CN107070660A - A kind of design Storage method of block chain encrypted radio-frequency chip - Google Patents
A kind of design Storage method of block chain encrypted radio-frequency chip Download PDFInfo
- Publication number
- CN107070660A CN107070660A CN201710121975.3A CN201710121975A CN107070660A CN 107070660 A CN107070660 A CN 107070660A CN 201710121975 A CN201710121975 A CN 201710121975A CN 107070660 A CN107070660 A CN 107070660A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user
- frequency chip
- data
- encrypted radio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000013461 design Methods 0.000 title claims abstract description 22
- 238000003860 storage Methods 0.000 title claims abstract description 18
- 230000008569 process Effects 0.000 claims abstract description 10
- 230000006870 function Effects 0.000 claims description 11
- 238000000151 deposition Methods 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 238000000682 scanning probe acoustic microscopy Methods 0.000 claims description 2
- 238000006243 chemical reaction Methods 0.000 claims 1
- 238000007726 management method Methods 0.000 description 4
- 230000000739 chaotic effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000009466 transformation Effects 0.000 description 3
- 230000002349 favourable effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000000844 transformation Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012804 iterative process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000013517 stratification Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of design Storage method of block chain encrypted radio-frequency chip, including:The first step, designs the data structure of block chain encrypted radio-frequency chip;Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip.A kind of block chain encrypted radio-frequency chip-stored design method of the present invention improves information security degree, meets the principle of one card for multiple uses by have studied the encryption principle of block chain, increases information protection degree, improves the security used and the convenience used.
Description
Technical field
The present invention relates to Internet technical field, a kind of block chain encrypted radio-frequency chip-stored design method.
Background technology
With the fast development of block chain technology, the application of block chain is also further extensive.Block chain encrypted radio-frequency chip is made
For user and the connection tie of block chain network, importance is increasingly highlighted.The storage mode moment of block chain encrypted radio-frequency chip
Threatened by hacker and virus, security incident repeatedly occurs in recent years.In order to make the use of block chain more convenient, and carry
High security, it is necessary to make by the strong block chain encrypted radio-frequency chip of easy to use, safe, favorable expandability, application
For instrument.And the storage of block chain encrypted radio-frequency chip and operation are basis and core, not only the technology of block chain is considered
Inside, it is also contemplated that security, application and autgmentability.Therefore, a kind of block chain encrypted radio-frequency for solving problem above is needed badly
The design Storage method of chip.
The content of the invention
In view of this, the technical problem to be solved in the present invention is to provide one kind using extensive, safe, favorable expandability,
The design Storage method of the strong block chain encrypted radio-frequency chip of application.
To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of block chain encrypted radio-frequency chip
Design Storage method, comprises the following steps:
The first step, designs the data structure of block chain encrypted radio-frequency chip;
Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;
3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip;
The data structure of block chain encrypted radio-frequency chip includes user data, authentication data and account data;
The user data includes reading control data A, address name, subscriber phone, ID;
Wherein, reading control data A is used to store the information that control user data is read, and address name is used to store user
Name information, subscriber phone is used to store the phone information of user, ID storage internal user numbering;
Authentication data includes:Read control data B, user password hash value, certification key, accountee public key;
Wherein, reading control data B is used for the information that authentication data is read, and the information extraction that authentication data is read
Mark, and obtains user's anti-fake mark plus local time stamp, prevents from distorting, and finally the value of user's anti-fake mark and uses the registered permanent residence
The hash value of length needed for the value of order is transformed into actual safety certification by Hash AESs, the information that authentication data is read is carried
The process for taking mark is:
The information that the authentication data of random length is read first is divided and to generate equal length be 4n bytes
Sub-information section, wherein n is any integer value formulated in advance according to system, generates 4n length by Hash functional transformations afterwards
Hash value, by obtaining user's anti-fake mark plus the local time stamp, in the case of the loss of block chain encrypted radio-frequency chip,
Disabled user's Brute Force user password is effectively prevented from, finally certification key is used to read control data B and described uses the registered permanent residence
The safety certification between hash value is made, account public key decryptions are used for decrypted user anti-fake mark, for each upper account of inquiry
Remaining sum;
Account data includes:Read control data C, master key ciphertext, main private key ciphertext;
Wherein, the information that control data C is used to store account data reading is read, master key ciphertext is used for association user mouthful
Order and account private key, lift the encryption parameter of the accountee public key, and raising cracks difficulty, makes account safer;
Data in block chain encrypted radio-frequency chip organize Storage Format to be tree-shaped file structure, tool in user memory
There is the form of multi-level file structure, tree-shaped file structure is divided into three kinds of levels:First level is master control file, is answer more
It is the root of tree-shaped file structure with the root of file structure, the public information text for depositing block chain encrypted radio-frequency chip
Part, and be all application program services;Second level is application file, under master control file, is tree-shaped file
The subdirectory of structure, multiple application files are set up according to service condition respectively, and application file is used to realize block chain encrypted radio-frequency
A variety of application functions of chip;3rd level is atom file, for storing real application data and corresponding system administration
Data message in information, the data structure of block chain encrypted radio-frequency chip is just deposited in atom file, when application file is needed
Corresponding atom file can be called when wanting;
The encryption of block chain encrypted radio-frequency chip, decrypting process are:
(1) encrypt:System generates a 32 byte master keys at random, while reading user uses password, and storage is arrived
Array, wherein user use password as row vector, and master key is encrypted as column vector, and with AES, is led
Key ciphertext;
(2) decrypt:Master key ciphertext is read out of account data, while reading user uses password, and is stored to number
Group matrix, wherein user uses password as row vector, and master key ciphertext will make master key as column vector by decipherment algorithm
Ciphertext is reduced into master key, then reads main private key ciphertext from block chain encrypted radio-frequency chip, passes through user's anti-counterfeiting label
The checking of note, main private key is reduced into reference to master key by main private key ciphertext.
A kind of block chain encrypted radio-frequency chip-stored design method of the present invention have studied the principle of block chain, it is contemplated that letter
Degree of safety is ceased, the data structure of block chain encrypted radio-frequency chip is devised, and considers encryption, the process of decryption, in order to meet
The principle of one card for multiple uses, devises multi-level file structure, increases information protection degree, improves the security used and uses
Convenience.
Brief description of the drawings
Fig. 1 is the specific steps of block chain encrypted radio-frequency chip-stored design method.
Embodiment
In order that technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Drawings and Examples are closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only used
To explain the present invention, it is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent substitution and improvement, include
Within protection scope of the present invention.Specific method is as follows:
Embodiment 1:The Hash construction of function of user password
Password is used to pass through Hash functional transformations into the hash value of required length, specific mistake the user needed for verifying card
The user of random length is is generated the sub-information section that length is 4n bytes by journey using password through filling up, dividing first, afterwards
The hash value of 4n length is generated by chaos iteration, functional transformation, replacement and look-up table of functions.Specific algorithm is as follows:
A) form for being expressed as formulating using password by user, initial format is K=(α, x0, m), wherein α reflects for chaos
The parameter penetrated, x0It is here the use password of user for the initial value of chaotic maps, m is primary iteration number of times.With 0-1 chaos sequences
Each register of row initialization is:
A=(b0,b1,…,bn-1), B=(b8n,b8n+1,…,b2*(8n-1)),
C=(b2*8n,b2*(8n+1),…,b3*(8n-1)), D=(b3*8n,b3*(8n+1),…,b4*(8n-1))
B) user of random length generates the sub-information section that length is 4n bytes through filling up, dividing using password.
C) A, B, C, D are recalculated using function f (*).
D) replacement time of A, B, C and D in the dynamic s-box of chaos is determined according to A, B, C and D of generation last bit
Sequence, i.e., by A, B, C and D respectively with being corresponded with label 1,2,3 and 4, according to function F (*) point function index order as
Chaos replaces order.
E) searched by last bit of A, B, C, D and calculate f (*).
F) judging initial data is that processing is no and finishes, and be, otherwise hash value A, B, C, D of output 4n bytes turn to b) step
Suddenly.
Embodiment 2:The definition and application of application file under system main-control file
Set up on block chain encrypted radio-frequency chip on file system root mesh and set up system main-control file.Deposit block chain
The public information file of encrypted radio-frequency chip, and be all application program services.According to using feelings on master control file
Condition sets up multiple application catalogue files respectively, and for example, block chain financial environment includes key information, personal information etc., then fixed
The application environment of adopted finance contact, the filename that this is applied according to China's finance block chain encrypted radio-frequency chip specification definable
For 1PAY.SYS.DDF01.The same financial contactless system environment of definable, and it is defined as 2PAY.SYS.DDF01.Finance connects
The application environment of the application environment of touch and financial contact is all the different application file under system main-control file, application
File realizes the selection of different application to realize a variety of applications of radio frequency chip by filename.
Embodiment 3:The physical planning of key structure
Key management be related to flatly the generation of key, inspections, distribution, transmission, using, certainly, the comprehensive skill of destruction
Art, and administration system and the quality of personnel with key has close relationship.Current Guo borders Biao quasi-ization Group knits ISO, and oneself passes through
Key management standard is formulated.But it is due to the difference of the Shi Jishiyong situation of encryption system, specific system has specific reality
Border requires, therefore is difficult unified in standardization.
Current cipher key system typically uses hierarchical structure, is designed using the basic thought of key-protection key.
Protected for the key designs of (i+1) layer by i-th layer of key, while itself is also protected by last layer key again.
Key is stratification protection mechanism, next layer of key by level above cryptographic key protection.
The hierarchical structure of cipher key system is often determined according to the functional structure of encryption system in actual use, if being
Function of uniting is relatively easy, then key hierarchy can be reduced accordingly.Need suitably to increase key structure if function is relative complex
The number of plies.The security of key management system can be greatly promoted by the design of layered model.Due to all can be used in each layer
New agreement is changed, is managed, therefore whole cipher key system is behavioral characteristics, and not exclusively one static storage
Mechanism, along with each layer of key, all in the presence of corresponding agreement.
3 layers of key management system, respectively master key layer, sub-key layer are used in block chain encrypted radio-frequency chip system
With session key layer.There is identical system master key in intelligent block chain encrypted radio-frequency chip and card reader, according to system
Actual conditions it is different, one or more master keys are had in some smart cards or card reader, to improve the security of system.
A master key has only been used in the system.Master key is encrypted using variable master key parameter close with regard to son can be obtained
Key, while sub-key is encrypted using other variable master key parameter with regard to third layer session key can be obtained.For reading
The data transmitted between card device and chip are encrypted using session key.Under normal circumstances, session key can only by with once,
Accordingly even when session key is decoded by attacker, leakage is also only merely once to transmit data.Further, can not be from session key
It is counter to inquire into obtain system master key.
Session key generating mode:State piece manufacture identification code, application sequence are designed with block chain encrypted radio-frequency chip
Number or block chain encrypted radio-frequency chip serial number, wherein, had according to the sequence number of block chain encrypted radio-frequency chip and uniquely.Separately
Outside, in transaction, system is usually noted the time of transaction, also has corresponding counter in some cards to control to read and write number of times.
Counter increases automatically after card is performed certain instruction.When this guarantees merchandising every time, the value of counter and friendship
Easy Time Inconsistency.Therefore using manufacturer identification code of the master key to card, generation sub-key is encrypted in the sequence number of card.Though
Identical master key is so used, but is due to that sequence number is different, therefore the sub-key of each card generation is also what is differed.For
Ensure for the session key on every card only using once, using sub-key exchange hour and Counter Value are encrypted
Generate session key.So for the same card, the session key used of merchandising every time is all different.For a multipurpose
Chip for, different applications usually use different master keys, therefore this make it that the workload of decoding system is very big, and
The meaning of decoding is also little.
Master key can be proposed one piece of data and then one key of organic synthesis, Ran Houzai independently of one another by the people of multiple trusts
Secure random number cryptographic calculation is added to obtain.Therefore all difficult prediction of the generation of master key and variation pattern.System master key is in dress
If not will result in the leakage of key with caution during load, therefore the loading of master key must enter under the environment of safety
OK.Due to needing that system master key artificially is loaded into radio frequency chip and card reader, thereby, it is ensured that loading process must be special
Carried out in the equipment of mouth, what environment during download must be safe, information can not be lost in contact in radio-frequency card.Operated in card
System ensures that master key can not can not just be read again after being loaded into.Key can not be carried out in card reader and loads cumbersome, it is past
Toward security module is added to deposit key, to realize encryption and decipherment algorithm.
Encryption-decryption algorithm has used digital chaotic sequence, can be mixed to numeral on the premise of excessively operand is not increased
Ignorant iterative process is improved, and the pseudo-random sequence more class produced by making whole system is noise-like, and reduces weak key
Ratio, expands the space of available key, makes the selection of key and has bigger randomness.By digital chaotic system iteration is produced
The raw pseudo- chaos sequence cycle is unpredictable, it is difficult to Accurate Analysis, and far smaller than 2N(N is to realize precision).Although improving
Precision is realized, still will not to be greatly improved the average period of pseudo- chaos sequence, and still there can be sequence be attracted to
The situation of some fixed value.In order to improve the cyclophysis of pseudo- chaos sequence, extend and control its sequence period, utilize m sequences
Arrange the method disturbed to chaos iteration system.
Claims (1)
1. a kind of design Storage method of block chain encrypted radio-frequency chip, it is characterised in that comprise the following steps:
The first step, designs the data structure of block chain encrypted radio-frequency chip;
Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;
3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip;
The data structure of the block chain encrypted radio-frequency chip includes user data, authentication data and account data;
The user data includes reading control data A, address name, subscriber phone, ID and user password;
Wherein, the control data A that reads is used to store the information that the user data is read, and the address name is used to store
The name information of user, the subscriber phone is used for the phone information for storing user, and the ID storage internal user is numbered,
The user password is used for the use password for storing user's setting;
The authentication data includes:Read control data B, user password hash value, certification key, accountee public key;
Wherein, the control data B that reads is used to store the information that the authentication data is read, and the authentication data is read
The information taken carries out extraction mark, and obtains user's anti-fake mark plus local time stamp, prevents from distorting, finally the user
The institute of length needed for the value of anti-fake mark and the value of the user password are transformed into actual safety certification by Hash AESs
User password hash value is stated, is to the process that the information that the authentication data is read extract mark:
The information that the authentication data of random length is read first divides and generates the sub-information that equal length is 8 bytes
Section, afterwards by Hash functions by the sub-information section conversion generate 8 byte lengths hash value, by plus it is described local when
Between stamp obtain user's anti-fake mark, can the block chain encrypted radio-frequency chip loss in the case of, it is to avoid disabled user is sudden and violent
Power cracks the user password, and the last certification key is used for the reading control data B and the user password hash value
Between safety certification, the accountee public key is used to decrypt user's anti-fake mark, for each upper account of inquiry
Remaining sum;
The account data includes:Read control data C, master key ciphertext, main private key ciphertext;
Wherein, the control data C that reads is used to store the information that the account data is read, and the master key ciphertext is used to close
Join the user password and master key, lift the encryption parameter of the accountee public key, raising cracks difficulty, account is more pacified
Entirely;The main private key ciphertext is used for encryption, the complexity of decrypting process for increasing the block chain encrypted radio-frequency chip, further
Improve the security of the block chain encrypted radio-frequency chip;
Data in the block chain encrypted radio-frequency chip organize Storage Format to be tree-shaped file knot in the user memory
Structure, the form with multi-level file structure, the tree-shaped file structure is divided into three kinds of levels:First level is master control
File, is the root of the tree-shaped file structure, as the root of the tree-shaped file structure, is added for depositing the block chain
The public information file of close radio frequency chip, and be all application program services;Second level is application file, described
Under master control file, as the subdirectory of the tree-shaped file structure, multiple applications are set up respectively according to service condition
File, the application file is used for a variety of application functions for realizing the block chain encrypted radio-frequency chip;3rd level is former
Subfile, for storing real application data and corresponding system management messages, the user data, the authentication data and institute
State account data just to deposit in the atom file, the corresponding atom text can be called when the application file needs
Part;
The encryption of the block chain encrypted radio-frequency chip, decrypting process are:
(1) encrypt:The block chain encrypted radio-frequency chip generates a 32 byte master keys at random, while reading is described to use the registered permanent residence
Order, and store to an array, user password described in the array is as row vector, the master key conduct
Column vector, and encrypted with AES, obtain the master key ciphertext;The master key passes through user's anti-fake mark, leads to
AES is crossed, the main private key of the block chain encrypted radio-frequency chip is generated;
Decryption:The master key ciphertext is read from the account data, while reading the user password, and is stored to another
One array, wherein the user password is as row vector, the master key ciphertext passes through decipherment algorithm as column vector
The master key ciphertext is reduced into the master key, then the main private key is read from the block chain encrypted radio-frequency chip
Ciphertext, main private is reduced into by the checking of user's anti-fake mark, and with reference to the master key by the main private key ciphertext
Key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710121975.3A CN107070660B (en) | 2017-03-03 | 2017-03-03 | Storage design method of block chain encryption radio frequency chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710121975.3A CN107070660B (en) | 2017-03-03 | 2017-03-03 | Storage design method of block chain encryption radio frequency chip |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107070660A true CN107070660A (en) | 2017-08-18 |
CN107070660B CN107070660B (en) | 2020-03-17 |
Family
ID=59622799
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710121975.3A Active CN107070660B (en) | 2017-03-03 | 2017-03-03 | Storage design method of block chain encryption radio frequency chip |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070660B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537556A (en) * | 2018-03-13 | 2018-09-14 | 深圳信息职业技术学院 | A kind of multidate information method for anti-counterfeit based on block chain and NFC chip |
CN108833117A (en) * | 2018-07-25 | 2018-11-16 | 海南新软软件有限公司 | A kind of storage of private key and read method, device and hardware device |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109271801A (en) * | 2018-09-25 | 2019-01-25 | 宁波弘讯科技股份有限公司 | Injecting products approaches to IM, server, injection molding machine based on block chain |
CN109523277A (en) * | 2018-11-20 | 2019-03-26 | 王建新 | Product false proof electronic tag authentication method and system |
CN109829333A (en) * | 2019-01-14 | 2019-05-31 | 中国科学院信息工程研究所 | A kind of key message guard method and system based on OpenID |
WO2019102322A1 (en) * | 2017-11-27 | 2019-05-31 | International Business Machines Corporation | Authenticating a payment card |
CN109995537A (en) * | 2019-05-22 | 2019-07-09 | 杭州云象网络技术有限公司 | A method of it is encrypted based on Lorentz-logic mapping algorithm block chain |
CN110417546A (en) * | 2019-07-03 | 2019-11-05 | 山东大学 | The method and apparatus that the end B based on multi-way encryption uses private key |
CN111684412A (en) * | 2018-01-29 | 2020-09-18 | 亚历山大·石 | Secure blockchain integrated circuit |
US20210034778A1 (en) * | 2019-08-01 | 2021-02-04 | EMC IP Holding Company LLC | Anonymous ranking service |
CN116911393A (en) * | 2023-09-12 | 2023-10-20 | 苏州浪潮智能科技有限公司 | Quantum chip design system, quantum chip design method, electronic equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101042738A (en) * | 2006-03-24 | 2007-09-26 | 中国银联股份有限公司 | Method for implementing smart card multi-application and data processing apparatus |
CN101308546A (en) * | 2008-05-20 | 2008-11-19 | 上海华申智能卡应用系统有限公司 | Radio frequency label of safe storage structure having multi-stage protection and method thereof |
US20150242825A1 (en) * | 2014-02-24 | 2015-08-27 | Peter Burton Mills | Generation, storage, and validation of encrypted electronic currency |
CN205003731U (en) * | 2015-09-30 | 2016-01-27 | 深圳市招股科技有限公司 | Digital cash hardware wallet based on two interfaces IC -card |
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
CN106131048A (en) * | 2016-08-13 | 2016-11-16 | 深圳市樊溪电子有限公司 | A kind of non-trusted remote transaction file security for block chain stores system |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
-
2017
- 2017-03-03 CN CN201710121975.3A patent/CN107070660B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101042738A (en) * | 2006-03-24 | 2007-09-26 | 中国银联股份有限公司 | Method for implementing smart card multi-application and data processing apparatus |
CN101308546A (en) * | 2008-05-20 | 2008-11-19 | 上海华申智能卡应用系统有限公司 | Radio frequency label of safe storage structure having multi-stage protection and method thereof |
US20150242825A1 (en) * | 2014-02-24 | 2015-08-27 | Peter Burton Mills | Generation, storage, and validation of encrypted electronic currency |
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
CN205003731U (en) * | 2015-09-30 | 2016-01-27 | 深圳市招股科技有限公司 | Digital cash hardware wallet based on two interfaces IC -card |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106131048A (en) * | 2016-08-13 | 2016-11-16 | 深圳市樊溪电子有限公司 | A kind of non-trusted remote transaction file security for block chain stores system |
Non-Patent Citations (3)
Title |
---|
中国银联股份有限公司: "中国银联IC卡技术规范-基础规范 第1部分:借记/贷记应用规范", 《中国银联股份有限公司企业标准》 * |
产品快讯: "VeChain发布全球首款基于区块链技术的NFC防伪芯片", 《金卡工程》 * |
袁晶莹等: ""链"起名牌包", 《二十一世纪商业评论》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2581935A (en) * | 2017-11-27 | 2020-09-02 | Ibm | Authenticating a payment card |
WO2019102322A1 (en) * | 2017-11-27 | 2019-05-31 | International Business Machines Corporation | Authenticating a payment card |
US10990982B2 (en) | 2017-11-27 | 2021-04-27 | International Business Machines Corporation | Authenticating a payment card |
GB2581935B (en) * | 2017-11-27 | 2021-02-03 | Ibm | Authenticating a payment card |
CN111684412A (en) * | 2018-01-29 | 2020-09-18 | 亚历山大·石 | Secure blockchain integrated circuit |
CN108537556A (en) * | 2018-03-13 | 2018-09-14 | 深圳信息职业技术学院 | A kind of multidate information method for anti-counterfeit based on block chain and NFC chip |
CN108833117A (en) * | 2018-07-25 | 2018-11-16 | 海南新软软件有限公司 | A kind of storage of private key and read method, device and hardware device |
CN109190384B (en) * | 2018-07-26 | 2022-02-22 | 百色学院 | Multi-center block chain fusing protection system and method |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109271801A (en) * | 2018-09-25 | 2019-01-25 | 宁波弘讯科技股份有限公司 | Injecting products approaches to IM, server, injection molding machine based on block chain |
CN109523277A (en) * | 2018-11-20 | 2019-03-26 | 王建新 | Product false proof electronic tag authentication method and system |
CN109523277B (en) * | 2018-11-20 | 2021-05-25 | 王建新 | Product anti-counterfeiting electronic tag authentication method and system |
CN109829333A (en) * | 2019-01-14 | 2019-05-31 | 中国科学院信息工程研究所 | A kind of key message guard method and system based on OpenID |
CN109995537A (en) * | 2019-05-22 | 2019-07-09 | 杭州云象网络技术有限公司 | A method of it is encrypted based on Lorentz-logic mapping algorithm block chain |
CN110417546A (en) * | 2019-07-03 | 2019-11-05 | 山东大学 | The method and apparatus that the end B based on multi-way encryption uses private key |
US20210034778A1 (en) * | 2019-08-01 | 2021-02-04 | EMC IP Holding Company LLC | Anonymous ranking service |
US11921881B2 (en) * | 2019-08-01 | 2024-03-05 | EMC IP Holding Company LLC | Anonymous ranking service |
CN116911393A (en) * | 2023-09-12 | 2023-10-20 | 苏州浪潮智能科技有限公司 | Quantum chip design system, quantum chip design method, electronic equipment and storage medium |
CN116911393B (en) * | 2023-09-12 | 2024-01-12 | 苏州浪潮智能科技有限公司 | Quantum chip design system, quantum chip design method, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107070660B (en) | 2020-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107070660A (en) | A kind of design Storage method of block chain encrypted radio-frequency chip | |
TWI750223B (en) | Blockchain encrypted radio frequency chip storage design method | |
CN105100083B (en) | A kind of secret protection and support user's revocation based on encryption attribute method and system | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CN105306194B (en) | For encrypted file and/or the multiple encryption method and system of communications protocol | |
CN103413109B (en) | A kind of mutual authentication method of radio frequency identification system | |
CN100576792C (en) | The method that file encryption is shared | |
CN103427987B (en) | Method, data verification method and the electronic installation of data encryption | |
US9698974B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN105024803B (en) | Behavior fingerprint in white box realization | |
CN101149768B (en) | Special processor software encryption and decryption method | |
CN101765996A (en) | Remote Authentication And Transaction Signatures | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN109150903A (en) | A kind of account management method, device, storage medium and terminal device | |
CN104135473A (en) | A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption | |
CN106059760B (en) | A kind of cryptographic system from user terminal crypto module calling system private key | |
TW201141172A (en) | Methods, circuits, devices, and systems for provisioning of cryptographic data to one or more electronic devices | |
CN104868998A (en) | System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices | |
CN109934001A (en) | A kind of data ciphering method based on normal cloud model | |
CN106462689B (en) | Security system, managing device, approval apparatus, terminal installation, safety method and recording medium | |
CN109743162A (en) | A kind of operated using ideal lattice carries out the matched encryption method of identity attribute | |
CN105790929A (en) | High-efficient access control method based on rule redundancy elimination in encryption environment | |
CN114430321B (en) | DFA self-adaptive security-based black box traceable key attribute encryption method and device | |
CN100486157C (en) | Distribution type data encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Lu Yang Inventor before: Qian Dejun |
|
CB03 | Change of inventor or designer information | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170921 Address after: 200040, 4 floor, building 546, 4 Yuyuan Road, Jingan District, Shanghai Applicant after: Shanghai chain Mdt InfoTech Ltd Address before: 200131 Shanghai Fengxian District Shanghai free trade experimentation area, plus Road 39, 1, four, 39 parts Applicant before: Qian Dejun |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |