CN107743062A - Mobile phone safe encryption chip - Google Patents
Mobile phone safe encryption chip Download PDFInfo
- Publication number
- CN107743062A CN107743062A CN201710756635.8A CN201710756635A CN107743062A CN 107743062 A CN107743062 A CN 107743062A CN 201710756635 A CN201710756635 A CN 201710756635A CN 107743062 A CN107743062 A CN 107743062A
- Authority
- CN
- China
- Prior art keywords
- module
- modules
- mobile phone
- key
- phone safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication interface module, in addition to:Hardware Encryption Decryption module;The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2 algoritic modules, SM3 algoritic modules and SSF33 algoritic modules.
Description
Technical field
The present invention relates to mobile phone safe technical field, more particularly to mobile phone safe encryption chip.
Background technology
Intelligent terminal, refer to as PC that there is independent operating system, independent running space, Ke Yiyou
User voluntarily installs the program of the third party service providers such as software, game, navigation offer, and can be by mobile communication network come real
The general name of existing wireless network access type of cell phone.
Intelligent terminal has outstanding operating system, can freely install all kinds of softwares and the operation of the full touch screen type of complete large-size screen monitors
Feel this three big characteristic.Although also there are some safe encryption functions in current intelligent terminal.
But the safe encryption function of current intelligent terminal is weaker, user often carries out illegal brush machine operation.
The content of the invention
Based on this, it is necessary to for above-mentioned technical problem, there is provided a kind of mobile phone safe encryption chip, enhance intelligent terminal
Safe encryption function so that user can not carry out illegal brush machine operation.
A kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication
Interface module, in addition to:Hardware Encryption Decryption module;The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2
Algoritic module, SM3 algoritic modules and SSF33 algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has built-in DES modules.
In one of the embodiments, the hardware Encryption Decryption module also has built-in RSA modules.
In one of the embodiments, the hardware Encryption Decryption module also has SHA1 algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has MAC algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has RNG randomizer modules.
Above-mentioned mobile phone safe encryption chip, enhance the safe encryption function of intelligent terminal so that user can not be carried out illegally
Brush machine operates.
Brief description of the drawings
Fig. 1 is a kind of figure for mobile phone safe encryption chip that the embodiment of the present application provides.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Refering to Fig. 1, a kind of mobile phone safe encryption chip, including:Kernel module 100, memory module 200, clock power
Module 300, data communication interface module 400, hardware Encryption Decryption module 500.
For kernel module, a possible example relevant parameter is as follows:
Highest dominant frequency supports 48MHz
Use ARM Cortex-M0 kernels, 3 level production lines
Thumb instruction set, 0.9DMIPS/MHz
Built-in NVIC, it could support up 24 interrupt sources
Built in hardware multiplier
Hardware debugging interface
Built-in MPU
Support JTAG on-line debuggings.
For memory module, a possible example relevant parameter is as follows:
256KB Flash, 32 bit data widths, program can share with data, 2K byte page sizes,>100000 erasable longevity
Life,>The data retention over time of 100 years
16KB SRAM, 32 bit data widths
24KB ROM, Bootloader support tri- kinds of interfaces of I2C/SPI/7816 to download
For clock power module, a possible example relevant parameter is as follows:
Support two kinds of powering modes of 5V and 3.3V
Built-in PLL modules
Built-in crystal 40MHz, while supporting pieces external clock 12MHz
Built-in POR modules
Support low-power consumption mode, park mode, limit park mode
For data communication interface module, a possible example relevant parameter is as follows:
The master and slave interface of ISO7816-3 smart cards.T=0 and T=1 transmission modes are supported, transmission direction configuration is supported, supports
Number of retransmissions configuration (3 control bits, unlimited number, 0-7 re-transmission), supporting extra ETU to configure, (0/1/2/4 ETU exists
Transmission mode), BGT/WT configurations are supported, support H/W CRC/LRC to calculate, support to vote (voting) to same bit data
Algorithm is sampled three times, supports ATR (answer to reset) to interrupt
Standard UART interfaces
ISO14443 interfaces
SPI Master/Slave interfaces
GPIO interface
The hardware Encryption Decryption module, which has, supports the SM1 algoritic modules (close SM1 (SM1cryptographic of state
Algorithm), the close SM1 algorithms of state are to be grouped Standard Symmetric Multivariate algorithm by a kind of commercial cipher of national Password Management office establishment.)、
SM2 algoritic modules (SM2 is the ellipse curve public key cipher algorithm that national Password Management office issued on December 17th, 2010),
(the commercial algorithm of Password Management office of family establishment, recognizes SM3 algoritic modules for the digital signature in cipher application and checking, message
The generation and checking and the generation of random number of code are demonstrate,proved, the demand for security of a variety of cipher applications can be met.) and SSF33 algorithm moulds
Block.
SM1 modules support general and special parameters, and key length 128/256bit is optional, system key length 128bit,
In plain text and ciphertext length is 128bit.SSF33 modules support key length 128bit, system key length 128bit, in plain text
It is 128bit with ciphertext length.
In other one embodiment, the hardware Encryption Decryption module also has built-in DES modules, and (DES full name are
Data Encryption Standard, i.e. data encryption standards, it is a kind of block algorithm encrypted using key, 1977 beautiful
Federal State Standard Bureau of state is defined as federal data processing standard (FIPS), and mandate makes in non-level of confidentiality government communication
With widespread comes the subsequent algorithm in the world.), for realizing DES and 3DES encryption algorithm.Support DES algorithms 64
(56) position key, (112) position of 3DES algorithms 128 and 192 (168) position keys are supported.Support ECB and CBC mode of operations.
In other one embodiment, the hardware Encryption Decryption module also has built-in RSA modules, and (RSA public keys add
Close algorithm is 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs (Adi Shamir) He Lunna
De Ademan (Leonard Adleman) is proposed together.).Built-in RSA modules support CRT (Chinese remainder theorem), can be with
Modular multiplication and the Montgomery Algorithm of any 32~2048 is realized, support elliptic curve can also be realized using the crypto engine
(ECC)。
In other one embodiment, the hardware Encryption Decryption module also has SHA1 algoritic modules.
Secure Hash Algorithm (Secure Hash Algorithm) is primarily adapted for use in DSS (Digital
Signature Standard DSS) Digital Signature Algorithm (the Digital Signature Algorithm that define of the inside
DSA)。
In other one embodiment, the hardware Encryption Decryption module also has MAC algoritic modules.MAC algorithms
The Hash functions of (Message Authentication Codes) with privacy key:The hashed value of message is by there was only communicating pair
The privacy key K that knows is controlled.Now hash value is referred to as MAC.
In other one embodiment, the hardware Encryption Decryption module also has RNG randomizer modules.
The software instruction of mobile phone safe encryption chip is as follows:
Catalogue file is wiped:General erasing catalogue file command is used in the case where meeting catalogue erased conditions, erasing
All Files (not including catalogue in itself) under current DF.
Increase key:For increasing in key file or changing key
Change key:Ibid
Authenticating operation:The order is used to do certification to hair fastener host computer or user.
Random number produces:The order is used to generate random number.The instruction is not locked by card PKI applications to be influenceed.Can
Produce 4,8,16 random numbers.
By file name select file:Select file order is used to select PKI cards to apply.The instruction should not by card PKI
With locked influence, but the on-line Application sequence-number field in response data is 00.
By file identification select file:Ibid
Key is read to state:The order is used to read card data.Key can be read to state, on-line Application sequence
Number, private key PIN checkings enable mark etc..
Read key version:With [reading key to status function].
Read PIN and enable mark:With [reading key to status function].
Read certificate:With [reading key to status function].
Read on-line Application sequence number:With [reading key to status function].
Write card issuer's public key:The order is used to write data, it is necessary to the verification for passing through different rights when writing different pieces of information.
Write authenticating party public key:With [writing card issuer's public key function].
Write on-line Application serial number encryption pattern:With [writing card issuer's public key function].
Write on-line Application sequence number:With [writing card issuer's public key function].
RSA digital signature:The order is used for RSA digital signing operations, if the key will to corresponding authenticated configuration item
PIN certifications are asked, then when performing this instruction, user authentication status must set.
RSA signature is verified:The order operates for RSA public keys sign test.
RSA data encryptions:The order is used for data encryption operation.Use 1152bit keys
RSA data decipherings:The order is used for RSA private keys and DES key decryption operations, if the key is to corresponding certification
Configuration item requires PIN certifications, then when performing this instruction, user authentication status palpus set, otherwise performs refusal.
Generate unsymmetrical key pair:The order is used for card generation RSA key pair.
, it is necessary to first card taking piece random number before call instruction.
Need to change key status fields corresponding positions after generation key;I.e. if key generates to 1, then key is changed to state
The middle primary value of correspondence is 1, i.e. key is 0x01 to state byte.
The flag of mark modification corresponding secret key pair is enabled according to incoming private key PIN checkings;I.e. if key generates to 1,
It is incoming mark, i.e. 0x01 then to change private key PIN checkings and enable the corresponding primary value of mark.
Change password:This order is called to change user's operator password.After verifying the old password of user, new mouth may be updated as
Order.User's operator password length is 1-20 bytes, and ASCII is encoded, it is allowed to is worth the numeral for 0~9, default password is
“123456”。
Using unblock:When card application is locked, this instruction is called to be unlocked, it is silent to reset user's operator password
Recognize password " 123456 ", and " user's operator password number of attempt counter " is reset into initial value 3.The instruction should not by card
With locked influence.
Symmetric pattern writes certificate:Call this order that certificate can be write to the memory space that card is specified.
Asymmetric mode writes certificate function:With [symmetric pattern writes certificate function].
Symmetric key writes:This order is called to write direct card key.Only support No. 1 card key and application master
Control symmetric key write-in.Designated command message data domain included card issuer's purview certification, without carrying out authority before instruction
Authentication operation.
When only using master control key being symmetric key, i.e. symmetric pattern, it is allowed to pass through this instruction and update master control key.Renewal
During using master control symmetric key, while write using master control symmetric key, using 2 data elements such as master control symmetric key version.
Unsymmetrical key writes:With [symmetric key write-in functions].
Each technical characteristic of embodiment described above can be combined arbitrarily, to make description succinct, not to above-mentioned reality
Apply all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, the scope that this specification is recorded all is considered to be.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously
Can not therefore it be construed as limiting the scope of the patent.It should be pointed out that come for one of ordinary skill in the art
Say, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (6)
1. a kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication connect
Mouth mold block, it is characterised in that also include:Hardware Encryption Decryption module;
The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2 algoritic modules, SM3 algoritic modules and SSF33 to calculate
Method module.
2. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has
There are built-in DES modules.
3. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has
There are built-in RSA modules.
4. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has
There are SHA1 algoritic modules.
5. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has
There are MAC algoritic modules.
6. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has
There are RNG randomizer modules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710756635.8A CN107743062A (en) | 2017-08-29 | 2017-08-29 | Mobile phone safe encryption chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710756635.8A CN107743062A (en) | 2017-08-29 | 2017-08-29 | Mobile phone safe encryption chip |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107743062A true CN107743062A (en) | 2018-02-27 |
Family
ID=61235763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710756635.8A Pending CN107743062A (en) | 2017-08-29 | 2017-08-29 | Mobile phone safe encryption chip |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107743062A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117272317A (en) * | 2023-09-25 | 2023-12-22 | 中汽智联技术有限公司 | System safety starting method, electronic equipment and storage medium |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159780A (en) * | 2007-11-01 | 2008-04-09 | 中兴通讯股份有限公司 | Inter-network routing system and method of telecommunication integrated service access gateway |
CN101583219A (en) * | 2009-03-16 | 2009-11-18 | 东莞勤上光电股份有限公司 | Led street lamp controller |
CN101646075A (en) * | 2008-08-06 | 2010-02-10 | 中兴通讯股份有限公司 | Device and method for adjusting code rate of multimedia code stream |
CN102088348A (en) * | 2010-12-22 | 2011-06-08 | 东南大学 | Mobile phone security chip for embedded platform and protection system comprising same |
CN102867136A (en) * | 2012-08-23 | 2013-01-09 | 杭州晟元芯片技术有限公司 | Second-generation identity card authentication system with fingerprint characteristics |
CN103595532A (en) * | 2013-10-21 | 2014-02-19 | 上海动联信息技术股份有限公司 | Multi-functional composite password key based on USBKEY and OTP technology |
CN104504563A (en) * | 2014-12-30 | 2015-04-08 | 山东中孚信息产业股份有限公司 | Mobile information safety equipment and working method thereof |
CN105741680A (en) * | 2016-05-09 | 2016-07-06 | 成都优芯微电子技术有限公司 | Multimedia advertisement machine with function of starting up and shutting off at regular time |
CN105761618A (en) * | 2016-05-09 | 2016-07-13 | 成都优芯微电子技术有限公司 | Multimedia advertising machine convenient for data update |
CN105809882A (en) * | 2016-04-07 | 2016-07-27 | 大连大学 | Data collecting and alarming device of wireless anti-collision pier monitoring and alarming system |
CN106203134A (en) * | 2016-06-30 | 2016-12-07 | 珠海智融科技有限公司 | Anti-brush machine system and method based on hardware encryption |
CN106301774A (en) * | 2015-05-29 | 2017-01-04 | 联芯科技有限公司 | Safety chip, its encryption key generate method and encryption method |
CN106533653A (en) * | 2016-08-22 | 2017-03-22 | 深圳市华曦达科技股份有限公司 | Encrypted chip, encryption method and encryption system |
CN106973056A (en) * | 2017-03-30 | 2017-07-21 | 中国电力科学研究院 | The safety chip and its encryption method of a kind of object-oriented |
-
2017
- 2017-08-29 CN CN201710756635.8A patent/CN107743062A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159780A (en) * | 2007-11-01 | 2008-04-09 | 中兴通讯股份有限公司 | Inter-network routing system and method of telecommunication integrated service access gateway |
CN101646075A (en) * | 2008-08-06 | 2010-02-10 | 中兴通讯股份有限公司 | Device and method for adjusting code rate of multimedia code stream |
CN101583219A (en) * | 2009-03-16 | 2009-11-18 | 东莞勤上光电股份有限公司 | Led street lamp controller |
CN102088348A (en) * | 2010-12-22 | 2011-06-08 | 东南大学 | Mobile phone security chip for embedded platform and protection system comprising same |
CN102867136A (en) * | 2012-08-23 | 2013-01-09 | 杭州晟元芯片技术有限公司 | Second-generation identity card authentication system with fingerprint characteristics |
CN103595532A (en) * | 2013-10-21 | 2014-02-19 | 上海动联信息技术股份有限公司 | Multi-functional composite password key based on USBKEY and OTP technology |
CN104504563A (en) * | 2014-12-30 | 2015-04-08 | 山东中孚信息产业股份有限公司 | Mobile information safety equipment and working method thereof |
CN106301774A (en) * | 2015-05-29 | 2017-01-04 | 联芯科技有限公司 | Safety chip, its encryption key generate method and encryption method |
CN105809882A (en) * | 2016-04-07 | 2016-07-27 | 大连大学 | Data collecting and alarming device of wireless anti-collision pier monitoring and alarming system |
CN105741680A (en) * | 2016-05-09 | 2016-07-06 | 成都优芯微电子技术有限公司 | Multimedia advertisement machine with function of starting up and shutting off at regular time |
CN105761618A (en) * | 2016-05-09 | 2016-07-13 | 成都优芯微电子技术有限公司 | Multimedia advertising machine convenient for data update |
CN106203134A (en) * | 2016-06-30 | 2016-12-07 | 珠海智融科技有限公司 | Anti-brush machine system and method based on hardware encryption |
CN106533653A (en) * | 2016-08-22 | 2017-03-22 | 深圳市华曦达科技股份有限公司 | Encrypted chip, encryption method and encryption system |
CN106973056A (en) * | 2017-03-30 | 2017-07-21 | 中国电力科学研究院 | The safety chip and its encryption method of a kind of object-oriented |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117272317A (en) * | 2023-09-25 | 2023-12-22 | 中汽智联技术有限公司 | System safety starting method, electronic equipment and storage medium |
CN117272317B (en) * | 2023-09-25 | 2024-02-23 | 中汽智联技术有限公司 | System safety starting method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107077670B (en) | Method and apparatus for transmitting and processing transaction message, computer readable storage medium | |
CN114218592A (en) | Sensitive data encryption and decryption method and device, computer equipment and storage medium | |
US20060085848A1 (en) | Method and apparatus for securing communications between a smartcard and a terminal | |
CN109361508B (en) | Data transmission method, electronic device and computer readable storage medium | |
KR101349849B1 (en) | Universal secure information storage device | |
CN102033764B (en) | COS (Class of Service) firmware upgrading method of TF (T-Flash) card | |
CN106452771B (en) | JCE calls the method and device of the built-in RSA key operation of cipher card realization | |
JP2017505048A (en) | Electronic signature method, system and apparatus | |
CN101159754A (en) | Internet application management system operating on intelligent mobile terminal | |
CN111008094B (en) | Data recovery method, device and system | |
CN109815747A (en) | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain | |
CN112636916A (en) | Data processing method, data processing device, storage medium and electronic equipment | |
CN200993803Y (en) | Internet banking system safety terminal | |
Zhang et al. | Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone | |
CN109299944B (en) | Data encryption method, system and terminal in transaction process | |
EP2354994A1 (en) | Secure signature creation application using a TPM comprising a middleware stack | |
CN110472429A (en) | Data verification method, device, electronic equipment and storage medium | |
CN110100411B (en) | Cryptographic system management | |
KR102519828B1 (en) | Circuit chip and its operating method | |
CN101777980B (en) | Method for protection of digital certificate extension information | |
CN107743062A (en) | Mobile phone safe encryption chip | |
CN100574192C (en) | A kind of information safety devices and communication means thereof based on usb protocol | |
CN106487796A (en) | Identity card reads the safe ciphering unit in equipment and its application process | |
CN111949996A (en) | Generation method, encryption method, system, device and medium of security private key | |
CN104899480A (en) | Software copyright protection and management method based on combined public key identity authentication technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180227 |