CN111966969B - Authentication chip control method, authentication method for upper computer application and system thereof - Google Patents

Authentication chip control method, authentication method for upper computer application and system thereof Download PDF

Info

Publication number
CN111966969B
CN111966969B CN202010694189.4A CN202010694189A CN111966969B CN 111966969 B CN111966969 B CN 111966969B CN 202010694189 A CN202010694189 A CN 202010694189A CN 111966969 B CN111966969 B CN 111966969B
Authority
CN
China
Prior art keywords
authentication
application
upper computer
writer
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010694189.4A
Other languages
Chinese (zh)
Other versions
CN111966969A (en
Inventor
张旭鹏
韩晓军
于达
林维希
冯绍钧
张雪怡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGMEN DASCOM COMPUTER PERIPHERAL CO Ltd
Aisino Corp
Original Assignee
JIANGMEN DASCOM COMPUTER PERIPHERAL CO Ltd
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGMEN DASCOM COMPUTER PERIPHERAL CO Ltd, Aisino Corp filed Critical JIANGMEN DASCOM COMPUTER PERIPHERAL CO Ltd
Priority to CN202010694189.4A priority Critical patent/CN111966969B/en
Publication of CN111966969A publication Critical patent/CN111966969A/en
Application granted granted Critical
Publication of CN111966969B publication Critical patent/CN111966969B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Control Or Security For Electrophotography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an authentication chip control method, an authentication method of an upper computer application and a system thereof, wherein an application authentication information encrypted in the authentication chip is obtained through a consumable identification reader-writer in external equipment and is used for authenticating the upper computer application, a software development company does not need to pay extra hardware cost, and the authentication of the upper computer application can be conveniently realized only by applying the existing consumable identification reader-writer and the authentication chip, and the authentication cost is low. The user only needs to purchase authentication consumables or authentication chips matched with consumable identification readers, authentication of the upper computer application can be completed in the use process of using the external equipment, complicated registration and serial number input operation are not needed, and the user does not need to install a driver in advance like Ukey, so that the complexity of authentication operation of the user can be effectively reduced. The application authentication information is transmitted in a mode of encrypting the first secret code, so that confidentiality is high, and benefits of a software development company are effectively maintained.

Description

Authentication chip control method, authentication method for upper computer application and system thereof
Technical Field
The invention relates to the technical field of computer security, in particular to an authentication chip control method, an authentication method for upper computer application and a system thereof.
Background
Piracy and cracking of software are known to bring significant economic loss to software development companies. In addition to promoting and encouraging consumers to use the original software, software development companies choose to use encryption means to protect their own intellectual property rights. The authentication software product can identify whether the current operation is the piracy of the legal copy or the illegal copy through encryption, or realize the authorization or function unlocking of the application software through encryption and authentication, thereby ensuring the benefit of the software development company. The authentication mode of the existing application software mainly comprises the following steps:
1) The authorization or function unlocking of the application software is realized by authenticating the corresponding plain code serial number of the software product, the product serial number can be printed on the package of the software product or sent to a client in a communication mode such as a mailbox, but the serial number is easy to copy or reuse, the security is low, the serial number is generally longer, and the input operation is complex.
2) The user information (such as a mailbox and a user name) generates a corresponding serial number according to a specified algorithm, and the user inputs the user information and the serial number to authenticate the software product, wherein the serial number can only be used together with the user information, but the user can share the user information and the serial number for other people to use, and the verification algorithm is easy to be broken to generate a serial number generator, so that the security is low, the serial number is generally longer, and the input operation is complex.
3) And verifying through online registration information, registering by a user through a software interface, and transmitting authentication information to the current application software by a server for authorization or function unlocking, or registering a network account by the user, and logging in the network account in the application software to pass authentication. The two modes need to establish a server, the application software and the upper computer need to be connected with the Internet, the verification cost is high, and the server can not be used in a local area network or an off-line state.
4) The application software authentication is carried out by connecting the Ukey or the USB dongle with the upper computer, the mode is high in safety and does not need to depend on a server and the Internet, however, extra hardware cost is required to be manufactured, and the operation is inconvenient.
Disclosure of Invention
In order to solve the problems, the invention aims to provide an authentication chip control method with high security, low authentication cost and convenient authentication operation, an authentication method for upper computer application and a system thereof.
The invention solves the problems by adopting the following technical scheme:
in a first aspect of the present invention, there is provided an authentication chip control method comprising the steps of;
receiving an application authentication instruction;
encrypting application authentication information of the upper computer application and generating a first secret code, wherein the application authentication information is used for authenticating the upper computer application;
And sending the first password to a consumable identification reader.
Further, the method also comprises the following steps:
receiving an internal authentication instruction of external equipment;
encrypting the internal authentication of the external equipment and generating a second secret code;
and sending the second password to a consumable identification reader-writer.
In a second aspect of the present invention, there is provided an authentication chip comprising:
The chip carrier is provided with a chip read-write interface matched with the consumable identification reader-writer interface;
the microprocessor is arranged in the chip carrier and used for running an on-chip operating system, and the microprocessor is connected with the chip read-write interface;
the first storage module is used for storing application authentication information of the upper computer application and is connected with the microprocessor;
the microprocessor acquires an application authentication instruction from the consumable identification reader-writer through the chip read-write interface, encrypts the application authentication information in response to the application authentication instruction and generates a first secret code, and sends the first secret code to the consumable identification reader-writer through the chip read-write interface.
Further, consumable authentication information for authenticating whether the consumable is a specified consumable is stored in the first memory;
The microprocessor acquires a consumable authentication instruction from the consumable identification reader-writer through the chip read-write interface, encrypts the consumable authentication information in response to the consumable authentication instruction and generates a second secret code, and sends the second secret code to the consumable identification reader-writer through the chip read-write interface.
In a third aspect of the invention, there is provided a consumable comprising a consumable carrier and an authentication chip of the second aspect of the invention, the authentication chip being disposed on the consumable carrier.
In a fourth aspect of the present invention, there is provided a method for controlling a consumable identification reader/writer, comprising the steps of:
Sending an application authentication instruction to an authentication chip;
Acquiring a first secret code from an authentication chip, wherein the first secret code is generated by encrypting application authentication information;
and sending the first password to an upper computer, or sending the application authentication information to the upper computer after decrypting the first password into the application authentication information.
The fifth aspect of the invention provides a consumable identification reader-writer, which comprises a consumable identification reader-writer interface for identifying whether consumable is a specified authentication consumable, wherein the consumable identification reader-writer interface is used for being in communication connection with an authentication chip, and further comprises an upper computer communication interface connected with an upper computer;
The consumable identification reader-writer sends an application authentication instruction to the authentication chip according to the instruction of the upper computer or the external equipment, receives a first password from the authentication chip, sends the first password to the upper computer, or sends the application authentication information to the upper computer after decrypting the first password into the application authentication information.
In a sixth aspect of the present invention, there is provided an external device comprising the consumable identification reader of the fifth aspect of the present invention.
In a seventh aspect of the present invention, a control method of an upper computer is provided, including the steps of:
receiving application authentication information from a consumable identification reader-writer, or decrypting a first password from the consumable identification reader-writer to generate the application authentication information;
judging whether the application authentication information is correct or not, and if so, passing the authentication.
Further, the method also comprises the following steps:
If the authentication is passed, the upper computer application identity authorization or function unlocking is successful.
The eighth aspect of the present invention provides an upper computer, including an upper computer application loaded in the upper computer, where the upper computer receives application authentication information from the consumable identification reader or decrypts a first password from the consumable identification reader to generate application authentication information, where the application authentication information is used for authentication of the upper computer application, and the upper computer performs authentication and verification on the application authentication information, and if the authentication is correct, the upper computer application passes the authentication.
In a ninth aspect of the present invention, there is provided an upper computer application authentication system, including:
the upper computer is loaded with an upper computer application;
The consumable identification reader-writer is used for identifying whether the consumable is a specified consumable or not, and the consumable identification reader-writer is in communication connection with the upper computer;
The authentication chip comprises a chip carrier, a first storage module, a microprocessor for running an on-chip operating system and a chip read-write interface matched with a consumable identification reader-writer interface are arranged on the chip carrier, the first storage module is connected with the microprocessor, the microprocessor is connected with the consumable identification reader-writer through the chip read-write interface, and application authentication information for authenticating the application of the upper computer is stored in the first storage module;
The microprocessor acquires an application authentication instruction from the consumable identification reader-writer through a chip read-write interface, encrypts the application authentication information in response to the application authentication instruction and generates a first secret code, and sends the first secret code to the consumable identification reader-writer through the chip read-write interface;
The consumable identification reader-writer acquires a first password from the authentication chip, and sends the first password to the upper computer, or after decrypting the first password into application authentication information, sends the application authentication information to the upper computer;
The upper computer receives the application authentication information from the consumable identification reader-writer or decrypts the first password from the consumable identification reader-writer to generate the application authentication information;
The upper computer judges whether the application authentication information is correct, and if so, the upper computer application passes the authentication.
In a tenth aspect of the present invention, there is provided an authentication method for an upper computer application, including the steps of:
the consumable identification reader-writer sends an application authentication instruction to the authentication chip;
The authentication chip encrypts application authentication information of the upper computer application in response to the application authentication instruction and generates a first secret code, wherein the application authentication information is used for authenticating the upper computer application;
the authentication chip sends the first password to a consumable identification reader;
the consumable identification reader-writer acquires a first secret code from the authentication chip, and sends the first secret code to the upper computer, or after decrypting the first secret code into application authentication information, sends the application authentication information to the upper computer;
The upper computer receives application authentication information from the consumable identification reader-writer or decrypts a first password from the consumable identification reader-writer to generate the application authentication information;
the upper computer judges whether the application authentication information is correct or not, and if so, the upper computer passes the authentication.
Further, the method also comprises the following steps:
If the upper computer application passes the authentication, the upper computer application identity authorization or the function unlocking is successful.
Specifically, the consumable identification reader-writer sends an application authentication instruction to the authentication chip, specifically including:
the consumable identification reader-writer sends an application authentication instruction to the authentication chip;
And carrying out data exchange matching between the authentication chip and the consumable identification reader-writer, and establishing a communication handshake relationship.
Further, the authentication chip encrypts the application authentication information of the upper computer application in response to the application authentication instruction and generates a first password, and specifically includes:
The authentication chip acquires a secret key, encrypts application authentication information applied by the upper computer according to the secret key and generates a first secret code;
the upper computer or the consumable identification reader-writer acquires the secret key and decodes the first secret code to acquire application authentication information.
An eleventh aspect of the present invention provides a control apparatus comprising
At least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the preceding claims.
A twelfth aspect of the present invention provides a computer-readable storage medium storing computer-executable instructions for causing a computer to perform a method as set forth in any one of the preceding claims
One of the above technical solutions has the following advantages or beneficial effects:
In the embodiment of the invention, the application authentication information encrypted in the authentication chip is obtained through the consumable identification reader-writer in the external equipment and is used for authenticating the application of the upper computer, a software development company does not need to pay for hardware cost such as a server, ukey and the like, and the authentication of the application of the upper computer can be conveniently realized only by applying the existing consumable identification reader-writer and the authentication chip, so that the authentication cost is low. The user only needs to purchase authentication consumables or authentication chips matched with consumable identification readers, authentication of the upper computer application can be completed in the use process of using the external equipment, complicated registration and serial number input operation are not needed, and the user does not need to install a driver in advance like Ukey, so that the complexity of authentication operation of the user can be effectively reduced. The application authentication information is transmitted in a mode of encrypting the first secret code, so that confidentiality is high, and benefits of a software development company are effectively maintained.
Drawings
The invention is further described below with reference to the drawings and examples.
FIG. 1 is a schematic diagram of an authentication system for an upper computer application according to one or more embodiments of the present invention;
FIG. 2 is a flow chart of a control method according to a third embodiment of the present invention;
FIG. 3 is a flow chart of another control method according to a third embodiment of the present invention;
FIG. 4 is a flowchart of a control method according to a sixth embodiment of the present invention;
FIG. 5 is a flowchart of a control method according to an eighth embodiment of the present invention;
fig. 6 is a schematic structural view of a control device according to an eleventh embodiment of the present invention;
FIG. 7 is a flowchart of a control method according to a tenth embodiment of the present invention;
fig. 8 is a communication timing chart provided by an eleventh embodiment of the present invention.
Detailed Description
For external devices such as printing and card making, a matched appointed authentication consumable is usually provided for use, and a user does not want to use a third party consumable or needs to be appointed when performing a special task (for example, special transfer consumable is needed for making an identity card), so that the inventor has known a technology that a consumable identification reader for verifying whether the current consumable is the appointed authentication consumable is arranged in the external device, an authentication chip is arranged in the consumable, and the consumable identification reader in the external device is in communication connection with the authentication chip.
And identifying consumable authentication information in the authentication chip through the consumable identification reader-writer so as to judge whether a user uses the appointed authentication consumable, and stopping the external equipment and prompting the user when the identification or authentication fails.
In most cases, the external device is also connected to the host computer so as to respond to the working instruction of the host computer, such as a printer or a card making machine connected to the computer or the mobile terminal, and the image information to be printed or printed is selected in the application of the host computer, and is printed or printed by the external device.
Referring to fig. 1, in a first embodiment of the present invention, an authentication chip is provided, which can be separately provided for a user to install, so that the user can conveniently upgrade using the existing consumable, or the authentication chip is integrated into the consumable and is not separable, so that the host computer application and the binding sales of the consumable are facilitated.
The authentication chip comprises a chip carrier, a chip read-write interface matched with a consumable identification reader-writer interface is arranged on the chip carrier, if the chip read-write interface is a contact communication interface, the contact position of the chip read-write interface is required to be matched with the consumable identification reader-writer interface, if the chip read-write interface is a non-contact interface (such as an antenna and an RFID), the installation position of the chip read-write interface is required to be matched with the consumable identification reader-writer interface, in one implementation mode, the shape of the chip carrier is also matched with the shape of the consumable identification reader-writer interface, for example, the consumable identification reader-writer interface is annular, and the chip carrier is also annular arranged on the end face of a coiled material.
In addition, the authentication chip is also internally provided with an on-chip operating system (namely a COS system), and in order to operate the system, the authentication chip further comprises a microprocessor and a second storage module, wherein the microprocessor is connected with a chip read-write interface to realize communication connection with a consumable identification reader-writer, the second storage module stores system files of the on-chip operating system, and the microprocessor operates the on-chip operating system by loading the system files in the second storage.
The chip carrier further includes a first storage module, where the first storage module stores at least application authentication information for authenticating an application of the upper computer, and in some cases, the first storage module further stores external device internal authentication information for authenticating an internal application of the external device, that is, consumable identification reader-writer authorizes or unlocks the internal application of the external device through the authentication chip, for example, consumable authentication information for authenticating whether the consumable is a specified consumable, where the consumable authentication information is used to unlock internal function enablement of the external device, for example, after the authentication ribbon is the specified authentication ribbon, the transfer device is allowed to transfer.
Specifically, if the current consumable carrier is used for upgrading, the first storage module only needs to store application authentication information, for example, a user only needs to purchase an authentication chip and install the authentication chip on the consumable carrier (for example, on an empty ribbon holder), and the consumable carrier is installed in an external device to perform authentication.
If the application and the consumable are bound and sold for the upper computer, the first storage module stores application authentication information and consumable authentication information at the same time, and can be used for authenticating appointed consumable and upper computer application respectively, and can also be used for unlocking or authorizing other functions of the application of the external device by integrating other internal authentication information of the external device in the authentication chip.
When the upper computer application needs to be authenticated, the authentication chip receives an application authentication instruction from the consumable identification reader-writer, and the instruction can be initiated by the upper computer through the consumable identification reader-writer in the external device (for example, a user opens the upper computer application or clicks certain non-open functions of the upper computer application), and can also be initiated by the external device to the authentication chip through the consumable identification reader-writer.
After the microprocessor obtains the application authentication instruction through the chip read-write interface, the microprocessor responds to the application authentication instruction to encrypt the application authentication information and generate a first secret code, and the first secret code is sent to the consumable identification reader through the chip read-write interface.
Specifically, an on-chip operating system (COS system) is operated in the authentication chip, and after the COS system obtains an application authentication instruction from the consumable identification reader-writer, data exchange is required between the authentication chip and the consumable identification reader-writer, and a communication handshake relationship is established, that is, the consumable identification reader-writer needs to be mutually authenticated with the authentication chip to confirm and verify identities of both sides, and then further data transmission can be arranged. The authentication method is the prior art, for example, authentication is performed by means of mutual MAC address, random code, etc., and will not be described in detail here.
Specifically, in order to prevent illegal interception of the authentication information, the authentication chip needs to encrypt the application authentication information before sending the application authentication information to the consumable identification reader-writer. The transmission data encryption mode of the specific COS system also belongs to the prior art, for example, through DES encryption operation and the like.
The key used for encryption can also be obtained in various ways, for example, the key is generated by accessing a codebook stored in the second memory and is encrypted to generate a first secret code, the first secret code and the encrypted key are sent to an upper computer or a consumable identification reader-writer, the key is obtained through decryption by a preset decryption rule, and then the first secret code is decrypted, so that the application authentication information is obtained.
In another alternative mode, the upper computer or the consumable identification reader-writer sends the encryption rule of the key to the authentication chip, the authentication chip and the upper computer or the consumable identification reader-writer respectively generate the key by using the encryption rule, the authentication chip encrypts the application authentication information by using the key to generate a first secret code, and the upper computer or the consumable identification reader-writer decrypts the first secret code by using the key generated by the same encryption rule, so that the application authentication information is obtained.
Because the data encryption mode of the COS system is mature, details are not described here.
When the consumable is required to be authenticated, the microprocessor acquires a consumable authentication instruction from the consumable identification reader through the chip read-write interface, encrypts the consumable authentication information and generates a second secret code in response to the consumable authentication instruction, and sends the second secret code to the consumable identification reader through the chip read-write interface. The handshake establishment between the authentication chip and the consumable identification reader-writer, and the encryption mode of consumable authentication information in the authentication chip are consistent with the processing method of application authentication information.
A second embodiment of the present invention provides a consumable comprising the authentication chip and the consumable carrier of any one of the above first embodiments. The consumable can be an ink box, an ink ribbon, a paper box and the like, and the authentication chip is arranged on the consumable carrier.
Referring to fig. 2, a third embodiment of the present invention, which is applied to the authentication chip of any one of the first embodiments, provides a control method of the authentication chip, including the steps of:
101. receiving an application authentication instruction;
102. Encrypting application authentication information of the upper computer application and generating a first secret code, wherein the application authentication information is used for authenticating the upper computer application;
103. And sending the first password to a consumable identification reader.
The control method is used for sending the application authentication information in the authentication chip to the upper computer through the consumable identification reader-writer, and the password mode in the data transmission process is used for transmission, so that the safety is good.
Further, the step 101 includes the steps of:
1011. receiving an application authentication instruction from a consumable identification reader;
1012. And carrying out data exchange matching with the consumable identification reader-writer, authenticating the consumable identification reader-writer, and establishing a communication handshake relationship with the consumable identification reader-writer.
Further, the step 102 includes the following steps:
1021. and acquiring a secret key, encrypting application authentication information of the upper computer application according to the secret key, and generating a first secret code.
The secret key is generated through operation by an on-chip operation system in the authentication chip, for example, a password stored in a password book in the authentication chip is selected randomly to be used as the secret key, or the password is operated to be used as the secret key, and the secret key is required to be encrypted and then sent to a consumable identification reader-writer or an upper computer.
Or the application authentication instruction comprises a secret key or an encrypted secret key, and the authentication chip directly uses the secret key; or the application authentication instruction comprises a key generation algorithm, the authentication chip obtains the key according to the algorithm operation, the key is not required to be sent in the above situation, and the consumable identification reader or the upper computer only needs to decrypt according to the reserved key or the key generated by the same algorithm.
Referring to fig. 3, when performing consumable authentication, the method further comprises the following steps:
104. receiving an internal authentication instruction of external equipment;
105. Encrypting the internal authentication information of the external equipment and generating a second secret code;
106. and sending the second password to a consumable identification reader-writer.
The step 104 specifically includes:
1041. receiving an internal authentication instruction of external equipment from a consumable identification reader;
1042. And carrying out data exchange matching with the consumable identification reader-writer, authenticating the consumable identification reader-writer, and establishing a communication handshake relationship with the consumable identification reader-writer.
In one embodiment of the steps 104 and 105, the external device internal authentication instruction is a consumable authentication instruction for starting the step 105. The internal authentication information of the external equipment is consumable authentication information for authenticating whether the consumable used for authentication is a specified authentication consumable.
In another embodiment of the steps 104 and 105, the external device internal authentication information is used to authorize or unlock the external device internal application other functions than consumable authentication, such as unlocking advanced scanning functions in a scanning and printing integrated machine.
In this embodiment, the data encryption manner of the authentication chip is the same as that of the first embodiment, and the description thereof will not be repeated here.
Referring to fig. 1, a fourth embodiment of the present invention provides a consumable identification reader-writer, where the consumable identification reader-writer includes a consumable identification reader-writer interface for identifying whether a consumable is a specified authentication consumable, and the consumable identification reader-writer interface may be in communication connection with an authentication chip, and further includes an upper computer communication interface connected with an upper computer, where the consumable identification reader-writer is in communication connection with the upper computer through the upper computer communication interface.
The consumable identification reader-writer sends an application authentication instruction to the authentication chip according to the instruction of the upper computer or the external equipment, receives a first password from the authentication chip, sends the first password to the upper computer, or sends the application authentication information to the upper computer after decrypting the first password into the application authentication information.
Preferably, after the consumable identification reader-writer sends an application authentication instruction to the authentication chip, the consumable identification reader-writer performs data interaction matching with the authentication chip, and establishes a communication handshake relationship with the authentication chip after confirming that the authentication chip is authorized authentication equipment, so that the safety is good.
The consumable identification reader-writer receives a first secret code from the authentication chip, sends the first secret code to the upper computer, or sends the application authentication information to the upper computer after decrypting the first secret code into the application authentication information, wherein a key for decrypting the first secret code can be obtained in various modes, for example, an application authentication instruction comprises the key, or a key or an encrypted key is received from the authentication chip, and the two schemes need to transmit the key; or an algorithm containing the key in the authentication instruction is applied, and the consumable identification reader and the authentication chip execute the algorithm to obtain the key respectively, so that the key does not need to be transmitted.
The consumable identification reader-writer authenticates whether the consumable is a specified authentication consumable through the authentication chip, is of the prior art, and is not repeated.
A fifth embodiment of the present invention provides an external device including the consumable recognition reader of any one of the above fourth embodiments.
Referring to fig. 4, a sixth embodiment of the present invention is applied to the consumable identification reader/writer of any one of the fourth embodiments, and provides a method for controlling the consumable identification reader/writer, including the steps of:
201. sending an application authentication instruction to an authentication chip;
202. Acquiring a first secret code from an authentication chip, wherein the first secret code is generated by encrypting application authentication information;
203. and sending the first password to an upper computer, or sending the application authentication information to the upper computer after decrypting the first password into the application authentication information.
Wherein step 201 comprises the following steps:
2011. sending an application authentication instruction to an authentication chip according to an instruction of an upper computer or external equipment;
2012. And carrying out data exchange matching with the authentication chip, authenticating the validity of the authentication chip, and establishing a communication handshake relationship with the authentication chip.
In step 203, the key for decrypting the first secret code may be obtained in various manners, for example, the application authentication instruction in step 201 or step 2011 includes the key, or further includes a step of receiving the key or the encrypted key from the authentication chip, where the two schemes need to transmit the key; or in step 201 or step 2011, an algorithm containing the key in the authentication instruction is applied, and the consumable identification reader and the establishment of the communication handshake relationship respectively execute the algorithm to obtain the key, so that the transmission of the key is not needed.
The consumable identification reader-writer authenticates whether the consumable is an authentication method of the appointed authentication consumable through the authentication chip, which is the prior art and is not repeated.
Referring to fig. 1, a seventh embodiment of the present invention provides a host computer, in which an application of the host computer is installed, the host computer receives application authentication information from a consumable identification reader or decrypts a first password from the consumable identification reader to generate application authentication information, and the application authentication information is used for authentication of the application of the host computer. The upper computer authenticates and verifies the application authentication information, and if the authentication is correct, the upper computer application passes the authentication.
The upper computer application can be an application related to external equipment, such as printing, typesetting and photo processing application, or an application unrelated to the external equipment, such as word processing application, input method application and the like. After the upper computer application passes the authentication, the user can be authorized to use the related upper computer application, or part of functions of the upper computer application can be unlocked, for example, a common user can only use basic functions, and the advanced functions can be unlocked after passing the authentication. Taking typesetting software as an example, a common user can only use a basic typesetting function, while some advanced templates and filters are advanced functions and can only be used after unlocking. The user only needs to purchase the consumable with the application authentication information corresponding to the advanced application of the modified software or the authentication chip which can be installed on the consumable, and the advanced application of the upper computer application can be used by replacing the consumable or upgrading the existing consumable.
Specifically, the method comprises the steps that a user replaces consumable with application authentication information into external equipment, the upper computer application is opened, the unlocking function is clicked, the consumable identification reader-writer can be instructed to send an application authentication instruction to the authentication chip, the upper computer can acquire the application authentication information or the first secret code from the authentication chip through the consumable identification reader-writer, if the application authentication information or the first secret code is the first secret code, the application authentication information is obtained through decryption, and at the moment, the upper computer application advanced function can be unlocked only by identifying whether the application authentication information can pass authentication. The authorization function of the upper computer application is similar, and the upper computer application can be used only by prompting the unlocking step when the application is opened.
The other operation mode is that after the user opens the upper computer application, authentication is started, and if the authentication is correct, the upper application function is automatically unlocked or the upper computer application is authorized to be used.
Referring to fig. 5, an eighth embodiment of the present invention, applied to the upper computer in any one of the aspects of the seventh embodiment, provides a control method of the upper computer, including the following steps:
301. receiving application authentication information from a consumable identification reader-writer, or decrypting a first password from the consumable identification reader-writer to generate the application authentication information;
302. judging whether the application authentication information is correct or not, and if so, passing the authentication.
Further, the method also comprises the following steps:
303. if the authentication is passed, the upper computer application identity authorization or function unlocking is successful.
Further, in another embodiment of the foregoing, the step 301 further includes the following steps:
300. and sending a working instruction to the consumable identification reader-writer, wherein the working instruction is an application authentication instruction which instructs the consumable identification reader-writer to send to the authentication chip.
In step 300, the method is performed in response to the user clicking the unlock function, or in response to the user launching the upper computer application.
In step 301, decrypting the first secret code from the consumable identification reader to generate application authentication information, which specifically includes obtaining a key corresponding to the first secret code, and decoding the first secret code by using the key, thereby obtaining the application authentication information.
The key may be obtained in various manners, for example, the application work instruction of step 300 includes the key, the authentication chip encrypts using the key, step 301 decrypts using the key, or further includes a step of acquiring the key or the encrypted key from the authentication chip from the consumable identification reader;
Or the algorithm containing the key in the working instruction in step 300 is executed by the upper computer and the authentication chip respectively to obtain the key, so that the key does not need to be transmitted.
Referring to fig. 1, a ninth embodiment of the present invention provides an application authentication system for a host computer, including:
the upper computer is loaded with an upper computer application;
The consumable identification reader-writer is used for identifying whether the consumable is a specified consumable or not, and the consumable identification reader-writer is in communication connection with the upper computer;
The authentication chip comprises a chip carrier, a first storage module, a microprocessor for running an on-chip operating system and a chip read-write interface matched with a consumable identification reader-writer interface are arranged on the chip carrier, the first storage module is connected with the microprocessor, the microprocessor is connected with the consumable identification reader-writer through the chip read-write interface, and application authentication information for authenticating the application of the upper computer is stored in the first storage module;
The microprocessor acquires an application authentication instruction from the consumable identification reader-writer through a chip read-write interface, encrypts the application authentication information in response to the application authentication instruction and generates a first secret code, and sends the first secret code to the consumable identification reader-writer through the chip read-write interface;
The consumable identification reader-writer acquires a first password from the authentication chip, and sends the first password to the upper computer, or after decrypting the first password into application authentication information, sends the application authentication information to the upper computer;
The upper computer receives the application authentication information from the consumable identification reader-writer or decrypts the first password from the consumable identification reader-writer to generate the application authentication information;
The upper computer judges whether the application authentication information is correct, and if so, the upper computer application passes the authentication.
The consumable identification reader-writer responds to a working instruction sent by an upper computer or external equipment and sends an application authentication instruction to the authentication chip. For example, the upper computer application is opened, that is, the upper computer sends a working instruction, or the working instruction is sent to the consumable identification reader-writer according to the unlocking operation of the user, or the user clicks a function option on the external device to initiate the working instruction to the authentication chip.
The authentication chip comprises a chip carrier, a chip read-write interface matched with a consumable identification reader-writer interface is arranged on the chip carrier, if the chip read-write interface is a contact communication interface, the contact position of the chip read-write interface is required to be matched with the consumable identification reader-writer interface, if the chip read-write interface is a non-contact interface (such as an antenna and an RFID), the installation position of the chip read-write interface is required to be matched with the consumable identification reader-writer interface, in one implementation mode, the shape of the chip carrier is also matched with the shape of the consumable identification reader-writer interface, for example, the consumable identification reader-writer interface is annular, and the chip carrier is also annular arranged on the end face of a coiled material.
In addition, the authentication chip is also internally provided with an on-chip operating system (namely a COS system), and in order to operate the system, the authentication chip further comprises a microprocessor and a second storage module, wherein the microprocessor is connected with a chip read-write interface to realize communication connection with a consumable identification reader-writer, the second storage module stores system files of the on-chip operating system, and the microprocessor operates the on-chip operating system by loading the system files in the second storage.
The chip carrier further includes a first memory module storing at least application authentication information for authenticating an application of the host computer, and in some cases, consumable authentication information for authenticating whether the consumable is a specified consumable.
Specifically, if the existing consumable is upgraded, the first storage module only needs to store application authentication information, and if the application and the consumable are bound and sold for the upper computer, the first storage module stores application authentication information and consumable authentication information simultaneously and is used for authenticating the appointed consumable and authenticating the upper computer application respectively.
After the microprocessor obtains the application authentication instruction through the chip read-write interface, the microprocessor responds to the application authentication instruction to encrypt the application authentication information and generate a first secret code, and the first secret code is sent to the consumable identification reader through the chip read-write interface.
Specifically, an on-chip operating system (COS system) is operated in the authentication chip, and after the COS system obtains an application authentication instruction from the consumable identification reader-writer, data exchange is required between the authentication chip and the consumable identification reader-writer, and a communication handshake relationship is established, that is, the consumable identification reader-writer needs to be mutually authenticated with the authentication chip to confirm and verify identities of both sides, and then further data transmission can be arranged. The authentication method is the prior art, for example, authentication is performed by means of mutual MAC address, random code, etc., and will not be described in detail here.
In this embodiment, the data encryption manner of the authentication chip is the same as that of the first embodiment, the data decryption manner of the consumable identification reader-writer is the same as that of the sixth embodiment, and the data decryption manner of the upper computer is the same as that of the eighth embodiment, and the description thereof is not repeated here.
Referring to fig. 7 and 8, a tenth embodiment of the present invention, applied to the upper computer application authentication system according to any one of the aspects of the ninth embodiment, provides an authentication method for an upper computer application, including the following steps:
401. The consumable identification reader-writer sends an application authentication instruction to the authentication chip;
402. The authentication chip encrypts application authentication information of the upper computer application in response to the application authentication instruction and generates a first secret code, wherein the application authentication information is used for authenticating the upper computer application;
403. the authentication chip sends the first password to a consumable identification reader;
404. The consumable identification reader-writer acquires a first secret code from the authentication chip, and sends the first secret code to the upper computer, or after decrypting the first secret code into application authentication information, sends the application authentication information to the upper computer;
405. The upper computer receives application authentication information from the consumable identification reader-writer or decrypts a first password from the consumable identification reader-writer to generate the application authentication information;
406. the upper computer judges whether the application authentication information is correct or not, and if so, the upper computer passes the authentication.
Further, the method also comprises the following steps:
407. If the upper computer application passes the authentication, the upper computer application identity authorization or the function unlocking is successful.
The upper computer application can be an application related to external equipment, such as printing, typesetting and photo processing application, or an application unrelated to the external equipment, such as word processing application, input method application and the like. After the upper computer application passes the authentication, the user can be authorized to use the related upper computer application, or part of functions of the upper computer application can be unlocked, for example, a common user can only use basic functions, and the advanced functions can be unlocked after passing the authentication. Taking typesetting software as an example, a common user can only use a basic typesetting function, while some advanced templates and filters are advanced functions and can only be used after unlocking. The user only needs to purchase the consumable with the application authentication information corresponding to the advanced application of the modified software or the authentication chip which can be installed on the consumable, and the advanced application of the upper computer application can be used by replacing the consumable or upgrading the existing consumable.
Specifically, the method comprises the steps that a user replaces consumable with application authentication information into external equipment, the upper computer application is opened, the unlocking function is clicked, the consumable identification reader-writer can be instructed to send an application authentication instruction to the authentication chip, the upper computer can acquire the application authentication information or the first secret code from the authentication chip through the consumable identification reader-writer, if the application authentication information or the first secret code is the first secret code, the application authentication information is obtained through decryption, and at the moment, the upper computer application advanced function can be unlocked only by identifying whether the application authentication information can pass authentication. The authorization function of the upper computer application is similar, and the upper computer application can be used only by prompting the unlocking step when the application is opened.
The other operation mode is that after the user opens the upper computer application, authentication is started, and if the authentication is correct, the upper application function is automatically unlocked or the upper computer application is authorized to be used.
Wherein step 401 comprises the steps of:
4011. The consumable identification reader-writer sends an application authentication instruction to the authentication chip according to the instruction of the upper computer or the external equipment;
4012. And carrying out data exchange matching with the authentication chip, authenticating the validity of the authentication chip, and establishing a communication handshake relationship with the authentication chip.
In step 402, the data encryption manner of the authentication chip is the same as that of the first embodiment, and the detailed description is omitted here.
In step 404, the data decryption method of the consumable identification reader is identical to that of implementation six, and the description is not repeated here.
In step 405, the data decryption manner of the upper computer is the same as that of the implementation eight, and the detailed description is not repeated here.
Referring to fig. 6, an eleventh embodiment of the present invention provides a control apparatus including at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the control methods of the third, sixth, and eighth embodiments described above.
The one or more modules are stored in the memory and when executed by the one or more processors perform the control method of any of the method embodiments described above, e.g., performing method steps 101 through 106 of embodiment three above, method steps 201 through 203 of embodiment six, and method steps 301 through 303 of embodiment eight.
A twelfth embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions that are executed by one or more processors, for example, by one of the processors in fig. 6, and that cause the one or more processors to perform the control methods of the third, sixth, and eighth embodiments described above, for example, the method steps 101 to 106 in the third embodiment described above, the method steps 201 to 203 in the sixth embodiment described above, and the method steps 301 to 303 in the eighth embodiment described above.
A thirteenth embodiment of the present invention provides a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, for example by one of the processors in fig. 6, cause the one or more processors to perform the control method of the third, sixth and eighth embodiments described above, for example, the method steps 101 to 106 in the third embodiment described above, the method steps 201 to 203 in the sixth embodiment described above, and the method steps 301 to 303 in the eighth embodiment described above.
In the embodiment of the invention, the application authentication information encrypted in the authentication chip is obtained through the consumable identification reader-writer in the external equipment and is used for authenticating the application of the upper computer, a software development company does not need to pay for hardware cost such as a server, ukey and the like, and the authentication of the application of the upper computer can be conveniently realized only by applying the existing consumable identification reader-writer and the authentication chip, so that the authentication cost is low. The user only needs to purchase authentication consumables or authentication chips matched with consumable identification readers, authentication of the upper computer application can be completed in the use process of using the external equipment, complicated registration and serial number input operation are not needed, and the user does not need to install a driver in advance like Ukey, so that the complexity of authentication operation of the user can be effectively reduced. The application authentication information is transmitted in a mode of encrypting the first secret code, so that confidentiality is high, and benefits of a software development company are effectively maintained.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Those skilled in the art will appreciate that all or part of the processes implementing the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and where the program may include processes implementing the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
The present invention is not limited to the above embodiments, but is merely preferred embodiments of the present invention, and the present invention should be construed as being limited to the above embodiments as long as the technical effects of the present invention are achieved by the same means.

Claims (7)

1. An application authentication system for a host computer, comprising:
the upper computer is loaded with an upper computer application;
The consumable identification reader-writer is used for identifying whether the consumable is a specified consumable or not, and the consumable identification reader-writer is in communication connection with the upper computer;
The authentication chip comprises a chip carrier, a first storage module, a microprocessor for running an on-chip operating system and a chip read-write interface matched with a consumable identification reader-writer interface are arranged on the chip carrier, the first storage module is connected with the microprocessor, the microprocessor is connected with the consumable identification reader-writer through the chip read-write interface, and application authentication information for authenticating the application of the upper computer is stored in the first storage module;
The microprocessor acquires an application authentication instruction from the consumable identification reader-writer through a chip read-write interface, encrypts the application authentication information in response to the application authentication instruction and generates a first secret code, and sends the first secret code to the consumable identification reader-writer through the chip read-write interface;
The consumable identification reader-writer acquires a first password from the authentication chip, and sends the first password to the upper computer, or after decrypting the first password into application authentication information, sends the application authentication information to the upper computer;
The upper computer receives the application authentication information from the consumable identification reader-writer or decrypts the first password from the consumable identification reader-writer to generate the application authentication information;
The upper computer judges whether the application authentication information is correct, and if so, the upper computer application passes the authentication.
2. The authentication method of the upper computer application is characterized by comprising the following steps of:
the consumable identification reader-writer sends an application authentication instruction to the authentication chip;
The authentication chip encrypts application authentication information of the upper computer application in response to the application authentication instruction and generates a first secret code, wherein the application authentication information is used for authenticating the upper computer application;
the authentication chip sends the first password to a consumable identification reader;
the consumable identification reader-writer acquires a first secret code from the authentication chip, and sends the first secret code to the upper computer, or after decrypting the first secret code into application authentication information, sends the application authentication information to the upper computer;
The upper computer receives application authentication information from the consumable identification reader-writer or decrypts a first password from the consumable identification reader-writer to generate the application authentication information;
the upper computer judges whether the application authentication information is correct or not, and if so, the upper computer passes the authentication.
3. The authentication method of a host application according to claim 2, further comprising the steps of:
If the upper computer application passes the authentication, the upper computer application identity authorization or the function unlocking is successful.
4. The authentication method of an upper computer application according to claim 2 or 3, wherein the consumable identification reader sends an application authentication command to the authentication chip, and specifically comprises:
the consumable identification reader-writer sends an application authentication instruction to the authentication chip;
And carrying out data exchange matching between the authentication chip and the consumable identification reader-writer, and establishing a communication handshake relationship.
5. The authentication method of the upper computer application according to claim 2 or 3, wherein the authentication chip encrypts the application authentication information of the upper computer application and generates a first secret code in response to the application authentication instruction, and specifically comprises:
The authentication chip acquires a secret key, encrypts application authentication information applied by the upper computer according to the secret key and generates a first secret code;
the upper computer or the consumable identification reader-writer acquires the secret key and decodes the first secret code to acquire application authentication information.
6. A control device, characterized by comprising
At least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 2-5.
7. A computer readable storage medium storing computer executable instructions for causing a computer to perform the method of any one of claims 2-5.
CN202010694189.4A 2020-07-17 2020-07-17 Authentication chip control method, authentication method for upper computer application and system thereof Active CN111966969B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010694189.4A CN111966969B (en) 2020-07-17 2020-07-17 Authentication chip control method, authentication method for upper computer application and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010694189.4A CN111966969B (en) 2020-07-17 2020-07-17 Authentication chip control method, authentication method for upper computer application and system thereof

Publications (2)

Publication Number Publication Date
CN111966969A CN111966969A (en) 2020-11-20
CN111966969B true CN111966969B (en) 2024-04-30

Family

ID=73360444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010694189.4A Active CN111966969B (en) 2020-07-17 2020-07-17 Authentication chip control method, authentication method for upper computer application and system thereof

Country Status (1)

Country Link
CN (1) CN111966969B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004139242A (en) * 2002-10-16 2004-05-13 Dainippon Printing Co Ltd Ic card, and system and method for issuing ic card
WO2011066690A1 (en) * 2009-12-04 2011-06-09 Sheng Yongxiang Electronic security device for validation adopting biometrics information and using method thereof
CN102968647A (en) * 2011-08-31 2013-03-13 北京中电华大电子设计有限责任公司 Reader-writer authentication and label authentication password distributing method and device
CN104680054A (en) * 2015-02-11 2015-06-03 成都布林特信息技术有限公司 RFID (radio frequency identification devices) data processing method
CN205091758U (en) * 2015-08-07 2016-03-16 北京亿速码数据处理有限责任公司 Card reader and CPU card transaction system
CN106022178A (en) * 2015-11-10 2016-10-12 天地融科技股份有限公司 Identity card reading method and system, and card reader
CN106295376A (en) * 2016-08-24 2017-01-04 杭州旗捷科技有限公司 A kind of highly effective and safe communication system being applied to printing field and operational approach thereof
CN108804953A (en) * 2018-06-15 2018-11-13 杭州旗捷科技有限公司 Consumable chip and its communication means, consumable chip and imaging device communication system, method
CN109214221A (en) * 2018-08-23 2019-01-15 武汉普利商用机器有限公司 A kind of identity card reader verification method, host computer and identity card reader
CN109977702A (en) * 2019-04-08 2019-07-05 成都靖尧通信技术有限公司 A kind of FPGA device encrypted authentication system and method based on DS2432 chip
CN110909338A (en) * 2019-11-01 2020-03-24 浙江地芯引力科技有限公司 Security authentication method and system based on security chip and security chip

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004139242A (en) * 2002-10-16 2004-05-13 Dainippon Printing Co Ltd Ic card, and system and method for issuing ic card
WO2011066690A1 (en) * 2009-12-04 2011-06-09 Sheng Yongxiang Electronic security device for validation adopting biometrics information and using method thereof
CN102968647A (en) * 2011-08-31 2013-03-13 北京中电华大电子设计有限责任公司 Reader-writer authentication and label authentication password distributing method and device
CN104680054A (en) * 2015-02-11 2015-06-03 成都布林特信息技术有限公司 RFID (radio frequency identification devices) data processing method
CN205091758U (en) * 2015-08-07 2016-03-16 北京亿速码数据处理有限责任公司 Card reader and CPU card transaction system
CN106022178A (en) * 2015-11-10 2016-10-12 天地融科技股份有限公司 Identity card reading method and system, and card reader
CN106295376A (en) * 2016-08-24 2017-01-04 杭州旗捷科技有限公司 A kind of highly effective and safe communication system being applied to printing field and operational approach thereof
CN108804953A (en) * 2018-06-15 2018-11-13 杭州旗捷科技有限公司 Consumable chip and its communication means, consumable chip and imaging device communication system, method
CN109214221A (en) * 2018-08-23 2019-01-15 武汉普利商用机器有限公司 A kind of identity card reader verification method, host computer and identity card reader
CN109977702A (en) * 2019-04-08 2019-07-05 成都靖尧通信技术有限公司 A kind of FPGA device encrypted authentication system and method based on DS2432 chip
CN110909338A (en) * 2019-11-01 2020-03-24 浙江地芯引力科技有限公司 Security authentication method and system based on security chip and security chip

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
安全RTU可信度量与认证技术;马纳;薄燕芳;罗冰;张高达;;中国仪器仪表(第04期);全文 *
赵跃华 ; 蒋军 ; 蔡贵贤 ; .远程电力监控系统中的用户认证与鉴别.计算机工程与设计.2006,(第09期),全文. *
远程电力监控系统中的用户认证与鉴别;赵跃华;蒋军;蔡贵贤;;计算机工程与设计(第09期);全文 *

Also Published As

Publication number Publication date
CN111966969A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
US7108177B2 (en) Proximity validation system and method
CN106656488B (en) Key downloading method and device for POS terminal
CN100533459C (en) Data safety reading method and safety storage apparatus thereof
CN102217277B (en) Method and system for token-based authentication
US20070107042A1 (en) System and method for limiting access to a shared multi-functional peripheral device
US8181223B2 (en) Electronic apparatus conducting two-port authentication, method of authenticating and receiving job data, an recording medium containing job data authentication-reception program
KR20030043738A (en) Application authentication system
CN106789024B (en) A kind of remote de-locking method, device and system
US7853787B2 (en) Peripheral device for programmable logic controller
US20090187770A1 (en) Data Security Including Real-Time Key Generation
CN110401613A (en) A kind of authentication management method and relevant device
CN105511821B (en) A kind of printing based on intelligent code key and imprinting control system and implementation method
JP6723422B1 (en) Authentication system
US9025188B2 (en) Information processing system acquiring access right to delivery destination of image data, method of processing information, image inputting apparatus, information processing apparatus, and program
CN111966969B (en) Authentication chip control method, authentication method for upper computer application and system thereof
CN115051871B (en) Authentication method and equipment and storage medium
KR101116607B1 (en) Printing apparatus having security funcition and method for the same
CN105072136A (en) Method and system for security authentication between devices based on virtual drive
CN109740321B (en) Method for revoking manager lock of encryption machine, encryption machine and manufacturer server
JP2008003782A (en) Authentication device, program of terminal device, image forming apparatus, terminal device control method, and image forming apparatus control method
KR101058929B1 (en) Data security storage method and storage device using smart card encryption key
JP5077685B2 (en) Input device and information processing method
KR100930012B1 (en) Method for Processing User's Certification
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
JP7280086B2 (en) Information relay device and information relay method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant