CN105656859B - Tax control equipment software safety online upgrading method and system - Google Patents

Tax control equipment software safety online upgrading method and system Download PDF

Info

Publication number
CN105656859B
CN105656859B CN201410659289.8A CN201410659289A CN105656859B CN 105656859 B CN105656859 B CN 105656859B CN 201410659289 A CN201410659289 A CN 201410659289A CN 105656859 B CN105656859 B CN 105656859B
Authority
CN
China
Prior art keywords
terminal
key
tax control
control equipment
upgrading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410659289.8A
Other languages
Chinese (zh)
Other versions
CN105656859A (en
Inventor
李伟
杨飞虎
宋颖
李利
张平
王招凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201410659289.8A priority Critical patent/CN105656859B/en
Publication of CN105656859A publication Critical patent/CN105656859A/en
Application granted granted Critical
Publication of CN105656859B publication Critical patent/CN105656859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention relates to a method and a system for safely upgrading tax control equipment software on line, which comprises the following steps: the terminal sends a tax control equipment identifier encrypted based on a first secret key to a network terminal; the network side decrypts the tax control equipment identification by using the second secret key, and sends a communication secret key encrypted based on a third secret key, an upgrade data packet encrypted based on the communication secret key and a digital signature to the terminal when the tax control equipment identification is determined to be a credible tax control equipment identification and the terminal has software upgrade authority; and the terminal decrypts the communication key by using the fourth key, obtains the plaintext of the upgrading data packet by using the communication key, obtains a first abstract corresponding to the digital signature by using the communication key and the first key, and executes software upgrading operation of the tax control equipment when the plaintext of the upgrading data packet is determined to be the complete and effective plaintext of the upgrading data packet according to the first abstract and a second abstract calculated based on the plaintext of the upgrading data packet. The invention ensures the safety and integrity of data transmission in the upgrading process and reduces the cost of software upgrading of the tax control equipment.

Description

Tax control equipment software safety online upgrading method and system
Technical Field
The invention relates to a tax control equipment software upgrading technology, in particular to a method and a system for safely upgrading tax control equipment software on line.
Background
Along with the adjustment of the national tax policy, the tax control equipment software generally needs to be changed, so the tax control equipment software needs to be upgraded in time to meet the requirements of the current tax policy.
Under the condition that the tax control equipment is delivered to a user, the current software upgrading methods of the tax control equipment generally comprise the following two methods: the method comprises the steps that a user goes to a local tax department to replace tax control equipment provided with new version software; and secondly, the user provides the tax control equipment for the corresponding after-sales service unit, and a professional of the after-sales service unit upgrades the software of the tax control equipment.
The inventor finds that the two existing tax control equipment software upgrading methods both need a longer upgrading period, which not only affects the normal service of a user, but also needs to consume higher labor cost; therefore, the existing tax control equipment software upgrading method is time-consuming and labor-consuming, and has higher cost.
In view of the technical problems of the existing tax control equipment software upgrading technology, the inventor of the invention actively researches and innovates based on the practical experience and professional knowledge which are abundant for many years in the design and manufacture of products of the type and by matching with the application of scholars so as to create a method and a system for safely upgrading tax control equipment software on line, can solve the problems of the existing tax control equipment software upgrading technology and enable the tax control equipment software upgrading technology to have practicability. After continuous research and design, and repeated trial production and improvement, the invention with practical value is finally created.
Disclosure of Invention
One of the objectives of the present invention is to provide a method and a system for safely upgrading tax control device software on-line, which can solve the technical problem of safely upgrading tax control device software in time, thereby reducing the upgrading cost of tax control device software.
The object of the present invention and the solution to the problem can be achieved by the following technical means.
The invention provides a safe online upgrading method of tax control equipment software, which comprises the following steps: the tax control equipment software upgrading terminal encrypts the tax control equipment identification by using the first secret key and sends a tax control equipment verification request containing the encrypted tax control equipment identification to the tax control equipment software upgrading network end; the network terminal decrypts the tax control equipment identification in the received tax control equipment verification request by using the second secret key; the network side sends a communication key encrypted based on a third key, an upgrade data packet encrypted based on the communication key and a digital signature encrypted based on the communication key to the terminal under the condition that the tax control equipment identification obtained by decryption is determined to be a credible tax control equipment identification and the terminal has software upgrade authority; the terminal decrypts the received communication key by using the fourth key, obtains the plaintext of the upgrade data packet by using the communication key obtained by decryption, and obtains the first digest corresponding to the digital signature by using the communication key obtained by decryption and the first key; and the terminal calculates a second abstract based on the upgrade data packet plaintext, and executes the software upgrade operation of the tax control equipment based on the upgrade data packet plaintext under the condition that the upgrade data packet plaintext obtained by decryption is determined to be the complete and effective upgrade data packet plaintext according to the first abstract and the second abstract.
According to the safe online upgrading system for the tax control equipment software provided by the invention, the system comprises: the tax control equipment software upgrading system comprises a tax control equipment software upgrading network end and a plurality of tax control equipment software upgrading terminals; wherein, the software upgrading network end includes: the device comprises a first decryption module, a software upgrading control module and a first communication module; and the software upgrading terminal includes: the system comprises a second communication module, an identity authentication request module, a second decryption module and an upgrading loading module; the identity authentication request module is used for encrypting the tax control equipment identification by using the first secret key and sending a tax control equipment verification request containing the encrypted tax control equipment identification to the tax control equipment software upgrading network end through the second communication module; the first decryption module is used for decrypting the tax control equipment identification in the tax control equipment verification request received by the first communication module by using the second secret key; the software upgrading control module is used for sending a communication key encrypted based on a third key, an upgrading data packet encrypted based on the communication key and a digital signature encrypted based on the communication key to the terminal through the first communication module under the condition that the tax control equipment identifier obtained through decryption is determined to be a credible tax control equipment identifier and the terminal has software upgrading authority; the second decryption module is used for decrypting the communication key received by the second communication module by using the fourth key, obtaining the plaintext of the upgrade data packet based on the communication key obtained by decryption, and obtaining the first digest corresponding to the digital signature by using the communication key obtained by decryption and the first key; and the upgrading loading module is used for calculating a second abstract based on the upgrading data packet plaintext, and executing software upgrading operation of the tax control equipment based on the upgrading data packet plaintext under the condition that the upgrading data packet plaintext obtained by decryption is determined to be the complete and effective upgrading data packet plaintext according to the first abstract and the second abstract.
By the technical scheme, the method and the system for safely upgrading the software of the tax control equipment on line at least have the following advantages and beneficial effects: the invention ensures the authenticity and reliability of both communication parties by authenticating the terminal identity; by authenticating the software upgrading authority of the terminal and authenticating the digital signature by the terminal, the terminal can timely and safely acquire a complete and effective upgrading data packet plaintext from a network end, and phenomena of interception, tampering, incompleteness and the like of the upgrading data packet are avoided; by enabling the network end and the terminal to adopt the symmetric communication key to realize the encryption and decryption of the upgrade data packet and the digital signature and utilizing the asymmetric key to encrypt and decrypt the communication key, the high efficiency of the encryption and decryption is ensured while the safe transmission of the communication key is ensured; therefore, the technical scheme provided by the invention can safely realize the upgrading of the software of the tax control equipment in time, and finally effectively reduce the cost of upgrading the software of the tax control equipment.
In conclusion, the invention has significant technical progress and obvious positive technical effect, and is a novel, advanced and practical new design.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more apparent, the following specific examples are given as preferred embodiments, and detailed description is given below.
Drawings
FIG. 1 is a flowchart of a method for secure online upgrade of software of a tax control device according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a method for secure online upgrade of software of a tax control device according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a tax control device software security online upgrade system according to a third embodiment of the present invention.
Detailed Description
The tax control device software security online upgrade method and system according to the embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The first embodiment of the method for safely upgrading tax control equipment software on line is shown in fig. 1.
In fig. 1, S100, the tax control device software upgrade terminal encrypts the tax control device identifier by using the first secret key, and sends a tax control device verification request carrying the encrypted tax control device identifier to the tax control device software upgrade network.
Specifically, the software upgrading terminal of the tax control device in this embodiment may be a tax control device, and may also be a tax control device and an intelligent electronic device (such as a computer or a smart phone) connected to the tax control device. The tax control device software upgrading terminal (i.e., the terminal in the following description) may be connected to the tax control device software upgrading network terminal (i.e., the network terminal in the following description) through the internet in a wired manner (e.g., a serial interface or a USB interface) or a wireless manner (e.g., a WIFI manner). Under the condition that the tax control equipment does not have the network connection capability, the tax control equipment can be connected with intelligent electronic equipment with the network connection capability so as to perform information interaction with a network end (also called a server end). The tax control device software upgrading network end of the embodiment may be a server.
The tax control device identifier of the embodiment is mainly used for uniquely identifying a tax control device. This tax control equipment sign can specifically be: information such as a serial number of the tax Control device, a Media Access Control (MAC) address of the tax Control device or a tax number of a taxpayer to which the tax Control device belongs; the tax control device identifier may also specifically be: the tax control equipment serial number, the tax control equipment MAC address, the taxpayer tax number to which the tax control equipment belongs and the like; in addition, the tax control device identifier may also be: and combining the information with at least one of the tax control device type model and the tax control device version number. The embodiment does not limit the concrete expression form of the tax control device identifier.
The first key of this embodiment may specifically be a network public key, and the terminal may obtain the network public key through information interaction with the network, and locally store the network public key. The terminal can obtain a network public key by performing information interaction with the network terminal at the initial stage of the software upgrading process of the tax control equipment, and locally stores the network public key; the terminal can also obtain the public key of the network terminal by performing information interaction with the network terminal before the software upgrading process of the tax control equipment, and locally store the public key of the network terminal. The embodiment does not limit the specific implementation manner of the terminal acquiring the network public key.
When the terminal needs to perform software upgrading, the terminal may first encrypt its own tax control device identifier by using a locally stored network public key, and then bear the encrypted tax control device identifier in a tax control device verification request (which may also be referred to as a tax control device authentication request) and send the verification request to the network. The authentication request can be a message based on HTTP; and the information carried in the verification request can indicate that the terminal needs to carry out software upgrading of the tax control equipment.
S110, the network side decrypts the tax control equipment identification in the received tax control equipment verification request by using the second secret key.
Specifically, in the case that the first secret key is a public key of the network, the second secret key in this step may be a private key of the network. Of course, the first key and the second key in this embodiment may also adopt other forms of key pairs.
The network side can generate a pair of keys, namely a network side public key and a network side private key, for each terminal respectively, the network side can provide the corresponding network side public key for the corresponding terminal through information interaction with the terminal, and the network side locally stores the network side private key. One network private key may correspond to a plurality of network public keys (i.e. a group of network public keys), or even may correspond to all network public keys; that is, although different terminals have different network public keys, the network private keys corresponding to the different terminals may be the same. Under the condition that the network side uses a plurality of network side private keys for all terminals, the network side can correspondingly store the network side private keys and information such as terminal IP addresses, so that the network side can accurately acquire the corresponding network side private keys for a certain terminal. The network side in this embodiment may also generate a pair of keys for multiple terminals (even all terminals), so that the network side public keys locally stored by the multiple terminals are the same, and the network side private keys corresponding to the multiple terminals are also the same. The embodiment does not limit the specific implementation manner of generating the network public key and the network private key by the network.
After the network determines that the received message/data packet is a tax control equipment verification request, the network can directly decrypt the encrypted tax control equipment identifier carried in the tax control equipment verification request by using the locally stored network private key under the condition that all terminals correspond to the same network private key, so that the tax control equipment identifier of the terminal sending the tax control equipment verification request is accurately obtained; and under the condition that all terminals correspond to different network side private keys, the network side can firstly utilize information such as a terminal IP address in the tax control equipment verification request to obtain the corresponding network side private key locally stored by the network side, and then utilize the obtained network side private key to decrypt the encrypted tax control equipment identification carried in the tax control equipment verification request, so that the tax control equipment identification of the terminal sending the tax control equipment verification request is accurately obtained.
And S120, the network side sends a communication key encrypted based on a third key, an upgrade data packet encrypted based on the communication key and a digital signature encrypted based on the communication key to the terminal under the condition that the tax control equipment identifier obtained by decryption is determined to be a credible tax control equipment identifier and the terminal has software upgrade authority.
Specifically, the network side locally stores a plurality of trusted tax control device identifiers, the trusted tax control device identifiers form a trusted tax control device identifier set, and the trusted tax control device identifier set may be in the form of a database, a table, or a text document. The trusted tax control device identifier set may be maintained by a network administrator or a tax control device software upgrade administrator (e.g., a tax control department worker) or other relevant personnel.
The network end can search whether the decrypted tax control equipment identification exists in the credible tax control equipment identification set, if the search result is that the decrypted tax control equipment identification is contained in the credible tax control equipment identification set, the decrypted tax control equipment identification is represented as the credible tax control equipment identification, and if the search result is that the decrypted tax control equipment identification is not contained in the credible tax control equipment identification set, the decrypted tax control equipment identification is represented as the incredible tax control equipment identification.
The terminal having the software upgrading right in this embodiment means that the current state of the terminal meets a software upgrading condition preset by the network, for example, the current time of the terminal meets the current software upgrading time range set by the network, and the current software upgrading times of the terminal meet the preset times set by the network.
The operation of checking whether the terminal has the software upgrading authority may be performed by the terminal or by the network. Under the condition that the checking operation is executed by the terminal, the terminal can firstly acquire software upgrading condition information (also called software upgrading permission information) from the network terminal, wherein the software upgrading condition information can be the software upgrading condition information encrypted based on a third secret key, then the terminal checks whether the current time of the terminal accords with a software upgrading time range and whether the current software upgrading times of the terminal accord with preset times, and if the terminal has the software upgrading permission as a result of the terminal checking, the terminal can send corresponding information to the network terminal so that the network terminal can know and continue to execute subsequent encryption operation; if the terminal does not have the software upgrading authority as a result of the terminal check, the terminal can send an authorization request to the network side to request the network side to grant the software upgrading authority. Under the condition that the checking operation is executed by the network terminal, the network terminal can acquire the current time of the terminal and the current software upgrading times of the terminal from the terminal, then the network terminal checks whether the current time of the terminal accords with the software upgrading time range and whether the current software upgrading times of the terminal accords with the preset times, and if the result of the network terminal checking is that the terminal has the software upgrading authority, the network terminal can continue to execute the subsequent encryption operation; if the network end checks that the terminal does not have the software upgrading authority, the network end can send the information that the terminal does not have the software upgrading authority to the terminal, so that the terminal sends an authorization request to the network end to request the network end to grant the terminal software upgrading authority. In this embodiment, the time of the terminal may be synchronized with the time of the network.
The process of granting the terminal software upgrading authority by the network side may include: the network side configures authorized software upgrading authority information (such as software upgrading times, software upgrading deadline time and the like) into a terminal (such as tax control equipment). The software upgrading authority information can be encrypted by a third secret key and then transmitted to the terminal. The software upgrade deadline is a software upgrade time range.
In addition, it should be noted that the network end may also configure the software upgrading permission information into the terminal by performing information interaction with the terminal at the initial stage of the software upgrading process of the tax control device, and the network end may also configure the software upgrading permission information into the terminal by performing information interaction with the terminal before the software upgrading process of the tax control device. The network terminal can actively configure the software upgrading permission information into the terminal, and can also configure the software upgrading permission information into the terminal according to the request of the terminal.
The third key in this embodiment may specifically be a terminal public key. The network side can obtain and locally store the terminal public key through information interaction with the terminal. Further, the network side may obtain and locally store the terminal public key by performing information interaction with the terminal at a start stage of a software upgrading process of the tax control device, and the network side may also obtain and locally store the terminal public key by performing information interaction with the terminal before the software upgrading process of the tax control device. In addition, because the terminal public keys transmitted by different terminals may be different, the network end may store the acquired terminal public key corresponding to the identifier of the trusted tax control device corresponding to the terminal, so that the network end may conveniently acquire the corresponding terminal public key according to the identifier of the trusted tax control device of the terminal. The embodiment does not limit the specific implementation manner of the network side acquiring the terminal public key and storing the terminal public key.
The communication key in this embodiment is generated by the network, for example, the network uses the currently generated random number as the communication key, and of course, the network may also generate the communication key in other manners. It should be noted that, for multiple software upgrading processes of the same terminal, each communication key generated by the network for the terminal is usually different, and for software upgrading processes of different terminals, each communication key generated by the network is usually different.
After the network end determines that the tax control equipment identification obtained by decryption is the credible tax control equipment identification and the terminal has software upgrading authority, the network end operates the plaintext of the upgrading data packet according to a preset algorithm (such as a Hash algorithm) so as to obtain a first abstract (such as a Hash first abstract), the network end encrypts the plaintext of the upgrading data packet by using a communication key generated by the network end, encrypts the first abstract by using a network end private key to generate a digital signature, and then the network end encrypts the digital signature by using the generated communication key so as to obtain the digital signature encrypted by using the communication key. The network side should also use the terminal public key stored therein to encrypt the communication key. The encrypted communication key, the encrypted upgrade data packet and the encrypted digital signature can form a new upgrade data packet, and the network sends the new upgrade data packet to the terminal.
It should be particularly noted that, the network may divide a larger upgrade data packet plaintext into a plurality of upgrade data packet plaintext, so that the encrypted upgrade data packet may be in the form of a plurality of encrypted upgrade data packets (i.e., multi-frame data packets); at this time, the network end should form a new upgrade data packet for each encrypted upgrade data packet, that is, each new upgrade data packet should include an encrypted communication key, a corresponding encrypted upgrade data packet, and a corresponding encrypted digital signature; and the network terminal should send new upgrade data packets to the terminal one by one.
S130, the terminal decrypts the received communication key by using the fourth key, obtains the upgrade data packet plaintext based on the communication key obtained by decryption, and obtains the first digest corresponding to the digital signature based on the communication key obtained by decryption and the first key.
Specifically, in the case that the third secret key is the terminal public key, the fourth secret key in this step may be the terminal private key. Of course, the third key and the fourth key in this embodiment may also adopt other forms of key pairs.
The terminal public key and the terminal private key are generally generated by the terminal, the terminal can provide the terminal public key to the network end through information interaction with the network end, and the terminal locally stores the generated terminal private key. The terminal public keys generated by different terminals may be different, and in general, the terminal private keys generated by different terminals are different. The embodiment does not limit the specific implementation manner of generating the terminal public key and the terminal private key by the terminal.
The terminal decrypts the received communication key by using the terminal private key stored in the terminal, decrypts the received upgrade data packet by using the communication key obtained by decryption to obtain the upgrade data packet plaintext, decrypts the digital signature ciphertext by using the communication key obtained by decryption, and decrypts the decrypted digital signature ciphertext by using the network public key to obtain the first digest.
And S140, the terminal calculates a second abstract based on the upgrade data packet plaintext, and executes the software upgrade operation of the tax control equipment based on the upgrade data packet plaintext under the condition that the upgrade data packet plaintext obtained by decryption is determined to be the complete and effective upgrade data packet plaintext according to the first abstract and the second abstract.
Specifically, the terminal operates on the plaintext of the upgrade data packet according to a predetermined algorithm (e.g., a hash algorithm), so as to obtain a second digest (e.g., a hash second digest) of the upgrade data packet. The terminal compares whether a first abstract obtained by decrypting the digital signature and a second abstract obtained by calculating the first abstract are the same or not, if the first abstract and the second abstract are completely the same, the terminal determines that an upgrade data packet plaintext obtained by decrypting the first abstract is a complete and effective (namely complete and real) upgrade data packet plaintext, and the terminal can execute corresponding tax control equipment software upgrading operation based on the upgrade data packet plaintext so as to install the upgrade data packet in the terminal, for example, data stored in a program storage area at the bottom layer of the terminal is updated, so that the safe online upgrading of tax control equipment software is realized; if the two are different, the terminal determines that the plaintext of the upgrade data packet obtained by decryption is not the complete and effective plaintext of the upgrade data packet, and if the plaintext of the upgrade data packet is tampered or damaged, the terminal should not execute corresponding software upgrade operation, so that damage to the terminal caused by the incomplete and effective plaintext of the upgrade data packet is avoided.
It should be noted that, in the case that the network divides a larger upgrade data package plaintext into a plurality of upgrade data package plaintext, the terminal performs the operations of decrypting the received communication key for each received new upgrade data package, obtaining the first digest corresponding to the upgrade data package plaintext and the digital signature based on the communication key obtained by decryption, calculating the second digest by the terminal based on the upgrade data package plaintext, and determining whether the upgrade data package plaintext obtained by decryption is the complete and effective upgrade data package plaintext according to the first digest and the second digest, where the terminal performs the software upgrade operation for the tax control device based on all the upgrade data package plaintext only when each new upgrade data package plaintext is the complete and effective upgrade data package plaintext.
Under the condition that the software is successfully upgraded, the terminal can set the software upgrading times configured for the terminal by the network end to be invalid values, such as zero clearing of the software upgrading times; if the software upgrade is not successful, the terminal should update the number of software upgrades configured for the terminal by the network, for example, reduce the number of software upgrades by one, and return to the above S120.
The public key and the private key pair in the embodiment belong to asymmetric keys, and although the method has the advantage of good safety, the encryption and decryption efficiency is relatively low, the data volume of the upgrade data packet plaintext is generally large, and if the public key and the private key are used for encrypting and decrypting the upgrade data packet plaintext, the encryption and decryption speed is relatively low; in the embodiment, the encryption and decryption of the plaintext and the first abstract of the upgrade data packet are performed by using the communication key, and the encryption and decryption of the communication key are performed by using the public key and the private key pair, so that the encryption and decryption speed of the plaintext and the first abstract of the upgrade data packet is ensured while the communication key in the new upgrade data packet is not intercepted and intercepted in the transmission process.
The second embodiment is a method for safely upgrading tax control equipment software on line, and the flow of the method is shown in fig. 2.
In fig. 2, in S201, a network (e.g., a server of a tax department) performs software upgrade authorization for a terminal (e.g., a tax control device of a user), that is, the network transmits authority information (e.g., upgrade times, upgrade deadline time, and the like) for the terminal software upgrade authorization to the terminal, so that the authority information is configured in the terminal. In practical application, the network end can encrypt the authority information by using the terminal public key stored in the network end, transmit the encrypted authority information to the terminal, decrypt the authority information by using the terminal private key of the terminal end, and store the decrypted authority information.
S202, the terminal encrypts the tax control equipment identification by using a locally stored server public key (A _ pub), and sends the encrypted tax control equipment identification to a network end through a tax control equipment verification request.
And S203, the network side decrypts the tax control equipment identification in the tax control equipment verification request by using the locally stored server private key (A _ pri, also called as the network side private key) to obtain the tax control equipment identification.
S204, the network side searches the tax control equipment identification obtained by decryption in a local database (namely the credible tax control equipment identification set), if the tax control equipment identification obtained by decryption is not searched in the local database, the equipment verification fails, and the software upgrading process of the tax control equipment is finished at S211; if the tax control device identification obtained by decryption is retrieved from the local database, the device verification is passed to S205.
It should be noted that, in the case that the tax control device verification request carries the terminal public key encrypted based on the server public key, the network end may decrypt the received terminal public key by using the server private key, and store the decrypted terminal public key (B _ pub, which may also be referred to as a device public key); if the network end has stored the terminal public key before, the terminal public key stored before will be covered by the terminal public key obtained this time, and the terminal public key can be stored corresponding to the tax control device identification.
S205, the terminal checks whether the authority information is expired (e.g. whether the current upgrade time reaches a predetermined value) or is invalid (e.g. whether the current time exceeds the upgrade deadline), and further, the terminal may check the authority information of the terminal when receiving the response information that is transmitted from the network and passes the verification; if the terminal is expired or invalid, the terminal must apply for authorization again (for example, the terminal sends an authorization request to the network end), and returns to S201; if the terminal is not expired and the terminal is not invalid, the terminal is sent information of the authority to the network side, and the process goes to S206.
S206, the network side encrypts the digest obtained by carrying out Hash operation on the upgrading data package by using a server private key (A _ pri) to obtain a digital signature, then, the currently generated random number sequence is used as a communication key K, a terminal public key (B _ pub) is used for encrypting the communication key K, the communication key K is used for encrypting the upgrading data package plaintext and the digital signature, and then, the network side reforms the upgrade data package by the ciphertext of the communication key K, the upgrade data package ciphertext and the digital signature ciphertext. And the network terminal transmits the reformed upgrading data packet to the terminal through the internet.
S207, after receiving the upgrade data packet, the terminal decrypts a communication key K in the upgrade data packet by using a terminal private key (B _ pri, which may also be referred to as an equipment private key), decrypts the upgrade data packet plaintext data and a digital signature by using the communication key K, and decrypts the digital signature by using a network public key (A _ pub) to obtain the digest.
S208, the terminal compares the decrypted abstract with the abstract calculated by upgrading the data packet plaintext, if the two are consistent, the digital signature passes the verification, and S209 is reached; if the two are not consistent, the digital signature verification fails, and the terminal subtracts 1 from the authorized upgrade number, and returns to S205.
S209, the terminal performs conventional analysis processing on the received upgrade data packet, such as calculating a checksum, checking whether the storage address of the upgrade data packet is valid according to the initial storage address of the data and the data length, and the like, if the analysis process is not abnormal, the step goes to S210, otherwise, analysis processing failure information is displayed to the user, and the terminal subtracts 1 from the authorized upgrade frequency and returns to S205.
S210, the terminal executes software upgrading operation according to the upgrading data packet plaintext and clears authority information.
And S211, ending the software upgrading process of the tax control equipment.
In the case where the upgrade packet is multi-frame data, the above-described S206 to S209 are repeatedly performed.
In a third embodiment, a tax control device software security online upgrade system is shown in fig. 3.
In fig. 3, the system for safely upgrading software of a tax control device on line mainly includes: the tax control equipment software upgrading system comprises a tax control equipment software upgrading network end and a plurality of tax control equipment software upgrading terminals. The software upgrading terminal of the tax control equipment can be the tax control equipment, and also can be the tax control equipment and the intelligent electronic equipment connected with the tax control equipment. The tax control device software upgrading network end can be a server.
The tax control equipment software upgrading network end mainly comprises: a first decryption module 300, a software upgrade control module 310, a first communication module 320, and a rights management module 380.
The tax control equipment software upgrading terminal comprises: a second communication module 330, an identity authentication request module 340, a second decryption module 350, an upgrade loading module 360, and an authorization request module 370.
The identity authentication request module 340 is mainly configured to encrypt the identifier of the tax control device by using the first key, and send a request for verifying the tax control device including the encrypted identifier of the tax control device to the software upgrade network of the tax control device through the second communication module 330.
Specifically, the first secret key may be a network public key, and the terminal may obtain the network public key through information interaction between the second communication module 330 and the network, and locally store the network public key.
When the terminal needs to perform software upgrade, the identity authentication request module 340 first encrypts the tax control device identifier by using the locally stored network public key, and then, the encrypted tax control device identifier is carried in a tax control device verification request (which may also be referred to as a tax control device authentication request) and sent to the network terminal through the second communication module 330.
The first decryption module 300 is mainly configured to decrypt, by using the second key, the fiscal device identifier in the fiscal device authentication request received by the first communication module 320.
Specifically, the second key may be a network private key when the first key is a network public key. Of course, the first key and the second key may also take other forms of key pairs.
After the first decryption module 300 determines that the network side receives the message/data packet as the tax control equipment verification request, under the condition that all terminals correspond to the same network side private key, the first decryption module 300 can directly decrypt the encrypted tax control equipment identifier carried in the tax control equipment verification request by using the network side private key locally stored by the network side, so as to accurately obtain the tax control equipment identifier of the terminal sending the tax control equipment verification request; under the condition that all terminals correspond to different network-side private keys, the first decryption module 300 may first obtain the corresponding network-side private key locally stored by the network side by using information such as the terminal IP address in the tax-control device verification request, and then decrypt the encrypted tax-control device identifier carried in the tax-control device verification request by using the obtained network-side private key, thereby accurately obtaining the tax-control device identifier of the terminal sending the tax-control device verification request.
The software upgrade control module 310 is mainly configured to send, to the terminal through the first communication module 320, a communication key encrypted based on the third key, an upgrade data packet encrypted based on the communication key, and a digital signature encrypted based on the communication key, when it is determined that the decrypted fiscal device identifier is the trusted fiscal device identifier and the terminal has the software upgrade authority.
Specifically, the software upgrading control module 310 may search whether the decrypted tax control device identifier exists in the trusted tax control device identifier set, indicate that the decrypted tax control device identifier is the trusted tax control device identifier if the search result is that the decrypted tax control device identifier is included in the trusted tax control device identifier set, and indicate that the decrypted tax control device identifier is the untrusted tax control device identifier if the search result is that the decrypted tax control device identifier is not included in the trusted tax control device identifier set.
The operation of checking whether the terminal has the software upgrading authority may be performed by the terminal or by the network. In the case that the checking operation is performed by the terminal, the authorization request module 370 may first obtain software upgrade condition information (which may also be referred to as software upgrade permission information) from the network end through the second communication module 330, where the software upgrade condition information may be software upgrade condition information encrypted based on a third key, then the authorization request module 370 checks whether the current time of the terminal meets a software upgrade time range and whether the current software upgrade times of the terminal meet a predetermined number of times, and if the result of the checking by the authorization request module 370 is that the terminal has software upgrade permission, the authorization request module 370 may send corresponding information to the network end, so that the software upgrade control module 310 of the network end knows and continues to perform subsequent encryption operations; if the authorization request module 370 checks that the terminal does not have the software upgrading right, the authorization request module 370 may send an authorization request to the network side to request the right management module 380 of the network side to grant its software upgrading right. In the case that the checking operation is performed by the network, the right management module 380 of the network may obtain the current time of the terminal and the current software upgrade times of the terminal from the terminal through the first communication module 320, and then, the right management module 380 checks whether the current time of the terminal conforms to the software upgrade time range and whether the current software upgrade times of the terminal conforms to the predetermined times, and if the result of the checking by the right management module 380 is that the terminal has the software upgrade right, the software upgrade control module 310 may continue to perform the subsequent encryption operation; if the result of the check of the right management module 380 is that the terminal does not have the software upgrading right, the right management module 380 may send information that the terminal does not have the software upgrading right to the terminal, so that the authorization request module 370 of the terminal sends an authorization request to the network side to request the right management module 380 of the network side to grant the software upgrading right of the terminal.
The process of the right management module 380 granting the terminal software upgrading right may include: the right management module 380 configures authorized software upgrade right information into the terminal through the first communication module 320. The right management module 380 may encrypt the software upgrading right information by using a third key and then transmit the encrypted software upgrading right information to the terminal.
In addition, it should be noted that the right management module 380 may also perform information interaction with the terminal through the first communication module 320 to configure the software upgrading right information into the terminal at the initial stage of the software upgrading process of the tax control device, and the right management module 380 may also perform information interaction with the terminal through the first communication module 320 to configure the software upgrading right information into the terminal before the software upgrading process of the tax control device. The right management module 380 can actively (i.e. the terminal does not need to request) configure the software upgrading right information into the terminal, and can also configure the software upgrading right information into the terminal according to the request of the terminal.
The third key in this embodiment may specifically be a terminal public key. Please refer to the description in the first embodiment, and a detailed implementation manner of the network side obtaining the terminal public key and storing the terminal public key is not repeated here.
The communication key in this embodiment is generated by the software upgrade control module 310 at the network end, for example, the software upgrade control module 310 uses the currently generated random number as the communication key, and of course, the software upgrade control module 310 may also generate the communication key in other manners. It should be noted that, for multiple software upgrade processes of the same terminal, the communication keys generated by the software upgrade control module 310 for the terminal are usually different, and for software upgrade processes of different terminals, the communication keys generated by the software upgrade control module 310 are usually different.
After determining that the decrypted tax control device identifier is the trusted tax control device identifier and the terminal has the software upgrading authority, the software upgrading control module 310 operates the upgrade data packet plaintext according to a predetermined algorithm (such as a hash algorithm) to obtain a first digest (such as a hash first digest) of the upgrade data packet, the software upgrading control module 310 encrypts the upgrade data packet plaintext by using the generated communication key, encrypts the first digest by using a network-side private key to generate a digital signature, and then, the software upgrading control module 310 encrypts the digital signature by using the generated communication key to obtain the digital signature encrypted by using the communication key. The software upgrade control module 310 should also perform encryption processing on the communication key using the terminal public key. The software upgrade control module 310 may form a new upgrade data packet from the encrypted communication key, the encrypted upgrade data packet, and the encrypted digital signature, and transmit the new upgrade data packet to the terminal through the first communication module 320.
It should be particularly noted that the software upgrade control module 310 may divide a larger upgrade data packet plaintext into a plurality of upgrade data packet plaintext, so that the encrypted upgrade data packet may be in the form of a plurality of encrypted upgrade data packets (i.e., multi-frame data packets); at this time, the software upgrade control module 310 should form a new upgrade data packet for each encrypted upgrade data packet, that is, each new upgrade data packet should include an encrypted communication key, a corresponding encrypted upgrade data packet, and a corresponding encrypted digital signature; and the software upgrade control module 310 should sequentially transmit a new upgrade data packet to the terminal through the first communication module 320.
The second decryption module 350 is mainly configured to decrypt the communication key received by the second communication module 330 by using the fourth key, obtain the plaintext of the upgrade data package based on the decrypted communication key, and obtain the first digest corresponding to the digital signature by using the decrypted communication key and the first key.
Specifically, in the case that the third secret key is a terminal public key, the fourth secret key may be a terminal private key. Of course, the third key and the fourth key may also take other forms of key pairs.
The second decryption module 350 decrypts the communication key received by the second communication module 330 by using the terminal private key stored in the terminal, and decrypts the upgrade data packet received by the second communication module 330 by using the communication key obtained by decryption to obtain the upgrade data packet plaintext, in addition, the second decryption module 350 decrypts the digital signature ciphertext by using the communication key obtained by decryption, and then, the second decryption module 350 decrypts the decrypted digital signature by using the network public key to obtain the first digest.
The upgrade loading module 360 is mainly configured to calculate a second digest based on the upgrade data package plaintext, and execute the software upgrade operation of the tax control device based on the upgrade data package plaintext when it is determined that the decrypted upgrade data package plaintext is the complete and effective upgrade data package plaintext according to the first digest and the second digest.
Specifically, the upgrade loading module 360 performs an operation on the plaintext of the upgrade data packet according to a predetermined algorithm (e.g., a hash algorithm), so as to obtain a second digest (e.g., a hash second digest) of the upgrade data packet. The upgrade loading module 360 compares whether the first abstract obtained by decrypting the digital signature by the second decryption module 350 is the same as the second abstract obtained by calculation, if the first abstract and the second abstract are completely the same, the upgrade loading module 360 determines that the upgrade data packet plaintext obtained by decryption is a complete and effective (i.e. complete and real) upgrade data packet plaintext, and the upgrade loading module 360 can execute corresponding tax control equipment software upgrade operation based on the upgrade data packet plaintext so as to install the upgrade data packet in the terminal, for example, to update the data stored in the program storage area at the bottom layer of the terminal, thereby realizing the safe online upgrade of the tax control equipment software; if the two are different, the upgrade loading module 360 determines that the decrypted upgrade data packet plaintext is not the complete and effective upgrade data packet plaintext, and if the upgrade data packet plaintext is tampered or damaged, the upgrade loading module 360 should not execute the corresponding software upgrade operation, so as to avoid the damage to the terminal caused by the incomplete and effective upgrade data packet plaintext.
It should be noted that, in the case that the software upgrade control module 310 divides a large upgrade data packet into a plurality of upgrade data packets, the second decryption module 350 and the upgrade loading module 360 in the network side perform the above operations of decrypting the received communication key for each received new upgrade data package, obtaining the first digest corresponding to the upgrade data package plaintext and the digital signature based on the decrypted communication key, calculating the second digest based on the upgrade data package plaintext by the terminal, and judging whether the upgrade data package plaintext obtained by decryption is the complete and effective upgrade data package plaintext according to the first digest and the second digest, the upgrade loading module 360 performs the software upgrade operation of the tax control device based on all the upgrade data packets plaintext only if each new upgrade data packet plaintext is the complete and effective upgrade data packet plaintext.
In the case of successful software upgrade, the upgrade loading module 360 may set the software upgrade times configured for it by the network end to a non-valid value, such as resetting the software upgrade times; in case that the software upgrade is not successful, the upgrade loading module 360 should update the software upgrade times configured for it by the network, for example, reduce the software upgrade times by one, and notify the software upgrade control module 310 to send the software upgrade data packet to the terminal again through the second communication module 330.
The authorization request module 370 is mainly used to request the network side to grant the software upgrading right under the condition that the terminal does not have the software upgrading right. The operations specifically performed by the authorization request module 370 have already been mentioned in the description of the other modules, and will not be repeated here.
The right management module 380 is mainly used for actively granting the software upgrading right to the terminal, and the right management module 380 is also mainly used for granting the software upgrading right to the terminal according to the request of the terminal. The operations specifically performed by the rights management module 380 have been mentioned in the description of the other modules and will not be repeated here.
Although the present invention has been described with reference to a preferred embodiment, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. A tax control equipment software safety online upgrading method is characterized by comprising the following steps:
the tax control equipment software upgrading terminal encrypts the tax control equipment identification by using the first secret key and sends a tax control equipment verification request containing the encrypted tax control equipment identification to the tax control equipment software upgrading network end;
the network terminal decrypts the tax control equipment identification in the received tax control equipment verification request by using the second secret key;
the network side sends a communication key encrypted based on a third key, an upgrade data packet encrypted based on the communication key and a digital signature encrypted based on the communication key to the terminal under the condition that the tax control equipment identification obtained by decryption is determined to be a credible tax control equipment identification and the terminal has software upgrade authority; the digital signature encrypted based on the communication key comprises: the network side carries out Hash operation on the upgrade data packet plaintext to obtain a first abstract, encrypts the first abstract by using a second secret key to obtain a digital signature, and encrypts the digital signature by using a communication secret key;
the terminal decrypts the received communication key by using the fourth key, obtains the plaintext of the upgrade data packet by using the communication key obtained by decryption, and obtains the first digest corresponding to the digital signature by using the communication key obtained by decryption and the first key;
the terminal calculates a second abstract based on the upgrade data packet plaintext, and the method comprises the following steps: the terminal carries out Hash operation on the upgrade data packet plaintext to obtain a second abstract; and executing software upgrading operation of the tax control equipment based on the upgrading data packet plaintext under the condition that the upgrading data packet plaintext obtained by decryption is determined to be the complete and effective upgrading data packet plaintext according to the first abstract and the second abstract.
2. The method of claim 1, wherein: the first secret key is a network public key, and the second secret key is a network private key; and/or the third key is a terminal public key, and the fourth key is a terminal private key;
the network terminal obtains a third key through information interaction with the terminal, and the terminal obtains a first key through information interaction with the network terminal.
3. The method of claim 1, wherein the network side determines that the tax control device identifier obtained by decryption is an authentic tax control device identifier when it is determined that a prestored authentic tax control device identifier set contains the tax control device identifier obtained by decryption.
4. The method of claim 1, wherein the terminal having software upgrade rights comprises: the current time of the terminal accords with the upgrading time range set by the network terminal, and the current software upgrading times of the terminal do not reach the upgrading times set by the network terminal.
5. The method of claim 1, wherein the method further comprises:
the network terminal actively grants software upgrading permission to the terminal; and/or
And the terminal requests the network terminal to grant the software upgrading authority under the condition that the terminal does not have the software upgrading authority, and the network terminal grants the software upgrading authority to the terminal according to the request.
6. The method according to claim 1, wherein the software upgrading terminal determines that the decrypted upgrade data packet plaintext is the complete and valid upgrade data packet plaintext when determining that the first digest and the second digest are the same.
7. The utility model provides a tax control equipment software safety online upgrade system which characterized in that includes: the tax control equipment software upgrading system comprises a tax control equipment software upgrading network end and a plurality of tax control equipment software upgrading terminals; wherein, tax control equipment software upgrades the network end and includes: the device comprises a first decryption module, a software upgrading control module and a first communication module; and the tax control equipment software upgrading terminal includes: the system comprises a second communication module, an identity authentication request module, a second decryption module and an upgrading loading module;
the identity authentication request module is used for encrypting the tax control equipment identification by using the first secret key and sending a tax control equipment verification request containing the encrypted tax control equipment identification to the tax control equipment software upgrading network end through the second communication module;
the first decryption module is used for decrypting the tax control equipment identification in the tax control equipment verification request received by the first communication module by using the second secret key;
the software upgrading control module is used for sending a communication key encrypted based on a third key, an upgrading data packet encrypted based on the communication key and a digital signature encrypted based on the communication key to the terminal through the first communication module under the condition that the tax control equipment identifier obtained through decryption is determined to be a credible tax control equipment identifier and the terminal has software upgrading authority;
the second decryption module is used for decrypting the communication key received by the second communication module by using the fourth key, obtaining the plaintext of the upgrade data packet based on the communication key obtained by decryption, and obtaining the first digest corresponding to the digital signature by using the communication key obtained by decryption and the first key;
and the upgrading loading module is used for calculating a second abstract based on the upgrading data packet plaintext, and executing software upgrading operation of the tax control equipment based on the upgrading data packet plaintext under the condition that the upgrading data packet plaintext obtained by decryption is determined to be the complete and effective upgrading data packet plaintext according to the first abstract and the second abstract.
8. The system of claim 7, wherein the first key is a network public key and the second key is a network private key; and/or the third key is a terminal public key, and the fourth key is a terminal private key;
the network side obtains a third key through information interaction with the terminal, and the terminal obtains a first key through information interaction with the network side.
9. The system according to claim 7 or 8, wherein the network side further comprises:
the authority management module is used for actively granting software upgrading authority to the terminal and/or granting software upgrading authority to the terminal according to the request of the terminal;
and the terminal further comprises:
and the authorization request module is used for requesting the network terminal to grant the software upgrading authority under the condition that the terminal does not have the software upgrading authority.
CN201410659289.8A 2014-11-18 2014-11-18 Tax control equipment software safety online upgrading method and system Active CN105656859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410659289.8A CN105656859B (en) 2014-11-18 2014-11-18 Tax control equipment software safety online upgrading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410659289.8A CN105656859B (en) 2014-11-18 2014-11-18 Tax control equipment software safety online upgrading method and system

Publications (2)

Publication Number Publication Date
CN105656859A CN105656859A (en) 2016-06-08
CN105656859B true CN105656859B (en) 2020-08-11

Family

ID=56479168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410659289.8A Active CN105656859B (en) 2014-11-18 2014-11-18 Tax control equipment software safety online upgrading method and system

Country Status (1)

Country Link
CN (1) CN105656859B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534194A (en) * 2016-12-16 2017-03-22 湖南国科微电子股份有限公司 Safe data transmission method and device for Beidou chip, and terminal
CN108270806A (en) * 2016-12-30 2018-07-10 航天信息股份有限公司 A kind of more application upgrade method and systems
CN106789088A (en) * 2017-02-08 2017-05-31 上海诺行信息技术有限公司 A kind of software version signature mechanism
CN106980565B (en) * 2017-03-17 2020-08-21 北京潘达互娱科技有限公司 Upgrading process monitoring method and device
CN107992318A (en) * 2017-12-07 2018-05-04 北京趣拿软件科技有限公司 Application program updating method, apparatus, storage medium and processor
CN108235807B (en) * 2018-01-15 2020-08-04 福建联迪商用设备有限公司 Software encryption terminal, payment terminal, software package encryption and decryption method and system
CN108241517B (en) * 2018-02-23 2021-02-02 武汉斗鱼网络科技有限公司 Software upgrading method, client and electronic equipment
CN108196867A (en) * 2018-03-08 2018-06-22 深圳市文鼎创数据科技有限公司 Device for upgrading firmware, equipment and its firmware upgrade method of equipment
CN108566381A (en) * 2018-03-19 2018-09-21 百度在线网络技术(北京)有限公司 A kind of security upgrading method, device, server, equipment and medium
CN110351316A (en) * 2018-04-04 2019-10-18 北京华大信安科技有限公司 A kind of remote software upgrade method and device
CN109104724B (en) * 2018-06-30 2019-06-07 江苏恒宝智能系统技术有限公司 A kind of data ciphering method and device for device upgrade
CN109992286A (en) * 2019-04-02 2019-07-09 深圳创维数字技术有限公司 Device updating method, server and computer readable storage medium
CN112583578B (en) * 2020-11-25 2023-03-24 青岛海信传媒网络技术有限公司 Display equipment and safety upgrading method thereof
CN114610346A (en) * 2020-12-09 2022-06-10 航天信息软件技术有限公司 Software upgrading method and device, storage medium and electronic equipment
CN112948851A (en) * 2021-02-25 2021-06-11 深圳壹账通智能科技有限公司 User authentication method, device, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043680A (en) * 2007-03-13 2007-09-26 中兴通讯股份有限公司 Method of application program for prevention illegal update mobile terminal
CN101426077A (en) * 2008-12-05 2009-05-06 深圳创维-Rgb电子有限公司 Method for on-line updating television set software through Internet
CN102082784A (en) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 Method for upgrading software on line
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4817153B2 (en) * 2009-11-06 2011-11-16 Necインフロンティア株式会社 Authentication method for updating software incorporated in information terminal, system thereof and program thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043680A (en) * 2007-03-13 2007-09-26 中兴通讯股份有限公司 Method of application program for prevention illegal update mobile terminal
CN101426077A (en) * 2008-12-05 2009-05-06 深圳创维-Rgb电子有限公司 Method for on-line updating television set software through Internet
CN102082784A (en) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 Method for upgrading software on line
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system

Also Published As

Publication number Publication date
CN105656859A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
CN105656859B (en) Tax control equipment software safety online upgrading method and system
US20220312208A1 (en) Access method and system of internet of things equipment based on 5g, and storage medium
CN107770182B (en) Data storage method of home gateway and home gateway
CN108390851B (en) Safe remote control system and method for industrial equipment
US9979553B2 (en) Secure certificate distribution
CN106789015B (en) Intelligent power distribution network communication safety system
CN101860540B (en) Method and device for identifying legality of website service
CN111435913B (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN102946314B (en) A kind of client-side user identity authentication method based on browser plug-in
CN101772024B (en) User identification method, device and system
CN101005357A (en) Method and system for updating certification key
CN105553666B (en) Intelligent power terminal safety authentication system and method
CN114024710A (en) Data transmission method, device, system and equipment
CN108809633B (en) Identity authentication method, device and system
CN110677382A (en) Data security processing method, device, computer system and storage medium
EP3544226B1 (en) Unified secure device provisioning
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN105025019A (en) Data safety sharing method
CN113346998A (en) Key updating and file sharing method, device, equipment and computer storage medium
CN114257376B (en) Digital certificate updating method, device, computer equipment and storage medium
CN113221184A (en) Internet of things system and device based on block chain network
CN113347143B (en) Identity verification method, device, equipment and storage medium
CN105471901A (en) Industrial information security authentication system
CN102546580A (en) Method, system and device for updating user password
CN111740824B (en) Trusted application management method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant