encrypted screen configuration file by using the decryption key when the authentication password is consistent with the authentication password received or stored by the broadcasting equipment, so as to obtain the screen configuration file for screen configuration;
wherein the exclusive-or code and the decryption key are dynamically generated.
12. The broadcasting control equipment is used for configuring a screen body of the display screen; the broadcasting control equipment is characterized by comprising an embedded processor and a memory; wherein the memory stores instructions for execution by the embedded processor and the instructions cause the embedded processor to perform operations to implement the screen profile import method of claim 9 or 10.
CN201910493409.4A 2019-06-06 2019-06-06 Screen configuration file export and import method and device and broadcasting control equipment Active CN112054890B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910493409.4A CN112054890B (en) 2019-06-06 2019-06-06 Screen configuration file export and import method and device and broadcasting control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910493409.4A CN112054890B (en) 2019-06-06 2019-06-06 Screen configuration file export and import method and device and broadcasting control equipment

Publications (2)

Publication Number Publication Date
CN112054890A CN112054890A (en) 2020-12-08
CN112054890B true CN112054890B (en) 2024-06-07

Family

ID=73608975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910493409.4A Active CN112054890B (en) 2019-06-06 2019-06-06 Screen configuration file export and import method and device and broadcasting control equipment

Country Status (1)

Country Link
CN (1) CN112054890B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114286116B (en) * 2021-12-10 2023-07-21 深圳市洲明科技股份有限公司 Media data playing method, device and system
CN116662957A (en) * 2023-06-08 2023-08-29 国网北京市电力公司 Identity authentication method, identity authentication device, computer readable storage medium and computer equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6111953A (en) * 1997-05-21 2000-08-29 Walker Digital, Llc Method and apparatus for authenticating a document
KR20050077329A (en) * 2004-01-27 2005-08-02 에스케이 텔레콤주식회사 Radio frequency identification system
KR20080043217A (en) * 2006-11-13 2008-05-16 한국전자통신연구원 Message authentication code generation method and authenticated encryption method using stream cipher
CN101937501A (en) * 2009-06-30 2011-01-05 西门子(中国)有限公司 Method and device for protecting files from unauthenticated accesses
CN103093137A (en) * 2013-01-21 2013-05-08 西北工业大学 File safe distribution method based on universal series bus (USB) flash disk
CN103139201A (en) * 2013-01-22 2013-06-05 中兴通讯股份有限公司 Network strategy acquiring method and data center switchboard
CN103560879A (en) * 2013-10-09 2014-02-05 中国科学院信息工程研究所 Method for achieving lightweight authentication and key agreement
CN104217230A (en) * 2014-08-29 2014-12-17 公安部交通管理科学研究所 Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
JP2016075765A (en) * 2014-10-03 2016-05-12 日本放送協会 Authentication encryption device, authentication decryption device, and program therefor
CN106034123A (en) * 2015-03-17 2016-10-19 中国移动通信集团湖北有限公司 Authentication method, application system server and client
CN106571911A (en) * 2015-07-10 2017-04-19 英飞凌科技股份有限公司 Data cipher and decipher based on device and data authentication
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7293282B2 (en) * 2003-07-03 2007-11-06 Time Warner Cable, Inc. Method to block unauthorized access to TFTP server configuration files
TWI510046B (en) * 2013-07-04 2015-11-21 Univ Nat Cheng Kung Method for authenticated encryption and decryption

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6111953A (en) * 1997-05-21 2000-08-29 Walker Digital, Llc Method and apparatus for authenticating a document
KR20050077329A (en) * 2004-01-27 2005-08-02 에스케이 텔레콤주식회사 Radio frequency identification system
KR20080043217A (en) * 2006-11-13 2008-05-16 한국전자통신연구원 Message authentication code generation method and authenticated encryption method using stream cipher
CN101937501A (en) * 2009-06-30 2011-01-05 西门子(中国)有限公司 Method and device for protecting files from unauthenticated accesses
CN103093137A (en) * 2013-01-21 2013-05-08 西北工业大学 File safe distribution method based on universal series bus (USB) flash disk
CN103139201A (en) * 2013-01-22 2013-06-05 中兴通讯股份有限公司 Network strategy acquiring method and data center switchboard
CN103560879A (en) * 2013-10-09 2014-02-05 中国科学院信息工程研究所 Method for achieving lightweight authentication and key agreement
CN104217230A (en) * 2014-08-29 2014-12-17 公安部交通管理科学研究所 Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
JP2016075765A (en) * 2014-10-03 2016-05-12 日本放送協会 Authentication encryption device, authentication decryption device, and program therefor
CN106034123A (en) * 2015-03-17 2016-10-19 中国移动通信集团湖北有限公司 Authentication method, application system server and client
CN106571911A (en) * 2015-07-10 2017-04-19 英飞凌科技股份有限公司 Data cipher and decipher based on device and data authentication
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium

Also Published As

Publication number Publication date
CN112054890A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
US20240146545A1 (en) Unified programming environment for programmable devices
US10496811B2 (en) Counterfeit prevention
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN109429222A (en) A kind of pair of Wireless Communication Equipment upgrade procedure and the method for communication data encryption
US11159329B2 (en) Collaborative operating system
US11831753B2 (en) Secure distributed key management system
WO2013002833A2 (en) Binding of cryptographic content using unique device characteristics with server heuristics
CN106936588B (en) Hosting method, device and system of hardware control lock
CN101996154A (en) General processor supporting reconfigurable safety design
CN110099064A (en) A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN113383335B (en) Secure logging of data storage device events
CN112054890B (en) Screen configuration file export and import method and device and broadcasting control equipment
CN104104650A (en) Data file visit method and terminal equipment
WO2017137481A1 (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
CN113014393B (en) Password safe box system based on hardware encryption and application method
CN113722741A (en) Data encryption method and device and data decryption method and device
CN110990111B (en) Method and system for verifying virtual trusted root in cloud environment
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method
CN108154037B (en) Inter-process data transmission method and device
US20200272769A1 (en) Methods and apparatus for performing secure back-up and restore
CN111698080B (en) Program file export and import method and device and multimedia playing box
CN116032532A (en) Method, device, equipment and computer storage medium for authorizing air download service
CN104636655A (en) Credibility verifying method of hot plug device
CN104580181A (en) Device and method for data encryption and encryption accelerator engine
CN103413098A (en) Method, system and device for hardware encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant