CN110233723A - A kind of secondary key management method and safety chip - Google Patents
A kind of secondary key management method and safety chip Download PDFInfo
- Publication number
- CN110233723A CN110233723A CN201910350078.9A CN201910350078A CN110233723A CN 110233723 A CN110233723 A CN 110233723A CN 201910350078 A CN201910350078 A CN 201910350078A CN 110233723 A CN110233723 A CN 110233723A
- Authority
- CN
- China
- Prior art keywords
- key
- level
- management
- memory block
- storage area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of secondary key management methods of data security arts, including step S10, one level-one memory block of creation and a secondary storage area;The level-one memory block is for storing the first data and first key, and the secondary storage area is for storing the second data and the second key;Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the permission of the level-one entrance management key and secondary inlet management key is arranged;Step S30, level-one memory block and secondary storage area are managed according to the permission.The present invention has the advantages that realizing the differentiated control to key, and then the flexibility of safety and the business development of lifting means.
Description
Technical field
The present invention relates to data security arts, a kind of secondary key management method and safety chip are referred in particular to.
Background technique
Key (Ukey/ token) is the core of entire encryption system, is the electron key for authentication, and key can be with
Be stored in brain, magnetic stripe card, smart card, in device memory, the safety of encryption is actually that key is depended on to realize.With
The development of science and technology, key are widely used among all trades and professions.
But traditional Ukey is generally provided by some general mechanism, only supports simple data encryption, decryption, signature
And the function of sign test, and traditional Ukey is an independent equipment, and Ukey is just inserted into mesh when needing to carry out authentication
In marking device, between Ukey and target device and the binding relationship of not formed fixation.It is traditional with the diversification of application scenarios
Ukey can not be competent under special scenes, such as can not carry out differentiated control to the equipment for using Ukey, and difference is respectively set
Permission, preferably to commence business.
Therefore, how a kind of safety chip and key management method for supporting differentiated control is provided, special scenes are met
Under demand for security, become a urgent problem to be solved.
Summary of the invention
One of the technical problem to be solved in the present invention is to provide a kind of secondary key management method, realize to key
Differentiated control, and then the flexibility of safety and the business development of lifting means.
The present invention is realized in one of technical problem: a kind of secondary key management method, the method includes as follows
Step:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block is for storing the first number
Accordingly and first key, the secondary storage area are used to store the second data and the second key;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one is arranged and enters
The permission of mouth management key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
Further, the step S20 is specifically included:
Step S21, the level-one entrance management key of a level-one memory block and the secondary inlet of a secondary storage area are created
Manage key;
Step S22, the permission that the level-one entrance management key is arranged is the access right for managing level-one memory block, the first number
According to, first key and the right to use of secondary inlet management key;The permission that the secondary inlet management key is arranged is management
The right to use of the access right of secondary storage area, the second data and the second key.
Further, the step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created,
And one first number and one second number are set;When being reset to level-one entrance management key, if identity
Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and
Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails
Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.
Further, the step S30 specifically:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data,
The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data,
The right to use of second key is managed.
The second technical problem to be solved by the present invention is to provide a kind of secondary key management method, realize to key
Differentiated control, and then the flexibility of safety and the business development of lifting means.
The present invention is realized in the twos' of technical problem: a kind of secondary key management safety chip, the safety chip
Including following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;It uses the level-one memory block
In storing the first data and first key, the secondary storage area is for storing the second data and the second key;
Entrance management key creation module, for creating, a level-one inlet tube manages key and secondary inlet management is close
Key, and the permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
Further, the entrance management key creation module specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a second level
The secondary inlet of memory block manages key;
Priority assignation unit, the permission for the level-one entrance management key to be arranged are to manage the access of level-one memory block
The right to use of power, the first data, first key and secondary inlet management key;The power of the secondary inlet management key is set
It is limited to the right to use of the management access right of secondary storage area, the second data and the second key.
Further, the entrance manages key creating unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created,
And one first number and one second number are set;When being reset to level-one entrance management key, if identity
Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and
Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails
Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.
Further, the step storage area management module are as follows:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data,
The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data,
The right to use of second key is managed.
The present invention has the advantages that passing through the level-one inlet tube of level-one memory block and secondary storage area to safety chip
It manages key and secondary inlet management key carries out differentiated control, the i.e. number of level-one entrance management key management level-one memory block
Key is managed according to, first key and secondary inlet, and secondary inlet manages data of key management secondary storage area, second close
Key, realize possess level-one entrance management key central authority to all equipment for integrating the safety chip carry out unified management and
Control, the branch for possessing secondary inlet management key can adjust secondary storage area storage according to the demand of own service
Data.
Detailed description of the invention
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is a kind of flow chart of secondary key management method of the present invention.
Fig. 2 is a kind of second level management schematic diagram of secondary key management safety chip of the present invention.
Specific embodiment
It please refers to shown in Fig. 1 to Fig. 2, a kind of preferred embodiment of secondary key management method of the present invention, including walks as follows
It is rapid:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block is for storing the first number
Accordingly and first key, the secondary storage area are used to store the second data and the second key;The level-one memory block and two
Grade memory block stores independently of each other and uses;First data, the second data, first key and the second key pass through instruction
It is called;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one is arranged and enters
The permission of mouth management key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
The step S20 is specifically included:
Step S21, the level-one entrance management key of a level-one memory block and the secondary inlet of a secondary storage area are created
Manage key;
Step S22, the permission that the level-one entrance management key is arranged is the access right for managing level-one memory block, the first number
According to, first key and the right to use of secondary inlet management key;The permission that the secondary inlet management key is arranged is management
The right to use of the access right of secondary storage area, the second data and the second key.
The step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created,
And one first number and one second number are set;When being reset to level-one entrance management key, if identity
Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and
Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails
Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.Such as first number of setting is 3 times,
Second number is set for 10 times, continuous 3 times or accumulative 10 authentification failures are locked.
The step S30 specifically:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data,
The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data,
The right to use of second key is managed.
A kind of one of preferred embodiment of secondary key management safety chip of the present invention, including following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;It uses the level-one memory block
In storing the first data and first key, the secondary storage area is for storing the second data and the second key;Described one
Grade memory block and secondary storage area store independently of each other and use;First data, the second data, first key and second
Key is called by instruction;The format of instruction includes at least the indispensabilities such as area code, data segment number, the cipher key number of memory block and wants
Element;
Entrance management key creation module, for creating, a level-one inlet tube manages key and secondary inlet management is close
Key, and the permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
Further, the entrance management key creation module specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a second level
The secondary inlet of memory block manages key;
Priority assignation unit, the permission for the level-one entrance management key to be arranged are to manage the access of level-one memory block
The right to use of power, the first data, first key and secondary inlet management key;The power of the secondary inlet management key is set
It is limited to the right to use of the management access right of secondary storage area, the second data and the second key.
Further, the entrance manages key creating unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created,
And one first number and one second number are set;When being reset to level-one entrance management key, if identity
Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and
Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails
Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.Such as first number of setting is 3 times,
Second number is set for 10 times, continuous 3 times or accumulative 10 authentification failures are locked.
Further, the step storage area management module are as follows:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data,
The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data,
The right to use of second key is managed.
Safety chip is a kind of hardware product, is integrated with the functions such as key management, cryptographic algorithm, has safety good, anti-
The strong feature of attacking ability is basic the setting of the industry protections such as finance, government affairs, public security, business data communication and storage safety
It applies.Sensitive data, key and cryptographic algorithm are packaged into a black box by safety chip, and outside can only be inputted according to interface specification
Data simultaneously obtain readable data under the strict control of keys at different levels or call related encryption and decryption and digital signature sign test function, most
Operation result is obtained by output eventually.And for sensitive data, protection key and the cryptographic algorithm inside safety chip, external nothing
Method is spied out, stolen and is destroyed.The safety of safety chip is embodied in the data behaviour that user can be allowed to obtain within the scope of authority
Make function and crypto-operation function, and can prevent user from illegally obtaining secret and ability except the scope of authority.
A kind of secondary key management safety chip of the invention is bound in such a way that mainboard welds with equipment, is constituted
The identification characteristics of the equipment, have accelerate with the other data protection of Ukey ad eundem, algorithm, the infrastructure of attack protection.
The two of a kind of preferred embodiment of secondary key management safety chip of the present invention:
A kind of built-in safety certificate equipment D of secondary key management safety chip of company A production.Management safety certification is set
The general headquarters of the mechanism B of standby D are unified filling to safety certificate equipment D progress safety chip initialization, and the one of setting level-one memory block
Grade entrance manages key, and the code name of written agency B and general headquarters communicate private key in level-one memory block, and have preset two
The secondary inlet of grade memory block manages key.By initialize it is filling after safety certificate equipment D transfer each province point of mechanism B to
When branch mechanism, secondary inlet management key is informed into branch.Branch can manage key in second level by secondary inlet
Information, business code name and the other application key of branch are written in memory block, and carries out various businesses application.
Due to being classified rights management mechanism, branch can read the machine in safety certificate equipment D in level-one memory block
The code name of structure B, and data exchange directly is carried out with general headquarters using general headquarters' communication private key.But branch can not be to level-one
The code name stored in memory block and general headquarters' communication private key are modified, and ensure that safety certificate equipment D can not change head and change
It takes behind face and is used except mechanism B.And branch knows secondary inlet management key, can modify secondary storage area at any time
Interior data, so that easily change resets safety certificate equipment D to carry out a variety of different industry in this branch facility-wide
Business application.
In conclusion the present invention has the advantages that passing through level-one memory block to safety chip and secondary storage area
Level-one entrance manages key and secondary inlet management key carries out differentiated control, i.e. level-one entrance management key management level-one is deposited
Data, first key and the secondary inlet management key of storage area, the data of secondary inlet management key management secondary storage area,
Second key realizes that the central authority for possessing level-one entrance management key carries out unification to all equipment for integrating the safety chip
It manages and controls, the branch for possessing secondary inlet management key can adjust secondary storage area according to the demand of own service
The data of storage.
Although specific embodiments of the present invention have been described above, those familiar with the art should be managed
Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this
The technical staff in field should be covered of the invention according to modification and variation equivalent made by spirit of the invention
In scope of the claimed protection.
Claims (8)
1. a kind of secondary key management method, it is characterised in that: described method includes following steps:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block for store the first data with
And first key, the secondary storage area is for storing the second data and the second key;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one inlet tube is arranged
Manage the permission of key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
2. a kind of secondary key management method as described in claim 1, it is characterised in that: the step S20 is specifically included:
Step S21, level-one entrance management key and the secondary inlet management of a secondary storage area of a level-one memory block are created
Key;
Step S22, be arranged level-one entrance management key permission be the access right of management level-one memory block, the first data,
The right to use of first key and secondary inlet management key;The permission of the secondary inlet management key is set for management second level
The right to use of the access right of memory block, the second data and the second key.
3. a kind of secondary key management method as claimed in claim 2, it is characterised in that: the step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, and is set
Set one first number and one second number;When being reset to level-one entrance management key, if authentication
Continuously first number of failure or authentication add up second number of failure, then level-one memory block and second level described in permanent locking
Memory block;When to the secondary inlet management key reset when, if authentication continuously fail first number or
Authentication adds up second number of failure, then secondary storage area described in permanent locking.
4. a kind of secondary key management method as claimed in claim 2, it is characterised in that: the step S30 specifically:
Access right of the permission to level-one memory block of key, the right to use of the first data, first are managed according to the level-one entrance
The right to use of the right to use and secondary inlet the management key of key is managed;
Access right of the permission to secondary storage area of key, the right to use of the second data, second are managed according to the secondary inlet
The right to use of key is managed.
5. a kind of secondary key manages safety chip, it is characterised in that: the safety chip includes following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;The level-one memory block is for depositing
The first data and first key are stored up, the secondary storage area is for storing the second data and the second key;
Entrance manages key creation module, manages key for creating level-one inlet tube reason key and a secondary inlet, and
The permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
6. a kind of secondary key as claimed in claim 5 manages safety chip, it is characterised in that: the entrance management key wound
Modeling block specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a secondary storage
The secondary inlet in area manages key;
Priority assignation unit, the access right that the permission for level-one entrance management key to be arranged be management level-one memory block,
The right to use of first data, first key and secondary inlet management key;The permission of the secondary inlet management key is set
For the right to use of the access right of management secondary storage area, the second data and the second key.
7. a kind of secondary key as claimed in claim 6 manages safety chip, it is characterised in that: the entrance management key wound
Build unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, and is set
Set one first number and one second number;When being reset to level-one entrance management key, if authentication
Continuously first number of failure or authentication add up second number of failure, then level-one memory block and second level described in permanent locking
Memory block;When to the secondary inlet management key reset when, if authentication continuously fail first number or
Authentication adds up second number of failure, then secondary storage area described in permanent locking.
8. a kind of secondary key as claimed in claim 6 manages safety chip, it is characterised in that: the step storage area management
Module are as follows:
Access right of the permission to level-one memory block of key, the right to use of the first data, first are managed according to the level-one entrance
The right to use of the right to use and secondary inlet the management key of key is managed;
Access right of the permission to secondary storage area of key, the right to use of the second data, second are managed according to the secondary inlet
The right to use of key is managed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910350078.9A CN110233723B (en) | 2019-04-28 | 2019-04-28 | Secondary key management method and security chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910350078.9A CN110233723B (en) | 2019-04-28 | 2019-04-28 | Secondary key management method and security chip |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110233723A true CN110233723A (en) | 2019-09-13 |
CN110233723B CN110233723B (en) | 2023-02-14 |
Family
ID=67860341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910350078.9A Active CN110233723B (en) | 2019-04-28 | 2019-04-28 | Secondary key management method and security chip |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110233723B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005141A1 (en) * | 2002-09-11 | 2005-01-06 | Norihiro Nagai | Information recording medium, information processing apparatus, information processing method, and computer program |
CN1702591A (en) * | 2005-04-29 | 2005-11-30 | 西安三茗科技有限责任公司 | Hand disk locking and de-locking control scheme based on USB key apparatus |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
WO2008068018A2 (en) * | 2006-12-06 | 2008-06-12 | Utimaco Safeware Ag | Method for the hierarchical management of access rights |
US20090034734A1 (en) * | 2007-07-31 | 2009-02-05 | Viasat, Inc. | Multi-Level Key Manager |
CN101441705A (en) * | 2007-11-19 | 2009-05-27 | 飞力凯网路股份有限公司 | Communication system, information processing method and program product |
CN102238183A (en) * | 2011-07-07 | 2011-11-09 | 广州杰赛科技股份有限公司 | Method for distributing and verifying system customer keys |
WO2012080972A2 (en) * | 2010-12-15 | 2012-06-21 | Taron Mohan | Storage media |
CN106059771A (en) * | 2016-05-06 | 2016-10-26 | 上海动联信息技术股份有限公司 | Intelligent POS machine secret key management system and method |
US20160330209A1 (en) * | 2013-12-31 | 2016-11-10 | Thales Nederland B.V. | A data securing system and method |
CN106713228A (en) * | 2015-11-13 | 2017-05-24 | 航天信息股份有限公司 | Cloud platform key management method and system |
-
2019
- 2019-04-28 CN CN201910350078.9A patent/CN110233723B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005141A1 (en) * | 2002-09-11 | 2005-01-06 | Norihiro Nagai | Information recording medium, information processing apparatus, information processing method, and computer program |
CN1702591A (en) * | 2005-04-29 | 2005-11-30 | 西安三茗科技有限责任公司 | Hand disk locking and de-locking control scheme based on USB key apparatus |
WO2008068018A2 (en) * | 2006-12-06 | 2008-06-12 | Utimaco Safeware Ag | Method for the hierarchical management of access rights |
US20090034734A1 (en) * | 2007-07-31 | 2009-02-05 | Viasat, Inc. | Multi-Level Key Manager |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
CN101441705A (en) * | 2007-11-19 | 2009-05-27 | 飞力凯网路股份有限公司 | Communication system, information processing method and program product |
WO2012080972A2 (en) * | 2010-12-15 | 2012-06-21 | Taron Mohan | Storage media |
CN102238183A (en) * | 2011-07-07 | 2011-11-09 | 广州杰赛科技股份有限公司 | Method for distributing and verifying system customer keys |
US20160330209A1 (en) * | 2013-12-31 | 2016-11-10 | Thales Nederland B.V. | A data securing system and method |
CN106713228A (en) * | 2015-11-13 | 2017-05-24 | 航天信息股份有限公司 | Cloud platform key management method and system |
CN106059771A (en) * | 2016-05-06 | 2016-10-26 | 上海动联信息技术股份有限公司 | Intelligent POS machine secret key management system and method |
Non-Patent Citations (3)
Title |
---|
GUANGLIANG LIU ET AL.: ""A hierarchical key management scheme in role-based access control"", 《2010 INTERNATIONAL CONFERENCE ON COMPUTER DESIGN AND APPLICATIONS》 * |
冯力等: "一种多密级移动存储设备多级密钥管理方案", 《信息安全研究》 * |
宋福刚等: "基于SSX20-D安全芯片的加密存储安全模型", 《计算机系统应用》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110233723B (en) | 2023-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018046008A1 (en) | Storage design method of blockchain encrypted radio frequency chip | |
JP4631935B2 (en) | Information processing apparatus, information processing method, program, and communication system | |
US8789195B2 (en) | Method and system for access control and data protection in digital memories, related digital memory and computer program product therefor | |
CN100464315C (en) | Mobile memory divulgence protection method and system | |
RU2573211C2 (en) | Execution method and universal electronic card and smart card system | |
CN106462438A (en) | Attestation of a host containing a trusted execution environment | |
CN106603484A (en) | Virtual key method and apparatus using the same, background system, and user terminal | |
CN101950342B (en) | Device and method for managing access control permission of integrated circuit card | |
CN101897211A (en) | Migration of computer secrets | |
CN106067205B (en) | A kind of gate inhibition's method for authenticating and device | |
JP2009100394A (en) | Information processing apparatus and method, recording medium, program, and information processing system | |
CN103326864A (en) | Electronic tag anti-fake authentication method | |
CN116324844A (en) | Method, apparatus, and computer readable medium for federated rights and hierarchical key management | |
CA3184856A1 (en) | Method, participatant unit, transaction register, and payment system for managing transaction data sets | |
CN111460420A (en) | Method, device and medium for using electronic seal based on block chain | |
CN103914926B (en) | A kind of safety feature storing invoice | |
CN103839305A (en) | Access control system and access control system privilege management method | |
CN108574578A (en) | A kind of black box data protection system and method | |
CN111460465A (en) | Identity authentication method, equipment and medium based on block chain | |
CN113515764B (en) | Data management and control method | |
CN110233723A (en) | A kind of secondary key management method and safety chip | |
CN113486323B (en) | Personalized issuing method and system for electronic identification of electric bicycle | |
Lambrinoudakis | Smart card technology for deploying a secure information management framework | |
CN114120496A (en) | Unlocking control method, server, encryption component and device | |
CN105893830B (en) | Student's IC card business management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |