CN107994986A - A kind of renewable TF card of Encryption Algorithm and method - Google Patents
A kind of renewable TF card of Encryption Algorithm and method Download PDFInfo
- Publication number
- CN107994986A CN107994986A CN201711404421.0A CN201711404421A CN107994986A CN 107994986 A CN107994986 A CN 107994986A CN 201711404421 A CN201711404421 A CN 201711404421A CN 107994986 A CN107994986 A CN 107994986A
- Authority
- CN
- China
- Prior art keywords
- card
- algorithm
- host
- key
- unique key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of renewable TF card of algorithm and method, it is characterized in that add management module, algorithm parameter collection, set of algorithms and authentication module, four modules work independently and store respectively, the authentication module includes the unique key and key description block of TF card, with host or card reader after certification and authorization check success, the new enciphering and deciphering algorithm and parameter of TF card receiving host or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms authentication module;The relation table of a scene, parameter and algorithm is further included, TF card selects matched parameter and algorithm according to the scene of practical application.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of renewable TF card of Encryption Algorithm and method.
Background technology
Due to TF card cost reason, the specific implementation of the encryption and decryption of data often in hardware design, firmware compiling just
, afterwards cannot needing to be updated Encryption Algorithm and relevant parameter, adjust according to actual conditions through determining.Due to TF card into
Capable is the production of mass, then, when user has encryption and decryption particular/special requirement, and situation about will not use in batches occurs,
The scheme of this cured enciphering and deciphering algorithm cannot meet the needs of client.
The content of the invention
For disadvantages described above, present invention aims at how to provide the Encryption Algorithm of realizing TF card may be updated, meet different
The different encryption and decryption demands of user.
To achieve these goals, the present invention provides a kind of renewable TF card of algorithm, it is characterised in that adds pipe
Module, algorithm parameter collection, set of algorithms and authentication module are managed, four modules work independently and store respectively, the authentication module bag
The unique key and key description block of TF card, authentication module and host or card reader are included after certification and authorization check success,
The new enciphering and deciphering algorithm and parameter of TF card receiving host or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms;Also
Include the relation table of a scene, parameter and algorithm, TF card selects matched parameter and algorithm according to the scene of practical application.
The renewable TF card of the algorithm, it is characterised in that the set of algorithms is nextport hardware component NextPort or component software;It is described
The corresponding driver of nextport hardware component NextPort is stored in set of algorithms, by selecting different drivers to activate different hardware groups
Part, the component software for can independent operating algorithm realize program form.
The renewable TF card of the algorithm, it is characterised in that certification is initiated by host, card reader or the authentication module
Operation, the key description that TF card is stored are sent to host or card reader, and host or card reader are described according to the key of reception
Verification unique key is calculated, then verification unique key is returned into TF card, TF card receives verification unique key and storage
Unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform algorithm renewal behaviour
Make, synchronized update relation table after having performed.
The renewable TF card of the algorithm, it is characterised in that host sends authentication starting signal to TF card, and TF card receives
After the authentication starting signal that Host is sent, TF card generation challenge information is simultaneously inserted in description block, and challenge information is in the unit interval
The true random number or pseudo random number of interior uniqueness, and description block is sent to host;After host receives description block, using fixed in advance
The analytical function Fn of justice carries out its content analytical Calculation, generation verification unique key, using verification unique key to received
Challenge information is encrypted and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously is decrypted with Unique Key,
If challenge information matches, certification passes through.
The renewable TF card of the algorithm, it is characterised in that when TF card works, in management module memory-resident, according to
One or more enciphering and deciphering algorithms needed for scene choosing, memory is fully loaded in initialization by the enciphering and deciphering algorithm chosen
In or run to call enciphering and deciphering algorithm when reload required enciphering and deciphering algorithm;The unique key is stored in TF card
In read-only storage.
A kind of implementation method of the renewable TF card of algorithm, it is characterised in that it is characterized in that adding management module, calculating
Method parameter set, set of algorithms and authentication module, four modules work independently and store respectively, and the authentication module includes TF card only
One key and key description block, for authentication module with host or card reader after certification and authorization check success, TF card receives master
The new enciphering and deciphering algorithm and parameter of machine or card reader transmission are simultaneously respectively written into algorithm parameter collection and set of algorithms;Further include a field
The relation table of scape, parameter and algorithm, TF card select matched parameter and algorithm according to the scene of practical application.
The implementation method of the renewable TF card of the algorithm, it is characterised in that the set of algorithms is nextport hardware component NextPort or software
Component;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, different by selecting different drivers to activate
Nextport hardware component NextPort, the component software for can independent operating algorithm realize program form.
The implementation method of the renewable TF card of the algorithm, it is characterised in that by host, card reader or the certification mould
Block initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, and host or card reader are according to reception
Key description calculate verification unique key, then verification unique key is returned into TF card, it is unique close that TF card receives verification
Key with store unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform
Algorithm renewal operation, synchronized update relation table after having performed.
The implementation method of the renewable TF card of the algorithm, it is characterised in that host sends authentication starting letter to TF card
Number, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block, and challenge information is
The true random number or pseudo random number of uniqueness within the unit interval, and description block is sent to host;After host receives description block,
Analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key is unique close using verification
Key is encrypted received challenge information and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously uses Unique
Key is decrypted, if challenge information matches, certification passes through.
The implementation method of the renewable TF card of the algorithm, it is characterised in that when TF card works, management module is resided
In memory, one or more enciphering and deciphering algorithms according to needed for being selected scene are complete by the enciphering and deciphering algorithm chosen in initialization
Portion is loaded into memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm;The unique key
It is stored in the read-only storage of TF card.
The present invention discloses the beneficial effect obtained:Realized by enciphering and deciphering algorithm and be retained separately with parameter, increase encryption and decryption
Algorithm and the mode of parameter mapping table so that TF card is adapted to different encryption and decryption demands;By using can be erasable
Non-volatile preserve the mode of enciphering and deciphering algorithm and its parameter so that TF card can be on the premise of cost not be significantly improved
The ability of enciphering and deciphering algorithm and its parameter can be updated by obtaining;By way of defining renewal verification process and domination set, protect
The safety and reliability of renewal enciphering and deciphering algorithm is demonstrate,proved.
Brief description of the drawings
Fig. 1 is the internal module composition schematic diagram of TF card;
Fig. 2 is the schematic diagram of specific identifying procedure;
Fig. 3 is the internal module composition schematic diagram of management module;
Fig. 4 is the data interaction schematic diagram of the TF card course of work;
Fig. 5 is algorithm and its primary message interaction diagrams of parameter renewal.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment, belongs to the scope of protection of the invention.
Related terms explanation:
Manager:Management module.Its function includes but not limited to parse control signal collection, control verification process, control more
New technological process, management scene-parameter-Algorithm mapping table etc..
SPA-Table:Scene-parameter-Algorithm mapping table.
Parameters Set:Parameter set.Its function, which includes working as, is not limited to management Parameters Cell etc..
Algorithms Set:Set of algorithms.Function includes but not limited to manage the algorithm realized by software, management by hardware
Algorithm drives of realization etc..
Unique Key:Unique key.It can be used for the unique key for identifying every TF card, in certification and renewal process
In be used for data encryption.
Describe Block:Description block.User describes current TF card information, is used for Framework computing including this
The information of Unique Key and the challenge information of TF card.
Parameters Cell:Parameters unit.The parameter of algorithm actual use is, it is necessary to according to different algorithms and calculation
Method, which is realized, carries out tissue.
Control Set:Control signal collection.Its function includes but not limited to triggering authentication flow, triggering;More new technological process
Triggering, control etc..
Fn:For calculating the algorithm of Unique Key by Describe.
Fig. 1 is the internal module composition schematic diagram of TF card, including management module Manager, algorithm parameter collection
Parameters Set, set of algorithms Algorithms Set and authentication module, the unique key that authentication module includes TF card are unique
Key and key description block Describe Block.Four management, algorithm, parameter, certification aspects are full decoupled, this just means this
While system is not only adapted to that encryption and decryption needs under various scenes, the difficulty cracked completely is added, is considerably increased
The reliability of system.
Fig. 2 is the schematic diagram of specific identifying procedure;Identifying procedure should include but not limited to the step shown in figure two:
1st, host Host sends authentication starting signal to TF card.
2nd, after the authentication starting signal for receiving Host transmissions, TF card generation challenge information simultaneously inserts Describe Block
In.Challenge information can be true random number or pseudo random number or other information, but need to meet in certain space-time model
The characteristics of enclosing interior uniqueness, to prevent Replay Attack as far as possible.
3rd, after Host receives Describe Block, parsing meter is carried out to its content using pre-defined function Fn
Calculate, generation Unique Key.Function Fn can be stored in ROM or non-volatile memory medium, its source code is at least in the state of preservation
It is lower to be in the state of being encrypted;Function Fn can be updated, but need to ensure forward compatibility.
4th, challenge information is encrypted using Unique Key and is sent to TF card.
5th, TF card parses the challenge information that Host is sent back and is decrypted with Unique Key, if challenge information matches, certification
Pass through.
Fig. 3 is the internal module composition schematic diagram of management module;Each function module is provided from the angle in cpu address space
Possible distribution mode:
1st, in TF card actual moving process, Manager modules should reside RAM to timely respond to Control Set.
2nd, in TF card actual moving process, according to actual needs might have multiple enciphering and deciphering algorithms be in RAM with
Just completion as fast as possible calculates.
3rd, in TF card actual moving process, if encryption process is related to mass data exchange or the management of complexity
Journey, might have multiple encryption and decryption hardware drivings according to actual needs and is in RAM so as to completion task as fast as possible.
4th, in TF card actual moving process, if encryption and decryption hardware management flow is relatively easy, encryption and decryption driver
It can be placed in ROM.
5th, TF card may integrate more than one hardware encryption module according to actual needs.
6th, Algorithms Set are stored on non-volatile media, such as flash, are added when needed by Manager modules
It is downloaded in memory.
7th, Parameters Set are stored on cloud non-volatile media, are read when needed by Manager.
8th, Unique Key are deposited in ROM, and whole its of TF card uses all one's life, it is impossible to is changed.
Fig. 4 is the data interaction schematic diagram of the TF card course of work:
1st, Host sends Control Set to show the needs for data encryption to TF card.Control Set can be
Hardware GPIO control signals or TF card can identify, the manageable command signal of software.
2nd, the content of Control Set includes but not limited to, and starts identifying procedure, starts more new technological process, scene description, leads to
Primary data transmission, the completion of notice data transfer, encryption data reading, encryption data storage and TF card back-signalling etc..
3rd, scene description content includes but not limited to, User ID, scene ID, encryption level etc..
4th, during normal use scene description informations of the Manager in Control Set by inquiring about SPA-
Table determines required Encryption Algorithm and algorithm parameter, and Encryption Algorithm or Encryption Algorithm hardware driving are loaded into RAM
In.
5th, during normal use, Manager will be encrypted the data of transmission according to Control Set, and root
According to the description determination data whereabouts in Control Set.
Fig. 5 is algorithm and its primary message interaction diagrams of parameter renewal:
Wherein Update Parameters, Ack Ready, Parameters Data, Success, Update
Algorithms is a part of Control Set;
Parameters Set and Algorithms Set respectively by respective different update flow, therefore can with it is independently updated mutually
Do not influence.
At no point in the update process, Manager modules need to update the information in SPA-Table at the same time
Parameters Set need to manage respective resource allocation conditions with Algorithms Set modules, it is impossible to occur
There is coverage condition in code or data between algorithms of different or different parameters.
The above disclosed interest field for being only an embodiment of the present invention, sheet cannot being limited with this certainly,
One of ordinary skill in the art will appreciate that realize all or part of flow of above-described embodiment, and according to the claims in the present invention institute
The equivalent variations of work, still fall within the scope that the present invention is covered.
Claims (10)
1. a kind of renewable TF card of algorithm, it is characterised in that add management module, algorithm parameter collection, set of algorithms and certification mould
Block, four modules work independently and store respectively, and the authentication module includes the unique key and key description block of TF card, certification
Module and host or card reader are after certification and authorization check success, the new encryption and decryption of TF card receiving host or card reader transmission
Algorithm and parameter are simultaneously respectively written into algorithm parameter collection and set of algorithms;Further include the relation table of a scene, parameter and algorithm, TF
Card selects matched parameter and algorithm according to the scene of practical application.
2. the renewable TF card of algorithm according to claim 1, it is characterised in that the set of algorithms is nextport hardware component NextPort or soft
Part component;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, by selecting different drivers to activate not
With nextport hardware component NextPort, the component software for can independent operating algorithm realize program form.
3. the renewable TF card of algorithm according to claim 1, it is characterised in that by host, card reader or the certification mould
Block initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, and host or card reader are according to reception
Key description calculate verification unique key, then verification unique key is returned into TF card, it is unique close that TF card receives verification
Key with store unique key be compared it is whether identical, if it is identical be determined as certification success, if certification success if perform
Algorithm renewal operation, synchronized update relation table after having performed.
4. the renewable TF card of algorithm according to claim 1, it is characterised in that host sends authentication starting letter to TF card
Number, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block, and challenge information is
The true random number or pseudo random number of uniqueness within the unit interval, and description block is sent to host;After host receives description block,
Analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key is unique close using verification
Key is encrypted received challenge information and is sent to TF card, and the challenge information that TF card parsing host is sent back simultaneously uses Unique
Key is decrypted, if challenge information matches, certification passes through.
5. the renewable TF card of algorithm according to claim 1, it is characterised in that when TF card works, management module is resided
In memory, one or more enciphering and deciphering algorithms according to needed for being selected scene are complete by the enciphering and deciphering algorithm chosen in initialization
Portion is loaded into memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm;The unique key
It is stored in the read-only storage of TF card.
6. a kind of implementation method of the renewable TF card of algorithm, it is characterised in that it is characterized in that adding management module, algorithm
Parameter set, set of algorithms and authentication module, four modules work independently and store respectively, and the authentication module includes the unique of TF card
Key and key description block, authentication module and host or card reader are after certification and authorization check success, TF card receiving host
Or the new enciphering and deciphering algorithm that sends of card reader and parameter and it is respectively written into algorithm parameter collection and set of algorithms;Further include a field
The relation table of scape, parameter and algorithm, TF card select matched parameter and algorithm according to the scene of practical application.
7. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that the set of algorithms is hard
Part component or component software;The corresponding driver of the nextport hardware component NextPort is stored in set of algorithms, by selecting different drivings
The different nextport hardware component NextPort of program activation, the component software for can independent operating algorithm realize program form.
8. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that by host, card reader or
The authentication module initiates authentication operation, and the key description that TF card is stored is sent to host or card reader, host or Card Reader
Device calculates verification unique key according to the description of the key of reception, then verification unique key is returned to TF card, and TF card receives
Verification unique key with storage unique key be compared it is whether identical, if it is identical be determined as certification successfully, if certification
Successful then execution algorithm renewal operation, synchronized update relation table after having performed.
9. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that host is sent to TF card
Authentication starting signal, after TF card receives the authentication starting signal of Host transmissions, TF card generation challenge information is simultaneously inserted in description block,
Challenge information is the true random number or pseudo random number of the uniqueness within the unit interval, and description block is sent to host;Host is received
To after description block, analytical Calculation is carried out to its content using pre-defined analytical function Fn, generation verification unique key, uses
Verification unique key is encrypted received challenge information and is sent to TF card, the challenge information that TF card parsing host is sent back
And decrypted with Unique Key, if challenge information matches, certification passes through.
10. the implementation method of the renewable TF card of algorithm according to claim 6, it is characterised in that when TF card works,
In management module memory-resident, one or more enciphering and deciphering algorithms according to needed for being selected scene, will choose in initialization
Enciphering and deciphering algorithm is fully loaded in memory or reloads required enciphering and deciphering algorithm when running to and calling enciphering and deciphering algorithm;
The unique key is stored in the read-only storage of TF card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711404421.0A CN107994986A (en) | 2017-12-22 | 2017-12-22 | A kind of renewable TF card of Encryption Algorithm and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711404421.0A CN107994986A (en) | 2017-12-22 | 2017-12-22 | A kind of renewable TF card of Encryption Algorithm and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107994986A true CN107994986A (en) | 2018-05-04 |
Family
ID=62041387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711404421.0A Pending CN107994986A (en) | 2017-12-22 | 2017-12-22 | A kind of renewable TF card of Encryption Algorithm and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107994986A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458853A (en) * | 2007-12-11 | 2009-06-17 | 结行信息技术(上海)有限公司 | On-line POS system and smart card on-line payment method |
CN102710412A (en) * | 2012-05-07 | 2012-10-03 | 北京握奇数据***有限公司 | Method and device for compatible management of encryption algorithm |
CN102855563A (en) * | 2012-07-24 | 2013-01-02 | 上海柯斯软件有限公司 | System and method for achieving secure payment based on set top box (STB) |
CN102945379A (en) * | 2012-06-27 | 2013-02-27 | 无锡北邮感知技术产业研究院有限公司 | Offline type bidirectional authentication method for card reader and label in RFID (radio frequency identification device) system |
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN103593592A (en) * | 2013-11-08 | 2014-02-19 | 上海新储集成电路有限公司 | User data encryption and decryption method |
KR20140055423A (en) * | 2012-10-31 | 2014-05-09 | 고려대학교 산학협력단 | System of encryption/decryption and method thereof in smart card in public key crypto algorithm |
CN107017986A (en) * | 2017-06-05 | 2017-08-04 | 深圳市成为信息技术有限公司 | A kind of key updating method and system |
-
2017
- 2017-12-22 CN CN201711404421.0A patent/CN107994986A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458853A (en) * | 2007-12-11 | 2009-06-17 | 结行信息技术(上海)有限公司 | On-line POS system and smart card on-line payment method |
CN102710412A (en) * | 2012-05-07 | 2012-10-03 | 北京握奇数据***有限公司 | Method and device for compatible management of encryption algorithm |
CN102945379A (en) * | 2012-06-27 | 2013-02-27 | 无锡北邮感知技术产业研究院有限公司 | Offline type bidirectional authentication method for card reader and label in RFID (radio frequency identification device) system |
CN102855563A (en) * | 2012-07-24 | 2013-01-02 | 上海柯斯软件有限公司 | System and method for achieving secure payment based on set top box (STB) |
KR20140055423A (en) * | 2012-10-31 | 2014-05-09 | 고려대학교 산학협력단 | System of encryption/decryption and method thereof in smart card in public key crypto algorithm |
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN103593592A (en) * | 2013-11-08 | 2014-02-19 | 上海新储集成电路有限公司 | User data encryption and decryption method |
CN107017986A (en) * | 2017-06-05 | 2017-08-04 | 深圳市成为信息技术有限公司 | A kind of key updating method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111723383B (en) | Data storage and verification method and device | |
CN109560931B (en) | Equipment remote upgrading method based on certificate-free system | |
CN109409472B (en) | Two-dimensional code generation method, data processing device and server | |
CN107005836A (en) | Subscriber identity module pond | |
CN111541534B (en) | Control method, equipment and storage medium of terminal of Internet of things | |
CN104765357A (en) | Authorization system and method for vehicle remote diagnosis | |
CN104852925A (en) | Method for leakproof, secure storage and backup of data of mobile smart terminal | |
US20160191504A1 (en) | Mobile terminal for providing one time password and operating method thereof | |
CN106790156A (en) | A kind of smart machine binding method and device | |
CN110868294B (en) | Key updating method, device and equipment | |
CN109587164A (en) | A kind of information encrypting transmission method, device, equipment and storage medium | |
CN111580956B (en) | Cipher card, key space configuration method and key use method thereof | |
CN102986162B (en) | Based on license dynamic management approach, the Apparatus and system of TCM or TPM | |
CN107563207A (en) | Encryption method, device and decryption method, device | |
CN108462700A (en) | Background server, terminal device, safe early warning method and storage medium suitable for recognition of face | |
CN104933361A (en) | Device and method for protecting login password | |
US20220182248A1 (en) | Secure startup method, controller, and control system | |
CN106559386A (en) | A kind of authentication method and device | |
EP2689367B1 (en) | Data protection using distributed security key | |
CN107589999B (en) | Process communication safety channel establishing method in heaven-earth integrated engineering | |
CN107437996A (en) | A kind of identity authentication method, device and terminal | |
CN105792167A (en) | Method, device and apparatus for initializing trusted execution environment | |
CN115426106B (en) | Identity authentication method, device and system, electronic equipment and storage medium | |
CN111311261A (en) | Security processing method, device and system for online transaction | |
CN107994986A (en) | A kind of renewable TF card of Encryption Algorithm and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |
|
RJ01 | Rejection of invention patent application after publication |