CN110276221A - Apply card reading system based on block chain PKI certificate more - Google Patents

Apply card reading system based on block chain PKI certificate more Download PDF

Info

Publication number
CN110276221A
CN110276221A CN201910555579.0A CN201910555579A CN110276221A CN 110276221 A CN110276221 A CN 110276221A CN 201910555579 A CN201910555579 A CN 201910555579A CN 110276221 A CN110276221 A CN 110276221A
Authority
CN
China
Prior art keywords
certificate
bca
block chain
industry
intelligence contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910555579.0A
Other languages
Chinese (zh)
Other versions
CN110276221B (en
Inventor
杨小宝
惠小强
刘亚雪
龙艳
刘圆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910555579.0A priority Critical patent/CN110276221B/en
Publication of CN110276221A publication Critical patent/CN110276221A/en
Application granted granted Critical
Publication of CN110276221B publication Critical patent/CN110276221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0013Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The invention discloses apply card reading system based on block chain PKI certificate more, it is related to smartcard identification and technical field of communication safety and comprising, system includes reader device, mobile terminal, industry background system and the more Application Certificate system DMcert of block chain, reader device has ESAM chip, it uses the key and certificate of more application file structure storage every profession and trades, there is the distributed conglomerate node trust model of hierarchical structure in the more Application Certificate system DMcert of block chain, be deployed with intelligent contract in the model.It mostly can be improved the convenience that user's load is traded using card reading system in the present invention, and can effectively promote the safety of environment for card use using the form of the more Application Certificate system DMcert of block chain.

Description

Apply card reading system based on block chain PKI certificate more
Technical field
The present invention relates to smartcard identifications and technical field of communication safety and comprising, more particularly to based on block chain PKI certificate Apply card reading system more.
Background technique
Outlet that the load of the trading cards such as water, electricity, combustion gas, traffic in resident's basic living must go its own or The comprehensive website of such as e-supermarket, this is very inconvenient for the common people, therefore has expedited the emergence of the card reader technology of inter-trade smart card, The technology can be such that the smart card of a variety of industries is written and read using the same card reader.
Currently, card reader is generally to pass through the PSAM/SAM card number increased in card reader in support of the extension to smart card What amount was realized, since this extended mode not only needs to occupy the big quantity space of reader device, and complexity is welded, extends more Using obviously unrealistic.Moreover, current environment for card use is mostly PKI (Public Key Infrastructure) technology based on trusted party, Studies have shown that due to the trust of PKI technology extremely concentrates on CA (certificate authority) and there are Single Point of Faliures and unpredictable Threat, therefore, trusted party CA is not fully believable.
Summary of the invention
The embodiment of the invention provides card reading system is applied based on block chain PKI certificate, it can solve existing skill more The problem of art.
The present invention provides based on block chain PKI certificate apply card reading system, including by network connection one Reader device, mobile terminal, industry background system and the more Application Certificate system DMcert of block chain, the card reader risen is set There is ESAM chip, which stores the key and certificate of every profession and trade using more application file structures in standby;
The more Application Certificate system DMcert of block chain have the distributed conglomerate node trust model of hierarchical structure, The distribution conglomerate node trust model serves as the role of one CA of tradition, the letter of traditional CA using a large amount of miner's node BCA Appoint the BCA node being dispersed in block chain network, the first layer in the distribution conglomerate node trust model is root BCA, the last layer are to act on behalf of BCA, remaining node is father BCA, other every profession and trade root BCA to father BCA in addition to acting on behalf of BCA and having intersection Form single tree, all data services acted on behalf of BCA and carry out conglomerate jointly, the distribution conglomerate node The overall situation is deployed with intelligent contract in trust model, and the intelligence contract is the application program operated on block chain, and contract is write Enter in block chain.
In the present invention card reading system is applied based on block chain PKI certificate more, had the advantages that
(1) reader device more applied is supported to can overcome the disadvantages that the limitation of current multi-application smart card hair fastener;
(2) block chain DMcert system supports the operation of conglomerate certificate, and provides higher safety for environment for card use;
(3) this method can be deployed on portable equipment, be realized " one machine of a family ", while saving social cost, improved and occupied The convenience of the transaction such as people's load.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the composition schematic diagram for more applying card reading system in the present invention based on block chain PKI certificate;
Fig. 2 is the composition schematic diagram of the more Application Certificate system DMcert of block chain;
Fig. 3 is the schematic diagram of traditional trust model;
Fig. 4 is the schematic diagram of distributed conglomerate node trust model in the present invention;
Fig. 5 is the relation schematic diagram of access control intelligence contract ACC and industry intelligence contract ISC;
Fig. 6 is the composition of reader device and the connection schematic diagram with other parts.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to figs. 1 to Fig. 6, the present invention provides apply card reading system, the system packet based on block chain PKI certificate more Include reader device, mobile terminal, industry background system and the more Application Certificate system DMcert of block chain.
In practical applications, of the invention mostly also to need to cooperate smart card, application provider and hair using card reading system Mechanism for card could use, and industry background system, mobile terminal, application provider and the card sending mechanism in the system are for smart card The management platform of more application authorization services is provided with reader device, is the prior art, therefore do not do specific introduction.
The reader device includes the standardized Bluetooth interface for wirelessly communicating with mobile terminal, embedded-type security access Module (ESAM) in the reader device, uses more application files as memory and control built-in chip type in the ESAM chip Structure stores every profession and trade key and certificate, to ensure that every profession and trade application is independent interference-free.
There is distributed conglomerate node trust model, such as Fig. 2 and 4 in the more Application Certificate system DMcert of block chain It is shown.Traditional trust model needs a credible CA in single industry PKI system to sign and issue the number of the industry in Fig. 3 Certificate, all CA form tree in trust structure, and the root of the tree is Root-CA, i.e. root CA.In the PKI system of conglomerate In system, the certificate that CA (Agent-CA) signs and issues multiple industries is acted on behalf of usually using one, except finally acting on behalf of CA has intersection, higher level All CA still form tree, and Root-CA is tree root.This means that two serious safety defects: once Root-CA by To attack, each CA in system can be affected;Once Agent-CA is under attack, all industries in system all can be by To influence, and agency is more, influences bigger.Enhance safety in block platform chain realize distributed trust model Property, distributed conglomerate node trust model of the invention from industry root CA to intermediate CA again to all third parties of final CA all It is realized in block chain network, the function of traditional CA is realized by miner's node (Agent node) in block chain, miner's node Circle in BCA such as Fig. 4 indicates that miner's node BCAs in the present invention is the block chain link that its function is completed instead of tradition CA Traditional CA is not simply placed in block chain network by point.Therefore, the trust of originally one CA is dispersed to block chain network In a large amount of BCA node, these nodes safeguard the operation and related data of CA certificate jointly.First layer is root BCA in the model, The last layer is to act on behalf of BCA, for acting on behalf of the end-user certificate for signing and issuing every profession and trade, between first layer and the last layer BCA is father BCA.Each layer of BCA node all uses distributed computing technology to store in the distribution conglomerate node trust model It in block chain, is authorized between all BCA nodes by certificate, upper one layer is next layer of sign entitlement certificate.Except last One layer of the BCA that acts on behalf of has other than intersection, and the root BCA to father BCA of other every profession and trades forms single tree, all agencies BCA then safeguards the local certificate and related data of multiple industries jointly.
Certificate operation requests in the present invention are as the transaction (affairs/transaction) in block chain by miner's node BCAs verifies, is packaged into block, blacklist (revocation) is added and is written local block chain storage etc..Miner's node can replace tradition CA completes its function, and eliminates signature and CRL (Certificate Revoke List, certificate repository revocation list) or OCSP (Online Certificate Status Protocol, the inquiry of certificate presence) response service.In addition, Hash verification is demonstrate,proved The mode of book is simple and quick.
The block chain network of root BCA is safeguarded by one-level management person in Fig. 4, can have plurality of layers father BCA later, by later stages Other manager's maintenance, acts on behalf of BCA and is safeguarded by final public administration person.Root BCA signs and issues industry root certificate certainly.Act on behalf of BCA completion The function of traditional proxy CA is more with being signed and issued according to the certificate of authority for terminal by father's BCA sign entitlement certificate of any industry The ability of a industry certificate, the father BCA that wherein father BCA can be root BCA or be trusted by root BCA.To realize traditional proxy CA Function, act on behalf of BCA including at least two class certificates: mine card and the industry certificate of authority, mine card are certificates inside block chain, are to prove Act on behalf of that BCA is authentic and valid, evidence with grant a certificate ability.The BCA node tool of the certificate is held in the statement of the industry certificate of authority There is the power for signing and issuing the sector applications certificate.In addition, the distribution conglomerate node trust model further includes being presented to The final industry certificate of reader device, is signed and issued by acting on behalf of BCA.
The overall situation is deployed with intelligent contract in the distribution conglomerate node trust model, and the intelligence contract is considered as It is the application program operated on block chain, which is written multiple contracts, area in block chain in the form of software code Block chain can run the data of multiple business.By taking water industry as an example, intelligent contract can write and define the operation of water industry certificate Agreement and algorithm.
Trigger condition and response operation are pre-defined in the intelligence contract, affairs can trigger function code in contract It executes.The more Application Certificate system DMcert of block chain by the overall situation deployment intelligent contractual control conglomerate certificate operation with Management, the intelligence contract includes two class intelligence contracts, is respectively defined as access control intelligence contract ACC and industry intelligence contract ISC.Only one ACC in the more Application Certificate system DMcert of block chain, the intelligence contract first define credentials verification process The selection in middle verifying path, it is therefore an objective in light client light-client quick search and flow congestion is avoided, secondly, access Control intelligence contract ACC is deployed on industry contract ISC, is responsible for the specific ISC of triggering.Access control contract letter defined below Number:
Register Authority M: address MmWith trust authority Mc
Register the card reader in special domain: address RmWith trust authority Rc
Register light client: address LmWith the L of " free " or " busy " state of being ins
Add card reader RmTo administrative center Mi
Add access path control: C=(Mm,Dm,Lm,Ls, p), p indicates access path control protocol
Select light client light-client:C → Lm, Ls
When reader device and intelligent card mutual authentication, reader device submits certification verification request to block catenary system, Access control intelligence contract ACC triggers selection light client light-client predetermined using checking request as input Function code distribution verifying path.In addition, including all industry intelligence contract ISC in access control intelligence contract ACC storage Address, certificate any operation (application, update, revocation, verifying etc.) unique industry intelligence contract ISC can be triggered, such as Fig. 5.
There are multiple industry intelligence being defined in global ether mill block chain in the more Application Certificate system DMcert of block chain Contract ISC, each ISC both correspond to an industry, formulate the agreement and rule that certificate operates by corresponding industry, are defined below The handling function of certificate in industry intelligence contract ISC:
Initialize(x,x,..,x)
Create(x,x,..,x)
Check(x,x,..,x)
Signing(x,x,..,x)
Update(x,x,..,x)
Revoke(x,x,..,x)
Assuming that acting on behalf of in the block chain network of BCA has certificate in n industry intelligence contract ISC, i-th of ISC defined below Operation:
1) create and initialize: father BCA calls creation function to dispose a new industry intelligence contract on block chain The address of new contract is returned to block chain network during creation by ISC, and after deployment success, all BCA nodes can be visited Ask it.
Initialization function defines relevant to industry all information, each ISC include its trade information (such as industry ID, Public key) and relevant hash algorithm, trade information includes globally unique profession identity symbol IID, access control intelligence contract ACC IID is accorded with by profession identity and triggers corresponding ISC, and hash algorithm is for calculating the calculation for being loaded into certificate cryptographic Hash in block chain Different encryption methods, such as RSA cryptographic algorithms, ECC algorithm, Ed25519 may be selected in method, a block chain.Industry intelligence contract ISC also safeguards the variable of one group of array and certificate revocation mapping, and array includes the list of certificate, it is also possible that often The validity period of a certificate and some other parameter information, list of the certificate revocation mapping comprising cancellation of doucment.
2) certificate request C is checkedi: act on behalf of BCA comparison certificate request CiWith trade information existing in block chain network, Ci=1 It indicates to check correctly, otherwise refuse, with C={ c1,c2,c3,…,cnIndicate correctly all requests.
3) grant a certificate requests Si: acting on behalf of BCA, X.509 mixed format generates certificate according to improved block chain, using altogether Knowledge mechanism generates the block comprising certificate into block chain, with S={ s1,s2,s3,…,snIndicate all certificates signed and issued column Table.
4) certificate request U is updatedi: industry background system applies for again or acts on behalf of that BCA initiates Ci', step 2), 3) is repeated, but It is original SiHash be added industry intelligence contract ISC certificate revocation mapping table, Si=UiIndicate updated certificate column Table.
5) cancellation of doucment requests Ri: the certificate hash that addition needs to cancel to industry intelligence certificate ISC certificate revocation maps Table, with R={ r1,r2,r3,…,rnIndicate all list of cert cancelled.
Industry intelligence contract ISC is started by access control intelligence contract ACC, and the certificate request that industry background system is initiated is made Check function, C are triggered for input affairsi=1 Signing letter as incoming event triggering ACC registration & addition function and ISC Number, ACC registration addition function are only executed in industry initial registration, later real-time update.Ci'=1 and Ri=1 triggering Update&Revoke function.In addition, including two kinds of data structures in industry intelligence contract ISC storage, array and certificate revocation reflect It penetrates, storage of array S={ s1,s2,s3,…,snIn siHash, cancellation of doucment R={ r1,r2,r3,…,rnIn riHash add It is added in revocation mapping.
Card is signed and issued to sub- BCA from root BCA to every grade of block chain network of BCA all at least one intelligent contract, father BCA is acted on behalf of When book, added by the way that the Hash record of certificate to be completed to the signature to certificate in the intelligent contract of father BCA, and contract address To the extended field for mixing X.509 certificate format.Root BCA is logical to intermediate BCA sign entitlement certificate (public key comprising intermediate BCA) It crosses and realizes the Hash record of the certificate of authority in the intelligent contract of root BCA;Intermediate BCA (is wrapped to BCA sign entitlement certificate is acted on behalf of Containing the public key for acting on behalf of BCA) by the way that the Hash record of the certificate of authority is realized in intermediate BCA intelligence contract;BCA is acted on behalf of to client End sign and issue industry certificate (public key comprising industry) by by the Hash record of industry certificate in the industry intelligence contract for acting on behalf of BCA It is realized in ISC.The complete certificate of authority signed and issued is stored in the intelligent contract of current BCA, acts on behalf of the industry intelligence contract of BCA ISC is stored with the hash of complete the industry certificate of authority and final device certificate that intermediate BCA is issued;The intelligent contract of intermediate BCA In be stored with the complete intermediate BCA certificate of authority;Complete root certificate is stored in the intelligent contract of root BCA.BCA is acted on behalf of to sign and issue most Whole industry certificate is the last one certificate element of trust model, and in addition to industry certificate, other is all the certificate of authority.Due to block Certificate in chain is not signed, therefore traditional certificate signature validation checks that certificate hash is stored in block chain in block chain In presence replace, the public key for verifying signature is the address of certificate hash storage in block chain.Industry intelligence contract ISC is deposited The hash of final industry certificate is contained, final industry certificate is by checking certificate hash in the industry intelligence contract ISC for acting on behalf of BCA In presence verify.Industry intelligence contract ISC is stored with the complete industry certificate of authority, each certificate of authority in addition to root certificate It can be verified by checking presence of the certificate hash in father's BCA intelligence contract.It is realized with this from final certificate (leaf card Book) the verifying path of root certificate into BCA tree.
Industry root BCA block chain network at least one intelligent contract in the distribution conglomerate node trust model About, which has recorded complete industry root certificate and every layer of father's BCA block chain network all at least one intelligent contracts, should Intelligent contract includes that the identity of sub- BCA and address, the identity of record and address constitute in trade network from BCA is acted on behalf of to root BCA Certification authentication path, which can be used to verify the trust chain of entire certificate agency.In power industry, intelligence Energy contract is defined in electric industry agreement and rule under global child node, can negotiate formulation by electric power enterprise and belong to the industry Unique contract, which disposes under the control of father BCA, makes attacker that malice industry contract can not be written easily.
For smart card in the communication process with reader device, smart card calls the row of corresponding document by application identifier Industry certificate completes two-way authentication to carry out network verification in block chain.
The reader device is managed work using ESAM chip, which has SPI interface and two can be with The USART interface (general serial coffret) of compatible 7816 interface of ISO/IEC, as shown in Figure 6.It is non-in reader device Contact transmits integrated chip 14443 interface of ISO/IEC and SPI interface, and the SPI interface of the SPI interface and ESAM chip is logical Letter, 14443 interface of ISO/IEC are then interacted with contact type intelligent card.Two USART interfaces simulation two of ESAM chip A 7816 interface of ISO/IEC, for being interacted with contact intelligent card.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (8)

1. applying card reading system based on block chain PKI certificate, which is characterized in that including by being connected to the network together more Reader device, mobile terminal, industry background system and the more Application Certificate system DMcert of block chain, in the reader device With ESAM chip, which stores the key and certificate of every profession and trade using more application file structures;
The more Application Certificate system DMcert of block chain have the distributed conglomerate node trust model of hierarchical structure, this point Cloth conglomerate node trust model plays the part of the role of traditional CA using miner's node BCAs, and the trust of traditional CA is dispersed to area BCA node in block chain network, the first layer in the distribution conglomerate node trust model is root BCA, and the last layer is BCA is acted on behalf of, remaining node is father BCA, other every profession and trade root BCA form tree-shaped knot to father BCA in addition to acting on behalf of BCA by intersecting Structure, all data services acted on behalf of BCA and carry out conglomerate jointly, overall situation portion in the distribution conglomerate node trust model There is intelligent contract in administration, and the intelligence contract is the application program operated on block chain, and contract is written in block chain.
2. applying card reading system based on block chain PKI certificate as described in claim 1, which is characterized in that the intelligence more Energy contract includes access control intelligence contract ACC and industry intelligence contract ISC, the more Application Certificate system DMcert of block chain The quantity of middle access control intelligence contract ACC is one, and the access control intelligence contract ACC first defines certification authentication The selection that path is verified in journey, enables light client light-client quick search and to avoid flow congestion, secondly described in Access control intelligence contract ACC is deployed on industry contract ISC, is responsible for the specific industry intelligence contract ISC of triggering.
3. applying card reading system based on block chain PKI certificate as claimed in claim 2, which is characterized in that the reading more When card device equipment and intelligent card mutual authentication, reader device submits certification verification request, the access control to block catenary system Intelligence contract ACC is made using checking request as input, triggers selection light client light-client function generation predetermined Code is to distribute verifying path, while access control intelligence contract ACC is stored with the address of all industry intelligence contract ISC, certificate Any operation can trigger unique industry intelligence contract ISC.
4. applying card reading system based on block chain PKI certificate as claimed in claim 2, which is characterized in that the row more The operation of industry intelligence contract ISC includes creation and initializes, checks, signs and issues, updates, cancels, and father BCA calls wound in creation operation It builds function and disposes new industry intelligence contract ISC on block chain, the address of new contract is returned to block chain during creation Network, all BCA nodes can access the new contract after deployment success;It is defined in initialization operation relevant to industry all Information;Check to act on behalf of have trade information in BCA comparison check certificate request and block chain network in operation, to determine that certificate is asked Seeking Truth is no legal;Sign and issue operation in act on behalf of BCA according to improved block chain mixing X.509 format generate certificate, utilize common recognition Mechanism generates the block comprising certificate into block chain;It updates industry background system in operation and applies for or act on behalf of that BCA is initiated again Grant a certificate request, and repeat to sign and issue operation, but industry intelligence contract ISC certificate is added in the hash of original issued certificate Cancel mapping table;Addition needs the certificate hash that cancels to industry intelligence contract ISC certificate revocation mapping table in destruction operation;Institute Certificate revocation mapping table is stated to be safeguarded by industry intelligence contract ISC.
5. applying card reading system based on block chain PKI certificate as claimed in claim 2, which is characterized in that Mei Gesuo more Stating industry intelligence contract ISC all includes its trade information and relevant hash algorithm, and trade information includes globally unique industry Identifier IID, the access control intelligence contract ACC accord with IID by profession identity and trigger corresponding industry intelligence contract ISC, Hash algorithm is loaded into certificate cryptographic Hash in block chain for calculating.
6. applying card reading system based on block chain PKI certificate as described in claim 1, which is characterized in that the generation more Manage BCA and include at least two class certificates: mine card and the industry certificate of authority, mine card is certificate inside block chain, be prove to act on behalf of BCA it is true The real effective, evidence with grant a certificate ability;The BCA node that the certificate is held in the statement of the industry certificate of authority, which has, signs and issues the row The power of portion's Application Certificate out of trade;BCA is acted on behalf of by any industry father BCA sign entitlement certificate, this acts on behalf of BCA according to the certificate of authority Multiple industry certificates are signed and issued for terminal, wherein father BCA is the root BCA or intermediate BCA for root BCA trust.
7. applying card reading system based on block chain PKI certificate as described in claim 1, which is characterized in that the reading more For card device equipment in the communication process with smart card, smart card calls corresponding industry card in file by application identifier AID Book, to carry out network verification in block chain.
8. applying card reading system based on block chain PKI certificate as described in claim 1, which is characterized in that the reading more Also there is contactless transmission chip, the ESAM chip has SPI interface and two USART interfaces, described in card device equipment Contactless transmission integrated chip 14443 interface of ISO/IEC and SPI interface, the SPI of the SPI interface and the ESAM chip Interface communication, 14443 interface of ISO/IEC are interacted with contact type intelligent card;Two USART of the ESAM chip connect Mouth mold intends two 7816 interfaces of ISO/IEC, for interacting with contact intelligent card.
CN201910555579.0A 2019-06-25 2019-06-25 Multi-application card reader system based on block chain PKI certificate Active CN110276221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910555579.0A CN110276221B (en) 2019-06-25 2019-06-25 Multi-application card reader system based on block chain PKI certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910555579.0A CN110276221B (en) 2019-06-25 2019-06-25 Multi-application card reader system based on block chain PKI certificate

Publications (2)

Publication Number Publication Date
CN110276221A true CN110276221A (en) 2019-09-24
CN110276221B CN110276221B (en) 2022-09-23

Family

ID=67963127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910555579.0A Active CN110276221B (en) 2019-06-25 2019-06-25 Multi-application card reader system based on block chain PKI certificate

Country Status (1)

Country Link
CN (1) CN110276221B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN109635165A (en) * 2018-12-06 2019-04-16 北京磁云数字科技有限公司 Data summarization method, device, equipment and medium based on tree-like block chain network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN109635165A (en) * 2018-12-06 2019-04-16 北京磁云数字科技有限公司 Data summarization method, device, equipment and medium based on tree-like block chain network

Also Published As

Publication number Publication date
CN110276221B (en) 2022-09-23

Similar Documents

Publication Publication Date Title
CN112307455B (en) Identity authentication method and device based on block chain and electronic equipment
CN101527633B (en) Method for intelligent key devices to obtain digital certificates
CN107592293A (en) The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN110050474A (en) The type name of subobject for the composite object in Internet of Things network and block chain
CN110069908A (en) A kind of authority control method and device of block chain
CN113239382A (en) Credible identity model based on block chain intelligent contract
CN108777684A (en) Identity identifying method, system and computer readable storage medium
CN109598147B (en) Data processing method and device based on block chain and electronic equipment
CZ11597A3 (en) Method of safe use of digital designation in a commercial coding system
CN110493273A (en) Identification authentication data processing method, device, computer equipment and storage medium
CN111383114A (en) Asset information management method and device based on block chain
CN111738725A (en) Cross-border resource transfer authenticity auditing method and device and electronic equipment
CN108876669A (en) Course notarization system and method applied to multi-platform shared education resources
CN113704775B (en) Service processing method and related device based on distributed digital identity
CN109547200A (en) Certificate distribution method and corresponding calculating equipment and medium in block chain network
CN111402033A (en) Asset information management method and device based on block chain
CN109544982A (en) Parking information sharing method and shared system
CN109743321A (en) Block chain, application program, the user authen method of application program and system
CN111340628A (en) Asset information management method and device based on block chain
CN101950342A (en) Device and method for managing access control permission of integrated circuit card
Gutmann Everything you never wanted to know about pki but were forced to find out
CN113077233B (en) Electronic warranty issuing method, cloud server and electronic warranty system
Boontaetae et al. RDI: Real digital identity based on decentralized PKI
CN105743855B (en) A kind of safety control system of Internet application equipment and its distribution, application method
CN110276221A (en) Apply card reading system based on block chain PKI certificate more

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant