WO2018046008A1 - Procédé de conception de stockage de puce radiofréquence chiffrée par chaînage de blocs - Google Patents

Procédé de conception de stockage de puce radiofréquence chiffrée par chaînage de blocs Download PDF

Info

Publication number
WO2018046008A1
WO2018046008A1 PCT/CN2017/101304 CN2017101304W WO2018046008A1 WO 2018046008 A1 WO2018046008 A1 WO 2018046008A1 CN 2017101304 W CN2017101304 W CN 2017101304W WO 2018046008 A1 WO2018046008 A1 WO 2018046008A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
radio frequency
blockchain
frequency chip
Prior art date
Application number
PCT/CN2017/101304
Other languages
English (en)
Chinese (zh)
Inventor
陆杨
Original Assignee
上海鼎利信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海鼎利信息科技有限公司 filed Critical 上海鼎利信息科技有限公司
Publication of WO2018046008A1 publication Critical patent/WO2018046008A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to the field of Internet technology, and relates to a blockchain encryption radio frequency chip storage design method.
  • Blockchain encryption RF chip is increasingly important as a link between the user and the blockchain network.
  • Blockchain encryption RF chip storage methods are constantly threatened by hackers and viruses. Security incidents have occurred many times in recent years.
  • a dense RF chip is used as a tool.
  • the storage and operation of the blockchain encryption RF chip is the foundation and core. It is necessary not only to take into account the technology of the blockchain, but also to consider security, application and scalability. Therefore, there is a need for a storage design method for a blockchain encrypted radio frequency chip that solves the above problems.
  • the technical problem to be solved by the present invention is to provide a storage design method for a blockchain encryption radio frequency chip which is widely used, high in security, good in scalability, and highly applicable.
  • the technical solution of the present invention is: a storage design method for a blockchain encryption radio frequency chip, comprising the following steps:
  • the first step is to design the blockchain to encrypt the data structure of the RF chip
  • the data in the blockchain encryption radio frequency chip is designed to be organized and stored in the user memory
  • the third step is to design the encryption and decryption process of the blockchain encryption radio frequency chip
  • the data structure of the blockchain encryption radio frequency chip includes user data, authentication data and account data;
  • the user data includes read control data A, a user name, a user phone, and a user ID;
  • the read control data A is used to store information for controlling user data reading, the user name is used to store the user's name information, the user phone is used to store the user's phone information, and the user ID stores the internal user number;
  • the authentication data includes: read control data B, user password hash value, authentication key, account master public key;
  • the read control data B is used to authenticate the information read by the data, and the information of the authentication data is extracted, and the local time stamp is added to obtain the user anti-counterfeit mark to prevent tampering, and finally the value of the user anti-counterfeiting mark and the user are
  • the value of the password is converted into a hash value of the length required for the actual security authentication by the hash encryption algorithm, and the process of extracting the information of the authentication data reading is:
  • the information read by the authentication data of any length is divided to generate sub-information segments of length 4n bytes, where n is an arbitrary integer value determined according to the system in advance, and then a Hash function transform is used to generate a 4n-length hash. The value is obtained by adding the local timestamp to obtain the user security flag. In the case that the blockchain encryption radio chip is lost, the illegal user is effectively prevented from violently cracking the user password.
  • the authentication key is used to read the control data B and the Secure authentication between user password hash values, account public key decryption is used to decrypt user security tokens for querying the balance of each account;
  • the account data includes: read control data C, master key ciphertext, and master private key ciphertext;
  • the read control data C is used to store the information read by the account data
  • the master key ciphertext is used to associate the user password with the account private key, improve the encryption parameter of the account public key, improve the difficulty of cracking, and make the account more Safety;
  • the data in the blockchain encryption radio frequency chip is organized in the user memory as a tree file structure, and has a multi-level file structure.
  • the tree file structure is divided into three levels: the first level is the total control file, which is more
  • the root of the application file structure is the root directory of the tree file structure, which is used to store the public information file of the blockchain encryption RF chip and serves all applications; the second level is the application file, which is in the total control file.
  • the application file is used to implement various application functions of the blockchain encryption radio frequency chip
  • the third level is an atom file, which is used to store the actual The application data and the corresponding system management information, the data information in the data structure of the blockchain encryption radio frequency chip is stored in the atom file, and the corresponding atom file can be called when the application file needs;
  • the encryption and decryption process of the blockchain encryption radio frequency chip is:
  • Encryption The system randomly generates a 32-byte master key, reads the user's password at the same time, and stores it in the array matrix, where the user uses the password as the row vector and the master key as the column vector.
  • the encryption algorithm encrypts to obtain the master key ciphertext;
  • the blockchain encryption radio frequency chip storage design method of the invention studies the principle of the blockchain, considers the information security degree, designs the data structure of the blockchain encryption radio frequency chip, and considers the process of encryption and decryption, in order to To meet the principle of multi-purpose card, we have designed a multi-level file structure, increased the degree of information protection, and improved the security and ease of use.
  • FIG. 1 is a specific step of a blockchain encryption radio frequency chip storage design method.
  • Embodiment 1 Hash function construction of user password
  • the user-used password required for the verification card is transformed into a hash value of a desired length by a hash function.
  • the specific process is to first fill and divide the user-used password of any length to generate a sub-information segment of length 4n bytes, and then pass Chaotic iteration, function transformation, substitution, and function lookup tables generate a 4n length hash value.
  • the specific algorithm is as follows:
  • the user is represented by a password into a format.
  • m is the initial number of iterations.
  • a user of any length is padded and divided using a password to generate a sub-information segment having a length of 4 n bytes.
  • Embodiment 2 Definition and application of application files under the system total control file
  • the blockchain encrypts the public information files of the RF chip and serves all applications. Create multiple application catalog files according to the usage conditions on the total control file, for example, the blockchain financial environment including key information, personal information, etc., and then define the financial contact application environment, and encrypt the radio frequency chip according to the Chinese financial blockchain.
  • the specification defines the file name for this application as 1PAY.SYS.DDF01.
  • the financial contactless system environment can also be defined and defined as 2PAY.SYS.DDF01.
  • the financial contact application environment and the financial contact application environment are different application files under the system total control file, and the application file realizes various application selections by using the file name to realize various applications of the radio frequency chip.
  • Embodiment 3 Specific Planning of Key Structure
  • Key management is a comprehensive technology involving the generation, inspection, distribution, transmission, use, storage and destruction of keys, and is closely related to the key management system and the quality of personnel.
  • the ISO has developed a key management standard.
  • the specific system has specific practical requirements, so it is difficult to unify in standardization.
  • the hierarchical structure of the key system is often determined according to the functional structure of the encryption system. If the system function is relatively simple, the key hierarchy can be correspondingly reduced. If the function is relatively complicated, it is necessary to increase the number of key structure layers as appropriate.
  • the security of the key management system can be greatly improved by the design of the layered mode. Since the new protocol can be used to change and manage in each layer, the entire key system is a dynamic feature, not just a static storage mechanism. With each layer of keys, there is a corresponding protocol. .
  • a layer 3 key management system is used in the blockchain encryption radio chip system, which is a master key layer, a subkey layer and a session key layer, respectively.
  • the same system master key exists in the intelligent blockchain encryption radio chip and the card reader. According to the actual situation of the system, some smart cards or card readers have one or more master keys to improve the system. Security. Only one master key is used in this system.
  • the subkey is obtained by encrypting the master key using a variable master key parameter
  • the third layer session key is obtained by encrypting the subkey with another variable master key parameter.
  • the data transmitted between the reader and the chip is encrypted using a session key. Normally, the session key can only be used once, so that even if the session key is deciphered by the attacker, only the data is transmitted once. Also, the system master key cannot be derived from the session key.
  • the session key generation method includes: a state-of-the-art manufacturing identification code is used in the blockchain encryption radio frequency chip, and the serial number or the blockchain is used to encrypt the radio frequency chip serial number, wherein the serial number of the radio frequency chip is encrypted according to the blockchain.
  • the system usually records the time of the transaction at the time of the transaction, and there are corresponding counters in some cards to control the number of readings and writes. The counter is automatically incremented when the card is executed with an instruction. This ensures that the value of the counter and the trading time are inconsistent each time a transaction is made. Therefore, the manufacturer's identification code of the card is used by the master key, and the serial number of the card is encrypted to generate a subkey.
  • the same master key is used, since the serial numbers are different, the subkeys generated by each card are also different. To ensure that the session key on each card is used only once, the transaction time and counter values are encrypted using a subkey to generate a session key. Thus, for the same card, the session key used for each transaction is different. For a multi-purpose chip, different applications often use different master keys, so this makes the deciphering system a lot of work, and the meaning of deciphering is not great.
  • the master key can be presented by a plurality of trusted persons independently of each other and then organically synthesized into a key, and then added by a secure random number encryption operation. Therefore, the generation and change of the master key are difficult to predict. Department If the master key is not careful during the loading process, the key will be leaked. Therefore, the master key must be loaded in a secure environment. Since the system master key needs to be manually loaded into the radio frequency chip and the card reader, it is ensured that the loading process must be performed on the dedicated device, and the environment at the time of downloading must be secure, and the information cannot be lost when the radio frequency card is in contact. The in-card operating system ensures that the master key cannot be read again after it has been loaded. It is very troublesome to load the key in the card reader, and a security module is often added to store the key to implement the encryption and decryption algorithm.
  • the encryption and decryption algorithm uses a digital chaotic sequence, which can improve the digital chaotic iterative process without increasing the amount of computation, so that the pseudo-random sequence generated by the whole system is more similar to noise, and the proportion of weak keys is reduced and expanded.
  • the space of the available keys makes the selection of keys more random.
  • the pseudo-chaotic sequence period generated by the iteration of the digital chaotic system is unpredictable, difficult to accurately analyze, and far less than 2 N (N is the implementation accuracy). Although the accuracy of the implementation is improved, the average period of the pseudo-chaotic sequence is still not greatly improved, and there is still a case where the sequence is attracted to a certain fixed value.
  • the m-sequence is used to perturb the chaotic iterative system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de conception de stockage d'une puce radiofréquence chiffrée par chaînage de blocs. Le procédé comprend les étapes consistant à : concevoir la structure de données d'une puce radiofréquence chiffrée par chaînage de blocs ; concevoir la forme selon laquelle des données de la puce radiofréquence chiffrée par chaînage de blocs sont organisées et stockées dans une mémoire utilisateur ; et concevoir des processus de chiffrement et de déchiffrement pour la puce radiofréquence chiffrée par chaînage de blocs. L'étude du principe de chiffrement du chaînage de blocs permet au procédé de conception de stockage d'une puce radiofréquence chiffrée par chaînage de blocs d'améliorer la sécurité des informations, satisfaire le principe d'une carte unique pour une pluralité d'usages, améliorer le degré de protection d'informations, et améliorer la sécurité et la commodité d'utilisation.
PCT/CN2017/101304 2016-09-12 2017-09-11 Procédé de conception de stockage de puce radiofréquence chiffrée par chaînage de blocs WO2018046008A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201610818054.8 2016-09-12
CN201610815590.2 2016-09-12
CN201610818054 2016-09-12
CN201610818053.3 2016-09-12
CN201610815590 2016-09-12
CN201610818053 2016-09-12

Publications (1)

Publication Number Publication Date
WO2018046008A1 true WO2018046008A1 (fr) 2018-03-15

Family

ID=61561350

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2017/101305 WO2018046009A1 (fr) 2016-09-12 2017-09-11 Système d'identité à chaîne de blocs
PCT/CN2017/101304 WO2018046008A1 (fr) 2016-09-12 2017-09-11 Procédé de conception de stockage de puce radiofréquence chiffrée par chaînage de blocs

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101305 WO2018046009A1 (fr) 2016-09-12 2017-09-11 Système d'identité à chaîne de blocs

Country Status (2)

Country Link
TW (2) TWI750223B (fr)
WO (2) WO2018046009A1 (fr)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896A (zh) * 2018-03-29 2018-07-20 上海交通大学 一种具有数据保护功能的变电站状态监测***和方法
CN110532293A (zh) * 2019-09-02 2019-12-03 浪潮软件股份有限公司 一种基于区块链技术的数据流生命周期管理方法及***
CN110570309A (zh) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 用于更换区块链网络的领导者的方法和***
CN110990808A (zh) * 2019-11-21 2020-04-10 杭州趣链科技有限公司 一种基于区块链的公证摇号方法
CN111327568A (zh) * 2018-12-14 2020-06-23 中国电信股份有限公司 身份认证方法和***
CN111428253A (zh) * 2020-03-24 2020-07-17 福建福链科技有限公司 一种适用于区块链的数据保护方法及***
CN111522809A (zh) * 2019-02-02 2020-08-11 阿里巴巴集团控股有限公司 数据处理方法、***及设备
CN112184974A (zh) * 2020-09-27 2021-01-05 江苏天创科技有限公司 一种基于5g通讯节点的监测***
CN113364596A (zh) * 2021-05-27 2021-09-07 南方科技大学 一种基于区块链的挖矿方法、装置、移动终端及存储介质
CN113570321A (zh) * 2021-04-29 2021-10-29 国家能源集团新能源有限责任公司 氢能数据管理***
CN116132174A (zh) * 2023-02-13 2023-05-16 华中师范大学 一种5g车联网供应链的远程安全通信方法、***及终端

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768933B (zh) * 2018-04-11 2020-11-03 深圳技术大学 一种区块链平台上自主可监管数字身份认证***
CN109257342B (zh) * 2018-09-04 2020-05-26 阿里巴巴集团控股有限公司 区块链跨链的认证方法、***、服务器及可读存储介质
CN109255619A (zh) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 一种基于区块链的身份认证方法及设备
CN109583215B (zh) * 2018-09-28 2022-11-15 创新先进技术有限公司 一种处理征信数据的方法及装置、区块链数据共享***
CN109598518A (zh) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 基于区块链的防伪方法及装置、电子设备
US10970372B2 (en) 2018-11-01 2021-04-06 Microsoft Technology Licensing, Llc Revocable biometric print based identification
CN109447029B (zh) * 2018-11-12 2022-09-02 公安部第三研究所 电子身份证照生成***及方法
CN111224804B (zh) * 2018-11-26 2022-12-09 ***通信集团辽宁有限公司 物联网设备的初始化方法、装置、物联网设备及存储介质
CN109493058A (zh) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 一种基于区块链的身份识别方法及相关设备
CN109861996B (zh) * 2019-01-17 2023-06-02 深圳壹账通智能科技有限公司 基于区块链的关系证明方法、装置、设备及存储介质
GB2581527B (en) * 2019-02-22 2023-02-08 Secure Thingz Ltd Security data processing device
JP2020521342A (ja) * 2019-03-29 2020-07-16 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited ブロックチェーンネットワークにおける機密データ要素の管理
CN110516451B (zh) * 2019-07-24 2021-03-02 杭州电子科技大学 基于区块链的派生定密文件密级变更、解密提醒通知方法
CN110457954B (zh) * 2019-07-29 2023-08-25 创新先进技术有限公司 合同管理装置与方法
CN110781140B (zh) * 2019-09-06 2023-08-18 平安科技(深圳)有限公司 区块链中数据签名的方法、装置、计算机设备及存储介质
CN111092851A (zh) * 2019-09-23 2020-05-01 上海唯链信息科技有限公司 基于区块链的物联网温度检测设备的数据验真方法及装置
TWI711000B (zh) * 2019-09-30 2020-11-21 辰光能源科技有限公司 環境健康與產品品質建立系統
TWI740234B (zh) * 2019-10-16 2021-09-21 辰光能源科技有限公司 真食誠現系統
TWI727474B (zh) * 2019-10-25 2021-05-11 李婷婷 數位身分管理系統及方法
CN111556007B (zh) * 2020-03-03 2021-09-24 支付宝实验室(新加坡)有限公司 基于区块链的身份校验方法、装置、设备及存储介质
TWI729781B (zh) * 2020-04-21 2021-06-01 麥睿資訊股份有限公司 資料認證系統及其資料認證之方法
CN111914270A (zh) * 2020-07-08 2020-11-10 广西佳壹大数据科技股份有限公司 基于区块链技术的可编程认证服务方法和***
CN112073661B (zh) * 2020-08-03 2022-10-25 浙江旅游职业学院 一种用于无菌车间的防篡改视频监控***
CN112447291B (zh) * 2020-11-23 2023-03-28 四川大学华西医院 基于区块链的医联体数据之间的共享方法
CN112561006B (zh) * 2020-12-04 2023-08-29 中国联合网络通信集团有限公司 电子车牌管理方法、射频识别读写器、节点、设备及介质
CN112749409B (zh) * 2021-01-06 2024-03-08 上海零数众合信息科技有限公司 一种区块链中基于随机数的加密方法
CN112819628B (zh) * 2021-02-01 2024-02-02 网易(杭州)网络有限公司 交易防重放的检测方法及装置、***、电子设备、存储介质
CN112989392B (zh) * 2021-04-19 2022-08-30 河北科技大学 战场态势感知方法、***和终端设备
CN114189388A (zh) * 2021-12-17 2022-03-15 中国电子科技网络信息安全有限公司 一种联盟链密钥管理***及方法
CN114584343B (zh) * 2022-01-24 2023-05-02 厦门理工学院 一种云计算中心的数据保护方法、***和可读存储介质
CN114900348B (zh) * 2022-04-28 2024-01-30 福建福链科技有限公司 一种区块链传感器数据验证的方法及终端
CN115002779B (zh) * 2022-07-29 2022-11-22 杭州宇链科技有限公司 基于区块链和安全芯片的伪基站防治方法和***
CN116828457B (zh) * 2023-08-30 2023-11-17 四川轻化工大学 应用于酒窖中智能无线监测方法、***和介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6831982B1 (en) * 1999-11-19 2004-12-14 Storage Technology Corporation Encryption key management system using multiple smart cards
CN101308546A (zh) * 2008-05-20 2008-11-19 上海华申智能卡应用***有限公司 具有多级保护的安全存储结构的射频标签及其方法
CN105610578A (zh) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 区块链信息存证及隐私保护方法
CN105812126A (zh) * 2016-05-19 2016-07-27 齐鲁工业大学 健康区块链数据加密密钥的轻量级备份与高效恢复方法
CN105871855A (zh) * 2016-04-11 2016-08-17 杨鹏 一种电子设备标识码生成、存储和识别的方法及***

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
GB9930145D0 (en) * 1999-12-22 2000-02-09 Kean Thomas A Method and apparatus for secure configuration of a field programmable gate array
TWI351864B (en) * 2005-03-25 2011-11-01 Via Tech Inc Apparatus and method for employing cyrptographic f
CN101484904A (zh) * 2006-07-07 2009-07-15 桑迪士克股份有限公司 使用多用途控制结构的内容控制***和方法
KR101366243B1 (ko) * 2006-12-04 2014-02-20 삼성전자주식회사 인증을 통한 데이터 전송 방법 및 그 장치
CN102144371B (zh) * 2008-09-10 2015-06-03 Lg电子株式会社 选择性地加密控制信号的方法
JP5813380B2 (ja) * 2011-06-03 2015-11-17 株式会社東芝 半導体記憶装置
US10102510B2 (en) * 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
US10346814B2 (en) * 2014-06-04 2019-07-09 MONI Limited System and method for executing financial transactions
TWI528217B (zh) * 2014-07-02 2016-04-01 柯呈翰 於線上加上即時檔案動態標籤、加密之系統及方法
CN205003731U (zh) * 2015-09-30 2016-01-27 深圳市招股科技有限公司 一种基于双界面ic卡的数字货币硬件钱包
CN105701372B (zh) * 2015-12-18 2019-04-09 布比(北京)网络技术有限公司 一种区块链身份构建及验证方法
CN105790954B (zh) * 2016-03-02 2019-04-09 布比(北京)网络技术有限公司 一种构建电子证据的方法和***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6831982B1 (en) * 1999-11-19 2004-12-14 Storage Technology Corporation Encryption key management system using multiple smart cards
CN101308546A (zh) * 2008-05-20 2008-11-19 上海华申智能卡应用***有限公司 具有多级保护的安全存储结构的射频标签及其方法
CN105610578A (zh) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 区块链信息存证及隐私保护方法
CN105871855A (zh) * 2016-04-11 2016-08-17 杨鹏 一种电子设备标识码生成、存储和识别的方法及***
CN105812126A (zh) * 2016-05-19 2016-07-27 齐鲁工业大学 健康区块链数据加密密钥的轻量级备份与高效恢复方法

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896B (zh) * 2018-03-29 2023-06-23 上海交通大学 一种具有数据保护功能的变电站状态监测***和方法
CN108306896A (zh) * 2018-03-29 2018-07-20 上海交通大学 一种具有数据保护功能的变电站状态监测***和方法
CN111327568A (zh) * 2018-12-14 2020-06-23 中国电信股份有限公司 身份认证方法和***
CN111327568B (zh) * 2018-12-14 2022-04-01 中国电信股份有限公司 身份认证方法和***
CN111522809B (zh) * 2019-02-02 2023-04-21 阿里巴巴集团控股有限公司 数据处理方法、***及设备
CN111522809A (zh) * 2019-02-02 2020-08-11 阿里巴巴集团控股有限公司 数据处理方法、***及设备
CN110532293A (zh) * 2019-09-02 2019-12-03 浪潮软件股份有限公司 一种基于区块链技术的数据流生命周期管理方法及***
CN110570309A (zh) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 用于更换区块链网络的领导者的方法和***
CN110570309B (zh) * 2019-09-16 2023-06-16 上海保险交易所股份有限公司 用于更换区块链网络的领导者的方法和***
CN110990808A (zh) * 2019-11-21 2020-04-10 杭州趣链科技有限公司 一种基于区块链的公证摇号方法
CN111428253A (zh) * 2020-03-24 2020-07-17 福建福链科技有限公司 一种适用于区块链的数据保护方法及***
CN111428253B (zh) * 2020-03-24 2023-04-07 福建福链科技有限公司 一种适用于区块链的数据保护方法及***
CN112184974A (zh) * 2020-09-27 2021-01-05 江苏天创科技有限公司 一种基于5g通讯节点的监测***
CN113570321A (zh) * 2021-04-29 2021-10-29 国家能源集团新能源有限责任公司 氢能数据管理***
CN113364596A (zh) * 2021-05-27 2021-09-07 南方科技大学 一种基于区块链的挖矿方法、装置、移动终端及存储介质
CN116132174A (zh) * 2023-02-13 2023-05-16 华中师范大学 一种5g车联网供应链的远程安全通信方法、***及终端
CN116132174B (zh) * 2023-02-13 2024-04-16 华中师范大学 一种5g车联网供应链的远程安全通信方法、***及终端

Also Published As

Publication number Publication date
TW201812638A (zh) 2018-04-01
TWI749061B (zh) 2021-12-11
TW201812630A (zh) 2018-04-01
WO2018046009A1 (fr) 2018-03-15
TWI750223B (zh) 2021-12-21

Similar Documents

Publication Publication Date Title
WO2018046008A1 (fr) Procédé de conception de stockage de puce radiofréquence chiffrée par chaînage de blocs
CN107070660B (zh) 一种区块链加密射频芯片的存储设计方法
US9866376B2 (en) Method, system, and device of provisioning cryptographic data to electronic devices
CN106534092B (zh) 基于消息依赖于密钥的隐私数据加密方法
US8208627B2 (en) Format-preserving cryptographic systems
CN105024803B (zh) 白箱实现中的行为指纹
CN102138300B (zh) 消息认证码预计算在安全存储器中的应用
CN101149768B (zh) 一种专用处理器软件的加密和解密方法
JP2020522205A (ja) プログレッシブキー暗号化アルゴリズム
CN105100083B (zh) 一种隐私保护且支持用户撤销的基于属性加密方法和***
US20130339252A1 (en) Format-preserving cryptographic systems
RU2584500C2 (ru) Криптографический способ аутентификации и идентификации с шифрованием в реальном времени
CN106888081B (zh) 白盒实施方案内中间值的宽编码
MX2007014237A (es) Implementacion de almacenamiento seguro con integridad protegida.
CN105306194B (zh) 供加密档案和/或通讯协定的多重加密方法与***
CN102725737A (zh) 可验证防泄漏的加密和解密
CN105184115B (zh) 用于将隐式完整性或可信性检查包括到白箱实现中的方法
US20120063594A1 (en) Method for creating asymmetrical cryptographic key pairs
CN1322431C (zh) 基于对称密钥加密保存和检索数据
CN108537537A (zh) 一种安全可信的数字货币钱包***
CN104868998A (zh) 一种向电子设备供应加密数据的***、设备和方法
CN106209346B (zh) 白盒密码技术交错查找表
US8181869B2 (en) Method for customizing customer identifier
EP3214567B1 (fr) Mise à jour sécurisée de contenu de mémoire externe pour un certain système sur puce
CN105978680A (zh) 在白盒实现方案中实现填充

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17848181

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17848181

Country of ref document: EP

Kind code of ref document: A1