CN110233723A - A kind of secondary key management method and safety chip - Google Patents

A kind of secondary key management method and safety chip Download PDF

Info

Publication number
CN110233723A
CN110233723A CN201910350078.9A CN201910350078A CN110233723A CN 110233723 A CN110233723 A CN 110233723A CN 201910350078 A CN201910350078 A CN 201910350078A CN 110233723 A CN110233723 A CN 110233723A
Authority
CN
China
Prior art keywords
key
level
management
memory block
storage area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910350078.9A
Other languages
Chinese (zh)
Other versions
CN110233723B (en
Inventor
林龙
刘峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New World (fujian) Public Service Co Ltd
Original Assignee
New World (fujian) Public Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New World (fujian) Public Service Co Ltd filed Critical New World (fujian) Public Service Co Ltd
Priority to CN201910350078.9A priority Critical patent/CN110233723B/en
Publication of CN110233723A publication Critical patent/CN110233723A/en
Application granted granted Critical
Publication of CN110233723B publication Critical patent/CN110233723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of secondary key management methods of data security arts, including step S10, one level-one memory block of creation and a secondary storage area;The level-one memory block is for storing the first data and first key, and the secondary storage area is for storing the second data and the second key;Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the permission of the level-one entrance management key and secondary inlet management key is arranged;Step S30, level-one memory block and secondary storage area are managed according to the permission.The present invention has the advantages that realizing the differentiated control to key, and then the flexibility of safety and the business development of lifting means.

Description

A kind of secondary key management method and safety chip
Technical field
The present invention relates to data security arts, a kind of secondary key management method and safety chip are referred in particular to.
Background technique
Key (Ukey/ token) is the core of entire encryption system, is the electron key for authentication, and key can be with Be stored in brain, magnetic stripe card, smart card, in device memory, the safety of encryption is actually that key is depended on to realize.With The development of science and technology, key are widely used among all trades and professions.
But traditional Ukey is generally provided by some general mechanism, only supports simple data encryption, decryption, signature And the function of sign test, and traditional Ukey is an independent equipment, and Ukey is just inserted into mesh when needing to carry out authentication In marking device, between Ukey and target device and the binding relationship of not formed fixation.It is traditional with the diversification of application scenarios Ukey can not be competent under special scenes, such as can not carry out differentiated control to the equipment for using Ukey, and difference is respectively set Permission, preferably to commence business.
Therefore, how a kind of safety chip and key management method for supporting differentiated control is provided, special scenes are met Under demand for security, become a urgent problem to be solved.
Summary of the invention
One of the technical problem to be solved in the present invention is to provide a kind of secondary key management method, realize to key Differentiated control, and then the flexibility of safety and the business development of lifting means.
The present invention is realized in one of technical problem: a kind of secondary key management method, the method includes as follows Step:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block is for storing the first number Accordingly and first key, the secondary storage area are used to store the second data and the second key;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one is arranged and enters The permission of mouth management key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
Further, the step S20 is specifically included:
Step S21, the level-one entrance management key of a level-one memory block and the secondary inlet of a secondary storage area are created Manage key;
Step S22, the permission that the level-one entrance management key is arranged is the access right for managing level-one memory block, the first number According to, first key and the right to use of secondary inlet management key;The permission that the secondary inlet management key is arranged is management The right to use of the access right of secondary storage area, the second data and the second key.
Further, the step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, And one first number and one second number are set;When being reset to level-one entrance management key, if identity Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.
Further, the step S30 specifically:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data, The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data, The right to use of second key is managed.
The second technical problem to be solved by the present invention is to provide a kind of secondary key management method, realize to key Differentiated control, and then the flexibility of safety and the business development of lifting means.
The present invention is realized in the twos' of technical problem: a kind of secondary key management safety chip, the safety chip Including following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;It uses the level-one memory block In storing the first data and first key, the secondary storage area is for storing the second data and the second key;
Entrance management key creation module, for creating, a level-one inlet tube manages key and secondary inlet management is close Key, and the permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
Further, the entrance management key creation module specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a second level The secondary inlet of memory block manages key;
Priority assignation unit, the permission for the level-one entrance management key to be arranged are to manage the access of level-one memory block The right to use of power, the first data, first key and secondary inlet management key;The power of the secondary inlet management key is set It is limited to the right to use of the management access right of secondary storage area, the second data and the second key.
Further, the entrance manages key creating unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, And one first number and one second number are set;When being reset to level-one entrance management key, if identity Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.
Further, the step storage area management module are as follows:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data, The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data, The right to use of second key is managed.
The present invention has the advantages that passing through the level-one inlet tube of level-one memory block and secondary storage area to safety chip It manages key and secondary inlet management key carries out differentiated control, the i.e. number of level-one entrance management key management level-one memory block Key is managed according to, first key and secondary inlet, and secondary inlet manages data of key management secondary storage area, second close Key, realize possess level-one entrance management key central authority to all equipment for integrating the safety chip carry out unified management and Control, the branch for possessing secondary inlet management key can adjust secondary storage area storage according to the demand of own service Data.
Detailed description of the invention
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is a kind of flow chart of secondary key management method of the present invention.
Fig. 2 is a kind of second level management schematic diagram of secondary key management safety chip of the present invention.
Specific embodiment
It please refers to shown in Fig. 1 to Fig. 2, a kind of preferred embodiment of secondary key management method of the present invention, including walks as follows It is rapid:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block is for storing the first number Accordingly and first key, the secondary storage area are used to store the second data and the second key;The level-one memory block and two Grade memory block stores independently of each other and uses;First data, the second data, first key and the second key pass through instruction It is called;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one is arranged and enters The permission of mouth management key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
The step S20 is specifically included:
Step S21, the level-one entrance management key of a level-one memory block and the secondary inlet of a secondary storage area are created Manage key;
Step S22, the permission that the level-one entrance management key is arranged is the access right for managing level-one memory block, the first number According to, first key and the right to use of secondary inlet management key;The permission that the secondary inlet management key is arranged is management The right to use of the access right of secondary storage area, the second data and the second key.
The step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, And one first number and one second number are set;When being reset to level-one entrance management key, if identity Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.Such as first number of setting is 3 times, Second number is set for 10 times, continuous 3 times or accumulative 10 authentification failures are locked.
The step S30 specifically:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data, The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data, The right to use of second key is managed.
A kind of one of preferred embodiment of secondary key management safety chip of the present invention, including following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;It uses the level-one memory block In storing the first data and first key, the secondary storage area is for storing the second data and the second key;Described one Grade memory block and secondary storage area store independently of each other and use;First data, the second data, first key and second Key is called by instruction;The format of instruction includes at least the indispensabilities such as area code, data segment number, the cipher key number of memory block and wants Element;
Entrance management key creation module, for creating, a level-one inlet tube manages key and secondary inlet management is close Key, and the permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
Further, the entrance management key creation module specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a second level The secondary inlet of memory block manages key;
Priority assignation unit, the permission for the level-one entrance management key to be arranged are to manage the access of level-one memory block The right to use of power, the first data, first key and secondary inlet management key;The power of the secondary inlet management key is set It is limited to the right to use of the management access right of secondary storage area, the second data and the second key.
Further, the entrance manages key creating unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, And one first number and one second number are set;When being reset to level-one entrance management key, if identity Certification continuously first number of failure or accumulative second number that fail of authentication, then level-one memory block described in permanent locking and Secondary storage area;When being reset to secondary inlet management key, first number if authentication continuously fails Or authentication second number of accumulative failure, then secondary storage area described in permanent locking.Such as first number of setting is 3 times, Second number is set for 10 times, continuous 3 times or accumulative 10 authentification failures are locked.
Further, the step storage area management module are as follows:
According to level-one entrance management key permission to the right to use of the access right of level-one memory block, the first data, The right to use of the right to use and secondary inlet the management key of first key is managed;
According to secondary inlet management key permission to the right to use of the access right of secondary storage area, the second data, The right to use of second key is managed.
Safety chip is a kind of hardware product, is integrated with the functions such as key management, cryptographic algorithm, has safety good, anti- The strong feature of attacking ability is basic the setting of the industry protections such as finance, government affairs, public security, business data communication and storage safety It applies.Sensitive data, key and cryptographic algorithm are packaged into a black box by safety chip, and outside can only be inputted according to interface specification Data simultaneously obtain readable data under the strict control of keys at different levels or call related encryption and decryption and digital signature sign test function, most Operation result is obtained by output eventually.And for sensitive data, protection key and the cryptographic algorithm inside safety chip, external nothing Method is spied out, stolen and is destroyed.The safety of safety chip is embodied in the data behaviour that user can be allowed to obtain within the scope of authority Make function and crypto-operation function, and can prevent user from illegally obtaining secret and ability except the scope of authority.
A kind of secondary key management safety chip of the invention is bound in such a way that mainboard welds with equipment, is constituted The identification characteristics of the equipment, have accelerate with the other data protection of Ukey ad eundem, algorithm, the infrastructure of attack protection.
The two of a kind of preferred embodiment of secondary key management safety chip of the present invention:
A kind of built-in safety certificate equipment D of secondary key management safety chip of company A production.Management safety certification is set The general headquarters of the mechanism B of standby D are unified filling to safety certificate equipment D progress safety chip initialization, and the one of setting level-one memory block Grade entrance manages key, and the code name of written agency B and general headquarters communicate private key in level-one memory block, and have preset two The secondary inlet of grade memory block manages key.By initialize it is filling after safety certificate equipment D transfer each province point of mechanism B to When branch mechanism, secondary inlet management key is informed into branch.Branch can manage key in second level by secondary inlet Information, business code name and the other application key of branch are written in memory block, and carries out various businesses application.
Due to being classified rights management mechanism, branch can read the machine in safety certificate equipment D in level-one memory block The code name of structure B, and data exchange directly is carried out with general headquarters using general headquarters' communication private key.But branch can not be to level-one The code name stored in memory block and general headquarters' communication private key are modified, and ensure that safety certificate equipment D can not change head and change It takes behind face and is used except mechanism B.And branch knows secondary inlet management key, can modify secondary storage area at any time Interior data, so that easily change resets safety certificate equipment D to carry out a variety of different industry in this branch facility-wide Business application.
In conclusion the present invention has the advantages that passing through level-one memory block to safety chip and secondary storage area Level-one entrance manages key and secondary inlet management key carries out differentiated control, i.e. level-one entrance management key management level-one is deposited Data, first key and the secondary inlet management key of storage area, the data of secondary inlet management key management secondary storage area, Second key realizes that the central authority for possessing level-one entrance management key carries out unification to all equipment for integrating the safety chip It manages and controls, the branch for possessing secondary inlet management key can adjust secondary storage area according to the demand of own service The data of storage.
Although specific embodiments of the present invention have been described above, those familiar with the art should be managed Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this The technical staff in field should be covered of the invention according to modification and variation equivalent made by spirit of the invention In scope of the claimed protection.

Claims (8)

1. a kind of secondary key management method, it is characterised in that: described method includes following steps:
Step S10, a level-one memory block and a secondary storage area are created;The level-one memory block for store the first data with And first key, the secondary storage area is for storing the second data and the second key;
Step S20, one level-one inlet tube of creation reason key and a secondary inlet manage key, and the level-one inlet tube is arranged Manage the permission of key and secondary inlet management key;
Step S30, level-one memory block and secondary storage area are managed according to the permission.
2. a kind of secondary key management method as described in claim 1, it is characterised in that: the step S20 is specifically included:
Step S21, level-one entrance management key and the secondary inlet management of a secondary storage area of a level-one memory block are created Key;
Step S22, be arranged level-one entrance management key permission be the access right of management level-one memory block, the first data, The right to use of first key and secondary inlet management key;The permission of the secondary inlet management key is set for management second level The right to use of the access right of memory block, the second data and the second key.
3. a kind of secondary key management method as claimed in claim 2, it is characterised in that: the step S21 specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, and is set Set one first number and one second number;When being reset to level-one entrance management key, if authentication Continuously first number of failure or authentication add up second number of failure, then level-one memory block and second level described in permanent locking Memory block;When to the secondary inlet management key reset when, if authentication continuously fail first number or Authentication adds up second number of failure, then secondary storage area described in permanent locking.
4. a kind of secondary key management method as claimed in claim 2, it is characterised in that: the step S30 specifically:
Access right of the permission to level-one memory block of key, the right to use of the first data, first are managed according to the level-one entrance The right to use of the right to use and secondary inlet the management key of key is managed;
Access right of the permission to secondary storage area of key, the right to use of the second data, second are managed according to the secondary inlet The right to use of key is managed.
5. a kind of secondary key manages safety chip, it is characterised in that: the safety chip includes following module:
Memory block creation module is used to create a level-one memory block and a secondary storage area;The level-one memory block is for depositing The first data and first key are stored up, the secondary storage area is for storing the second data and the second key;
Entrance manages key creation module, manages key for creating level-one inlet tube reason key and a secondary inlet, and The permission of the level-one entrance management key and secondary inlet management key is set;
Storage area management module, for being managed according to the permission to level-one memory block and secondary storage area.
6. a kind of secondary key as claimed in claim 5 manages safety chip, it is characterised in that: the entrance management key wound Modeling block specifically includes:
Entrance management key creating unit, the level-one entrance for creating a level-one memory block manage key and a secondary storage The secondary inlet in area manages key;
Priority assignation unit, the access right that the permission for level-one entrance management key to be arranged be management level-one memory block, The right to use of first data, first key and secondary inlet management key;The permission of the secondary inlet management key is set For the right to use of the access right of management secondary storage area, the second data and the second key.
7. a kind of secondary key as claimed in claim 6 manages safety chip, it is characterised in that: the entrance management key wound Build unit specifically:
The level-one entrance management key of a level-one memory block and the secondary inlet management key of a secondary storage area are created, and is set Set one first number and one second number;When being reset to level-one entrance management key, if authentication Continuously first number of failure or authentication add up second number of failure, then level-one memory block and second level described in permanent locking Memory block;When to the secondary inlet management key reset when, if authentication continuously fail first number or Authentication adds up second number of failure, then secondary storage area described in permanent locking.
8. a kind of secondary key as claimed in claim 6 manages safety chip, it is characterised in that: the step storage area management Module are as follows:
Access right of the permission to level-one memory block of key, the right to use of the first data, first are managed according to the level-one entrance The right to use of the right to use and secondary inlet the management key of key is managed;
Access right of the permission to secondary storage area of key, the right to use of the second data, second are managed according to the secondary inlet The right to use of key is managed.
CN201910350078.9A 2019-04-28 2019-04-28 Secondary key management method and security chip Active CN110233723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910350078.9A CN110233723B (en) 2019-04-28 2019-04-28 Secondary key management method and security chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910350078.9A CN110233723B (en) 2019-04-28 2019-04-28 Secondary key management method and security chip

Publications (2)

Publication Number Publication Date
CN110233723A true CN110233723A (en) 2019-09-13
CN110233723B CN110233723B (en) 2023-02-14

Family

ID=67860341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910350078.9A Active CN110233723B (en) 2019-04-28 2019-04-28 Secondary key management method and security chip

Country Status (1)

Country Link
CN (1) CN110233723B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050005141A1 (en) * 2002-09-11 2005-01-06 Norihiro Nagai Information recording medium, information processing apparatus, information processing method, and computer program
CN1702591A (en) * 2005-04-29 2005-11-30 西安三茗科技有限责任公司 Hand disk locking and de-locking control scheme based on USB key apparatus
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
WO2008068018A2 (en) * 2006-12-06 2008-06-12 Utimaco Safeware Ag Method for the hierarchical management of access rights
US20090034734A1 (en) * 2007-07-31 2009-02-05 Viasat, Inc. Multi-Level Key Manager
CN101441705A (en) * 2007-11-19 2009-05-27 飞力凯网路股份有限公司 Communication system, information processing method and program product
CN102238183A (en) * 2011-07-07 2011-11-09 广州杰赛科技股份有限公司 Method for distributing and verifying system customer keys
WO2012080972A2 (en) * 2010-12-15 2012-06-21 Taron Mohan Storage media
CN106059771A (en) * 2016-05-06 2016-10-26 上海动联信息技术股份有限公司 Intelligent POS machine secret key management system and method
US20160330209A1 (en) * 2013-12-31 2016-11-10 Thales Nederland B.V. A data securing system and method
CN106713228A (en) * 2015-11-13 2017-05-24 航天信息股份有限公司 Cloud platform key management method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050005141A1 (en) * 2002-09-11 2005-01-06 Norihiro Nagai Information recording medium, information processing apparatus, information processing method, and computer program
CN1702591A (en) * 2005-04-29 2005-11-30 西安三茗科技有限责任公司 Hand disk locking and de-locking control scheme based on USB key apparatus
WO2008068018A2 (en) * 2006-12-06 2008-06-12 Utimaco Safeware Ag Method for the hierarchical management of access rights
US20090034734A1 (en) * 2007-07-31 2009-02-05 Viasat, Inc. Multi-Level Key Manager
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101441705A (en) * 2007-11-19 2009-05-27 飞力凯网路股份有限公司 Communication system, information processing method and program product
WO2012080972A2 (en) * 2010-12-15 2012-06-21 Taron Mohan Storage media
CN102238183A (en) * 2011-07-07 2011-11-09 广州杰赛科技股份有限公司 Method for distributing and verifying system customer keys
US20160330209A1 (en) * 2013-12-31 2016-11-10 Thales Nederland B.V. A data securing system and method
CN106713228A (en) * 2015-11-13 2017-05-24 航天信息股份有限公司 Cloud platform key management method and system
CN106059771A (en) * 2016-05-06 2016-10-26 上海动联信息技术股份有限公司 Intelligent POS machine secret key management system and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GUANGLIANG LIU ET AL.: ""A hierarchical key management scheme in role-based access control"", 《2010 INTERNATIONAL CONFERENCE ON COMPUTER DESIGN AND APPLICATIONS》 *
冯力等: "一种多密级移动存储设备多级密钥管理方案", 《信息安全研究》 *
宋福刚等: "基于SSX20-D安全芯片的加密存储安全模型", 《计算机系统应用》 *

Also Published As

Publication number Publication date
CN110233723B (en) 2023-02-14

Similar Documents

Publication Publication Date Title
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
JP4631935B2 (en) Information processing apparatus, information processing method, program, and communication system
US8789195B2 (en) Method and system for access control and data protection in digital memories, related digital memory and computer program product therefor
CN100464315C (en) Mobile memory divulgence protection method and system
RU2573211C2 (en) Execution method and universal electronic card and smart card system
CN106462438A (en) Attestation of a host containing a trusted execution environment
CN106603484A (en) Virtual key method and apparatus using the same, background system, and user terminal
CN101950342B (en) Device and method for managing access control permission of integrated circuit card
CN101897211A (en) Migration of computer secrets
CN106067205B (en) A kind of gate inhibition's method for authenticating and device
JP2009100394A (en) Information processing apparatus and method, recording medium, program, and information processing system
CN103326864A (en) Electronic tag anti-fake authentication method
CN116324844A (en) Method, apparatus, and computer readable medium for federated rights and hierarchical key management
CA3184856A1 (en) Method, participatant unit, transaction register, and payment system for managing transaction data sets
CN111460420A (en) Method, device and medium for using electronic seal based on block chain
CN103914926B (en) A kind of safety feature storing invoice
CN103839305A (en) Access control system and access control system privilege management method
CN108574578A (en) A kind of black box data protection system and method
CN111460465A (en) Identity authentication method, equipment and medium based on block chain
CN113515764B (en) Data management and control method
CN110233723A (en) A kind of secondary key management method and safety chip
CN113486323B (en) Personalized issuing method and system for electronic identification of electric bicycle
Lambrinoudakis Smart card technology for deploying a secure information management framework
CN114120496A (en) Unlocking control method, server, encryption component and device
CN105893830B (en) Student's IC card business management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant