CN102594556A - Identity authentication method based on synchronization of spatiotemporal chaos - Google Patents
Identity authentication method based on synchronization of spatiotemporal chaos Download PDFInfo
- Publication number
- CN102594556A CN102594556A CN2011104094979A CN201110409497A CN102594556A CN 102594556 A CN102594556 A CN 102594556A CN 2011104094979 A CN2011104094979 A CN 2011104094979A CN 201110409497 A CN201110409497 A CN 201110409497A CN 102594556 A CN102594556 A CN 102594556A
- Authority
- CN
- China
- Prior art keywords
- synchronization
- authentication
- usbkey
- server
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Disclosed is an identity authentication method based on synchronization of spatiotemporal chaos. The identity authentication method based on the synchronization of the spatiotemporal chaos includes that every other state are extracted from a state sequence of a spatiotemporal chaos system as basic data to generate a key; initialization of system parameters at a server and a USBKey and information exchange of root keys are finished during an initialization phase; after a login phase and a synchronization phase, the USBKey responds to a random number in the information through verification, extracts synchronizing semaphore to generate new temporary public-private key pair, verifies a signature to confirm the identity of a sever, sends back the information containing a password and the signature of a user to the server, and the server confirms the identity of the user through signature verification in an authentication phase. According to the identity authentication method based on the synchronization of the spatiotemporal chaos, not only the authentication can be accomplished correctly, but also various known attacks can be resisted; and the public-private key pair in a dynamic change is used for accomplishing signing and authenticating processes of a protocol in a low network cost and without any exchange of secret information. Dynamic update of the key not only improves the security of the authentication method, but also prolongs service life of the relevant USBKey.
Description
Technical field
The present invention relates to the long-distance identity-certifying method under a kind of complex network environment, be specially a kind of identity identifying method based on synchronization of spatiotemporal chaos.
Background technology
Nineteen ninety, the Pecora of US Naval Research Laboratory and Carroll propose a kind of driving that is called first---the chaos method for synchronous of response, and successfully observed the synchronous phenomenon of chaos in the laboratory.Their initiative work greatly promoted chaos theoretical synchronously with the research of using, especially in the application in secure communication field.The technology that is usually used in the chaotic secret communication field has technology such as chaos is covered, chaos shift keying, Chaos Modulation.A common feature of these technology is: they all are the chaotic synchronizing systems that adopts low dimension, from the confidentiality of the technical realization communication of the coding and decoding of signal.The chaos system of in this type technology, relatively using always has based on the chaotic synchronizing system of cai's circuit and Lorenz chaos system etc.But these technology are not directly applied for the secure communication of network environment.People such as Hu Guang utilize unidirectional coupling map circling point (OCRML) space-time chaos model and unidirectional coupling map lattice point (OCOML) space-time chaos model to realize that the driving response of space-time chaos system is synchronous.This synchronization of spatiotemporal chaos model is that the data encryption communication under the computer network environment provides new thinking.
Because the space-time chaos system had both kept the pseudo-randomness and the ergodic of chaos system, therefore designed a kind of synchronisation key generating algorithm based on synchronization of spatiotemporal chaos.In identity identifying method, make the both sides that carry out authentication can the identical key of synchronized generation algorithm application based on synchronization of spatiotemporal chaos.The key that the synchronisation key algorithm is produced upgrades the public private key pair that Digital Signature Algorithm uses in the authentication method as the key updating factor, produces dynamic digital signature.Utilize the non-repudiation of digital signature and the authentication property of data source carried out the authentication of identity.Have only validated user could generate effective digital signature, and also have only validated user to pass through by certifying signature.
Along with the appearance of smart card, various authentication methods based on smart card also occur in succession, like the remote authentication method based on smart card of Hwang in 2000 and Li proposition.The appearance of USBKey has subsequently caused a research boom of identity identifying technology again, and various identity identifying methods based on USBKey also occur in succession.Current USBKey product all is to be theoretical foundation with digital certificate and RSA public key algorithm, and all is to adopt fixing key.Fact proved that the long-term use of same key will reduce its fail safe in any cryptographic methods.Therefore in the authentication method based on certificate, digital certificate has clear and definite useful life, yet its key is changed the process complicacy.But not having the replacing of clear and definite key in the authentication method based on certificate, this will inevitably make Related product fail safe in long-term use reduce.
Current widely used identity identifying technology mainly contains three types: the one, and the password authentication mode of user name encrypted code, two are based on the authentication techniques of challenge/answer method, and three are based on the authentication techniques of public-key cryptosystem and digital certificate.Except that these three types of widely used authentication techniques, also have the authentication techniques based on biological characteristics such as fingerprint, irises, because latter's technology is immature relatively, characteristics such as cost height are not by extensive employing.
In three types of authentication techniques that are widely used, the not competent current security requirement of password authentication mode.And, the authentication service of higher level of security can be provided based on the identity identifying technology of public-key cryptographic keys system, but this authentication service based on digital certificate, design of protocol is complicated, and offered load is bigger, and needs a believable third party to support.X.509 authentication protocol is exactly the normalized version of this type authentication techniques.Because the development of present domestic CA (Certificate Authentication) service industry is also lack of standardization, the authentication method based on digital certificate of various no third sides is suggested in succession.Identity identifying technology offered load based on challenging/replying is little, and higher high other authentication service of peace level can be provided.But it exists key to share and a distribution difficult problem.
For guaranteeing the fail safe of key, various authentication methods based on smart card and USBKey are suggested in succession.Like Hwang-Li smart card authentication method.This method is difficult to avoid Shen-Lin-Hwang to attack and Chan-Cheng attacks.Various improvement versions to the Hwang-Li method occur in succession subsequently; Improvement to the time stamp T of using in the Hwang-Li method is arranged; The improvement of adopting the ECC algorithm that this method is carried out in addition becomes the modulus-power algorithm in the big number field in the method into the dot product arithmetic of rational point among the ECC.
More than various authentication techniques and method a common characteristic is all arranged, that is: the whole bag of tricks all adopts a changeless key.The three parts who in the authentication techniques based on digital certificate, relates to must adopt a fixing public private key pair to carry out authentication, and based on appointing in advance also in the authentication method of challenge/answer techniques that identical key carries out authentication.
Like this, the long-term use of same key all will make the fail safe of method reduce.This authentication method produces dynamic digital signature and carries out dynamic authentication with the public private key pair that the synchronization of spatiotemporal chaos system dynamically updates the authentication both sides.Characteristics such as method is the basis with the ECDSA algorithm, adopts the authentication techniques based on challenge/response mode to design, and it is little to have load capacity, safe, and life cycle is long.
Summary of the invention
The objective of the invention is to; Through a kind of identity identifying method based on synchronization of spatiotemporal chaos is provided; A kind of synchronisation key generating algorithm based on synchronization of spatiotemporal chaos is applied to based in the USBKey identity identifying method; Dynamically update the authentication both sides and be used for the key of authentication, use the key of dynamic change to solve the safety problem that in the existing authentication method fixed key is faced.Method is divided into server end, client and USBKey and holds three parts based on the B/S pattern.The present invention can be applicable to authentication and the authentication under the various Secure Transaction under the network environment.
A kind of identity identifying method based on synchronization of spatiotemporal chaos of the present invention is to adopt following technological means to realize:
A kind of identity verification scheme based on synchronization of spatiotemporal chaos is got state from the status switch interval of space-time chaos system, as the master data that generates key; Get the low X position of space-time chaos system mode and put into one three byte arrays variable, and, form the part of final key with certain X+1 position of filling this three byte arrays variable in the low X position of another shape; May further comprise the steps:
1.1. accomplish the initialization of system parameters at initial phase server end and USBKey end, and accomplish the exchange of root key information;
1.2. landing phase, the file layout of USBKey conversion user password, and send authentication application to server;
1.3. synchronous phase generates the synchronizing signal amount by server, and generates new interim public private key pair and public words key according to this synchronizing signal amount, the synchronizing signal amount is signed message is beamed back USBKey;
1.4. authentication phase; USBKey is through the random number in the authentication response information; And extracting the new interim public private key pair of synchronizing signal amount generation, certifying signature is confirmed server identity; And beam back the information that comprises user password and signature and give server, server is confirmed user identity through certifying signature.
Aforesaid X position is 23.
Aforesaid X+1 position is 24.
Aforesaid authentication phase adopts the key schedule based on synchronization of spatiotemporal chaos in its authentication protocol, make the authentication both sides synchronously generate the identical key updating factor.
Aforesaid interim public private key pair generates through using the public private key pair and the key updating factor.
The validation both sides' of aforesaid certifying signature identity.
A kind of identity identifying method based on synchronization of spatiotemporal chaos of the present invention compared with prior art, has following remarkable advantages and beneficial effect:
This authentication method not only can correctly be accomplished authentication, and can resist various known attacks, also with less network overhead, under the situation that does not exchange any close secret information, accomplishes the signature and the verification process of agreement with the public and private key of dynamic change.Key dynamically update the fail safe that not only can improve authentication method, also prolonged the useful life of relevant USBKey simultaneously.
Description of drawings
Fig. 1 is the overall architecture sketch map of authentication method;
Fig. 2 is a protocol initializing process sketch map;
Fig. 3 lands and the verification process sketch map.
Embodiment
Below in conjunction with Figure of description, specific embodiment of the present invention is explained.
Authentication method is divided into server end based on C/S model, client and USBKey three parts structure as shown in Figure 1.The practical implementation step of method is following:
According to structure shown in Figure 1, affix one's name to corresponding assembly in server end, client and USBKey end respectively.Dispose corresponding safety database and authentication protocol program at server end; At client deployment Client Agent assembly; Affix one's name to corresponding firmware program in the USBKey end.
The registration of user profile and the initialization of USBKey.The user is delivered to server end with oneself user name and encrypted message through secured channels.Server deposits user profile in safety database and each parameter of generation system through initialization procedure, and the parameter information transmission is write USBKey, and with the USBKey interchange key, accomplish initialization procedure.USBKey is paid the user to be used.
The use of Client Agent assembly.Can be in the Flash memory of USBKey when the USBKey firmware is disposed with the Client Agent component stores.When USBKey was inserted client computer, client software is operation (client computer must allow automatic playing function) automatically.
The identification of user identity.When server need be discerned user identity, the user inserted client computer with USBKey, the operation automatically of client software this moment, and require the user to import encrypted message from USBKey input user with simple keyboard.After finishing, the information input confirms that USBKey can accomplish authentication by protocol procedures and server.
This authentication method separated into two parts is synchronisation key generating algorithm and authentication agreement two parts.The synchronisation key generating algorithm is described below at present.
The synchronisation key generating algorithm is divided into initial phase, synchronous phase and key and produces the stage.The synchronization of spatiotemporal chaos system that it adopted is suc as formula shown in (1) formula (2) and the formula (3).
Formula (1) is the drive system that algorithm adopted, and formula (2) and formula (3) are the responding system that communicating pair adopted.
I=1 wherein, 2 ..., i is the space lattice coordinate, and L is a Cycle Length, and n is the time series that disperses, z
n(i) be state variable.ε is the coupling constant.F (x) is a nonlinear function, and this paper is employed to be logistic mapping f (x)=ax (1-x).When a ∈ [3.5699456,4] was interval, f (x) will form a chaos state on [0,1] interval.For the OCRML system,, the outer ε of ε ∈ [0.16,0.19] can form a kind of chaos state except getting other value.
Can obtain unidirectional coupling map lattice point (OCOML) model of an open loop by formula (1), its expression formula is suc as formula shown in (2), wherein s
nRepresent a status switch.
Cycle boundary is opened the replacement of stream condition by one in formula (2).So just can use sequence s
nControl the OCOML system.z
n(i) be drive sequences from drive system formula (1).Copy type (2) obtains the opposing party's responding system suc as formula shown in (3), with identical z
n(i) come (3) two responding systems of drive-type (2) formula can reach synchronous.
Various symbols and the implication used in the verification process are as shown in table 1.
Consult the basic parameter of space-time chaos system the initial phase both sides.Produce the parameter group of the legal space-time chaos of safety system at random and pass to the recipient by the communication initiator through safe lane.Produce drive signal amount Drv the synchronous phase communication initiator, and send to the recipient.Produce the stage both sides at key and generate key according to Drv.Its step is following.
Used symbol and implication thereof in table 1 agreement
The state variable of getting the synchronization of spatiotemporal chaos system in the algorithm is a single precision floating datum, and generates 192 keys.
After system synchronization,
Both sides begin from the 3rd state of synchronization of spatiotemporal chaos system, get the odd states value.
Generate 192 keys and can get the 3rd, 5,7,9,11,13,15,17,19 states, 5-19 state got its low three byte LowByte3 [5,7,9,11,13,15,17,19] respectively,
Be filled into the 22nd to 15 of the 3rd state respectively on the 23rd of LowByte3 [5,7,9,11,13,15,17,19] again,
Thereby form a new key.So not only guaranteed the randomness of key but also avoided more shifting function, and kept the ergodic characteristics of chaos system that the repetition rate that makes algorithm generate key had dropped to minimum.
Authentication method is based on C/S model; Server end adopts safety database storage administration key; Customer end adopted Client Agent software is accomplished the media of communicating by letter and adopting USBKey to store, manage as key of USBKey and server, and accomplishes main protocol procedures.The overall architecture of authentication method is as shown in Figure 1.Authentication method is divided into four steps: initial phase, landing phase, synchronous phase, Qualify Phase.
The symbol of using in the agreement is as shown in table 1.
1. initial phase
User Ui passes to server with UIDi and password pwdi through safe lane.
Server S generate at random safety elliptic curve (q, FR, a, b, G, n h), writes USBKey with the elliptic curve parameter group, and generates the system parameters { ε of synchronization of spatiotemporal chaos system at random
i, also write USBKey.Initial condition { the Statei} of server initialization OCRML system.
USBKey picked at random k1 ∈ [1, n] as user's root private key Uki, calculates user's root public key UPki=k1*G.Server end is chosen random number k 2 ∈ [1, n], as the root private key Ski of server end and telex network, calculates client server root public key SPki.USBkey and server exchange PKI.
Server is with (UIDi, { ε
i, statei}, Ski, SPki, UPki, H (pwdi)) deposit safety database in.
USBKey appearance is with (UIDi, { ε
i, Uki, UPki SPki) deposits the secure storage areas of USBkey in.
2. landing phase
The user inserts USBKey, and pwdi enters password.
USBKey produces random number r1, to server S send authentication application Req (UIDi, r1) → S.
3. system synchronization stage
Server S is received authentication application, checking UIDi legitimacy.If not method, then refusal.
Look into database according to UIDi, extract drive system initial condition { statei}, initialization OCRML drive system.And generation drive signal amount Drv.
Adopt drive signal amount Drv to drive the new synchronisation key Val1 of local OCOML system's generation, Val2
Use Val1, Val2 calculates
Staging server private key Ski '=Ski*Val1
Staging server PKI SPki '=Val1*SPki
Casual user's PKI UPki '=Val2*UPki
Calculate Q=Ski ' * UPki ', get the temporary key k=Q.x of the x coordinate of Q as symmetric encipherment algorithm.
Server produces random number r2.Send response message R=(Drv, r1, r2, SigSki ' (Drv, r1, r2)) → USBKey to USBKey.
SigSki ' (Drv, r1, r2): the signature that server generates message with new temporary private Ski '.
4. Qualify Phase
USBKey receives response message R, carries out following calculation procedure
Isolate r1, whether see to equate, if unequal then T resends authentication application after the time with the r1 that preserves.
Isolate Drv, drive USBKey end OCOML chaos system and produce new sequence keys Val 1, Val2 (synchronous) with server end.
Use Val1, Val2 calculates
Casual user's private key Uki '=Uki*Val2
Casual user's PKI UPki '=Val2*UPki
Staging server PKI SPki '=Val1*SPki
Calculate Q=Uk ' * SPki ', get the temporary key k=Q.x of the x coordinate of Q as symmetric encipherment algorithm.
With staging server public key verifications signature SigSki ' (Drv, r1, r2), authentication failed, then T resends the checking application after the time.
The employing symmetric encipherment algorithm calculates.
C1=Ek(Bi,SigUki’(Bi))。
SigUki ' is (i): USBKey sends (C1) → S with casual user's private key Uki ' to the signature
that Bi generates.
Server authentication
Server receives that C1 does following calculating
Deciphering C1: (Bi, SigUki ' are (Bi))=Dk (C1).
Obtain SigUki ' (Bi), with the interim public key verifications signature of user, checking is not landed through refusal.
Verify successfully authentication success.Send C2=Ek (ack, SigSki ' are (ack)) → USBKey.
USBKey receives C2
Decipher (ack, SigSki ' are (ack))=Dk (C2).
Certifying signature SigSki ' (ack) fails with the interim public key verifications of server, and waiting for server resends C2.
Verify successfully initiation session.
The detailed process of agreement as shown in Figures 2 and 3.
Claims (6)
1. the identity identifying method based on synchronization of spatiotemporal chaos is characterized in that, gets state from the status switch interval of space-time chaos system, as the master data that generates key; Get the low X position of space-time chaos system mode and put into one three byte arrays variable, and, form the part of final key with certain X+1 position of filling this three byte arrays variable in the low X position of another shape; May further comprise the steps:
1.1. accomplish the initialization of system parameters at initial phase server end and USBKey end, and accomplish the exchange of root key information;
1.2. landing phase, the file layout of USBKey conversion user password, and send authentication application to server;
1.3. synchronous phase generates the synchronizing signal amount by server, and generates new interim public private key pair and public words key according to this synchronizing signal amount, the synchronizing signal amount is signed message is beamed back USBKey;
1.4. authentication phase; USBKey is through the random number in the authentication response information; And extracting the new interim public private key pair of synchronizing signal amount generation, certifying signature is confirmed server identity; And beam back the information that comprises user password and signature and give server, server is confirmed user identity through certifying signature.
2. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described X position is 23.
3. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described X+1 position is 24.
4. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1; It is characterized in that; Described authentication phase adopts the key schedule based on synchronization of spatiotemporal chaos in its authentication protocol, make the authentication both sides synchronously generate the identical key updating factor.
5. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described interim public private key pair generates through using the public private key pair and the key updating factor.
6. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, the validation both sides' of described certifying signature identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104094979A CN102594556A (en) | 2011-12-09 | 2011-12-09 | Identity authentication method based on synchronization of spatiotemporal chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104094979A CN102594556A (en) | 2011-12-09 | 2011-12-09 | Identity authentication method based on synchronization of spatiotemporal chaos |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102594556A true CN102594556A (en) | 2012-07-18 |
Family
ID=46482781
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104094979A Pending CN102594556A (en) | 2011-12-09 | 2011-12-09 | Identity authentication method based on synchronization of spatiotemporal chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102594556A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103199984A (en) * | 2013-03-17 | 2013-07-10 | 王少夫 | Coupled-map-lattice spatiotemporal chaos synchronization and cascading failure analysis method |
CN104980410A (en) * | 2014-04-14 | 2015-10-14 | 领步科技集团有限公司 | Encryption method for remote upgrading of power quality on-line monitoring equipment software |
CN105846989A (en) * | 2015-01-14 | 2016-08-10 | 深圳市伦琴科技有限公司 | Firmware dynamic encryption and decryption method based on fragment chaotic iteration |
CN112685336A (en) * | 2021-01-12 | 2021-04-20 | 张立旭 | Method and system for safely realizing quick addressing of data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1994017478A1 (en) * | 1993-01-19 | 1994-08-04 | City Of Hope | Method for control of chaotic systems |
WO2006019822A2 (en) * | 2004-07-14 | 2006-02-23 | Arizona Technology Enterprises | Pacemaker for treating physiological system dysfunction |
-
2011
- 2011-12-09 CN CN2011104094979A patent/CN102594556A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1994017478A1 (en) * | 1993-01-19 | 1994-08-04 | City Of Hope | Method for control of chaotic systems |
WO2006019822A2 (en) * | 2004-07-14 | 2006-02-23 | Arizona Technology Enterprises | Pacemaker for treating physiological system dysfunction |
Non-Patent Citations (2)
Title |
---|
匡锦瑜: "利用时空混沌同步进行数字加密通信", 《物理学报》, vol. 50, no. 10, 31 October 2001 (2001-10-31), pages 3 - 1 * |
谢志强: "新型S/KEY认证方案的分析与设计", 《计算机工程》, vol. 35, no. 5, 31 March 2009 (2009-03-31), pages 4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103199984A (en) * | 2013-03-17 | 2013-07-10 | 王少夫 | Coupled-map-lattice spatiotemporal chaos synchronization and cascading failure analysis method |
CN104980410A (en) * | 2014-04-14 | 2015-10-14 | 领步科技集团有限公司 | Encryption method for remote upgrading of power quality on-line monitoring equipment software |
CN105846989A (en) * | 2015-01-14 | 2016-08-10 | 深圳市伦琴科技有限公司 | Firmware dynamic encryption and decryption method based on fragment chaotic iteration |
CN112685336A (en) * | 2021-01-12 | 2021-04-20 | 张立旭 | Method and system for safely realizing quick addressing of data |
CN112685336B (en) * | 2021-01-12 | 2023-10-10 | 张立旭 | Method and system for safely realizing quick addressing of data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106411901B (en) | A kind of digital identity mark management method and system | |
CN110740033B (en) | Block chain multi-party data sharing method based on secret sharing technology | |
CN103699851B (en) | A kind of teledata integrity verification method of facing cloud storage | |
CN106385315B (en) | A kind of digital certificate management method and system | |
CN109672537B (en) | Anti-quantum certificate acquisition system and method based on public key pool | |
CN106549770B (en) | SM2 digital signature generation method and system | |
CN112055025B (en) | Privacy data protection method based on block chain | |
CN108551392B (en) | Blind signature generation method and system based on SM9 digital signature | |
CN106603246B (en) | A kind of SM2 digital signature segmentation generation method and system | |
CN106850198B (en) | SM2 digital signature generation method and system based on the collaboration of more devices | |
CN109583893B (en) | Traceable block chain-based digital currency transaction system | |
CN111211910B (en) | Anti-quantum computation CA (certificate Authority) and certificate issuing system based on secret shared public key pool and issuing and verifying method thereof | |
EP2302834A2 (en) | System and method for providing credentials | |
CN110959163A (en) | Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes | |
CN100542091C (en) | A kind of key generation method and system based on identity | |
CN106850229B (en) | SM2 digital signature generation method and system based on product secret division | |
CN109104286A (en) | A kind of new block generation method of the common recognition based on threshold digital signature | |
CN111159745B (en) | Verification method and device suitable for block chain | |
US10887110B2 (en) | Method for digital signing with multiple devices operating multiparty computation with a split key | |
CN109861829B (en) | Cloud data justice auditing system supporting dynamic updating and auditing method thereof | |
CN103634788A (en) | Certificateless multi-proxy signcryption method with forward secrecy | |
CN111211905A (en) | Identity management method for Fabric alliance chain members based on certificate-free authentication | |
CN106254372A (en) | A kind of Multi Digital Signature method of ID-based cryptosystem mechanism | |
CN102594556A (en) | Identity authentication method based on synchronization of spatiotemporal chaos | |
CN106936584A (en) | A kind of building method without CertPubKey cryptographic system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120718 |