1. Technical Field
Embodiments of the present disclosure relate to data management systems and methods, and particularly to a system and a method for encrypting and storing data.
2. Description of Related Art
A vision measuring machine (VMS) scans surface of objects to obtain images and image data of the objects. The images of each object are stored as an image file. Measurement program codes of the VMS and the image data of each object are stored as a text file. Too many image files and the test files may be prone to mistakes. In addition, an unauthorized person can easily modify the program codes and image data.
The disclosure, including the accompanying drawings, is illustrated by way of examples and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one.”
In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language. One or more software instructions in the modules may be embedded in firmware, such as in an EPROM. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable media may include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives.
In an exemplary embodiment, the computing device 1 includes at least one processor 12 and a storage system 13. The execution system 10 may include one or more modules (also described in
As shown in
The conversion module 100 calculates a size of binary data of each measurement data in the storage system 13. The size of the binary data is the total number of digital bits of the binary data. For example, if an item of binary data is “01010101”, the size of the binary data is eight bits.
The generation module 101 generates a one time password (OTP), The first storage module 102 stores the OTP and the size of the OTP in the predefined file.
The second storage module 103 obtains a size of the measurement program codes from the calculated size of the measurement data. The second storage module 103 stores the size of the OTP, the version number of the measurement program codes after the OTP in the predefined file. The second storage module 103 stores the size of the measurement program codes again in the predefined file. The size of the OTP is stored twice to make sure that the OTP cannot be changed by unauthorized persons. As shown in
The encryption module 104 encrypts the measurement program codes using the OTP, and stores the encrypted measurement program codes in the predefined file.
The detection module 105 detects if the measurement data includes image data of the object which is measured by the VMS 2.
The third storage module 106 stores the type of the image data, the image data, and the size of the image data in the predefined file if the measurement data includes image data of the object. If the measurement data does not include the image data of the object, the third storage module 106 stores the predefined file in a predefined storage path of the computing device 1. In one embodiment, a file suffix of the predefined file is “*.fvp”.
In step S30, the conversion module 100 calculates a size of binary data of each measurement data in the storage system 13.
In step S31, the generation module 101 generates a one time password (OTP).
In step S32, the first storage module 102 stores a size of the OTP in a predefined file.
In step S33, the first storage module 102 stores the OTP in the predefined file. The OTP is stored after the size of the OTP, as shown in
In step S34, the second storage module 103 obtains a size of the measurement program codes from the calculated size of the measurement data.
In step S35, the second storage module 103 stores the size of the OTP, the version number of the measurement program codes, and the size of the measurement program codes after the OTP in the predefined file.
In step S36, the encryption module 104 encrypts the measurement program codes by using the OTP, and stores the encrypted measurement program codes in the predefined file.
In step S37, the detection module 105 detects if the measurement data includes image data of the object which is measured by the VMS 2. If the measurement data includes the image data of the object, block S38 is implemented. If the measurement data does not include the image data of the object, block S39 is implemented.
In step S38, the third storage module 106 stores the type of the image data, the image data, and the size of the image data in the predefined file.
In step S39, the third storage module 106 stores the predefined file in a predefined storage path of the computing device 1. In one embodiment, a file suffix of the predefined file is “*.fvp”.
Although certain inventive embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2011 1 0383853 | Nov 2011 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
7571489 | Ong et al. | Aug 2009 | B2 |
8160243 | Bean | Apr 2012 | B1 |
20030026431 | Hammersmith | Feb 2003 | A1 |
20060182283 | Sandhu et al. | Aug 2006 | A1 |
20060236111 | Bodensjo et al. | Oct 2006 | A1 |
20070157298 | Dingwall et al. | Jul 2007 | A1 |
20080010453 | Hamid | Jan 2008 | A1 |
20080172713 | Kamendje et al. | Jul 2008 | A1 |
20080208758 | Spiker et al. | Aug 2008 | A1 |
20100250968 | Sadler | Sep 2010 | A1 |
20100274726 | Florek et al. | Oct 2010 | A1 |
20110051928 | Ari | Mar 2011 | A1 |
Entry |
---|
Cheng, Fred; A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-time Password Token, 2010, IEEE 34th Annual Computer Software and Applications Conference IEEE, pp. 147-154. |
Cheng et al.; “The Dynamic and Double Encryption System Based on Two-dimensional Image,” 2009, 2009 International Conference on Computational Intelligence and Security, IEEE, pp. 458-462. |
Number | Date | Country | |
---|---|---|---|
20130138974 A1 | May 2013 | US |