CN113708923A - Method and system for remotely downloading master key - Google Patents
Method and system for remotely downloading master key Download PDFInfo
- Publication number
- CN113708923A CN113708923A CN202110862203.1A CN202110862203A CN113708923A CN 113708923 A CN113708923 A CN 113708923A CN 202110862203 A CN202110862203 A CN 202110862203A CN 113708923 A CN113708923 A CN 113708923A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- management system
- public key
- downloading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000012795 verification Methods 0.000 claims abstract description 10
- 230000008520 organization Effects 0.000 claims abstract description 4
- 101150019400 TMK1 gene Proteins 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 12
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a system for remotely downloading a master key, which relate to the technical field of electronic payment, and comprise the following steps: s1, inputting a manufacturer RSA public key to the terminal management system, and importing the organization stock terminal data to the terminal management system; s2, the merchant uses the terminal to download the terminal program remotely; s3, after updating the terminal program, entering a main key downloading interface through the terminal and clicking to download, and calling an SM2 public key downloading interface by the terminal; s4, the terminal management system verifies the RSA public key of the manufacturer of the terminal and the unique terminal identifier, judges whether the terminal allows remote downloading, if the terminal allows remote downloading, the verification is passed, and the step S5 is skipped; s5, generating ZMK1, ZMK2 and TKM1 by the terminal management system; s6, the terminal management system returns ZMK2 and TKM1 to the terminal; and S7, terminal decryption ZMK2 and TKM1 obtain the master key, and the merchant is supported to remotely download the master key, so that the process is quick and convenient.
Description
Technical Field
The invention relates to the technical field of electronic payment, in particular to a method and a system for remotely downloading a master key.
Background
In order to ensure the security of the terminal master key, most acquiring organizations still adopt a key fob form to manage the terminal master key, and in the mode, when the merchant master key is invalid or lost, the merchant needs to go to the home or post the key by himself, the processing process is time-consuming and labor-consuming, and influences the daily use of the merchant, so that a safe and reliable scheme capable of downloading the master key remotely is urgently needed, and the merchant can conveniently and quickly download the master key when the master key of the terminal is abnormal.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method and a system for remotely downloading a master key, so as to solve the technical problems.
The technical method for solving the technical problem is as follows: in a method of remotely downloading a master key, the improvement comprising: the method comprises the following steps: s1, inputting a manufacturer RSA public key to the terminal management system, and importing the organization stock terminal data to the terminal management system, wherein the RSA public key is a public key cryptosystem using different encryption keys and decryption keys; s2, the merchant uses the terminal to download the terminal program remotely; s3, after updating the terminal program, entering a main key downloading interface through the terminal and clicking to download, calling an SM2 public key downloading interface by the terminal, wherein the SM2 public key is a national key algorithm public key; s4, the terminal management system verifies the RSA public key of the manufacturer of the terminal and the unique terminal identifier, judges whether the terminal allows remote downloading, if the terminal allows remote downloading, the verification is passed, and the step S5 is skipped; if not, returning an abnormal prompt; s5, after ZMK1 is generated by the terminal management system, ZMK2 and TKM1, ZMK1 are generated as encryption commands of the encryptor, the encryption commands are used for encrypting the SM2 public key, ZMK2 is used for protecting the transmission key of the TMK1, and the TKM1 is provided after being encrypted by a ciphertext and used for protecting the main key of the terminal; s6, the terminal management system returns ZMK2 and TKM1 to the terminal; s7, terminal decryption ZMK2 and TKM1 obtain the master key, and the master key is stored.
In the above method, step S8 is further included, after the master key is successfully saved, the terminal automatically updates to the standard program or masks the current master key download entry.
In the above method, in the step S5, the terminal management system generates ZMK1, including the steps of:
s501, the terminal management system calls a K1 command to the encryption machine, the encryption machine generates an SM2 public and private key and returns the SM2 public and private key to the terminal management system, and the K1 command is an encryption machine operation command and is used for the encryption machine to generate an SM 2;
s502, the terminal management system stores the SM2 private key, generates ZMK1, encrypts the SM2 public key and returns the SM2 public key to the terminal management system, and ZMK1 is an encryption command of an encryption machine and is used for encrypting the SM2 public key.
In the above method, in step S5, ZMK2 and TKM1 are generated, which includes the following steps:
s503, the terminal decrypts ZMK1 to obtain an SM2 public key, and simultaneously calls a main key downloading interface to apply for the terminal management system to obtain a main key;
s504, after receiving the request, the terminal management system verifies the RSA public key of the manufacturer, if the verification is passed, the terminal management system calls an encryption machine W0 instruction to generate ZMK2, and returns a command to the terminal management system W0 as an encryption machine operation instruction for producing ZMK 2; if the verification fails, the main key downloading is prompted to fail;
and S505, after receiving ZMK2 returned by the encryption device, the terminal management system calls a WP instruction of the encryption device to generate a TMK1 and returns the TMK1 to the terminal management system, wherein the WP instruction is an operation instruction of the encryption device and is used for generating a transmission key of the TMK1 and ZMK2 for protecting the TMK 1.
The invention also provides a system for remotely downloading the master key, which comprises a terminal and a terminal management system,
the terminal management system is used for inputting a manufacturer RSA public key and importing the enterprise stock terminal data, and the RSA public key is a public key cryptosystem using different encryption keys and decryption keys; checking an RSA public key and a terminal unique identifier of a manufacturer of the terminal, judging whether the terminal allows remote downloading, if the terminal allows remote downloading, passing the check, generating ZMK1, then generating ZMK2 and TKM1, wherein ZMK1 is an encryption command of an encryption machine and is used for encrypting an SM2 public key, ZMK2 is used for protecting a transmission key of TMK1, the TKM1 is provided after being encrypted by a ciphertext and is used for protecting a main key of the terminal, and if the terminal does not allow remote downloading, an exception prompt is returned; ZMK2 and TKM1 are then returned to the terminal;
the terminal is used for remotely downloading the terminal program, after the terminal program is updated, the terminal enters the main key downloading interface and clicks to download, and calls the SM2 public key downloading interface, wherein the SM2 public key is a national key algorithm public key; the master key is obtained and stored after the ZMK2 and TKM1 are decrypted.
The invention has the beneficial effects that: the remote downloading of the master key by the merchant is supported through the terminal and the terminal management system, and the process is quick and convenient; and the security of the master key is ensured through multi-layer encryption and transmission rules.
Drawings
Fig. 1 is a flow chart of a method for remotely downloading a master key according to the present invention.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
The conception, the specific structure, and the technical effects produced by the present invention will be clearly and completely described below in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the features, and the effects of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and those skilled in the art can obtain other embodiments without inventive effort based on the embodiments of the present invention, and all embodiments are within the protection scope of the present invention. In addition, all the connection/connection relations referred to in the patent do not mean that the components are directly connected, but mean that a better connection structure can be formed by adding or reducing connection auxiliary components according to specific implementation conditions. All technical characteristics in the invention can be interactively combined on the premise of not conflicting with each other.
Referring to fig. 1, a method for remotely downloading a master key according to the present invention includes the following steps:
and S1, inputting a manufacturer RSA public key into the terminal management system, and importing the organization stock terminal data into the terminal management system, wherein the RSA public key is a public key cryptosystem using different encryption keys and decryption keys.
And S2, the merchant uses the terminal to download the terminal program remotely.
And S3, after updating the terminal program, entering a main key downloading interface through the terminal and clicking to download, calling an SM2 public key downloading interface by the terminal, wherein the SM2 public key is a national key algorithm public key.
S4, the terminal management system verifies the RSA public key of the manufacturer of the terminal and the unique terminal identifier, judges whether the terminal allows remote downloading, if the terminal allows remote downloading, the verification is passed, and the step S5 is skipped; and if not, returning an exception prompt.
S5, after ZMK1 is generated by the terminal management system, ZMK2 and TKM1, ZMK1 are generated as encryption commands of the encryptor, the encryption commands are used for encrypting the SM2 public key, ZMK2 is used for protecting the transmission key of the TMK1, and the TKM1 is provided after being encrypted by a ciphertext and used for protecting the main key of the terminal;
specifically, the method comprises the following steps:
s501, the terminal management system calls a K1 command to the encryption machine, the encryption machine generates an SM2 public and private key and returns the SM2 public and private key to the terminal management system, and the K1 command is an encryption machine operation command and is used for the encryption machine to generate an SM 2;
s502, the terminal management system stores an SM2 private key, generates ZMK1, encrypts an SM2 public key and returns the encrypted SM2 public key to the terminal management system, wherein ZMK1 is an encryption command of an encryption machine and is used for encrypting an SM2 public key;
s503, the terminal decrypts ZMK1 to obtain an SM2 public key, and simultaneously calls a main key downloading interface to apply for the terminal management system to obtain a main key;
s504, after receiving the request, the terminal management system verifies the RSA public key of the manufacturer, if the verification is passed, the terminal management system calls an encryption machine W0 instruction to generate ZMK2, and returns a command to the terminal management system W0 as an encryption machine operation instruction for producing ZMK 2; if the verification fails, the main key downloading is prompted to fail;
and S505, after receiving ZMK2 returned by the encryption device, the terminal management system calls a WP instruction of the encryption device to generate a TMK1 and returns the TMK1 to the terminal management system, wherein the WP instruction is an operation instruction of the encryption device and is used for generating a transmission key of the TMK1 and ZMK2 for protecting the TMK 1.
S6, the terminal management system returns ZMK2 and TKM1 to the terminal.
S7, terminal decryption ZMK2 and TKM1 obtain the master key, and the master key is stored. The method and the device realize the remote downloading of the master key by the terminal, and ensure the safety of the master key through multi-layer encryption and transmission rules.
Further, the method also includes step S8, after the master key is successfully saved, the terminal automatically updates to the standard program or shields the current master key download entry, which enhances the concealment and security of the master key.
The invention also provides a system for remotely downloading the master key, which comprises a terminal and a terminal management system,
the terminal management system is used for inputting a manufacturer RSA public key and importing the enterprise stock terminal data, and the RSA public key is a public key cryptosystem using different encryption keys and decryption keys; checking an RSA public key and a terminal unique identifier of a manufacturer of the terminal, judging whether the terminal allows remote downloading, if the terminal allows remote downloading, passing the check, generating ZMK1, then generating ZMK2 and TKM1, wherein ZMK1 is an encryption command of an encryption machine and is used for encrypting an SM2 public key, ZMK2 is used for protecting a transmission key of TMK1, the TKM1 is provided after being encrypted by a ciphertext and is used for protecting a main key of the terminal, and if the terminal does not allow remote downloading, an exception prompt is returned; ZMK2 and TKM1 are then returned to the terminal;
the terminal is used for remotely downloading the terminal program, after the terminal program is updated, the terminal enters a main key downloading interface and clicks to download, an SM2 public key downloading interface is called, and an SM2 public key is a national key algorithm public key; the master key is obtained and stored after the ZMK2 and TKM1 are decrypted.
The invention realizes the support of remote downloading of the master key by the merchant through the terminal and the terminal management system, and the process is quick and convenient; and the security of the master key is ensured through multi-layer encryption and transmission rules.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (5)
1. A method for remotely downloading a master key, comprising: the method comprises the following steps:
s1, inputting a manufacturer RSA public key to the terminal management system, and importing the organization stock terminal data to the terminal management system, wherein the RSA public key is a public key cryptosystem using different encryption keys and decryption keys;
s2, the merchant uses the terminal to download the terminal program remotely;
s3, after updating the terminal program, entering a main key downloading interface through the terminal and clicking to download, calling an SM2 public key downloading interface by the terminal, wherein the SM2 public key is a national key algorithm public key;
s4, the terminal management system verifies the RSA public key of the manufacturer of the terminal and the unique terminal identifier, judges whether the terminal allows remote downloading, if the terminal allows remote downloading, the verification is passed, and the step S5 is skipped; if not, returning an abnormal prompt;
s5, after ZMK1 is generated by the terminal management system, ZMK2 and TKM1, ZMK1 are generated as encryption commands of the encryptor, the encryption commands are used for encrypting the SM2 public key, ZMK2 is used for protecting the transmission key of the TMK1, and the TKM1 is provided after being encrypted by a ciphertext and used for protecting the main key of the terminal;
s6, the terminal management system returns ZMK2 and TKM1 to the terminal;
s7, terminal decryption ZMK2 and TKM1 obtain the master key, and the master key is stored.
2. A method for remotely downloading a master key as recited in claim 1, wherein: and step S8, after the master key is successfully stored, the terminal automatically updates to a standard program or shields the current master key downloading entrance.
3. A method for remotely downloading a master key as recited in claim 1, wherein: in the step S5, the terminal management system generates ZMK1, including the steps of:
s501, the terminal management system calls a K1 command to the encryption machine, the encryption machine generates an SM2 public and private key and returns the SM2 public and private key to the terminal management system, and the K1 command is an encryption machine operation command and is used for the encryption machine to generate an SM 2;
s502, the terminal management system stores the SM2 private key, generates ZMK1, encrypts the SM2 public key and returns the SM2 public key to the terminal management system, and ZMK1 is an encryption command of an encryption machine and is used for encrypting the SM2 public key.
4. A method for remotely downloading a master key as recited in claim 3, wherein: in step S5, ZMK2 and TKM1 are generated, which includes the following steps:
s503, the terminal decrypts ZMK1 to obtain an SM2 public key, and simultaneously calls a main key downloading interface to apply for the terminal management system to obtain a main key;
s504, after receiving the request, the terminal management system verifies the RSA public key of the manufacturer, if the verification is passed, the terminal management system calls an encryption machine W0 instruction to generate ZMK2, and returns a command to the terminal management system W0 as an encryption machine operation instruction for producing ZMK 2; if the verification fails, the main key downloading is prompted to fail;
and S505, after receiving ZMK2 returned by the encryption device, the terminal management system calls a WP instruction of the encryption device to generate a TMK1 and returns the TMK1 to the terminal management system, wherein the WP instruction is an operation instruction of the encryption device and is used for generating a transmission key of the TMK1 and ZMK2 for protecting the TMK 1.
5. A system for remotely downloading a master key, comprising: comprises a terminal and a terminal management system,
the terminal management system is used for inputting a manufacturer RSA public key and importing the enterprise stock terminal data, and the RSA public key is a public key cryptosystem using different encryption keys and decryption keys; checking an RSA public key and a terminal unique identifier of a manufacturer of the terminal, judging whether the terminal allows remote downloading, if the terminal allows remote downloading, passing the check, generating ZMK1, then generating ZMK2 and TKM1, wherein ZMK1 is an encryption command of an encryption machine and is used for encrypting an SM2 public key, ZMK2 is used for protecting a transmission key of TMK1, the TKM1 is provided after being encrypted by a ciphertext and is used for protecting a main key of the terminal, and if the terminal does not allow remote downloading, an exception prompt is returned; ZMK2 and TKM1 are then returned to the terminal;
the terminal is used for remotely downloading the terminal program, after the terminal program is updated, the terminal enters the main key downloading interface and clicks to download, and calls the SM2 public key downloading interface, wherein the SM2 public key is a national key algorithm public key; the master key is obtained and stored after the ZMK2 and TKM1 are decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110862203.1A CN113708923A (en) | 2021-07-29 | 2021-07-29 | Method and system for remotely downloading master key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110862203.1A CN113708923A (en) | 2021-07-29 | 2021-07-29 | Method and system for remotely downloading master key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113708923A true CN113708923A (en) | 2021-11-26 |
Family
ID=78650851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110862203.1A Pending CN113708923A (en) | 2021-07-29 | 2021-07-29 | Method and system for remotely downloading master key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113708923A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101930644A (en) * | 2009-06-25 | 2010-12-29 | 中国银联股份有限公司 | Method for safely downloading master key automatically in bank card payment system and system thereof |
CN103731259A (en) * | 2013-03-15 | 2014-04-16 | 福建联迪商用设备有限公司 | Method and system for safe downloading of TMK |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
CN109995532A (en) * | 2019-04-11 | 2019-07-09 | 晏福平 | A kind of online management method and system of terminal master key |
-
2021
- 2021-07-29 CN CN202110862203.1A patent/CN113708923A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101930644A (en) * | 2009-06-25 | 2010-12-29 | 中国银联股份有限公司 | Method for safely downloading master key automatically in bank card payment system and system thereof |
CN103731259A (en) * | 2013-03-15 | 2014-04-16 | 福建联迪商用设备有限公司 | Method and system for safe downloading of TMK |
WO2014139406A1 (en) * | 2013-03-15 | 2014-09-18 | 福建联迪商用设备有限公司 | Method and system for safely downloading terminal master key (tmr) |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
CN109995532A (en) * | 2019-04-11 | 2019-07-09 | 晏福平 | A kind of online management method and system of terminal master key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111654367B (en) | Method for cryptographic operation and creation of working key, cryptographic service platform and device | |
CN109347625B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN105072125B (en) | A kind of http communication system and method | |
CN105915338B (en) | Generate the method and system of key | |
CN111740942B (en) | Login/registration method, device, system, electronic equipment and storage medium | |
CN105978917A (en) | System and method for trusted application security authentication | |
CN108319857B (en) | Trusted application locking and unlocking method and system | |
EP2919413A2 (en) | Data security verification method and device | |
CN108270739B (en) | Method and device for managing encryption information | |
CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
CN109033869A (en) | Encrypted file system hanging method and device | |
CN113674456B (en) | Unlocking method, unlocking device, electronic equipment and storage medium | |
CN112865965B (en) | Train service data processing method and system based on quantum key | |
CN112653719A (en) | Automobile information safety storage method and device, electronic equipment and storage medium | |
CN116226886B (en) | Information security management method and system for software information system | |
CN111970109A (en) | Data transmission method and system | |
CN108959962B (en) | API (application programming interface) secure calling method of dynamic library | |
US20230107953A1 (en) | Over-the-air updating method, update server, terminal device, and internet of things system | |
CN113886793A (en) | Device login method, device, electronic device, system and storage medium | |
CN113708923A (en) | Method and system for remotely downloading master key | |
CN110287725B (en) | Equipment, authority control method thereof and computer readable storage medium | |
CN111523128B (en) | Information protection method, system, electronic equipment and medium | |
CN113472749A (en) | Method for preventing unauthorized self-service machine terminal from accessing B/S architecture system | |
CN110166452A (en) | A kind of access control method and system based on JavaCard shared interface | |
CN111145461B (en) | Tax-controlled encryptor, tax return verification method and apparatus, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |