CN107743062A - Mobile phone safe encryption chip - Google Patents

Mobile phone safe encryption chip Download PDF

Info

Publication number
CN107743062A
CN107743062A CN201710756635.8A CN201710756635A CN107743062A CN 107743062 A CN107743062 A CN 107743062A CN 201710756635 A CN201710756635 A CN 201710756635A CN 107743062 A CN107743062 A CN 107743062A
Authority
CN
China
Prior art keywords
module
modules
mobile phone
key
phone safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710756635.8A
Other languages
Chinese (zh)
Inventor
郭鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Hui Banko Information Technology Co Ltd
Original Assignee
Suzhou Hui Banko Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Hui Banko Information Technology Co Ltd filed Critical Suzhou Hui Banko Information Technology Co Ltd
Priority to CN201710756635.8A priority Critical patent/CN107743062A/en
Publication of CN107743062A publication Critical patent/CN107743062A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication interface module, in addition to:Hardware Encryption Decryption module;The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2 algoritic modules, SM3 algoritic modules and SSF33 algoritic modules.

Description

Mobile phone safe encryption chip
Technical field
The present invention relates to mobile phone safe technical field, more particularly to mobile phone safe encryption chip.
Background technology
Intelligent terminal, refer to as PC that there is independent operating system, independent running space, Ke Yiyou User voluntarily installs the program of the third party service providers such as software, game, navigation offer, and can be by mobile communication network come real The general name of existing wireless network access type of cell phone.
Intelligent terminal has outstanding operating system, can freely install all kinds of softwares and the operation of the full touch screen type of complete large-size screen monitors Feel this three big characteristic.Although also there are some safe encryption functions in current intelligent terminal.
But the safe encryption function of current intelligent terminal is weaker, user often carries out illegal brush machine operation.
The content of the invention
Based on this, it is necessary to for above-mentioned technical problem, there is provided a kind of mobile phone safe encryption chip, enhance intelligent terminal Safe encryption function so that user can not carry out illegal brush machine operation.
A kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication Interface module, in addition to:Hardware Encryption Decryption module;The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2 Algoritic module, SM3 algoritic modules and SSF33 algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has built-in DES modules.
In one of the embodiments, the hardware Encryption Decryption module also has built-in RSA modules.
In one of the embodiments, the hardware Encryption Decryption module also has SHA1 algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has MAC algoritic modules.
In one of the embodiments, the hardware Encryption Decryption module also has RNG randomizer modules.
Above-mentioned mobile phone safe encryption chip, enhance the safe encryption function of intelligent terminal so that user can not be carried out illegally Brush machine operates.
Brief description of the drawings
Fig. 1 is a kind of figure for mobile phone safe encryption chip that the embodiment of the present application provides.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Refering to Fig. 1, a kind of mobile phone safe encryption chip, including:Kernel module 100, memory module 200, clock power Module 300, data communication interface module 400, hardware Encryption Decryption module 500.
For kernel module, a possible example relevant parameter is as follows:
Highest dominant frequency supports 48MHz
Use ARM Cortex-M0 kernels, 3 level production lines
Thumb instruction set, 0.9DMIPS/MHz
Built-in NVIC, it could support up 24 interrupt sources
Built in hardware multiplier
Hardware debugging interface
Built-in MPU
Support JTAG on-line debuggings.
For memory module, a possible example relevant parameter is as follows:
256KB Flash, 32 bit data widths, program can share with data, 2K byte page sizes,>100000 erasable longevity Life,>The data retention over time of 100 years
16KB SRAM, 32 bit data widths
24KB ROM, Bootloader support tri- kinds of interfaces of I2C/SPI/7816 to download
For clock power module, a possible example relevant parameter is as follows:
Support two kinds of powering modes of 5V and 3.3V
Built-in PLL modules
Built-in crystal 40MHz, while supporting pieces external clock 12MHz
Built-in POR modules
Support low-power consumption mode, park mode, limit park mode
For data communication interface module, a possible example relevant parameter is as follows:
The master and slave interface of ISO7816-3 smart cards.T=0 and T=1 transmission modes are supported, transmission direction configuration is supported, supports Number of retransmissions configuration (3 control bits, unlimited number, 0-7 re-transmission), supporting extra ETU to configure, (0/1/2/4 ETU exists Transmission mode), BGT/WT configurations are supported, support H/W CRC/LRC to calculate, support to vote (voting) to same bit data Algorithm is sampled three times, supports ATR (answer to reset) to interrupt
Standard UART interfaces
ISO14443 interfaces
SPI Master/Slave interfaces
GPIO interface
The hardware Encryption Decryption module, which has, supports the SM1 algoritic modules (close SM1 (SM1cryptographic of state Algorithm), the close SM1 algorithms of state are to be grouped Standard Symmetric Multivariate algorithm by a kind of commercial cipher of national Password Management office establishment.)、 SM2 algoritic modules (SM2 is the ellipse curve public key cipher algorithm that national Password Management office issued on December 17th, 2010), (the commercial algorithm of Password Management office of family establishment, recognizes SM3 algoritic modules for the digital signature in cipher application and checking, message The generation and checking and the generation of random number of code are demonstrate,proved, the demand for security of a variety of cipher applications can be met.) and SSF33 algorithm moulds Block.
SM1 modules support general and special parameters, and key length 128/256bit is optional, system key length 128bit, In plain text and ciphertext length is 128bit.SSF33 modules support key length 128bit, system key length 128bit, in plain text It is 128bit with ciphertext length.
In other one embodiment, the hardware Encryption Decryption module also has built-in DES modules, and (DES full name are Data Encryption Standard, i.e. data encryption standards, it is a kind of block algorithm encrypted using key, 1977 beautiful Federal State Standard Bureau of state is defined as federal data processing standard (FIPS), and mandate makes in non-level of confidentiality government communication With widespread comes the subsequent algorithm in the world.), for realizing DES and 3DES encryption algorithm.Support DES algorithms 64 (56) position key, (112) position of 3DES algorithms 128 and 192 (168) position keys are supported.Support ECB and CBC mode of operations.
In other one embodiment, the hardware Encryption Decryption module also has built-in RSA modules, and (RSA public keys add Close algorithm is 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs (Adi Shamir) He Lunna De Ademan (Leonard Adleman) is proposed together.).Built-in RSA modules support CRT (Chinese remainder theorem), can be with Modular multiplication and the Montgomery Algorithm of any 32~2048 is realized, support elliptic curve can also be realized using the crypto engine (ECC)。
In other one embodiment, the hardware Encryption Decryption module also has SHA1 algoritic modules.
Secure Hash Algorithm (Secure Hash Algorithm) is primarily adapted for use in DSS (Digital Signature Standard DSS) Digital Signature Algorithm (the Digital Signature Algorithm that define of the inside DSA)。
In other one embodiment, the hardware Encryption Decryption module also has MAC algoritic modules.MAC algorithms The Hash functions of (Message Authentication Codes) with privacy key:The hashed value of message is by there was only communicating pair The privacy key K that knows is controlled.Now hash value is referred to as MAC.
In other one embodiment, the hardware Encryption Decryption module also has RNG randomizer modules.
The software instruction of mobile phone safe encryption chip is as follows:
Catalogue file is wiped:General erasing catalogue file command is used in the case where meeting catalogue erased conditions, erasing All Files (not including catalogue in itself) under current DF.
Increase key:For increasing in key file or changing key
Change key:Ibid
Authenticating operation:The order is used to do certification to hair fastener host computer or user.
Random number produces:The order is used to generate random number.The instruction is not locked by card PKI applications to be influenceed.Can Produce 4,8,16 random numbers.
By file name select file:Select file order is used to select PKI cards to apply.The instruction should not by card PKI With locked influence, but the on-line Application sequence-number field in response data is 00.
By file identification select file:Ibid
Key is read to state:The order is used to read card data.Key can be read to state, on-line Application sequence Number, private key PIN checkings enable mark etc..
Read key version:With [reading key to status function].
Read PIN and enable mark:With [reading key to status function].
Read certificate:With [reading key to status function].
Read on-line Application sequence number:With [reading key to status function].
Write card issuer's public key:The order is used to write data, it is necessary to the verification for passing through different rights when writing different pieces of information.
Write authenticating party public key:With [writing card issuer's public key function].
Write on-line Application serial number encryption pattern:With [writing card issuer's public key function].
Write on-line Application sequence number:With [writing card issuer's public key function].
RSA digital signature:The order is used for RSA digital signing operations, if the key will to corresponding authenticated configuration item PIN certifications are asked, then when performing this instruction, user authentication status must set.
RSA signature is verified:The order operates for RSA public keys sign test.
RSA data encryptions:The order is used for data encryption operation.Use 1152bit keys
RSA data decipherings:The order is used for RSA private keys and DES key decryption operations, if the key is to corresponding certification Configuration item requires PIN certifications, then when performing this instruction, user authentication status palpus set, otherwise performs refusal.
Generate unsymmetrical key pair:The order is used for card generation RSA key pair.
, it is necessary to first card taking piece random number before call instruction.
Need to change key status fields corresponding positions after generation key;I.e. if key generates to 1, then key is changed to state The middle primary value of correspondence is 1, i.e. key is 0x01 to state byte.
The flag of mark modification corresponding secret key pair is enabled according to incoming private key PIN checkings;I.e. if key generates to 1, It is incoming mark, i.e. 0x01 then to change private key PIN checkings and enable the corresponding primary value of mark.
Change password:This order is called to change user's operator password.After verifying the old password of user, new mouth may be updated as Order.User's operator password length is 1-20 bytes, and ASCII is encoded, it is allowed to is worth the numeral for 0~9, default password is “123456”。
Using unblock:When card application is locked, this instruction is called to be unlocked, it is silent to reset user's operator password Recognize password " 123456 ", and " user's operator password number of attempt counter " is reset into initial value 3.The instruction should not by card With locked influence.
Symmetric pattern writes certificate:Call this order that certificate can be write to the memory space that card is specified.
Asymmetric mode writes certificate function:With [symmetric pattern writes certificate function].
Symmetric key writes:This order is called to write direct card key.Only support No. 1 card key and application master Control symmetric key write-in.Designated command message data domain included card issuer's purview certification, without carrying out authority before instruction Authentication operation.
When only using master control key being symmetric key, i.e. symmetric pattern, it is allowed to pass through this instruction and update master control key.Renewal During using master control symmetric key, while write using master control symmetric key, using 2 data elements such as master control symmetric key version.
Unsymmetrical key writes:With [symmetric key write-in functions].
Each technical characteristic of embodiment described above can be combined arbitrarily, to make description succinct, not to above-mentioned reality Apply all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, the scope that this specification is recorded all is considered to be.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously Can not therefore it be construed as limiting the scope of the patent.It should be pointed out that come for one of ordinary skill in the art Say, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (6)

1. a kind of mobile phone safe encryption chip, including:Kernel module, memory module, clock power module and data communication connect Mouth mold block, it is characterised in that also include:Hardware Encryption Decryption module;
The hardware Encryption Decryption module, which has, supports SM1 algoritic modules, SM2 algoritic modules, SM3 algoritic modules and SSF33 to calculate Method module.
2. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has There are built-in DES modules.
3. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has There are built-in RSA modules.
4. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has There are SHA1 algoritic modules.
5. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has There are MAC algoritic modules.
6. mobile phone safe encryption chip according to claim 1, it is characterised in that the hardware Encryption Decryption module also has There are RNG randomizer modules.
CN201710756635.8A 2017-08-29 2017-08-29 Mobile phone safe encryption chip Pending CN107743062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710756635.8A CN107743062A (en) 2017-08-29 2017-08-29 Mobile phone safe encryption chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710756635.8A CN107743062A (en) 2017-08-29 2017-08-29 Mobile phone safe encryption chip

Publications (1)

Publication Number Publication Date
CN107743062A true CN107743062A (en) 2018-02-27

Family

ID=61235763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710756635.8A Pending CN107743062A (en) 2017-08-29 2017-08-29 Mobile phone safe encryption chip

Country Status (1)

Country Link
CN (1) CN107743062A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272317A (en) * 2023-09-25 2023-12-22 中汽智联技术有限公司 System safety starting method, electronic equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159780A (en) * 2007-11-01 2008-04-09 中兴通讯股份有限公司 Inter-network routing system and method of telecommunication integrated service access gateway
CN101583219A (en) * 2009-03-16 2009-11-18 东莞勤上光电股份有限公司 Led street lamp controller
CN101646075A (en) * 2008-08-06 2010-02-10 中兴通讯股份有限公司 Device and method for adjusting code rate of multimedia code stream
CN102088348A (en) * 2010-12-22 2011-06-08 东南大学 Mobile phone security chip for embedded platform and protection system comprising same
CN102867136A (en) * 2012-08-23 2013-01-09 杭州晟元芯片技术有限公司 Second-generation identity card authentication system with fingerprint characteristics
CN103595532A (en) * 2013-10-21 2014-02-19 上海动联信息技术股份有限公司 Multi-functional composite password key based on USBKEY and OTP technology
CN104504563A (en) * 2014-12-30 2015-04-08 山东中孚信息产业股份有限公司 Mobile information safety equipment and working method thereof
CN105741680A (en) * 2016-05-09 2016-07-06 成都优芯微电子技术有限公司 Multimedia advertisement machine with function of starting up and shutting off at regular time
CN105761618A (en) * 2016-05-09 2016-07-13 成都优芯微电子技术有限公司 Multimedia advertising machine convenient for data update
CN105809882A (en) * 2016-04-07 2016-07-27 大连大学 Data collecting and alarming device of wireless anti-collision pier monitoring and alarming system
CN106203134A (en) * 2016-06-30 2016-12-07 珠海智融科技有限公司 Anti-brush machine system and method based on hardware encryption
CN106301774A (en) * 2015-05-29 2017-01-04 联芯科技有限公司 Safety chip, its encryption key generate method and encryption method
CN106533653A (en) * 2016-08-22 2017-03-22 深圳市华曦达科技股份有限公司 Encrypted chip, encryption method and encryption system
CN106973056A (en) * 2017-03-30 2017-07-21 中国电力科学研究院 The safety chip and its encryption method of a kind of object-oriented

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159780A (en) * 2007-11-01 2008-04-09 中兴通讯股份有限公司 Inter-network routing system and method of telecommunication integrated service access gateway
CN101646075A (en) * 2008-08-06 2010-02-10 中兴通讯股份有限公司 Device and method for adjusting code rate of multimedia code stream
CN101583219A (en) * 2009-03-16 2009-11-18 东莞勤上光电股份有限公司 Led street lamp controller
CN102088348A (en) * 2010-12-22 2011-06-08 东南大学 Mobile phone security chip for embedded platform and protection system comprising same
CN102867136A (en) * 2012-08-23 2013-01-09 杭州晟元芯片技术有限公司 Second-generation identity card authentication system with fingerprint characteristics
CN103595532A (en) * 2013-10-21 2014-02-19 上海动联信息技术股份有限公司 Multi-functional composite password key based on USBKEY and OTP technology
CN104504563A (en) * 2014-12-30 2015-04-08 山东中孚信息产业股份有限公司 Mobile information safety equipment and working method thereof
CN106301774A (en) * 2015-05-29 2017-01-04 联芯科技有限公司 Safety chip, its encryption key generate method and encryption method
CN105809882A (en) * 2016-04-07 2016-07-27 大连大学 Data collecting and alarming device of wireless anti-collision pier monitoring and alarming system
CN105741680A (en) * 2016-05-09 2016-07-06 成都优芯微电子技术有限公司 Multimedia advertisement machine with function of starting up and shutting off at regular time
CN105761618A (en) * 2016-05-09 2016-07-13 成都优芯微电子技术有限公司 Multimedia advertising machine convenient for data update
CN106203134A (en) * 2016-06-30 2016-12-07 珠海智融科技有限公司 Anti-brush machine system and method based on hardware encryption
CN106533653A (en) * 2016-08-22 2017-03-22 深圳市华曦达科技股份有限公司 Encrypted chip, encryption method and encryption system
CN106973056A (en) * 2017-03-30 2017-07-21 中国电力科学研究院 The safety chip and its encryption method of a kind of object-oriented

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272317A (en) * 2023-09-25 2023-12-22 中汽智联技术有限公司 System safety starting method, electronic equipment and storage medium
CN117272317B (en) * 2023-09-25 2024-02-23 中汽智联技术有限公司 System safety starting method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107077670B (en) Method and apparatus for transmitting and processing transaction message, computer readable storage medium
CN114218592A (en) Sensitive data encryption and decryption method and device, computer equipment and storage medium
US20060085848A1 (en) Method and apparatus for securing communications between a smartcard and a terminal
CN109361508B (en) Data transmission method, electronic device and computer readable storage medium
KR101349849B1 (en) Universal secure information storage device
CN102033764B (en) COS (Class of Service) firmware upgrading method of TF (T-Flash) card
CN106452771B (en) JCE calls the method and device of the built-in RSA key operation of cipher card realization
JP2017505048A (en) Electronic signature method, system and apparatus
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
CN111008094B (en) Data recovery method, device and system
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN112636916A (en) Data processing method, data processing device, storage medium and electronic equipment
CN200993803Y (en) Internet banking system safety terminal
Zhang et al. Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone
CN109299944B (en) Data encryption method, system and terminal in transaction process
EP2354994A1 (en) Secure signature creation application using a TPM comprising a middleware stack
CN110472429A (en) Data verification method, device, electronic equipment and storage medium
CN110100411B (en) Cryptographic system management
KR102519828B1 (en) Circuit chip and its operating method
CN101777980B (en) Method for protection of digital certificate extension information
CN107743062A (en) Mobile phone safe encryption chip
CN100574192C (en) A kind of information safety devices and communication means thereof based on usb protocol
CN106487796A (en) Identity card reads the safe ciphering unit in equipment and its application process
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
CN104899480A (en) Software copyright protection and management method based on combined public key identity authentication technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180227