CN102609665B - Method and device for signing user program and method and device for verifying signature of user program - Google Patents

Method and device for signing user program and method and device for verifying signature of user program Download PDF

Info

Publication number
CN102609665B
CN102609665B CN201210018479.2A CN201210018479A CN102609665B CN 102609665 B CN102609665 B CN 102609665B CN 201210018479 A CN201210018479 A CN 201210018479A CN 102609665 B CN102609665 B CN 102609665B
Authority
CN
China
Prior art keywords
user program
program
cpu
signature
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210018479.2A
Other languages
Chinese (zh)
Other versions
CN102609665A (en
Inventor
吴荣兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengonda Technology Co., Ltd.
Original Assignee
FUJIAN SANYUANDA SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN SANYUANDA SOFTWARE Co Ltd filed Critical FUJIAN SANYUANDA SOFTWARE Co Ltd
Priority to CN201210018479.2A priority Critical patent/CN102609665B/en
Publication of CN102609665A publication Critical patent/CN102609665A/en
Application granted granted Critical
Publication of CN102609665B publication Critical patent/CN102609665B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for signing a user program verifying signature of the user program. The method for signing the user program includes steps of acquiring ID (identity) of a CPU (central processing unit), computing the user program by SHA-256 hash operation to obtain a program digest, compiling a public key and a module generated through RSA (Ron Rivest,Adi Shamirh and Len Adleman) encryption algorithm into the user program; combining the ID of the CPU, the program digest and the length of the user program in sequence to form a data string; operating the data string by a private key corresponding to the public key and the module to obtain ciphertext; and loading the ciphertext into a check area of the CPU. By combining with the RSA algorithm and the SHA algorithm to process the user program and integrating with the ID of the CPU to be a part of the signature, the user program must be restarted by being strictly subjected to the signature verifying process matched with the signature, risk in brute force attack to the user program is greatly reduced, and the user program can be effectively protected from being tampered or stolen maliciously.

Description

To method and the device of user program signature and authentication of users program signature
Technical field
The present invention relates to information security field, relate in particular to a kind of method and device to user program signature and authentication of users program signature.
Background technology
Adopt otp memory save routine or the CPU of use with OTP, the CPU of OTP is that stored program storage unit belongs to disposable programmable type, so can not distort after program burn writing completes, unless changed storer or CPU, under the condition that does not change physical device, the scheme of this employing OTP CPU can reach anti-tamper effect, but program can be copied to, other identical CPU are upper to be used, can not reach antitheft effect, also have this scheme program can only programming once, program upgrade and functional additive technique cost compare are high and inconvenient.
Summary of the invention
The technical matters that the present invention mainly solves is to provide a kind of method and device to user program signature and authentication of users program signature, and the program of preventing is tampered with stolen, improves program security.
For solving the problems of the technologies described above, one aspect of the present invention is: a kind of method to user program signature is provided, comprises step:
Obtain the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, in described user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms;
The length of the ID of CPU, program digest and user program is combined into serial data in order;
Adopt the private key corresponding with described PKI and mould to be encrypted computing to described serial data and obtain ciphertext;
Described ciphertext is written into the check field of described CPU.
Wherein, described CPU has Nonvolatile static internal memory, and described check field is arranged in described Nonvolatile static internal memory.
Wherein, in the step of combination results serial data, also in serial data, be added with customized label.
For solving the problems of the technologies described above, another aspect of the present invention is: a kind of device to user program signature is provided, comprises:
Acquiring unit: for obtaining the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, wherein in user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms;
Processing unit: for the length of described ID, program digest and user program is combined into serial data in order;
Ciphering unit: obtain ciphertext for adopt described PKI and private key corresponding to mould to be encrypted computing to described serial data;
Be written into unit: for described ciphertext being written into the check field of described CPU.
Wherein, described processing unit also adds customized label in the time of combination results serial data in serial data.
For solving the problems of the technologies described above, another aspect of the present invention is: a kind of method of authentication of users program signature is provided, comprises step:
Read the ID of CPU itself;
PKI in user's program and mould are decrypted the plaintext obtaining after deciphering to the ciphertext in CPU check field;
Plaintext after deciphering is resolved according to known chronological order, obtain ID to be verified, user program to be verified summary, user program length;
Get user program according to user program length read, calculate the summary of the SHA-256 hash computing of user program;
Contrast whether ID to be verified equates with the ID of CPU own, whether the user program to be verified user program summary obtaining with computing of making a summary equate, if met simultaneously, start user program, otherwise forbid user program startup.
For solving the problems of the technologies described above, another aspect of the present invention is: a kind of device of authentication of users program signature is provided, comprises:
Reading unit: for reading the ID of CPU itself;
Decryption unit: PKI and mould for user's program are decrypted the plaintext obtaining after deciphering to the ciphertext in CPU check field;
Resolution unit: for the plaintext after deciphering is resolved according to known chronological order, obtain ID to be verified, user program to be verified summary, user program length;
Computing unit: for getting user program according to user program length read, calculate the summary of the SHA-256 hash computing of user program;
Contrast unit: whether the user program summary that whether ID to be verified equates with the ID of CPU own for contrasting, user program to be verified is made a summary to be obtained with computing equates, if met simultaneously, starts user program, otherwise forbid that user program starts.
The invention has the beneficial effects as follows: in the above-mentioned endorsement method of the present invention, the risk that the unpredictable reduction of ID of CPU is cracked, and RSA Algorithm is the most influential public key encryption algorithm at present, SHA is one of safest hashing algorithm of generally acknowledging, the present invention processes user program in conjunction with RSA Algorithm and SHA algorithm, and merge the ID of CPU as a part for signature, the startup of user program must be strictly by the certifying signature process matching with signature, and program is equivalent to bind with CPU, on other identical CPU, cannot use, reach the effect of a secret information of a machine, cracker cannot therefrom obtain encryption rule, greatly reduce program by the risk of Brute Force, the program that effectively prevents is maliciously tampered or steals.
If particularly CPU has Nonvolatile static internal memory NVSRAM, due to NVSRAM loss of data and receiving the characteristic of wiping content while attacking when the dead electricity, there is further security.
Brief description of the drawings
Fig. 1 is the process flow diagram of the present invention to user program signature;
Fig. 2 is serial data data structure schematic diagram of the present invention;
Fig. 3 is the structured flowchart of the present invention to user program signature apparatus;
Fig. 4 is the process flow diagram of authentication of users program signature of the present invention;
Fig. 5 is the structured flowchart of authentication of users program signature apparatus of the present invention;
Fig. 6 is the system chart that utilizes a terminal of the inventive method.
Embodiment
By describing technology contents of the present invention, structural attitude in detail, being realized object and effect, below in conjunction with embodiment and coordinate accompanying drawing to be explained in detail.
The present invention mainly will solve the safety problem of user program, first first to produce signature key group by authorized person, be specially: authorized person produces the set of cipher key of a 2048bit length by RSA2048 key generation instrument, set of cipher key specifically has PKI E, private key D, mould N, authorized person is distributed to PKI E and mould N the developer of dedicated cpu program, by developer, PKI E and mould N is compiled into program the inside.
Refer to Fig. 1, first the present invention proposes a kind of method to user program signature, comprises step:
S101: obtain the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, in described user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms; This CPU should be dedicated cpu, there is unique and unpredictable ID, user program by programming in this CPU, user program is the program that authorized person approves, in user program, comprise above-mentioned the PKI E being issued by authorized person and mould N, after the computing of SHA-256 hash, obtain the program digest S of 32 bytes;
S102: the length L of the ID of CPU, program digest S and user program is combined into serial data SS in order, the data structure of serial data SS as shown in Figure 2, the ID of CPU is generally 8 bytes or 16 bytes, program digest S is 32 bytes, and the length L of user's degree is 4 bytes, little endian mode unsigned int type; Certainly, can also add some customized labels as Business Name, developer's name, random number etc. in serial data, as long as serial data total length is no more than the length of the mould N of RSA Algorithm, the setting of this customized label provides the function of a self-identifying;
S103: adopt the private key D corresponding with described PKI E and mould N to be encrypted computing to described serial data SS and obtain ciphertext SS_C, SS_C is the ciphertext character string of 256 bytes;
S104: the check field that described ciphertext SS_C is written into described CPU.Preferably, selection has the CPU of Nonvolatile static internal memory NVSRAM, and check field is arranged in described Nonvolatile static internal memory NVSRAM, the characteristic of NVSRAM is to have ultralow power consumption, uses reserve battery to keep, loss of data when reserve battery is lost, or wipe NVSRAM content time under attack, due to this specific character, make the data in check field be difficult for being stolen, thereby improve the security of user program.Need to have unique and unpredictable ID in conjunction with CPU, the dedicated cpu that can select is as the MAXQ1850 chip of U.S.'s letter.
In the above-mentioned endorsement method of the present invention, the risk that the unpredictable reduction of ID of CPU is cracked, and RSA Algorithm is the most influential public key encryption algorithm at present, SHA is one of safest hashing algorithm of generally acknowledging, the present invention processes user program in conjunction with RSA Algorithm and SHA algorithm, and merge the ID of CPU as a part for signature, the startup of user program must be strictly by the certifying signature process matching with signature, and program is equivalent to bind with CPU, on other identical CPU, cannot use, reach the effect of a secret information of a machine, cracker cannot therefrom obtain encryption rule, greatly reduce program by the risk of Brute Force, the program that effectively prevents is maliciously tampered or steals.If particularly CPU has Nonvolatile static internal memory NVSRAM, due to NVSRAM loss of data and receiving the characteristic of wiping content while attacking when the dead electricity, there is further security.
Consult Fig. 3, the present invention also provides a kind of device to user program signature, comprising:
Acquiring unit: for obtaining the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, wherein in user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms.
Processing unit: for the length of described ID, program digest and user program is combined into serial data in order; Wherein, in the time of combination results serial data, can also in serial data, add customized label as Business Name, developer's name, random number etc.
Ciphering unit: obtain ciphertext for adopt described PKI and private key corresponding to mould to be encrypted computing to described serial data.
Be written into unit: for described ciphertext being written into the check field of described CPU.
Similar with the above-mentioned method to user program signature, this device according to the present invention can be signed to user program, provides a kind of effectively security signature mechanism in conjunction with ID and the NVSRAM of RSA Algorithm, SHA algorithm and CPU.This device can be thought a set of mandate instrument, and authorized person passes through this mandate instrument to the filling signed data of dedicated cpu.
Fig. 4 has provided the method for authentication of users program signature of the present invention, when CPU powers on after operation, carries out the process of certifying signature, specifically comprises step:
S201: the ID that reads CPU itself.
S202: the PKI E and the mould N that are compiled in before using in user program are decrypted the plaintext SS_D obtaining after deciphering to the ciphertext SS_C in CPU check field.
S203: the plaintext SS_D after deciphering is resolved according to known chronological order, obtain ID to be verified (ID_D), user program to be verified summary (being the SHA-256 value S_D of user program), user program length L _ D; So-called chronological order refers to putting in order (as shown in Figure 2) of ID, the program digest S of CPU be combined to form serial data in signature process time and the length L of user program.
S204: length L _ D reads user program according to user program, calculates the summary S1 of the SHA-256 hash computing of user program.
S205: whether the user program summary S1 that contrast whether ID to be verified (ID_D) equates with the ID of CPU own, user program to be verified summary S_D obtains with computing equates, if met simultaneously, starts user program, otherwise forbids that user program starts.
Under normal circumstances, the ID_D obtaining after plaintext SS_D after deciphering is resolved should equate with the ID of CPU itself, the S1 that the S_D that parsing obtains also should obtain with computing equates, in the time meeting this two conditions simultaneously, be that representative of consumer program is safe, be verified, user program normally starts, and in the time that any condition does not meet, read-me or CPU may be by artificial destructions, and possibility is dangerous, now, forbid that user program starts, forbid that CPU continues some sensitive functions of operation or restriction CPU.
Before the process of this certifying signature is based upon, have on pair basis of user program signature, by the process of signature and certifying signature, ensure the security of user program.
Consult Fig. 5, the present invention also provides a kind of device of authentication of users program signature, comprising:
Reading unit: for reading the ID of CPU itself;
Decryption unit: PKI and mould for user's program are decrypted the plaintext obtaining after deciphering to the ciphertext in CPU check field;
Resolution unit: for the plaintext after deciphering is resolved according to known chronological order, obtain ID to be verified, user program to be verified summary, user program length;
Computing unit: for getting user program according to user program length read, calculate the summary of the SHA-256 hash computing of user program;
Contrast unit: whether the user program summary that whether ID to be verified equates with the ID of CPU own for contrasting, user program to be verified is made a summary to be obtained with computing equates, if met simultaneously, starts user program, otherwise forbid that user program starts.
This device is corresponding with the method for above-mentioned certifying signature, due to this machine-processed security, and in the equipment that can be applicable to security to have higher requirements, such as POS terminal etc.
Fig. 6 has provided the system chart of an application example.
In this system, dedicated cpu is selected U.S. letter MAXQ1850 chip, MAXQ1850 has unique ID, by factory's mask and can not change, there is NVSRAM, the data that leave NVSRAM the inside in maintain by RTC (real-time clock) reserve battery after CPU power down, the loss of data of NVSRAM in the time being subject to certain attack or RTC reserve battery loss.
S3C2416 is the semi-conductive ARM9 processor of Samsung, is configured to Nor Flash and starts, and first moves the contents of program that physical address is 0x00000000.
XO2-1200 is CPLD (CPLD), there is Flash this CPLD inside, the one-level Boot of S3C2416 is stored in the Flash the inside of CPLD, the communication interface of CPLD and S3C2416 is 8 bit parallel buses, and S3C2416 can be by the program on the Flash of this bus access CPLD the inside.
MAXQ1850 and CPLD are unidirectional logic controls, and control interface bus is SPI (Serial Peripheral Interface (SPI)), and MAXQ1850 can read by SPI interface the Flash of CPLD the inside.
MAXQ1850 is controlling the reset signal of S3C2416 and the access limit of Flash by XO2-1200.
Nand Flash is storing the user program of S3C2416, and one-level starts the program of Nand Flash the inside.
This system starting process is as follows:
The A.MAXQ1850 operation that powers on;
B. read the ID of MAXQ1850 itself;
C. use and at PKI E and the mould N of program the inside, the ciphertext SS_C of check field (NVSRAM memory address 0x1800 in MAXQ1850) is decrypted, obtain the plaintext SS_D after deciphering;
D. according to known chronological order (as Fig. 2), SS_D is resolved, obtain SHA-256 value S_D, the user program length L _ D of ID_D, user program;
E. read the Boot1 program that is stored in XO2-1200 the inside and then calculate the summary S1 of the SHA-256 of Flash content by SPI according to L_D, whether contrast ID_D and ID equate, whether S_D and S1 equate, if simultaneously meet; the access limit of Flash consigns to S3C2416 and discharges the reset signal of S3C2416, unequal forbid S3C2416 continue operation.
The process of this startup is the process of a complete certifying signature, represents program safety when being verified.For this system, need to sign by mandate instrument before.
Signature process is as follows:
A. mandate instrument obtains the ID of MAXQ1850, the boot1 of S3C2416 is carried out the computing of SHA-256 hash and obtained the summary S of 32 bytes;
B. the length L of ID, S and user program is pressed to the synthetic serial data SS of Fig. 2 der group;
C. mandate instrument is encrypted computing with private key D to SS and obtains ciphertext SS_C, and SS_C is the ciphertext character string of 256 bytes;
D., after authorizing instrument and MAXQ1850 mutually to authenticate to pass through, mandate instrument is written into ciphertext SS_C the check field the inside (be in NVSRAM, address is 0x1800) of MAXQ1850.
The foregoing is only embodiments of the invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes instructions of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (6)

1. the method to user program signature, is characterized in that, comprises step:
Obtain the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, in described user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms;
The length of the ID of CPU, program digest and user program is combined into serial data in order;
Adopt the private key corresponding with described PKI and mould to be encrypted computing to described serial data and obtain ciphertext;
Described ciphertext is written into the check field of described CPU, described CPU has Nonvolatile static internal memory, and described check field is arranged in described Nonvolatile static internal memory.
2. the method to user program signature according to claim 1, is characterized in that: in the step of combination results serial data, also in serial data, be added with customized label.
3. the device to user program signature, is characterized in that, comprising:
Acquiring unit: for obtaining the ID of CPU, user program is carried out to the computing of SHA-256 hash and obtain program digest, wherein in user program, compiling has the PKI and the mould that produce by RSA cryptographic algorithms;
Processing unit: for the length of described ID, program digest and user program is combined into serial data in order;
Ciphering unit: obtain ciphertext for adopting the private key corresponding with described PKI and mould to be encrypted computing to described serial data;
Be written into unit: for described ciphertext being written into the check field that is positioned at CPU Nonvolatile static internal memory.
4. the device to user program signature according to claim 3, is characterized in that:
Described processing unit also adds customized label in the time of combination results serial data in serial data.
5. a method for authentication of users program signature, is characterized in that, comprises step:
Read the ID of CPU itself;
PKI in user's program and mould are decrypted to the ciphertext of the check field that is arranged in CPU Nonvolatile static internal memory the plaintext obtaining after deciphering;
Plaintext after deciphering is resolved according to known chronological order, obtain ID to be verified, user program to be verified summary, user program length;
Get user program according to user program length read, calculate the summary of the SHA-256 hash computing of user program;
Contrast whether ID to be verified equates with the ID of CPU own, whether the user program to be verified user program summary obtaining with computing of making a summary equate, if met simultaneously, start user program, otherwise forbid user program startup.
6. a device for authentication of users program signature, is characterized in that, comprising:
Reading unit: for reading the ID of CPU itself;
Decryption unit: PKI and mould for user's program are decrypted to the ciphertext of the check field that is arranged in CPU Nonvolatile static internal memory the plaintext obtaining after deciphering;
Resolution unit: for the plaintext after deciphering is resolved according to known chronological order, obtain ID to be verified, user program to be verified summary, user program length;
Computing unit: for getting user program according to user program length read, calculate the summary of the SHA-256 hash computing of user program;
Contrast unit: whether the user program summary that whether ID to be verified equates with the ID of CPU own for contrasting, user program to be verified is made a summary to be obtained with computing equates, if met simultaneously, starts user program, otherwise forbid that user program starts.
CN201210018479.2A 2012-01-19 2012-01-19 Method and device for signing user program and method and device for verifying signature of user program Active CN102609665B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210018479.2A CN102609665B (en) 2012-01-19 2012-01-19 Method and device for signing user program and method and device for verifying signature of user program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210018479.2A CN102609665B (en) 2012-01-19 2012-01-19 Method and device for signing user program and method and device for verifying signature of user program

Publications (2)

Publication Number Publication Date
CN102609665A CN102609665A (en) 2012-07-25
CN102609665B true CN102609665B (en) 2014-12-10

Family

ID=46527025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210018479.2A Active CN102609665B (en) 2012-01-19 2012-01-19 Method and device for signing user program and method and device for verifying signature of user program

Country Status (1)

Country Link
CN (1) CN102609665B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617403B (en) * 2013-11-25 2016-09-28 数安时代科技股份有限公司 PDF file digital signature and verification method, system
CN103617394A (en) * 2013-12-04 2014-03-05 北京网秦天下科技有限公司 SDK providing and invoking method and associated device
US11022955B2 (en) 2014-04-02 2021-06-01 Ridge Tool Company Smart tool systems
WO2015153008A2 (en) 2014-04-02 2015-10-08 Ridge Tool Company Electronic tool lock
CN105096481A (en) * 2014-05-19 2015-11-25 深圳华智融科技有限公司 POS terminal protection method and device
CN104038828B (en) * 2014-05-26 2017-02-15 四川长虹电器股份有限公司 RSA hash signature content protection optimizing method based on AES encryption
CN106170763B (en) 2015-01-07 2019-10-18 华为技术有限公司 A kind of software check method and apparatus
CN105844147A (en) * 2016-03-22 2016-08-10 福建超瑞创原信息技术有限公司 Application attestation method and apparatus
CN112689285B (en) * 2020-12-10 2023-08-15 航天信息股份有限公司 Authorization authentication method and system for mobile terminal SDK
CN114626868A (en) * 2022-03-22 2022-06-14 歌尔股份有限公司 Intelligent doorbell piracy prevention method and system, intelligent doorbell and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950344A (en) * 2010-09-21 2011-01-19 广东欧珀移动通信有限公司 Encryption and decryption methods of embedded software program
CN102317948A (en) * 2011-06-23 2012-01-11 华为技术有限公司 Protection method of chip and chip itself

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7849329B2 (en) * 2004-09-01 2010-12-07 Microsoft Corporation Licensing the use of a particular feature of software

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950344A (en) * 2010-09-21 2011-01-19 广东欧珀移动通信有限公司 Encryption and decryption methods of embedded software program
CN102317948A (en) * 2011-06-23 2012-01-11 华为技术有限公司 Protection method of chip and chip itself

Also Published As

Publication number Publication date
CN102609665A (en) 2012-07-25

Similar Documents

Publication Publication Date Title
CN102609665B (en) Method and device for signing user program and method and device for verifying signature of user program
US11379586B2 (en) Measurement methods, devices and systems based on trusted high-speed encryption card
CN201054140Y (en) Information security control chip
AU2011271088B2 (en) System and method for n-ary locality in a security co-processor
US20110154501A1 (en) Hardware attestation techniques
CN110110526B (en) Safety starting device and method based on safety chip
US20200026882A1 (en) Methods and systems for activating measurement based on a trusted card
US9015454B2 (en) Binding data to computers using cryptographic co-processor and machine-specific and platform-specific keys
CN108280035A (en) Safety guiding sequencer and secure booting apparatus
CN104573490A (en) Method for protecting installed software on Android platform
CN101983375A (en) Binding a cryptographic module to a platform
CN101882189B (en) Embedded-type system for ensuring completeness of program and realization method thereof
CN110932868B (en) Data signature method, system and device
CN110795742A (en) Measurement processing method and device for high-speed cryptographic operation, storage medium and processor
CN114785503B (en) Cipher card, root key protection method thereof and computer readable storage medium
CN101582765B (en) User bound portable trusted mobile device
Dave et al. Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc
CN111327429B (en) Terminal starting processing method and device
CN102982265A (en) Authentication method for storing basic input and output system (BIOS) setting
CN101355424B (en) Method for safely migrating handhold equipment data
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
CN101950345A (en) Hardware decryption-based high-reliability terminal equipment and working method thereof
CN114219055A (en) Bar code generation method, bar code verification method and payment system
CN110334524B (en) SOC starting method and system based on secondary key
CN109583196B (en) Key generation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: Copper Road Software Park G District, Gulou District of Fuzhou city in Fujian province 350000 Building No. 16

Patentee after: Hengonda Technology Co., Ltd.

Address before: 350003, Fujian Fuzhou Gulou District software Avenue 89, Fuzhou Software Park industrial base two, building 7, third floor

Patentee before: Fujian Sanyuanda Software Co., Ltd.