CN108183789B - Electronic code generation and authentication method - Google Patents

Electronic code generation and authentication method Download PDF

Info

Publication number
CN108183789B
CN108183789B CN201711467400.3A CN201711467400A CN108183789B CN 108183789 B CN108183789 B CN 108183789B CN 201711467400 A CN201711467400 A CN 201711467400A CN 108183789 B CN108183789 B CN 108183789B
Authority
CN
China
Prior art keywords
character string
enterprise
electronic
key
electronic code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711467400.3A
Other languages
Chinese (zh)
Other versions
CN108183789A (en
Inventor
朱涛
刘朝雷
宋西富
祝平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chuangtongpiao Technology Co ltd
Original Assignee
Chuangtongpiao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuangtongpiao Technology Co ltd filed Critical Chuangtongpiao Technology Co ltd
Priority to CN201711467400.3A priority Critical patent/CN108183789B/en
Publication of CN108183789A publication Critical patent/CN108183789A/en
Application granted granted Critical
Publication of CN108183789B publication Critical patent/CN108183789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for generating and authenticating an electronic code, wherein the electronic code is a quota valuable electronic code aiming at specific scientific and technical services, circulates between an enterprise and a service organization and is uniformly managed through an electronic code management system; the generation and authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, mechanism claiming, mechanism cashing and enterprise auditing; in each process, a new public key is generated through public key rearrangement and binarization, then an encrypted character string is generated by taking a private key as a secret key on the basis of the new public key, and the encrypted character string is secondarily encrypted to generate a final encrypted character string result; the authentication takes the result of the encrypted character string as the check basis. The method of the invention ensures that the electronic code cannot be copied and embezzled, the electronic code after signing is not redeemed by others at will, and the security of cashing is enhanced.

Description

Electronic code generation and authentication method
Technical Field
The invention relates to the field of information data processing, in particular to a method for generating and authenticating electronic codes.
Background
In order to encourage support and better service of 'public entrepreneurship and universal innovation', a quota valuable electronic code aiming at specific scientific and technical service is designed and issued by many companies, and the quota valuable electronic code can be circulated and redeemed through an 'internet management system'. The quota valuable electronic code corresponds to an application enterprise or an individual, a service pack (for a special service of a certain innovation and entrepreneur behavior, the special service is purchased by a third party organization capable of providing the special service by a government and is provided for an innovator and an entrepreneur in free) and the achieved effect one by one, and the management and the use of the quota valuable electronic code follow the principles of open popularization, independent application and special fund and cannot be split, transferred, purchased and pledged. The current quota-value electronic coding system comprises five service packages: the system comprises a high and new technology enterprise service package, an intellectual property service package, an analysis test service package, a new three-board listing service package and an initial service package.
The electronic encryption of the quota valuable electronic code is to encrypt data after an enterprise receives the quota valuable electronic code in order to ensure the security of the quota valuable electronic code and prevent the quota valuable electronic code from being copied and stolen by others, establish a private key and a public key, send the public key to the enterprise, and store the private key in a system. When signing a contract, an enterprise needs to input a public key to confirm a quota valuable electronic code, the quota valuable electronic code is used for establishing an encryption key for the organization after signing the contract, the public key is sent to the organization, the private key is stored in the system, the organization needs to input own public key for confirmation in the cashing process, and the enterprise can finish cashing only by inputting own public key for confirmation. Thus, double encryption is a protection for the entire flow of the stream of quotum valued electronic codes. It is therefore desirable to design an encryption method.
Disclosure of Invention
The invention provides a method for generating and authenticating an electronic code, aiming at solving the problems.
The invention is implemented according to the following technical scheme.
A generation and authentication method of electronic code, the said electronic code is a quota valuable electronic code to the particular science and technology service, circulate between enterprise and service organization, manage through the electronic code management system unitedly; the generation and the authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, organization claiming, organization cashing and enterprise auditing;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, uses a private key M2 as the secret key, and encrypts the B1 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails.
The mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coded data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3 is judged, the cashing is successful; otherwise, the redemption fails.
The enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encryption character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the audit fails.
Further, M3 is generated by using the public key M1 in step A2 by breaking M1 into 8 independent characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearranging to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
Further, M6 is generated by using the public key M4 in step P2 by splitting M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearranging to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.
The present invention obtains the following advantageous effects.
The electronic code is encrypted, and the electronic code cannot be copied and embezzled, so that the electronic code can be used for signing only by inputting a correct key and using the correct account for logging in the signing process of an enterprise. The electronic code signing and secondary encryption are carried out on the signing mechanism, in order to ensure that the signed electronic code cannot be redeemed by others at will and enhance the security of redemption, the mechanism needs to log in a correct account and input a correct key to perform redemption application, and the mechanism is ensured not to make mistakes. The double confirmation cashing mode not only ensures the safety and the accuracy of electronic code cashing, but also ensures that an organization can not be cashed without authorization under the condition of in-place service, and after the organization applies for cashing, an enterprise needs to log in a normal account and input a correct key to confirm cashing. The encryption of the electronic code, the verification of the signing and cashing processes are all used for ensuring that the electronic code enables enterprises to obtain due services under the conditions of safety and reliability, and the institutions obtain due rewards.
Drawings
FIG. 1 is a flowchart of the steps of an enterprise claiming electronic code in the present invention;
FIG. 2 is a flowchart of the steps of the present invention for signing an electronic code for an enterprise;
FIG. 3 is a flow chart of steps in the mechanism claimed electronic code of the present invention;
FIG. 4 is a flowchart of the steps of the present invention for an institution redeeming an electronic code;
FIG. 5 is a flowchart of the steps of the present invention for an enterprise to review electronic codes.
Detailed Description
The present invention will be further explained below with reference to the drawings and examples.
As shown in fig. 1 to 5, a method for generating and authenticating an electronic code, which is a quota valuable electronic code for a specific scientific and technical service, circulated between an enterprise and a service organization, and managed uniformly by an electronic code management system; the generation and authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, mechanism claiming, mechanism cashing and enterprise auditing;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, uses a private key M2 as the secret key, and encrypts the B1 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails.
The mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coding data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3 is judged, the cashing is successful; otherwise, the redemption fails.
The enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encryption character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the auditing is failed.
The method of generating M3 using the public key M1 in step A2 is to split M1 into 8 independent characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearrange them to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
The method for generating M6 using the public key M4 in step P2 is to split M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearrange them to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.

Claims (3)

1. A generation and authentication method of electronic code, the said electronic code is a quota valuable electronic code to the particular science and technology service, circulate between enterprise and service organization, manage through the electronic code management system unitedly; the method is characterized in that the generation and the authentication of the electronic code comprise five processes of enterprise application, enterprise signing, organization application, organization cashing and enterprise audit;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, encrypts the B1 by using a DES symmetric encryption algorithm by taking a private key M2 as the secret key, and obtains an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails;
the mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coded data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3, the cashing is successful; otherwise, the cashing fails;
the enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the auditing is failed.
2. A method of generating and authenticating an electronic code according to claim 1, wherein the public key M1 is used to generate M3 in step A2 by splitting M1 into 8 individual characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearranging to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
3. A method of generating and authenticating an electronic code according to claim 1, wherein the method of generating M6 using the public key M4 in step P2 is to split M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearrange them to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.
CN201711467400.3A 2017-12-28 2017-12-28 Electronic code generation and authentication method Active CN108183789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711467400.3A CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711467400.3A CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Publications (2)

Publication Number Publication Date
CN108183789A CN108183789A (en) 2018-06-19
CN108183789B true CN108183789B (en) 2023-03-28

Family

ID=62548631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711467400.3A Active CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Country Status (1)

Country Link
CN (1) CN108183789B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852093A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 Electronic-seal safety authentication system and method based on CPK
WO2007091002A1 (en) * 2006-02-07 2007-08-16 Nextenders (India) Private Limited Document security management system
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN106779645A (en) * 2017-02-08 2017-05-31 政和科技股份有限公司 Information ciphering method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007091002A1 (en) * 2006-02-07 2007-08-16 Nextenders (India) Private Limited Document security management system
CN1852093A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 Electronic-seal safety authentication system and method based on CPK
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN106779645A (en) * 2017-02-08 2017-05-31 政和科技股份有限公司 Information ciphering method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
天津首推"创通票"激发双创活力.《领导决策信息》.2016,(第34期),第12-13页. *

Also Published As

Publication number Publication date
CN108183789A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
US10419416B2 (en) Encryption and decryption techniques using shuffle function
US10986073B2 (en) Vaultless tokenization engine
CN106534092B (en) The privacy data encryption method of key is depended on based on message
US7475250B2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
CN106027228B (en) Encryption and decryption method and encryption and decryption system for webpage identifier
CN114982194A (en) Block chain implemented data hiding scheme for improved data secure communication, storage and transmission
CN113348455A (en) Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures
WO2015144672A1 (en) Method and system for encrypted data synchronization for secure data management
CN108777673B (en) Bidirectional identity authentication method in block chain
CN109872154A (en) A kind of identity real name Verification System based on block chain transaction data
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN110365468B (en) Anonymization processing method, device, equipment and storage medium
CN113761578A (en) Document true checking method based on block chain
CN111711521B (en) Block chain account private key resetting method and system
CN107332663A (en) Archive management method based on encryption technology
CN108183789B (en) Electronic code generation and authentication method
CN113342802A (en) Method and device for storing block chain data
CN105827411A (en) Information processing method and apparatus
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN112581285B (en) Block chain-based account generation method, system and medium in stock right transaction system
CN109088734B (en) Coding method and system
CN112291189B (en) Method, device, equipment and storage medium for sending and checking ciphertext
KR101501508B1 (en) Method and system for authentication by data encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 300384 Room 204, floor 2, Haitai building, No. 6, Meiyuan Road, Huayuan Industrial Zone, Binhai New Area, Tianjin

Applicant after: CHUANGTONGPIAO TECHNOLOGY CO.,LTD.

Address before: 300384 Room 204, 2 tower, Hai Tai Building, 6 Mei Yuan Road, Huayuan Industrial Area, Nankai District, Tianjin.

Applicant before: CHUANGTONGPIAO TECHNOLOGY CO.,LTD.

GR01 Patent grant
GR01 Patent grant