CN107070660A - A kind of design Storage method of block chain encrypted radio-frequency chip - Google Patents

A kind of design Storage method of block chain encrypted radio-frequency chip Download PDF

Info

Publication number
CN107070660A
CN107070660A CN201710121975.3A CN201710121975A CN107070660A CN 107070660 A CN107070660 A CN 107070660A CN 201710121975 A CN201710121975 A CN 201710121975A CN 107070660 A CN107070660 A CN 107070660A
Authority
CN
China
Prior art keywords
block chain
user
frequency chip
data
encrypted radio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710121975.3A
Other languages
Chinese (zh)
Other versions
CN107070660B (en
Inventor
钱德君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chain Mdt Infotech Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710121975.3A priority Critical patent/CN107070660B/en
Publication of CN107070660A publication Critical patent/CN107070660A/en
Application granted granted Critical
Publication of CN107070660B publication Critical patent/CN107070660B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of design Storage method of block chain encrypted radio-frequency chip, including:The first step, designs the data structure of block chain encrypted radio-frequency chip;Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip.A kind of block chain encrypted radio-frequency chip-stored design method of the present invention improves information security degree, meets the principle of one card for multiple uses by have studied the encryption principle of block chain, increases information protection degree, improves the security used and the convenience used.

Description

A kind of design Storage method of block chain encrypted radio-frequency chip
Technical field
The present invention relates to Internet technical field, a kind of block chain encrypted radio-frequency chip-stored design method.
Background technology
With the fast development of block chain technology, the application of block chain is also further extensive.Block chain encrypted radio-frequency chip is made For user and the connection tie of block chain network, importance is increasingly highlighted.The storage mode moment of block chain encrypted radio-frequency chip Threatened by hacker and virus, security incident repeatedly occurs in recent years.In order to make the use of block chain more convenient, and carry High security, it is necessary to make by the strong block chain encrypted radio-frequency chip of easy to use, safe, favorable expandability, application For instrument.And the storage of block chain encrypted radio-frequency chip and operation are basis and core, not only the technology of block chain is considered Inside, it is also contemplated that security, application and autgmentability.Therefore, a kind of block chain encrypted radio-frequency for solving problem above is needed badly The design Storage method of chip.
The content of the invention
In view of this, the technical problem to be solved in the present invention is to provide one kind using extensive, safe, favorable expandability, The design Storage method of the strong block chain encrypted radio-frequency chip of application.
To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of block chain encrypted radio-frequency chip Design Storage method, comprises the following steps:
The first step, designs the data structure of block chain encrypted radio-frequency chip;
Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;
3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip;
The data structure of block chain encrypted radio-frequency chip includes user data, authentication data and account data;
The user data includes reading control data A, address name, subscriber phone, ID;
Wherein, reading control data A is used to store the information that control user data is read, and address name is used to store user Name information, subscriber phone is used to store the phone information of user, ID storage internal user numbering;
Authentication data includes:Read control data B, user password hash value, certification key, accountee public key;
Wherein, reading control data B is used for the information that authentication data is read, and the information extraction that authentication data is read Mark, and obtains user's anti-fake mark plus local time stamp, prevents from distorting, and finally the value of user's anti-fake mark and uses the registered permanent residence The hash value of length needed for the value of order is transformed into actual safety certification by Hash AESs, the information that authentication data is read is carried The process for taking mark is:
The information that the authentication data of random length is read first is divided and to generate equal length be 4n bytes Sub-information section, wherein n is any integer value formulated in advance according to system, generates 4n length by Hash functional transformations afterwards Hash value, by obtaining user's anti-fake mark plus the local time stamp, in the case of the loss of block chain encrypted radio-frequency chip, Disabled user's Brute Force user password is effectively prevented from, finally certification key is used to read control data B and described uses the registered permanent residence The safety certification between hash value is made, account public key decryptions are used for decrypted user anti-fake mark, for each upper account of inquiry Remaining sum;
Account data includes:Read control data C, master key ciphertext, main private key ciphertext;
Wherein, the information that control data C is used to store account data reading is read, master key ciphertext is used for association user mouthful Order and account private key, lift the encryption parameter of the accountee public key, and raising cracks difficulty, makes account safer;
Data in block chain encrypted radio-frequency chip organize Storage Format to be tree-shaped file structure, tool in user memory There is the form of multi-level file structure, tree-shaped file structure is divided into three kinds of levels:First level is master control file, is answer more It is the root of tree-shaped file structure with the root of file structure, the public information text for depositing block chain encrypted radio-frequency chip Part, and be all application program services;Second level is application file, under master control file, is tree-shaped file The subdirectory of structure, multiple application files are set up according to service condition respectively, and application file is used to realize block chain encrypted radio-frequency A variety of application functions of chip;3rd level is atom file, for storing real application data and corresponding system administration Data message in information, the data structure of block chain encrypted radio-frequency chip is just deposited in atom file, when application file is needed Corresponding atom file can be called when wanting;
The encryption of block chain encrypted radio-frequency chip, decrypting process are:
(1) encrypt:System generates a 32 byte master keys at random, while reading user uses password, and storage is arrived Array, wherein user use password as row vector, and master key is encrypted as column vector, and with AES, is led Key ciphertext;
(2) decrypt:Master key ciphertext is read out of account data, while reading user uses password, and is stored to number Group matrix, wherein user uses password as row vector, and master key ciphertext will make master key as column vector by decipherment algorithm Ciphertext is reduced into master key, then reads main private key ciphertext from block chain encrypted radio-frequency chip, passes through user's anti-counterfeiting label The checking of note, main private key is reduced into reference to master key by main private key ciphertext.
A kind of block chain encrypted radio-frequency chip-stored design method of the present invention have studied the principle of block chain, it is contemplated that letter Degree of safety is ceased, the data structure of block chain encrypted radio-frequency chip is devised, and considers encryption, the process of decryption, in order to meet The principle of one card for multiple uses, devises multi-level file structure, increases information protection degree, improves the security used and uses Convenience.
Brief description of the drawings
Fig. 1 is the specific steps of block chain encrypted radio-frequency chip-stored design method.
Embodiment
In order that technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Drawings and Examples are closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only used To explain the present invention, it is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent substitution and improvement, include Within protection scope of the present invention.Specific method is as follows:
Embodiment 1:The Hash construction of function of user password
Password is used to pass through Hash functional transformations into the hash value of required length, specific mistake the user needed for verifying card The user of random length is is generated the sub-information section that length is 4n bytes by journey using password through filling up, dividing first, afterwards The hash value of 4n length is generated by chaos iteration, functional transformation, replacement and look-up table of functions.Specific algorithm is as follows:
A) form for being expressed as formulating using password by user, initial format is K=(α, x0, m), wherein α reflects for chaos The parameter penetrated, x0It is here the use password of user for the initial value of chaotic maps, m is primary iteration number of times.With 0-1 chaos sequences Each register of row initialization is:
A=(b0,b1,…,bn-1), B=(b8n,b8n+1,…,b2*(8n-1)),
C=(b2*8n,b2*(8n+1),…,b3*(8n-1)), D=(b3*8n,b3*(8n+1),…,b4*(8n-1))
B) user of random length generates the sub-information section that length is 4n bytes through filling up, dividing using password.
C) A, B, C, D are recalculated using function f (*).
D) replacement time of A, B, C and D in the dynamic s-box of chaos is determined according to A, B, C and D of generation last bit Sequence, i.e., by A, B, C and D respectively with being corresponded with label 1,2,3 and 4, according to function F (*) point function index order as Chaos replaces order.
E) searched by last bit of A, B, C, D and calculate f (*).
F) judging initial data is that processing is no and finishes, and be, otherwise hash value A, B, C, D of output 4n bytes turn to b) step Suddenly.
Embodiment 2:The definition and application of application file under system main-control file
Set up on block chain encrypted radio-frequency chip on file system root mesh and set up system main-control file.Deposit block chain The public information file of encrypted radio-frequency chip, and be all application program services.According to using feelings on master control file Condition sets up multiple application catalogue files respectively, and for example, block chain financial environment includes key information, personal information etc., then fixed The application environment of adopted finance contact, the filename that this is applied according to China's finance block chain encrypted radio-frequency chip specification definable For 1PAY.SYS.DDF01.The same financial contactless system environment of definable, and it is defined as 2PAY.SYS.DDF01.Finance connects The application environment of the application environment of touch and financial contact is all the different application file under system main-control file, application File realizes the selection of different application to realize a variety of applications of radio frequency chip by filename.
Embodiment 3:The physical planning of key structure
Key management be related to flatly the generation of key, inspections, distribution, transmission, using, certainly, the comprehensive skill of destruction Art, and administration system and the quality of personnel with key has close relationship.Current Guo borders Biao quasi-ization Group knits ISO, and oneself passes through Key management standard is formulated.But it is due to the difference of the Shi Jishiyong situation of encryption system, specific system has specific reality Border requires, therefore is difficult unified in standardization.
Current cipher key system typically uses hierarchical structure, is designed using the basic thought of key-protection key. Protected for the key designs of (i+1) layer by i-th layer of key, while itself is also protected by last layer key again. Key is stratification protection mechanism, next layer of key by level above cryptographic key protection.
The hierarchical structure of cipher key system is often determined according to the functional structure of encryption system in actual use, if being Function of uniting is relatively easy, then key hierarchy can be reduced accordingly.Need suitably to increase key structure if function is relative complex The number of plies.The security of key management system can be greatly promoted by the design of layered model.Due to all can be used in each layer New agreement is changed, is managed, therefore whole cipher key system is behavioral characteristics, and not exclusively one static storage Mechanism, along with each layer of key, all in the presence of corresponding agreement.
3 layers of key management system, respectively master key layer, sub-key layer are used in block chain encrypted radio-frequency chip system With session key layer.There is identical system master key in intelligent block chain encrypted radio-frequency chip and card reader, according to system Actual conditions it is different, one or more master keys are had in some smart cards or card reader, to improve the security of system. A master key has only been used in the system.Master key is encrypted using variable master key parameter close with regard to son can be obtained Key, while sub-key is encrypted using other variable master key parameter with regard to third layer session key can be obtained.For reading The data transmitted between card device and chip are encrypted using session key.Under normal circumstances, session key can only by with once, Accordingly even when session key is decoded by attacker, leakage is also only merely once to transmit data.Further, can not be from session key It is counter to inquire into obtain system master key.
Session key generating mode:State piece manufacture identification code, application sequence are designed with block chain encrypted radio-frequency chip Number or block chain encrypted radio-frequency chip serial number, wherein, had according to the sequence number of block chain encrypted radio-frequency chip and uniquely.Separately Outside, in transaction, system is usually noted the time of transaction, also has corresponding counter in some cards to control to read and write number of times. Counter increases automatically after card is performed certain instruction.When this guarantees merchandising every time, the value of counter and friendship Easy Time Inconsistency.Therefore using manufacturer identification code of the master key to card, generation sub-key is encrypted in the sequence number of card.Though Identical master key is so used, but is due to that sequence number is different, therefore the sub-key of each card generation is also what is differed.For Ensure for the session key on every card only using once, using sub-key exchange hour and Counter Value are encrypted Generate session key.So for the same card, the session key used of merchandising every time is all different.For a multipurpose Chip for, different applications usually use different master keys, therefore this make it that the workload of decoding system is very big, and The meaning of decoding is also little.
Master key can be proposed one piece of data and then one key of organic synthesis, Ran Houzai independently of one another by the people of multiple trusts Secure random number cryptographic calculation is added to obtain.Therefore all difficult prediction of the generation of master key and variation pattern.System master key is in dress If not will result in the leakage of key with caution during load, therefore the loading of master key must enter under the environment of safety OK.Due to needing that system master key artificially is loaded into radio frequency chip and card reader, thereby, it is ensured that loading process must be special Carried out in the equipment of mouth, what environment during download must be safe, information can not be lost in contact in radio-frequency card.Operated in card System ensures that master key can not can not just be read again after being loaded into.Key can not be carried out in card reader and loads cumbersome, it is past Toward security module is added to deposit key, to realize encryption and decipherment algorithm.
Encryption-decryption algorithm has used digital chaotic sequence, can be mixed to numeral on the premise of excessively operand is not increased Ignorant iterative process is improved, and the pseudo-random sequence more class produced by making whole system is noise-like, and reduces weak key Ratio, expands the space of available key, makes the selection of key and has bigger randomness.By digital chaotic system iteration is produced The raw pseudo- chaos sequence cycle is unpredictable, it is difficult to Accurate Analysis, and far smaller than 2N(N is to realize precision).Although improving Precision is realized, still will not to be greatly improved the average period of pseudo- chaos sequence, and still there can be sequence be attracted to The situation of some fixed value.In order to improve the cyclophysis of pseudo- chaos sequence, extend and control its sequence period, utilize m sequences Arrange the method disturbed to chaos iteration system.

Claims (1)

1. a kind of design Storage method of block chain encrypted radio-frequency chip, it is characterised in that comprise the following steps:
The first step, designs the data structure of block chain encrypted radio-frequency chip;
Data in second step, design block chain encrypted radio-frequency chip organize Storage Format in user memory;
3rd step, designs encryption, the decrypting process of block chain encrypted radio-frequency chip;
The data structure of the block chain encrypted radio-frequency chip includes user data, authentication data and account data;
The user data includes reading control data A, address name, subscriber phone, ID and user password;
Wherein, the control data A that reads is used to store the information that the user data is read, and the address name is used to store The name information of user, the subscriber phone is used for the phone information for storing user, and the ID storage internal user is numbered, The user password is used for the use password for storing user's setting;
The authentication data includes:Read control data B, user password hash value, certification key, accountee public key;
Wherein, the control data B that reads is used to store the information that the authentication data is read, and the authentication data is read The information taken carries out extraction mark, and obtains user's anti-fake mark plus local time stamp, prevents from distorting, finally the user The institute of length needed for the value of anti-fake mark and the value of the user password are transformed into actual safety certification by Hash AESs User password hash value is stated, is to the process that the information that the authentication data is read extract mark:
The information that the authentication data of random length is read first divides and generates the sub-information that equal length is 8 bytes Section, afterwards by Hash functions by the sub-information section conversion generate 8 byte lengths hash value, by plus it is described local when Between stamp obtain user's anti-fake mark, can the block chain encrypted radio-frequency chip loss in the case of, it is to avoid disabled user is sudden and violent Power cracks the user password, and the last certification key is used for the reading control data B and the user password hash value Between safety certification, the accountee public key is used to decrypt user's anti-fake mark, for each upper account of inquiry Remaining sum;
The account data includes:Read control data C, master key ciphertext, main private key ciphertext;
Wherein, the control data C that reads is used to store the information that the account data is read, and the master key ciphertext is used to close Join the user password and master key, lift the encryption parameter of the accountee public key, raising cracks difficulty, account is more pacified Entirely;The main private key ciphertext is used for encryption, the complexity of decrypting process for increasing the block chain encrypted radio-frequency chip, further Improve the security of the block chain encrypted radio-frequency chip;
Data in the block chain encrypted radio-frequency chip organize Storage Format to be tree-shaped file knot in the user memory Structure, the form with multi-level file structure, the tree-shaped file structure is divided into three kinds of levels:First level is master control File, is the root of the tree-shaped file structure, as the root of the tree-shaped file structure, is added for depositing the block chain The public information file of close radio frequency chip, and be all application program services;Second level is application file, described Under master control file, as the subdirectory of the tree-shaped file structure, multiple applications are set up respectively according to service condition File, the application file is used for a variety of application functions for realizing the block chain encrypted radio-frequency chip;3rd level is former Subfile, for storing real application data and corresponding system management messages, the user data, the authentication data and institute State account data just to deposit in the atom file, the corresponding atom text can be called when the application file needs Part;
The encryption of the block chain encrypted radio-frequency chip, decrypting process are:
(1) encrypt:The block chain encrypted radio-frequency chip generates a 32 byte master keys at random, while reading is described to use the registered permanent residence Order, and store to an array, user password described in the array is as row vector, the master key conduct Column vector, and encrypted with AES, obtain the master key ciphertext;The master key passes through user's anti-fake mark, leads to AES is crossed, the main private key of the block chain encrypted radio-frequency chip is generated;
Decryption:The master key ciphertext is read from the account data, while reading the user password, and is stored to another One array, wherein the user password is as row vector, the master key ciphertext passes through decipherment algorithm as column vector The master key ciphertext is reduced into the master key, then the main private key is read from the block chain encrypted radio-frequency chip Ciphertext, main private is reduced into by the checking of user's anti-fake mark, and with reference to the master key by the main private key ciphertext Key.
CN201710121975.3A 2017-03-03 2017-03-03 Storage design method of block chain encryption radio frequency chip Active CN107070660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710121975.3A CN107070660B (en) 2017-03-03 2017-03-03 Storage design method of block chain encryption radio frequency chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710121975.3A CN107070660B (en) 2017-03-03 2017-03-03 Storage design method of block chain encryption radio frequency chip

Publications (2)

Publication Number Publication Date
CN107070660A true CN107070660A (en) 2017-08-18
CN107070660B CN107070660B (en) 2020-03-17

Family

ID=59622799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710121975.3A Active CN107070660B (en) 2017-03-03 2017-03-03 Storage design method of block chain encryption radio frequency chip

Country Status (1)

Country Link
CN (1) CN107070660B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537556A (en) * 2018-03-13 2018-09-14 深圳信息职业技术学院 A kind of multidate information method for anti-counterfeit based on block chain and NFC chip
CN108833117A (en) * 2018-07-25 2018-11-16 海南新软软件有限公司 A kind of storage of private key and read method, device and hardware device
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109523277A (en) * 2018-11-20 2019-03-26 王建新 Product false proof electronic tag authentication method and system
CN109829333A (en) * 2019-01-14 2019-05-31 中国科学院信息工程研究所 A kind of key message guard method and system based on OpenID
WO2019102322A1 (en) * 2017-11-27 2019-05-31 International Business Machines Corporation Authenticating a payment card
CN109995537A (en) * 2019-05-22 2019-07-09 杭州云象网络技术有限公司 A method of it is encrypted based on Lorentz-logic mapping algorithm block chain
CN110417546A (en) * 2019-07-03 2019-11-05 山东大学 The method and apparatus that the end B based on multi-way encryption uses private key
CN111684412A (en) * 2018-01-29 2020-09-18 亚历山大·石 Secure blockchain integrated circuit
US20210034778A1 (en) * 2019-08-01 2021-02-04 EMC IP Holding Company LLC Anonymous ranking service
CN116911393A (en) * 2023-09-12 2023-10-20 苏州浪潮智能科技有限公司 Quantum chip design system, quantum chip design method, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042738A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Method for implementing smart card multi-application and data processing apparatus
CN101308546A (en) * 2008-05-20 2008-11-19 上海华申智能卡应用系统有限公司 Radio frequency label of safe storage structure having multi-stage protection and method thereof
US20150242825A1 (en) * 2014-02-24 2015-08-27 Peter Burton Mills Generation, storage, and validation of encrypted electronic currency
CN205003731U (en) * 2015-09-30 2016-01-27 深圳市招股科技有限公司 Digital cash hardware wallet based on two interfaces IC -card
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106131048A (en) * 2016-08-13 2016-11-16 深圳市樊溪电子有限公司 A kind of non-trusted remote transaction file security for block chain stores system
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042738A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Method for implementing smart card multi-application and data processing apparatus
CN101308546A (en) * 2008-05-20 2008-11-19 上海华申智能卡应用系统有限公司 Radio frequency label of safe storage structure having multi-stage protection and method thereof
US20150242825A1 (en) * 2014-02-24 2015-08-27 Peter Burton Mills Generation, storage, and validation of encrypted electronic currency
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN205003731U (en) * 2015-09-30 2016-01-27 深圳市招股科技有限公司 Digital cash hardware wallet based on two interfaces IC -card
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106131048A (en) * 2016-08-13 2016-11-16 深圳市樊溪电子有限公司 A kind of non-trusted remote transaction file security for block chain stores system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
中国银联股份有限公司: "中国银联IC卡技术规范-基础规范 第1部分:借记/贷记应用规范", 《中国银联股份有限公司企业标准》 *
产品快讯: "VeChain发布全球首款基于区块链技术的NFC防伪芯片", 《金卡工程》 *
袁晶莹等: ""链"起名牌包", 《二十一世纪商业评论》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2581935A (en) * 2017-11-27 2020-09-02 Ibm Authenticating a payment card
WO2019102322A1 (en) * 2017-11-27 2019-05-31 International Business Machines Corporation Authenticating a payment card
US10990982B2 (en) 2017-11-27 2021-04-27 International Business Machines Corporation Authenticating a payment card
GB2581935B (en) * 2017-11-27 2021-02-03 Ibm Authenticating a payment card
CN111684412A (en) * 2018-01-29 2020-09-18 亚历山大·石 Secure blockchain integrated circuit
CN108537556A (en) * 2018-03-13 2018-09-14 深圳信息职业技术学院 A kind of multidate information method for anti-counterfeit based on block chain and NFC chip
CN108833117A (en) * 2018-07-25 2018-11-16 海南新软软件有限公司 A kind of storage of private key and read method, device and hardware device
CN109190384B (en) * 2018-07-26 2022-02-22 百色学院 Multi-center block chain fusing protection system and method
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109523277A (en) * 2018-11-20 2019-03-26 王建新 Product false proof electronic tag authentication method and system
CN109523277B (en) * 2018-11-20 2021-05-25 王建新 Product anti-counterfeiting electronic tag authentication method and system
CN109829333A (en) * 2019-01-14 2019-05-31 中国科学院信息工程研究所 A kind of key message guard method and system based on OpenID
CN109995537A (en) * 2019-05-22 2019-07-09 杭州云象网络技术有限公司 A method of it is encrypted based on Lorentz-logic mapping algorithm block chain
CN110417546A (en) * 2019-07-03 2019-11-05 山东大学 The method and apparatus that the end B based on multi-way encryption uses private key
US20210034778A1 (en) * 2019-08-01 2021-02-04 EMC IP Holding Company LLC Anonymous ranking service
US11921881B2 (en) * 2019-08-01 2024-03-05 EMC IP Holding Company LLC Anonymous ranking service
CN116911393A (en) * 2023-09-12 2023-10-20 苏州浪潮智能科技有限公司 Quantum chip design system, quantum chip design method, electronic equipment and storage medium
CN116911393B (en) * 2023-09-12 2024-01-12 苏州浪潮智能科技有限公司 Quantum chip design system, quantum chip design method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN107070660B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
TWI750223B (en) Blockchain encrypted radio frequency chip storage design method
CN104363215B (en) A kind of encryption method and system based on attribute
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
CN102170357B (en) Combined secret key dynamic security management system
CN105306194B (en) For encrypted file and/or the multiple encryption method and system of communications protocol
CN103413109B (en) A kind of mutual authentication method of radio frequency identification system
CN100576792C (en) The method that file encryption is shared
CN103427987B (en) Method, data verification method and the electronic installation of data encryption
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN105024803B (en) Behavior fingerprint in white box realization
CN101149768B (en) Special processor software encryption and decryption method
CN101765996A (en) Remote Authentication And Transaction Signatures
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
CN106059760B (en) A kind of cryptographic system from user terminal crypto module calling system private key
TW201141172A (en) Methods, circuits, devices, and systems for provisioning of cryptographic data to one or more electronic devices
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
CN109934001A (en) A kind of data ciphering method based on normal cloud model
CN109743162A (en) A kind of operated using ideal lattice carries out the matched encryption method of identity attribute
CN105790929A (en) High-efficient access control method based on rule redundancy elimination in encryption environment
CN106462689B (en) Security system, managing device, approval apparatus, terminal installation, safety method and recording medium
CN114430321B (en) DFA self-adaptive security-based black box traceable key attribute encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Lu Yang

Inventor before: Qian Dejun

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20170921

Address after: 200040, 4 floor, building 546, 4 Yuyuan Road, Jingan District, Shanghai

Applicant after: Shanghai chain Mdt InfoTech Ltd

Address before: 200131 Shanghai Fengxian District Shanghai free trade experimentation area, plus Road 39, 1, four, 39 parts

Applicant before: Qian Dejun

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant