CN100401309C - Tax controlling equipment software edition intelligent upgrade encryption identification method - Google Patents

Tax controlling equipment software edition intelligent upgrade encryption identification method Download PDF

Info

Publication number
CN100401309C
CN100401309C CNB2006100398245A CN200610039824A CN100401309C CN 100401309 C CN100401309 C CN 100401309C CN B2006100398245 A CNB2006100398245 A CN B2006100398245A CN 200610039824 A CN200610039824 A CN 200610039824A CN 100401309 C CN100401309 C CN 100401309C
Authority
CN
China
Prior art keywords
program
control machine
tax control
tax
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100398245A
Other languages
Chinese (zh)
Other versions
CN1949235A (en
Inventor
王平
朱海伟
冯常伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiongmao Electromechanical Inst Rument Technology Co Ltd Nanjing
Nanjing Panda Electronics Co Ltd
Original Assignee
Xiongmao Electromechanical Inst Rument Technology Co Ltd Nanjing
Nanjing Panda Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiongmao Electromechanical Inst Rument Technology Co Ltd Nanjing, Nanjing Panda Electronics Co Ltd filed Critical Xiongmao Electromechanical Inst Rument Technology Co Ltd Nanjing
Priority to CNB2006100398245A priority Critical patent/CN100401309C/en
Publication of CN1949235A publication Critical patent/CN1949235A/en
Application granted granted Critical
Publication of CN100401309C publication Critical patent/CN100401309C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to tax control device software version intelligent upgrading encrypting verification method. It includes the following steps: using DES symmetry encryption algorithm to encrypt upgrade waiting executable program and software version; using MD5 equal hashing function to extract message mapping for the encrypted file to gain verifying code; using it to extract message mapping for the encrypted file, software version difference, 1 byte random number generated by program announcing end to generate verifying code and verify; while upgrading and verifying, using hashing function which is the same between the tax control machine end and the program announcing end to extract message mapping for the encrypted program, and comparing the identifying code with the USB verifying code; using the hashing function random number to extract message mapping; using tax control machine to read the encrypted program partly, and cryptographic key to decrypt.

Description

Tax controlling equipment software edition intelligent upgrade encryption identification method
Technical field
The present invention is a kind of software version intelligent upgrade encryption design proposal that can be applied to tax-control cash register, is used for the tax controlling equipment technical field of infotech and electronic technology and automatic technology, and the encryption and decryption authentication techniques in the computer technology.
Background technology
The tax is the lifeblood of national economy, thereby the design of tax control product is extremely important.Because having wide range of applications of tax control product, the replacing of product software and upgrading are more frequent.This has flexibly the easily characteristic of row with regard to the software upgrading that requires tax controlling equipment.Because the software upgrading mode adopts the medium of various ways such as USB memory disc, Ethernet usually, and tax control product has strict security requirement simultaneously, and this needs the upgrading mode of software must have the security of height.
This section situation is like this, and conventional upgrade method is not adopt the encrypting and authenticating mode.The system constructing of encrypting and authenticating is to propose in our invention.Below one section word may from the programme upgrade method of other tax-control cash register, our invention advantage just is so: all constitute with program software, need not the outside intelligent card authentication.(in conventional password, the destination uses identical key with originator, and promptly encryption key is identical or of equal value with decruption key, and promptly symmetric encipherment algorithm calculates.DES and various distortion thereof are the algorithms of using always, and DES is a block encryption, will expressly be divided into the piece of 64bits.
CN200410067248.6 relates to a kind of method and device of controlling safety updating of software of tax register, before tax-control cash register carries out the software upgrading down operation, tax-control cash register must be provided by the software upgrading download security code that is provided by other carriers, this security code is according to the characterisitic parameter of every tax-control cash register, as has a machine code of uniqueness, obtain the digital signature security code by the asymmetry cryptographic calculation, be stored in the smart card of selling at random.
The foundation of the step that comprises following order at least: A, tax-control cash register security code, background management system (1) input machine code, background management system (1) sends to SAM card module for reading and writing (2) with described machine code, SAM card module for reading and writing (2) carries out obtaining the digital signature security code after asymmetric arithmetic is encrypted according to machine code and the key of self, and issue background management system (1), background management system (1) is sent to smart card module for reading and writing (3) with described digital signature security code, and stores in smart card; B, the affirmation of tax-control cash register smart card, after tax-control cash register is received the download instruction of software upgrading, microprocessor (4) by tax-control cash register sends the ID authentication request order to smart card module for reading and writing (6), smart card module for reading and writing (6) sends the multidigit random number to the microprocessor (4) of tax-control cash register, microprocessor (4) is according to tax-control cash register smart card identity authenticate key and the multidigit random number that receives, produce a result by symmetry algorithm, smart card module for reading and writing (6) is according to multidigit random number that is sent and the authentication key of oneself, also produce a result by symmetry algorithm, microprocessor (4) compares described two results, only under above-mentioned two encrypted result same cases, microprocessor (4) confirms that smart card is effective; C, the authentication of tax-control cash register security code, by microprocessor (4) smart card module for reading and writing (6) being carried out digital signature reads, microprocessor (4) carries out the asymmetric arithmetic deciphering according to tax-control cash register security code authenticate key, tax-control cash register machine code after obtaining to decipher, microprocessor (4) reads the machine code of tax-control cash register storage, microprocessor (4) compares described two machine codes, only under above-mentioned two machine codes came to the same thing situation, the tax-control cash register microprocessor confirmed that security code is effective; After D, tax-control cash register confirmed that the digital signature security code effectively, tax-control cash register microprocessor (4) accessed update software by standard serial interface (7) from PC (8), download to tax-control cash register program storage (5).)
Yet the said method more complicated does not have good scheme to the technology that guarantees software integrity.Also need a plurality of hardware card.In order to solve the problem of the security aspect of software upgrading in the tax controlling equipment design, the present invention has done the design of aspects such as encrypting and authenticating, digital signature for the software upgrading mode of tax controlling equipment, guaranteed the consistance of software upgrading sequence version number, update time and publisher, user side's identity, and the security and the integrality of software to be upgraded itself.
Summary of the invention
The present invention seeks to: solve the problem of the security aspect of software upgrading in the tax controlling equipment design, guarantee the consistance of software upgrading sequence version number, update time and publisher, user side's identity, and the security and the integrality of software to be upgraded itself.
When the needs update software is downloaded, at first smart card is carried out authentication, after confirming that smart card identity is correct, carry out the authentication of security code, by the security code asymmetric arithmetic is deciphered, when the machine code of the deciphering that obtains and tax control cash receiving storage was identical, tax-control cash register just carried out the software upgrading download.The present invention adopts the digital signature security code authentication method that possesses uniqueness, high security, fundamentally improves security and reliability that the system of tax-supervising cash register software upgrading is downloaded.
The present technique solution is: the present invention adopts symmetric encipherment algorithm that executable program, software and hardware version are encrypted.
1, adopts the DES symmetric encipherment algorithm, encrypt for executable program to be upgraded and software version.DES algorithm and key are kept at program issue end and tax control machine end.
2, adopt hash function such as MD5, carry out extract message mapping, be verified sign indicating number for the file after encrypting.This hash function is kept at program issue end and tax control machine end simultaneously.
3, adopt hash function such as MD5, carry out extract message mapping, produce identifying code, verify for the 1 byte random number that the software version difference and the program issue end of the file after encrypting, identification number to be upgraded, tax control machine to be upgraded produces.Promptly extract and be verified sign indicating number.This hash function is kept at program issue end and tax control machine end simultaneously.Identifying code, and add that 1 byte random number forms 5 byte identifying codes, personnel carry by upgrade job.
4, in the upgrade validation process, at first use with the program issue and hold identical hash function that the program of the distribution of having encrypted is carried out extract message mapping by the tax control machine end.And the identifying code that the identifying code that generates and USB or network media are issued compares.If both are inconsistent, authentication failed then shows that program runs into to distort in the distribution way, withdraw from upgrading.
5, use the hash function identical that the program of the distribution of having encrypted is added the identification number of this machine, existing software version and the difference value of software version to be upgraded and the random number (identifying code of the 5th byte that the personnel that promptly upgrade are entrained) that generation is held in the program issue by the tax control machine end, carry out extract message mapping with program issue end.If both are inconsistent, then authentication failed shows that program is not corresponding with tax control machine to be upgraded, withdraws from upgrading.
6, tax control machine reads the encrypted program piecemeal, and uses secret key decryption.First content comprised the version information of software, can produce information by tax control machine, confirmed by the user.
7, tax control machine reads deciphering with the encrypted program piecemeal, and block-by-block covers original executable program file, finishes escalation process.
Beneficial effect of the present invention:
1, the confidentiality in the assurance upgrading executable program issuing process.
2, guarantee executable program in the escalation process integrality and can not distorting property.
3, realized the proof procedure of software version during upgrading and difference in version.
4, the present invention has realized in the escalation process checking for the identification number of tax control machine to be upgraded.Solve the problem of the security aspect of software upgrading in the tax controlling equipment design, guarantee the consistance of software upgrading sequence version number, update time and publisher, user side's identity, and the security and the integrality of software to be upgraded itself.The present invention adopts the security code authentication method possess uniqueness, high security, fundamentally improves security that the system of tax-supervising cash register software upgrading downloads and integrality, reliability.
Description of drawings
Fig. 1 is a program encryption process block diagram of the present invention
Fig. 2 is a program verification process block diagram of the present invention
Fig. 3 is that the present invention utilizes DES to realize block diagram
Specific implementation
1, adopts the DES symmetric encipherment algorithm, encrypt for executable program to be upgraded and software version.In order to reduce calculated amount and to save the space, adopt the method for block encryption.Issue by media such as USB, networks through encrypting the file that produces.DES algorithm and key are kept at program issue end and tax control machine end, as shown in Figure 1.
2, adopt hash function such as MD5, carry out extract message mapping, obtain the identifying code of 16 bytes for the file after encrypting.This hash function is kept at program issue end and tax control machine end, as shown in Figure 1 simultaneously.
3, adopt hash function such as MD5, carry out extract message mapping, obtain the identifying code of 16 bytes for the 1 byte random number that the software version difference and the program issue end of the file after encrypting, identification number to be upgraded, tax control machine to be upgraded produces.This hash function is kept at program issue end and tax control machine end simultaneously.Divide 4 groups of XORs to produce the identifying code of 4 bytes 16 byte identifying codes, and add that 1 byte random number forms 5 byte identifying codes, personnel carry by upgrade job, as shown in Figure 1.
4, in the upgrade validation process, at first use with the program issue and hold identical hash function that the program of the distribution of having encrypted is carried out extract message mapping by the tax control machine end.And the identifying code of the identifying code of 16 bytes that will generate and USB or network media issue compares.If both are inconsistent, authentication failed then shows that program runs into to distort in the distribution way, withdraw from upgrading.As shown in Figure 2.
5, second step, use the hash function identical that the program of the distribution of having encrypted is added the identification number of this machine, existing software version and the difference value of software version to be upgraded and the random number (identifying code of the 5th byte that the personnel that promptly upgrade are entrained) that generation is held in the program issue by the tax control machine end with program issue end, carry out extract message mapping, and the identifying code of entrained preceding 4 bytes of the identifying code of 16 bytes that will generate and upgrading personnel compares.If both are inconsistent, then authentication failed shows that program is not corresponding with tax control machine to be upgraded, withdraws from upgrading.As shown in Figure 2.
6, in the 3rd step, tax control machine reads the encrypted program piecemeal, and uses secret key decryption.First content comprised the version information of software, can produce information by tax control machine, confirmed by the user.As shown in Figure 2.
7, in the 4th step, tax control machine reads deciphering with the encrypted program piecemeal, and block-by-block covers original executable program file, finishes escalation process.As shown in Figure 2.
Use standard DES symmetric cryptography
Public?Function?EncryptDes(ByVal?SourceStr?As?String)As?String
”get?encodekey?string?from?web.config
Dim?skey?As?String
skey=ConfigurationSettings.AppSettings(″EnCodeKey″)
”put?the?input?string?into?the?byte?array
Dim?des?As?DESCryptoServiceProvider=New?DESCryptoServiceProvider()
Dim?inputByteArray?As?Byte()
inputByteArray=Encoding.Default.GetBytes(SourceStr)
”set?encrypt?object?and?skey
des.Key=ASCIIEncoding.ASCII.GetBytes(skey)
des.IV=ASCIIEncoding.ASCII.GetBytes(skey)
Dim?ms?As?MemoryStream=New?MemoryStream()
Dim?cs?As?CryptoStream=New?CryptoStream(ms,des.CreateEncryptor(),CryptoStreamMode.Write)
Dim?sw?As?StreamWriter=New?StreamWriter(cs)
sw.Write(SourceStr)
sw.Flush()
cs.FlushFinalBlock()
ms.Flush()
Return?Convert.ToBase64String(ms.GetBuffer(),0,ms.Length)
End?Function
The MD5 algorithm is that Ron Rivest invented in 1992, and it is divided into the 512-bit piece to data, produces the message digest value of 128-bit.In the nearest several years, MD5 is one of topmost Message Digest 5.
The realization of MD5 algorithm be divided into fill message, determine additional messages length, initialization buffer zone, packet transaction message, output message summary several sections.MD5 handles the information of input with 512 groupings, and each grouping is divided into 16 32 seat groupings again, after having passed through a series of processing, the output of algorithm is formed by four 32, will will generate 128 hashed values after these four 32 packet concatenation.
1, fills message
Be filled into the M1 from M
|M1|≡448?mod?512
| M1|>| M|: if | M| ≡ 448mod 512, then | M1|=|M|+512
Fill content: 100 ... 0
Additional messages length
M1 is filled into M2, and message-length is with 64 bit representations
If | M1|>264, then only get low 64
| M2| is 512 multiple, can be divided into length and be 512 L grouping Y0, Y1 ..., YL-1
2, initialization buffer zone
Buffer length: 128
With four 32 registers (A, B, C, D) expression
A=01?23?45?67(0×67452301)
B=89?AB?CD?EF(0×EFCDAB89)
C=FE?DC?BA?98(0×98BADCFE)
D=76?54?32?10(0×10325476)
In the bracket is the actual numerical value of each register, and the front is actual storage order.
3, packet transaction message
The core of algorithm is a compression function,
Be made up of the four-wheel computing, the every wheel carried out 16 step iteration.The every wheel used different logical functions, is designated as F, G, H, I.T is the form that produces in advance, comprises 64,32 every.512 message is divided into 16 groupings every the wheel, and each grouping X is 32.
CV0=IV
CVi=HMD5(CVi-1,Yi)
Each is taken turns and comprises the sequence that the 16 steps operation of buffer zone ABCD is formed.
a←b+((a+g(b,c,d)+X[k]+T[i])<<<s)
Wherein,
A, b, c, four words of d=buffer zone are arranged with a given order;
G=basic logic function F, G, H, one of I;
The s=of<<<is to 32 word ring shift left s positions
X[k]=M[q * 16+k]=k 32 words in q 512 bit data block
T[i]=i of table among the T 32 words;
Adding of +=mould 232;
First round computing
·For(k=0;k<16;++k){
A←B+((A+g 1(B,C,D)+X[ρ 1(k)]+T[16×0+k+1])
<<<s 1[k?mod?4])
(A,B,C,D)←(A,B,C,D)>>>32
}
·g 1(B,C,D)=(B&C)|(B&D)
·ρ 1(k)=k, 0≤k<16
·s 1[0...3]=[7,12,17,22]
Second takes turns computing
·For(k=0;k<16;++k){
A←B+((A+g 2(B,C,D)+X[ρ 2(k)]+T[16×1+k+1])
<<<s 2[k?mod?4])
(A,B,C,D)←(A,B,C,D)>>>32
}
·g 2(B,C,D)=(B&D)|(C&D)
·ρ 2(k)=(1+5k)mod?16, 0≤k<16
·s 2[0...3]=[5,9,14,20]
The third round computing
·For(k=0;k<16;++k){
A←B+((A+g 3(B,C,D)+X[ρ 3(k)]+T[16×2+k+1])
<<<s 3[k?mod?4])
(A,B,C,D)←(A,B,C,D)>>>32
}
Figure C20061003982400081
·ρ 3(k)=(5+3k)mod?16, 0≤k<16
·s 3[0...3]=[4,11,16,23]
The four-wheel computing
·For(k=0;k<16;++k){
A←B+((A+g 4(B,C,D)+X[ρ 4(k)]+T[16×3+k+1])
<<<s 4[k?mod?4])
(A,B,C,D)←(A,B,C,D)>>>32
}
Figure C20061003982400082
·ρ 4(k)=7k?mod?16, 0≤k<16
·s 4[0...3]=[6,10,15,21]
CV0=IV
CV q-1=SUM 32(CV q,RF I[Y q,RF H[Y q,RF G[Y q,RF F[Y q,CV q]]]])
MD=CV L
Wherein: the initial value of IV=ABCD (is seen step 3)
Y qThe q of=message 512 bit data block
Data block number in the L=message;
The CVq=link variable is used for the processing of q data block
RFx=uses one of basic logic function x to take turns power function.
The final eap-message digest result of MD=
SUM 32=the mould 2 that calculates by 32 words respectively 32Addition results.
4, output message summary
MD=CVL
It uses 56 keys that 64 data block is encrypted, and the data block of 64bits is carried out 16 take turns coding.Take turns when coding with every, " the every wheel " key value of a 48bits is drawn by the complete key of 56bits.Because key length is relatively short, we adopt triple des.Encryption became for three steps, and the key in each step is all different, be equivalent to 168Bits with the key effect.
Make i represent iterations,
Figure C20061003982400091
Represent mould 2 summations by turn, f is an encryption function.The encryption and decryption procedural representation of DES is as follows.
L 0R 0← IP (<64bit input code 〉)
L i←R i-1 i=1,2,Λ,16
R i ← L i - 1 ⊕ f ( R i - 1 , k i ) i=1,2,Λ,16
<64bit ciphertext〉← IP -1(R 16L 16)
R 16L 16← IP (<64bit ciphertext 〉)
R i-1←L i i=16,15,Λ,1
L i ← R i - 1 ⊕ f ( R i - 1 , k i ) i=16,15,Λ,1
<64bit is expressly〉← IP -1(R 0L 0)
The whole file of message extraction algorithm is used as a big text message, by its irreversible character string mapping algorithm, has produced this unique informative abstract.If propagate afterwards in the process of this file, no matter any type of change (comprising error of transmission that the circuit instability causes in artificial modification or the downloading process etc.) has taken place in the content of file, as long as will find that informative abstract is inequality when this file is recomputated eap-message digest, can determine just incorrect file that you obtain thus.

Claims (2)

1. tax controlling equipment software edition intelligent upgrade encryption identification method is characterized in that adopting following step:
(1) adopt the DES symmetric encipherment algorithm, encrypt for executable program to be upgraded and software version, DES algorithm and key are kept at program issue end and tax control machine end;
(2) adopt the MD5 hash function, carry out extract message mapping for the file after encrypting, be verified sign indicating number, this hash function is kept at program issue end and tax control machine end simultaneously;
(3) adopt the MD5 hash function, carry out extract message mapping for the software version difference of the file after encrypting, identification number to be upgraded, tax control machine to be upgraded and 1 byte random number of program issue end generation, obtain the identifying code of 16 bytes, verify; This hash function is kept at program issue end and tax control machine end simultaneously; Divide 4 groups of XORs to produce the identifying code of 4 bytes 16 byte identifying codes, and add that 1 byte random number forms 5 byte identifying codes, personnel carry by upgrade job;
(4) in the upgrade validation process, at first being used with the program issue by the tax control machine end holds identical hash function that the program of the distribution of having encrypted is carried out extract message mapping, and the identifying code that the identifying code that generates and USB or network media are issued compares, if both are inconsistent, authentication failed then, showing that program runs in distribution way distorts, and withdraws from upgrading;
(5) use the hash function identical that the program of the distribution of having encrypted is added the identification number of this machine, existing software version and the difference value of software version to be upgraded and the random number that generation is held in the program issue by the tax control machine end with program issue end, the identifying code of the 5th byte that the personnel that promptly upgrade are entrained carries out extract message mapping; If the identifying code with program issue end that the tax control machine end uses is inconsistent, then authentication failed shows that program is not corresponding with tax control machine to be upgraded, withdraws from upgrading;
(6) tax control machine reads the encrypted program piecemeal, and uses secret key decryption; First content comprised the version information of software, produces information by tax control machine, confirmed by the user;
(7) tax control machine reads deciphering with the encrypted program piecemeal, and block-by-block covers original executable program file, finishes escalation process.
2. tax controlling equipment software edition intelligent upgrade encryption identification method according to claim 1 is characterized in that adopting the method for block encryption for reducing calculated amount and saving the space; Issue by USB or network media through encrypting the file that produces.
CNB2006100398245A 2006-04-24 2006-04-24 Tax controlling equipment software edition intelligent upgrade encryption identification method Expired - Fee Related CN100401309C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100398245A CN100401309C (en) 2006-04-24 2006-04-24 Tax controlling equipment software edition intelligent upgrade encryption identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100398245A CN100401309C (en) 2006-04-24 2006-04-24 Tax controlling equipment software edition intelligent upgrade encryption identification method

Publications (2)

Publication Number Publication Date
CN1949235A CN1949235A (en) 2007-04-18
CN100401309C true CN100401309C (en) 2008-07-09

Family

ID=38018751

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100398245A Expired - Fee Related CN100401309C (en) 2006-04-24 2006-04-24 Tax controlling equipment software edition intelligent upgrade encryption identification method

Country Status (1)

Country Link
CN (1) CN100401309C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159542B (en) * 2007-11-12 2010-06-09 中兴通讯股份有限公司 Method and system for saving and/or obtaining authentication parameter on terminal network appliance
CN101344906B (en) * 2008-05-19 2010-06-23 北京深思洛克软件技术股份有限公司 Sectional type remote updating method
CN101436141B (en) * 2008-11-21 2012-07-18 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN102281138B (en) * 2010-06-12 2014-05-07 国民技术股份有限公司 Method and system for improving safety of verification code
CN102622251B (en) * 2012-03-07 2016-01-06 深圳市凯立德欣软件技术有限公司 The method of navigation software updating and management and server
CN103812894B (en) * 2012-11-12 2017-09-01 中国石油天然气集团公司 The management method of web file publishings version in a kind of real-time monitoring system
CN108388439A (en) * 2018-03-27 2018-08-10 深圳市路畅科技股份有限公司 A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software
CN110412907A (en) * 2019-06-11 2019-11-05 武汉欣叶电子科技有限公司 A kind of perfume atmosphere generator, vehicle-mounted fragrant atmosphere control system and method
CN111124447A (en) * 2019-11-29 2020-05-08 山东英信计算机技术有限公司 Platform management method, system, equipment and computer readable storage medium
CN112506543B (en) * 2020-12-07 2023-07-14 天津津航计算技术研究所 Multi-device software upgrading management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001095274A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
WO2004051983A1 (en) * 2002-12-03 2004-06-17 Nagravision Sa Method of securing software updates
CN1601959A (en) * 2004-10-15 2005-03-30 宁波三维技术有限公司 Method and appts for controlling safety updating of software of tax register

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001095274A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
WO2004051983A1 (en) * 2002-12-03 2004-06-17 Nagravision Sa Method of securing software updates
CN1601959A (en) * 2004-10-15 2005-03-30 宁波三维技术有限公司 Method and appts for controlling safety updating of software of tax register

Also Published As

Publication number Publication date
CN1949235A (en) 2007-04-18

Similar Documents

Publication Publication Date Title
CN100401309C (en) Tax controlling equipment software edition intelligent upgrade encryption identification method
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN101213814B (en) Secure patch system
US9537657B1 (en) Multipart authenticated encryption
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
CN101149768B (en) Special processor software encryption and decryption method
US7908474B2 (en) Method for improved key management for ATMs and other remote devices
CN104104517B (en) The method and system of disposal password checking
US20200106600A1 (en) Progressive key encryption algorithm
US7693286B2 (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
CN101355422B (en) Novel authentication mechanism for encrypting vector
CN107678763A (en) Electric energy meter upgrade method and system based on digital signature technology
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN111639348B (en) Management method and device of database keys
CN111147245A (en) Algorithm for encrypting by using national password in block chain
CN102365839A (en) Key implementation system
CN110289946A (en) A kind of generation method and block chain node device of block chain wallet localization file
US7792303B2 (en) Method of delivering direct proof private keys to devices using a distribution CD
CN114267100B (en) Unlocking authentication method and device, security chip and electronic key management system
CN111614621A (en) Internet of things communication method and system
CN105406957A (en) Securing A Cryptographic Device Against Implementation Attacks
CN113312608A (en) Electric power metering terminal identity authentication method and system based on timestamp
CN102222188A (en) Information system user password generation method
CN110225028A (en) A kind of distribution anti-counterfeiting system and its method
CN112597545A (en) Medical electronic contract evidence storing method based on block chain technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080709

Termination date: 20210424