CN107994986A - A kind of renewable TF card of Encryption Algorithm and method - Google Patents

A kind of renewable TF card of Encryption Algorithm and method Download PDF

Info

Publication number
CN107994986A
CN107994986A CN201711404421.0A CN201711404421A CN107994986A CN 107994986 A CN107994986 A CN 107994986A CN 201711404421 A CN201711404421 A CN 201711404421A CN 107994986 A CN107994986 A CN 107994986A
Authority
CN
China
Prior art keywords
card
algorithm
host
key
unique key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711404421.0A
Other languages
Chinese (zh)
Inventor
卞兴中
俞伟
贾宗铭
郭芳芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ramaxel Technology Shenzhen Co Ltd
Original Assignee
Ramaxel Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ramaxel Technology Shenzhen Co Ltd filed Critical Ramaxel Technology Shenzhen Co Ltd
Priority to CN201711404421.0A priority Critical patent/CN107994986A/en
Publication of CN107994986A publication Critical patent/CN107994986A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of renewable TF card of algorithm and method, it is characterized in that add management module, algorithm parameter collection, set of algorithms and authentication module, four modules work independently and store respectively, the authentication module includes the unique key and key description block of TF card, with host or card reader after certification and authorization check success, the new enciphering and deciphering algorithm and parameter of TF card receiving host or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms authentication module;The relation table of a scene, parameter and algorithm is further included, TF card selects matched parameter and algorithm according to the scene of practical application.

Description

A kind of renewable TF card of Encryption Algorithm and method
Technical field
The present invention relates to information security field, more particularly to a kind of renewable TF card of Encryption Algorithm and method.
Background technology
Due to TF card cost reason, the specific implementation of the encryption and decryption of data often in hardware design, firmware compiling just , afterwards cannot needing to be updated Encryption Algorithm and relevant parameter, adjust according to actual conditions through determining.Due to TF card into Capable is the production of mass, then, when user has encryption and decryption particular/special requirement, and situation about will not use in batches occurs, The scheme of this cured enciphering and deciphering algorithm cannot meet the needs of client.
The content of the invention
For disadvantages described above, present invention aims at how to provide the Encryption Algorithm of realizing TF card may be updated, meet different The different encryption and decryption demands of user.
To achieve these goals, the present invention provides a kind of renewable TF card of algorithm, it is characterised in that adds pipe Module, algorithm parameter collection, set of algorithms and authentication module are managed, four modules work independently and store respectively, the authentication module bag The unique key and key description block of TF card, authentication module and host or card reader are included after certification and authorization check success, The new enciphering and deciphering algorithm and parameter of TF card receiving host or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms;Also Include the relation table of a scene, parameter and algorithm, TF card selects matched parameter and algorithm according to the scene of practical application.
The renewable TF card of the algorithm, it is characterised in that the set of algorithms is nextport hardware component NextPort or component software;It is described The corresponding driver of nextport hardware component NextPort is stored in set of algorithms, by selecting different drivers to activate different hardware groups Part, the component software for can independent operating algorithm realize program form.
The renewable TF card of the algorithm, it is characterised in that certification is initiated by host, card reader or the authentication module Operation, the key description that TF card is stored are sent to host or card reader, and host or card reader are described according to the key of reception Verification unique key is calculated, then verification unique key is returned into TF card, TF card receives verification unique key and storage Unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform algorithm renewal behaviour Make, synchronized update relation table after having performed.
The renewable TF card of the algorithm, it is characterised in that host sends authentication starting signal to TF card, and TF card receives After the authentication starting signal that Host is sent, TF card generation challenge information is simultaneously inserted in description block, and challenge information is in the unit interval The true random number or pseudo random number of interior uniqueness, and description block is sent to host;After host receives description block, using fixed in advance The analytical function Fn of justice carries out its content analytical Calculation, generation verification unique key, using verification unique key to received Challenge information is encrypted and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously is decrypted with Unique Key, If challenge information matches, certification passes through.
The renewable TF card of the algorithm, it is characterised in that when TF card works, in management module memory-resident, according to One or more enciphering and deciphering algorithms needed for scene choosing, memory is fully loaded in initialization by the enciphering and deciphering algorithm chosen In or run to call enciphering and deciphering algorithm when reload required enciphering and deciphering algorithm;The unique key is stored in TF card In read-only storage.
A kind of implementation method of the renewable TF card of algorithm, it is characterised in that it is characterized in that adding management module, calculating Method parameter set, set of algorithms and authentication module, four modules work independently and store respectively, and the authentication module includes TF card only One key and key description block, for authentication module with host or card reader after certification and authorization check success, TF card receives master The new enciphering and deciphering algorithm and parameter of machine or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms;Further include a field The relation table of scape, parameter and algorithm, TF card select matched parameter and algorithm according to the scene of practical application.
The implementation method of the renewable TF card of the algorithm, it is characterised in that the set of algorithms is nextport hardware component NextPort or software Component;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, different by selecting different drivers to activate Nextport hardware component NextPort, the component software for can independent operating algorithm realize program form.
The implementation method of the renewable TF card of the algorithm, it is characterised in that by host, card reader or the certification mould Block initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, and host or card reader are according to reception Key description calculate verification unique key, then verification unique key is returned into TF card, it is unique close that TF card receives verification Key with store unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform Algorithm renewal operation, synchronized update relation table after having performed.
The implementation method of the renewable TF card of the algorithm, it is characterised in that host sends authentication starting letter to TF card Number, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block, and challenge information is The true random number or pseudo random number of uniqueness within the unit interval, and description block is sent to host;After host receives description block, Analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key is unique close using verification Key is encrypted received challenge information and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously uses Unique Key is decrypted, if challenge information matches, certification passes through.
The implementation method of the renewable TF card of the algorithm, it is characterised in that when TF card works, management module is resided In memory, one or more enciphering and deciphering algorithms according to needed for being selected scene are complete by the enciphering and deciphering algorithm chosen in initialization Portion is loaded into memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm;The unique key It is stored in the read-only storage of TF card.
The present invention discloses the beneficial effect obtained:Realized by enciphering and deciphering algorithm and be retained separately with parameter, increase encryption and decryption Algorithm and the mode of parameter mapping table so that TF card is adapted to different encryption and decryption demands;By using can be erasable Non-volatile preserve the mode of enciphering and deciphering algorithm and its parameter so that TF card can be on the premise of cost not be significantly improved The ability of enciphering and deciphering algorithm and its parameter can be updated by obtaining;By way of defining renewal verification process and domination set, protect The safety and reliability of renewal enciphering and deciphering algorithm is demonstrate,proved.
Brief description of the drawings
Fig. 1 is the internal module composition schematic diagram of TF card;
Fig. 2 is the schematic diagram of specific identifying procedure;
Fig. 3 is the internal module composition schematic diagram of management module;
Fig. 4 is the data interaction schematic diagram of the TF card course of work;
Fig. 5 is algorithm and its primary message interaction diagrams of parameter renewal.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment, belongs to the scope of protection of the invention.
Related terms explanation:
Manager:Management module.Its function includes but not limited to parse control signal collection, control verification process, control more New technological process, management scene-parameter-Algorithm mapping table etc..
SPA-Table:Scene-parameter-Algorithm mapping table.
Parameters Set:Parameter set.Its function, which includes working as, is not limited to management Parameters Cell etc..
Algorithms Set:Set of algorithms.Function includes but not limited to manage the algorithm realized by software, management by hardware Algorithm drives of realization etc..
Unique Key:Unique key.It can be used for the unique key for identifying every TF card, in certification and renewal process In be used for data encryption.
Describe Block:Description block.User describes current TF card information, is used for Framework computing including this The information of Unique Key and the challenge information of TF card.
Parameters Cell:Parameters unit.The parameter of algorithm actual use is, it is necessary to according to different algorithms and calculation Method, which is realized, carries out tissue.
Control Set:Control signal collection.Its function includes but not limited to triggering authentication flow, triggering;More new technological process Triggering, control etc..
Fn:For calculating the algorithm of Unique Key by Describe.
Fig. 1 is the internal module composition schematic diagram of TF card, including management module Manager, algorithm parameter collection Parameters Set, set of algorithms Algorithms Set and authentication module, the unique key that authentication module includes TF card are unique Key and key description block Describe Block.Four management, algorithm, parameter, certification aspects are full decoupled, this just means this While system is not only adapted to that encryption and decryption needs under various scenes, the difficulty cracked completely is added, is considerably increased The reliability of system.
Fig. 2 is the schematic diagram of specific identifying procedure;Identifying procedure should include but not limited to the step shown in figure two:
1st, host Host sends authentication starting signal to TF card.
2nd, after the authentication starting signal for receiving Host transmissions, TF card generation challenge information simultaneously inserts Describe Block In.Challenge information can be true random number or pseudo random number or other information, but need to meet in certain space-time model The characteristics of enclosing interior uniqueness, to prevent Replay Attack as far as possible.
3rd, after Host receives Describe Block, parsing meter is carried out to its content using pre-defined function Fn Calculate, generation Unique Key.Function Fn can be stored in ROM or non-volatile memory medium, its source code is at least in the state of preservation It is lower to be in the state of being encrypted;Function Fn can be updated, but need to ensure forward compatibility.
4th, challenge information is encrypted using Unique Key and is sent to TF card.
5th, TF card parses the challenge information that Host is sent back and is decrypted with Unique Key, if challenge information matches, certification Pass through.
Fig. 3 is the internal module composition schematic diagram of management module;Each function module is provided from the angle in cpu address space Possible distribution mode:
1st, in TF card actual moving process, Manager modules should reside RAM to timely respond to Control Set.
2nd, in TF card actual moving process, according to actual needs might have multiple enciphering and deciphering algorithms be in RAM with Just completion as fast as possible calculates.
3rd, in TF card actual moving process, if encryption process is related to mass data exchange or the management of complexity Journey, might have multiple encryption and decryption hardware drivings according to actual needs and is in RAM so as to completion task as fast as possible.
4th, in TF card actual moving process, if encryption and decryption hardware management flow is relatively easy, encryption and decryption driver It can be placed in ROM.
5th, TF card may integrate more than one hardware encryption module according to actual needs.
6th, Algorithms Set are stored on non-volatile media, such as flash, are added when needed by Manager modules It is downloaded in memory.
7th, Parameters Set are stored on cloud non-volatile media, are read when needed by Manager.
8th, Unique Key are deposited in ROM, and whole its of TF card uses all one's life, it is impossible to is changed.
Fig. 4 is the data interaction schematic diagram of the TF card course of work:
1st, Host sends Control Set to show the needs for data encryption to TF card.Control Set can be Hardware GPIO control signals or TF card can identify, the manageable command signal of software.
2nd, the content of Control Set includes but not limited to, and starts identifying procedure, starts more new technological process, scene description, leads to Primary data transmission, the completion of notice data transfer, encryption data reading, encryption data storage and TF card back-signalling etc..
3rd, scene description content includes but not limited to, User ID, scene ID, encryption level etc..
4th, during normal use scene description informations of the Manager in Control Set by inquiring about SPA- Table determines required Encryption Algorithm and algorithm parameter, and Encryption Algorithm or Encryption Algorithm hardware driving are loaded into RAM In.
5th, during normal use, Manager will be encrypted the data of transmission according to Control Set, and root According to the description determination data whereabouts in Control Set.
Fig. 5 is algorithm and its primary message interaction diagrams of parameter renewal:
Wherein Update Parameters, Ack Ready, Parameters Data, Success, Update Algorithms is a part of Control Set;
Parameters Set and Algorithms Set respectively by respective different update flow, therefore can with it is independently updated mutually Do not influence.
At no point in the update process, Manager modules need to update the information in SPA-Table at the same time
Parameters Set need to manage respective resource allocation conditions with Algorithms Set modules, it is impossible to occur There is coverage condition in code or data between algorithms of different or different parameters.
The above disclosed interest field for being only an embodiment of the present invention, sheet cannot being limited with this certainly, One of ordinary skill in the art will appreciate that realize all or part of flow of above-described embodiment, and according to the claims in the present invention institute The equivalent variations of work, still fall within the scope that the present invention is covered.

Claims (10)

1. a kind of renewable TF card of algorithm, it is characterised in that add management module, algorithm parameter collection, set of algorithms and certification mould Block, four modules work independently and store respectively, and the authentication module includes the unique key and key description block of TF card, certification Module and host or card reader are after certification and authorization check success, the new encryption and decryption of TF card receiving host or card reader transmission Algorithm and parameter are simultaneously respectively written into algorithm parameter collection and set of algorithms;Further include the relation table of a scene, parameter and algorithm, TF Card selects matched parameter and algorithm according to the scene of practical application.
2. the renewable TF card of algorithm according to claim 1, it is characterised in that the set of algorithms is nextport hardware component NextPort or soft Part component;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, by selecting different drivers to activate not With nextport hardware component NextPort, the component software for can independent operating algorithm realize program form.
3. the renewable TF card of algorithm according to claim 1, it is characterised in that by host, card reader or the certification mould Block initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, and host or card reader are according to reception Key description calculate verification unique key, then verification unique key is returned into TF card, it is unique close that TF card receives verification Key with store unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform Algorithm renewal operation, synchronized update relation table after having performed.
4. the renewable TF card of algorithm according to claim 1, it is characterised in that host sends authentication starting letter to TF card Number, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block, and challenge information is The true random number or pseudo random number of uniqueness within the unit interval, and description block is sent to host;After host receives description block, Analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key is unique close using verification Key is encrypted received challenge information and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously uses Unique Key is decrypted, if challenge information matches, certification passes through.
5. the renewable TF card of algorithm according to claim 1, it is characterised in that when TF card works, management module is resided In memory, one or more enciphering and deciphering algorithms according to needed for being selected scene are complete by the enciphering and deciphering algorithm chosen in initialization Portion is loaded into memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm;The unique key It is stored in the read-only storage of TF card.
6. a kind of implementation method of the renewable TF card of algorithm, it is characterised in that it is characterized in that adding management module, algorithm Parameter set, set of algorithms and authentication module, four modules work independently and store respectively, and the authentication module includes the unique of TF card Key and key description block, authentication module and host or card reader are after certification and authorization check success, TF card receiving host Or the new enciphering and deciphering algorithm that sends of card reader and parameter and it is respectively written into algorithm parameter collection and set of algorithms;Further include a field The relation table of scape, parameter and algorithm, TF card select matched parameter and algorithm according to the scene of practical application.
7. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that the set of algorithms is hard Part component or component software;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, by selecting different drivings The different nextport hardware component NextPort of program activation, the component software for can independent operating algorithm realize program form.
8. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that by host, card reader or The authentication module initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, host or Card Reader Device calculates verification unique key according to the description of the key of reception, then verification unique key is returned to TF card, and TF card receives Verification unique key with storage unique key be compared it is whether identical, if it is identical be determined as certification successfully, if certification Successful then execution algorithm renewal operation, synchronized update relation table after having performed.
9. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that host is sent to TF card Authentication starting signal, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block, Challenge information is the true random number or pseudo random number of the uniqueness within the unit interval, and description block is sent to host;Host is received To after description block, analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key, uses Verification unique key is encrypted received challenge information and is sent to TF card, the challenge information that TF card parsing host is sent back And decrypted with Unique Key, if challenge information matches, certification passes through.
10. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that when TF card works, In management module memory-resident, one or more enciphering and deciphering algorithms according to needed for being selected scene, will choose in initialization Enciphering and deciphering algorithm is fully loaded in memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm; The unique key is stored in the read-only storage of TF card.
CN201711404421.0A 2017-12-22 2017-12-22 A kind of renewable TF card of Encryption Algorithm and method Pending CN107994986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711404421.0A CN107994986A (en) 2017-12-22 2017-12-22 A kind of renewable TF card of Encryption Algorithm and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711404421.0A CN107994986A (en) 2017-12-22 2017-12-22 A kind of renewable TF card of Encryption Algorithm and method

Publications (1)

Publication Number Publication Date
CN107994986A true CN107994986A (en) 2018-05-04

Family

ID=62041387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711404421.0A Pending CN107994986A (en) 2017-12-22 2017-12-22 A kind of renewable TF card of Encryption Algorithm and method

Country Status (1)

Country Link
CN (1) CN107994986A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458853A (en) * 2007-12-11 2009-06-17 结行信息技术(上海)有限公司 On-line POS system and smart card on-line payment method
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据***有限公司 Method and device for compatible management of encryption algorithm
CN102855563A (en) * 2012-07-24 2013-01-02 上海柯斯软件有限公司 System and method for achieving secure payment based on set top box (STB)
CN102945379A (en) * 2012-06-27 2013-02-27 无锡北邮感知技术产业研究院有限公司 Offline type bidirectional authentication method for card reader and label in RFID (radio frequency identification device) system
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN103593592A (en) * 2013-11-08 2014-02-19 上海新储集成电路有限公司 User data encryption and decryption method
KR20140055423A (en) * 2012-10-31 2014-05-09 고려대학교 산학협력단 System of encryption/decryption and method thereof in smart card in public key crypto algorithm
CN107017986A (en) * 2017-06-05 2017-08-04 深圳市成为信息技术有限公司 A kind of key updating method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458853A (en) * 2007-12-11 2009-06-17 结行信息技术(上海)有限公司 On-line POS system and smart card on-line payment method
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据***有限公司 Method and device for compatible management of encryption algorithm
CN102945379A (en) * 2012-06-27 2013-02-27 无锡北邮感知技术产业研究院有限公司 Offline type bidirectional authentication method for card reader and label in RFID (radio frequency identification device) system
CN102855563A (en) * 2012-07-24 2013-01-02 上海柯斯软件有限公司 System and method for achieving secure payment based on set top box (STB)
KR20140055423A (en) * 2012-10-31 2014-05-09 고려대학교 산학협력단 System of encryption/decryption and method thereof in smart card in public key crypto algorithm
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN103593592A (en) * 2013-11-08 2014-02-19 上海新储集成电路有限公司 User data encryption and decryption method
CN107017986A (en) * 2017-06-05 2017-08-04 深圳市成为信息技术有限公司 A kind of key updating method and system

Similar Documents

Publication Publication Date Title
CN111723383B (en) Data storage and verification method and device
CN109560931B (en) Equipment remote upgrading method based on certificate-free system
CN109409472B (en) Two-dimensional code generation method, data processing device and server
CN107005836A (en) Subscriber identity module pond
CN111541534B (en) Control method, equipment and storage medium of terminal of Internet of things
CN104765357A (en) Authorization system and method for vehicle remote diagnosis
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
US20160191504A1 (en) Mobile terminal for providing one time password and operating method thereof
CN106790156A (en) A kind of smart machine binding method and device
CN110868294B (en) Key updating method, device and equipment
CN109587164A (en) A kind of information encrypting transmission method, device, equipment and storage medium
CN111580956B (en) Cipher card, key space configuration method and key use method thereof
CN102986162B (en) Based on license dynamic management approach, the Apparatus and system of TCM or TPM
CN107563207A (en) Encryption method, device and decryption method, device
CN108462700A (en) Background server, terminal device, safe early warning method and storage medium suitable for recognition of face
CN104933361A (en) Device and method for protecting login password
US20220182248A1 (en) Secure startup method, controller, and control system
CN106559386A (en) A kind of authentication method and device
EP2689367B1 (en) Data protection using distributed security key
CN107589999B (en) Process communication safety channel establishing method in heaven-earth integrated engineering
CN107437996A (en) A kind of identity authentication method, device and terminal
CN105792167A (en) Method, device and apparatus for initializing trusted execution environment
CN115426106B (en) Identity authentication method, device and system, electronic equipment and storage medium
CN111311261A (en) Security processing method, device and system for online transaction
CN107994986A (en) A kind of renewable TF card of Encryption Algorithm and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504

RJ01 Rejection of invention patent application after publication