WO2018046008A1 - Storage design method of blockchain encrypted radio frequency chip - Google Patents

Storage design method of blockchain encrypted radio frequency chip Download PDF

Info

Publication number
WO2018046008A1
WO2018046008A1 PCT/CN2017/101304 CN2017101304W WO2018046008A1 WO 2018046008 A1 WO2018046008 A1 WO 2018046008A1 CN 2017101304 W CN2017101304 W CN 2017101304W WO 2018046008 A1 WO2018046008 A1 WO 2018046008A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
radio frequency
blockchain
frequency chip
Prior art date
Application number
PCT/CN2017/101304
Other languages
French (fr)
Chinese (zh)
Inventor
陆杨
Original Assignee
上海鼎利信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海鼎利信息科技有限公司 filed Critical 上海鼎利信息科技有限公司
Publication of WO2018046008A1 publication Critical patent/WO2018046008A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to the field of Internet technology, and relates to a blockchain encryption radio frequency chip storage design method.
  • Blockchain encryption RF chip is increasingly important as a link between the user and the blockchain network.
  • Blockchain encryption RF chip storage methods are constantly threatened by hackers and viruses. Security incidents have occurred many times in recent years.
  • a dense RF chip is used as a tool.
  • the storage and operation of the blockchain encryption RF chip is the foundation and core. It is necessary not only to take into account the technology of the blockchain, but also to consider security, application and scalability. Therefore, there is a need for a storage design method for a blockchain encrypted radio frequency chip that solves the above problems.
  • the technical problem to be solved by the present invention is to provide a storage design method for a blockchain encryption radio frequency chip which is widely used, high in security, good in scalability, and highly applicable.
  • the technical solution of the present invention is: a storage design method for a blockchain encryption radio frequency chip, comprising the following steps:
  • the first step is to design the blockchain to encrypt the data structure of the RF chip
  • the data in the blockchain encryption radio frequency chip is designed to be organized and stored in the user memory
  • the third step is to design the encryption and decryption process of the blockchain encryption radio frequency chip
  • the data structure of the blockchain encryption radio frequency chip includes user data, authentication data and account data;
  • the user data includes read control data A, a user name, a user phone, and a user ID;
  • the read control data A is used to store information for controlling user data reading, the user name is used to store the user's name information, the user phone is used to store the user's phone information, and the user ID stores the internal user number;
  • the authentication data includes: read control data B, user password hash value, authentication key, account master public key;
  • the read control data B is used to authenticate the information read by the data, and the information of the authentication data is extracted, and the local time stamp is added to obtain the user anti-counterfeit mark to prevent tampering, and finally the value of the user anti-counterfeiting mark and the user are
  • the value of the password is converted into a hash value of the length required for the actual security authentication by the hash encryption algorithm, and the process of extracting the information of the authentication data reading is:
  • the information read by the authentication data of any length is divided to generate sub-information segments of length 4n bytes, where n is an arbitrary integer value determined according to the system in advance, and then a Hash function transform is used to generate a 4n-length hash. The value is obtained by adding the local timestamp to obtain the user security flag. In the case that the blockchain encryption radio chip is lost, the illegal user is effectively prevented from violently cracking the user password.
  • the authentication key is used to read the control data B and the Secure authentication between user password hash values, account public key decryption is used to decrypt user security tokens for querying the balance of each account;
  • the account data includes: read control data C, master key ciphertext, and master private key ciphertext;
  • the read control data C is used to store the information read by the account data
  • the master key ciphertext is used to associate the user password with the account private key, improve the encryption parameter of the account public key, improve the difficulty of cracking, and make the account more Safety;
  • the data in the blockchain encryption radio frequency chip is organized in the user memory as a tree file structure, and has a multi-level file structure.
  • the tree file structure is divided into three levels: the first level is the total control file, which is more
  • the root of the application file structure is the root directory of the tree file structure, which is used to store the public information file of the blockchain encryption RF chip and serves all applications; the second level is the application file, which is in the total control file.
  • the application file is used to implement various application functions of the blockchain encryption radio frequency chip
  • the third level is an atom file, which is used to store the actual The application data and the corresponding system management information, the data information in the data structure of the blockchain encryption radio frequency chip is stored in the atom file, and the corresponding atom file can be called when the application file needs;
  • the encryption and decryption process of the blockchain encryption radio frequency chip is:
  • Encryption The system randomly generates a 32-byte master key, reads the user's password at the same time, and stores it in the array matrix, where the user uses the password as the row vector and the master key as the column vector.
  • the encryption algorithm encrypts to obtain the master key ciphertext;
  • the blockchain encryption radio frequency chip storage design method of the invention studies the principle of the blockchain, considers the information security degree, designs the data structure of the blockchain encryption radio frequency chip, and considers the process of encryption and decryption, in order to To meet the principle of multi-purpose card, we have designed a multi-level file structure, increased the degree of information protection, and improved the security and ease of use.
  • FIG. 1 is a specific step of a blockchain encryption radio frequency chip storage design method.
  • Embodiment 1 Hash function construction of user password
  • the user-used password required for the verification card is transformed into a hash value of a desired length by a hash function.
  • the specific process is to first fill and divide the user-used password of any length to generate a sub-information segment of length 4n bytes, and then pass Chaotic iteration, function transformation, substitution, and function lookup tables generate a 4n length hash value.
  • the specific algorithm is as follows:
  • the user is represented by a password into a format.
  • m is the initial number of iterations.
  • a user of any length is padded and divided using a password to generate a sub-information segment having a length of 4 n bytes.
  • Embodiment 2 Definition and application of application files under the system total control file
  • the blockchain encrypts the public information files of the RF chip and serves all applications. Create multiple application catalog files according to the usage conditions on the total control file, for example, the blockchain financial environment including key information, personal information, etc., and then define the financial contact application environment, and encrypt the radio frequency chip according to the Chinese financial blockchain.
  • the specification defines the file name for this application as 1PAY.SYS.DDF01.
  • the financial contactless system environment can also be defined and defined as 2PAY.SYS.DDF01.
  • the financial contact application environment and the financial contact application environment are different application files under the system total control file, and the application file realizes various application selections by using the file name to realize various applications of the radio frequency chip.
  • Embodiment 3 Specific Planning of Key Structure
  • Key management is a comprehensive technology involving the generation, inspection, distribution, transmission, use, storage and destruction of keys, and is closely related to the key management system and the quality of personnel.
  • the ISO has developed a key management standard.
  • the specific system has specific practical requirements, so it is difficult to unify in standardization.
  • the hierarchical structure of the key system is often determined according to the functional structure of the encryption system. If the system function is relatively simple, the key hierarchy can be correspondingly reduced. If the function is relatively complicated, it is necessary to increase the number of key structure layers as appropriate.
  • the security of the key management system can be greatly improved by the design of the layered mode. Since the new protocol can be used to change and manage in each layer, the entire key system is a dynamic feature, not just a static storage mechanism. With each layer of keys, there is a corresponding protocol. .
  • a layer 3 key management system is used in the blockchain encryption radio chip system, which is a master key layer, a subkey layer and a session key layer, respectively.
  • the same system master key exists in the intelligent blockchain encryption radio chip and the card reader. According to the actual situation of the system, some smart cards or card readers have one or more master keys to improve the system. Security. Only one master key is used in this system.
  • the subkey is obtained by encrypting the master key using a variable master key parameter
  • the third layer session key is obtained by encrypting the subkey with another variable master key parameter.
  • the data transmitted between the reader and the chip is encrypted using a session key. Normally, the session key can only be used once, so that even if the session key is deciphered by the attacker, only the data is transmitted once. Also, the system master key cannot be derived from the session key.
  • the session key generation method includes: a state-of-the-art manufacturing identification code is used in the blockchain encryption radio frequency chip, and the serial number or the blockchain is used to encrypt the radio frequency chip serial number, wherein the serial number of the radio frequency chip is encrypted according to the blockchain.
  • the system usually records the time of the transaction at the time of the transaction, and there are corresponding counters in some cards to control the number of readings and writes. The counter is automatically incremented when the card is executed with an instruction. This ensures that the value of the counter and the trading time are inconsistent each time a transaction is made. Therefore, the manufacturer's identification code of the card is used by the master key, and the serial number of the card is encrypted to generate a subkey.
  • the same master key is used, since the serial numbers are different, the subkeys generated by each card are also different. To ensure that the session key on each card is used only once, the transaction time and counter values are encrypted using a subkey to generate a session key. Thus, for the same card, the session key used for each transaction is different. For a multi-purpose chip, different applications often use different master keys, so this makes the deciphering system a lot of work, and the meaning of deciphering is not great.
  • the master key can be presented by a plurality of trusted persons independently of each other and then organically synthesized into a key, and then added by a secure random number encryption operation. Therefore, the generation and change of the master key are difficult to predict. Department If the master key is not careful during the loading process, the key will be leaked. Therefore, the master key must be loaded in a secure environment. Since the system master key needs to be manually loaded into the radio frequency chip and the card reader, it is ensured that the loading process must be performed on the dedicated device, and the environment at the time of downloading must be secure, and the information cannot be lost when the radio frequency card is in contact. The in-card operating system ensures that the master key cannot be read again after it has been loaded. It is very troublesome to load the key in the card reader, and a security module is often added to store the key to implement the encryption and decryption algorithm.
  • the encryption and decryption algorithm uses a digital chaotic sequence, which can improve the digital chaotic iterative process without increasing the amount of computation, so that the pseudo-random sequence generated by the whole system is more similar to noise, and the proportion of weak keys is reduced and expanded.
  • the space of the available keys makes the selection of keys more random.
  • the pseudo-chaotic sequence period generated by the iteration of the digital chaotic system is unpredictable, difficult to accurately analyze, and far less than 2 N (N is the implementation accuracy). Although the accuracy of the implementation is improved, the average period of the pseudo-chaotic sequence is still not greatly improved, and there is still a case where the sequence is attracted to a certain fixed value.
  • the m-sequence is used to perturb the chaotic iterative system.

Abstract

A storage design method of a blockchain encrypted radio frequency chip, comprising: step 1, designing the data structure of a blockchain encrypted radio frequency chip; step 2, designing the form in which data of the blockchain encrypted radio frequency chip is organized and stored in a user memory; and step 3, designing encryption and decryption processes for the blockchain encrypted radio frequency chip. By means of studying the encryption principle of blockchain, the storage design method of a blockchain encrypted radio frequency chip improves information security, satisfies the principle of one card for multiple uses, enhances the degree of information protection, and improves use security and convenience.

Description

一种区块链加密射频芯片存储设计方法Blockchain encryption radio frequency chip storage design method
相关申请的交叉引用Cross-reference to related applications
本申请要求于2016年9月12日提交的,申请号为201610815590.2,题目为“一种区块链加密射频芯片的储存设计方法(A Storage Design Method of Blockchain Encrypted Radio Frequency Chip)”的在先中国申请的优先权。本申请还要求于2016年9月12日提交的,申请号为201610818053.3,题目为“一种区块链身份系统(A Blockchain Identity System)”的在先中国申请的优先权。本申请还要求于2016年9月12日提交的,申请号为201610818054.8,题目为“一种区块链实时轮询云端系统(A Blockchain Real-time Polling Cloud System)”的在先中国申请的优先权。以上提到的三个在先中国申请通过引用被整体地并入本文。This application claims to be filed on September 12, 2016, with the application number 201610815590.2, titled "A Storage Design Method of Blockchain Encrypted Radio Frequency Chip" Priority of application. The present application also claims priority from the prior Chinese application filed on September 12, 2016, with the application number 201610818053.3 entitled "A Blockchain Identity System". This application also requires the priority of the prior Chinese application submitted on September 12, 2016, with the application number 201610818054.8, titled "A Blockchain Real-time Polling Cloud System" right. The three prior Chinese applications mentioned above are incorporated herein by reference in their entirety.
技术领域Technical field
本发明涉及互联网技术领域,一种区块链加密射频芯片存储设计方法。The invention relates to the field of Internet technology, and relates to a blockchain encryption radio frequency chip storage design method.
背景技术Background technique
随着区块链技术的迅猛发展,区块链的应用也愈加广泛。区块链加密射频芯片作为用户与区块链网络的连接纽带,重要性日益凸显。区块链加密射频芯片的存储方式时刻受到黑客和病毒的威胁,近年已经多次发生安全事件。为了让区块链的使用更加便捷,并提高的安全性,必须借助使用便捷、安全性高、扩展性好、应用性强的区块链加 密射频芯片作为工具。而区块链加密射频芯片的存储与操作是基础与核心,不仅要将区块链的技术考虑在内,还要考虑安全性、应用性与扩展性。因此,亟需一种解决以上问题的区块链加密射频芯片的存储设计方法。With the rapid development of blockchain technology, the application of blockchain has become more widespread. The blockchain encryption RF chip is increasingly important as a link between the user and the blockchain network. Blockchain encryption RF chip storage methods are constantly threatened by hackers and viruses. Security incidents have occurred many times in recent years. In order to make the use of the blockchain more convenient and improve the security, it is necessary to use the blockchain with convenient use, high security, good expansibility and strong applicability. A dense RF chip is used as a tool. The storage and operation of the blockchain encryption RF chip is the foundation and core. It is necessary not only to take into account the technology of the blockchain, but also to consider security, application and scalability. Therefore, there is a need for a storage design method for a blockchain encrypted radio frequency chip that solves the above problems.
发明内容Summary of the invention
有鉴于此,本发明要解决的技术问题是提供一种使用广泛、安全性高、扩展性好、应用性强的区块链加密射频芯片的存储设计方法。In view of this, the technical problem to be solved by the present invention is to provide a storage design method for a blockchain encryption radio frequency chip which is widely used, high in security, good in scalability, and highly applicable.
为达到上述技术方案的效果,本发明的技术方案为:一种区块链加密射频芯片的存储设计方法,包括以下步骤:In order to achieve the effects of the foregoing technical solutions, the technical solution of the present invention is: a storage design method for a blockchain encryption radio frequency chip, comprising the following steps:
第一步,设计区块链加密射频芯片的数据结构;The first step is to design the blockchain to encrypt the data structure of the RF chip;
第二步,设计区块链加密射频芯片中的数据在用户存储器中组织存放形式;In the second step, the data in the blockchain encryption radio frequency chip is designed to be organized and stored in the user memory;
第三步,设计区块链加密射频芯片的加密、解密过程;The third step is to design the encryption and decryption process of the blockchain encryption radio frequency chip;
区块链加密射频芯片的数据结构包含用户数据、认证数据和账户数据;The data structure of the blockchain encryption radio frequency chip includes user data, authentication data and account data;
所述用户数据包括读取控制数据A、用户姓名、用户电话、用户ID;The user data includes read control data A, a user name, a user phone, and a user ID;
其中,读取控制数据A用于存储控制用户数据读取的信息,用户姓名用于存储用户的姓名信息,用户电话用于存储用户的电话信息,用户ID存放内部用户编号;The read control data A is used to store information for controlling user data reading, the user name is used to store the user's name information, the user phone is used to store the user's phone information, and the user ID stores the internal user number;
认证数据包括:读取控制数据B、用户口令Hash值、认证密钥、账户主公钥; The authentication data includes: read control data B, user password hash value, authentication key, account master public key;
其中,读取控制数据B用于认证数据读取的信息,并且将认证数据读取的信息提取标记,并加上本地时间戳得到用户防伪标记,防止篡改,最后把用户防伪标记的值和用户口令的值经过Hash加密算法变换成实际安全认证所需长度的Hash值,认证数据读取的信息提取标记的过程为:The read control data B is used to authenticate the information read by the data, and the information of the authentication data is extracted, and the local time stamp is added to obtain the user anti-counterfeit mark to prevent tampering, and finally the value of the user anti-counterfeiting mark and the user are The value of the password is converted into a hash value of the length required for the actual security authentication by the hash encryption algorithm, and the process of extracting the information of the authentication data reading is:
首先将任意长度的所述认证数据读取的信息经划分而生成长度相等为4n字节的子信息段,其中n为根据系统提前制定的任意整数值,之后通过Hash函数变换生成4n长度的Hash值,通过加上所述本地时间戳得到用户防伪标记,在区块链加密射频芯片遗失情况下,有效地避免非法用户暴力破解用户口令,最后认证密钥用于读取控制数据B和所述用户口令Hash值之间的安全认证,账户公钥解密用于解密用户防伪标记,以用于查询上各个账户的余额;First, the information read by the authentication data of any length is divided to generate sub-information segments of length 4n bytes, where n is an arbitrary integer value determined according to the system in advance, and then a Hash function transform is used to generate a 4n-length hash. The value is obtained by adding the local timestamp to obtain the user security flag. In the case that the blockchain encryption radio chip is lost, the illegal user is effectively prevented from violently cracking the user password. Finally, the authentication key is used to read the control data B and the Secure authentication between user password hash values, account public key decryption is used to decrypt user security tokens for querying the balance of each account;
账户数据包括:读取控制数据C、主密钥密文、主私钥密文;The account data includes: read control data C, master key ciphertext, and master private key ciphertext;
其中,读取控制数据C用于存储账户数据读取的信息,主密钥密文用于关联用户口令及账户私钥,提升所述账户主公钥的加密参数,提高破解难度,使账户更加安全;The read control data C is used to store the information read by the account data, and the master key ciphertext is used to associate the user password with the account private key, improve the encryption parameter of the account public key, improve the difficulty of cracking, and make the account more Safety;
区块链加密射频芯片中的数据在用户存储器中组织存放形式为树型文件结构,具有多层次文件结构的形态,树型文件结构分成三种层次:第一个层次是总控制文件,是多应用文件结构的根,为树型文件结构的根目录,用于存放区块链加密射频芯片的公共信息文件,并且为所有的应用程序服务;第二个层次是应用文件,在总控制文件之下,为树型文件结构的子目录,根据使用情况分别建立多个应用文件,应用文件用于实现区块链加密射频芯片的多种应用功能;第三个层次是原子文件,用于存储实际应用数据和相应的系统管理信息,区块链加密射频芯片的数据结构中的数据信息就存放于原子文件中,当应用文件需要时可调用相应的原子文件;The data in the blockchain encryption radio frequency chip is organized in the user memory as a tree file structure, and has a multi-level file structure. The tree file structure is divided into three levels: the first level is the total control file, which is more The root of the application file structure is the root directory of the tree file structure, which is used to store the public information file of the blockchain encryption RF chip and serves all applications; the second level is the application file, which is in the total control file. Next, as a subdirectory of the tree file structure, a plurality of application files are respectively created according to the usage, and the application file is used to implement various application functions of the blockchain encryption radio frequency chip; the third level is an atom file, which is used to store the actual The application data and the corresponding system management information, the data information in the data structure of the blockchain encryption radio frequency chip is stored in the atom file, and the corresponding atom file can be called when the application file needs;
区块链加密射频芯片的加密、解密过程为:The encryption and decryption process of the blockchain encryption radio frequency chip is:
(1)加密:系统随机生成一个32字节主密钥,同时读取用户使用口令,并且存储到数组矩阵,其中用户使用口令作为行向量,主密钥作为列向量,并用 加密算法加密,得到主密钥密文;(1) Encryption: The system randomly generates a 32-byte master key, reads the user's password at the same time, and stores it in the array matrix, where the user uses the password as the row vector and the master key as the column vector. The encryption algorithm encrypts to obtain the master key ciphertext;
(2)解密:从账户数据内读取主密钥密文,同时读取用户使用口令,并且存储到数组矩阵,其中用户使用口令作为行向量,主密钥密文作为列向量,通过解密算法将作主密钥密文还原成主密钥,然后从区块链加密射频芯片中读取主私钥密文,通过所述用户防伪标记的验证,结合主密钥将主私钥密文还原成主私钥。(2) Decryption: Read the master key ciphertext from the account data, and read the user password, and store it in the array matrix, where the user uses the password as the row vector and the master key ciphertext as the column vector, through the decryption algorithm. The master key ciphertext is restored to the master key, and then the master private key ciphertext is read from the blockchain encrypted radio frequency chip, and the master private key ciphertext is restored by the verification of the user security mark and the master key. Become the master private key.
本发明的一种区块链加密射频芯片存储设计方法研究了区块链的原理,考虑了信息安全度,设计了区块链加密射频芯片的数据结构,并考虑了加密、解密的过程,为了满足一卡多用的原则,设计了多层次文件结构,加大了信息保护程度,提高使用的安全性和使用的便捷性。The blockchain encryption radio frequency chip storage design method of the invention studies the principle of the blockchain, considers the information security degree, designs the data structure of the blockchain encryption radio frequency chip, and considers the process of encryption and decryption, in order to To meet the principle of multi-purpose card, we have designed a multi-level file structure, increased the degree of information protection, and improved the security and ease of use.
附图说明DRAWINGS
图1为区块链加密射频芯片存储设计方法的具体步骤。FIG. 1 is a specific step of a blockchain encryption radio frequency chip storage design method.
具体实施方式detailed description
为了使本发明所要解决的技术问题、技术方案及有益效果更加清楚明白,以下结合附图及实施例,对本发明进行详细的说明。应当说明的是,此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明,能实现同样功能的产品属于等同替换和改进,均包含在本发明的保护范围之内。具体方法如下:The present invention will be described in detail below with reference to the accompanying drawings and embodiments. It should be noted that the specific embodiments described herein are only intended to explain the present invention, and are not intended to limit the invention, and that the products that can achieve the same function are equivalents and modifications, and are included in the scope of the present invention. The specific method is as follows:
实施例1:用户口令的Hash函数构造Embodiment 1: Hash function construction of user password
将验证卡片所需的用户使用口令经过Hash函数变换成所需长度的Hash值,具体过程为首先将任意长度的用户使用口令经填补、划分而生成长度为4n字节的子信息段,之后通过混沌迭代、函数变换、替换和函数查找表生成4n长度的Hash值。具体算法如下:The user-used password required for the verification card is transformed into a hash value of a desired length by a hash function. The specific process is to first fill and divide the user-used password of any length to generate a sub-information segment of length 4n bytes, and then pass Chaotic iteration, function transformation, substitution, and function lookup tables generate a 4n length hash value. The specific algorithm is as follows:
a)将用户使用口令表示成制定的格式,初始格式为K=(α,x0,m),其中α为混沌映射的参数,x0为混沌映射的初值,这里为用户的使用口令,m为初始迭代次数。以0-1混沌序列初始化各寄存器为:a) The user is represented by a password into a format. The initial format is K=(α, x 0 , m), where α is the parameter of the chaotic map, x 0 is the initial value of the chaotic map, here is the user's password. m is the initial number of iterations. Initialize each register with a 0-1 chaotic sequence as:
A=(b0,b1,…,bn-1),B=(b8n,b8n+1,…,b2*(8n-1)), A=(b 0 , b 1 ,...,b n-1 ), B=(b 8n , b 8n+1 ,...,b 2*(8n-1) ),
C=(b2*8n,b2*(8n+1),…,b3*(8n-1)),D=(b3*8n,b3*(8n+1),…,b4*(8n-1))C=(b 2*8n , b 2*(8n+1) ,...,b 3*(8n-1) ), D=(b 3*8n , b 3*(8n+1) ,...,b 4 *(8n-1) )
b)任意长度的用户使用口令经填补、划分而生成长度为4n字节的子信息段。b) A user of any length is padded and divided using a password to generate a sub-information segment having a length of 4 n bytes.
c)使用函数f(*)重新计算A、B、C、D。c) Recalculate A, B, C, D using the function f(*).
d)根据生成的A、B、C和D的最后比特位决定A、B、C和D在混沌动态s—盒的替换次序,即将A、B、C和D分别与用标号1、2、3和4一一对应,按照函数F(*)的分函数下标顺序做为混沌替换次序。d) according to the last bits of the generated A, B, C and D, determine the replacement order of A, B, C and D in the chaotic dynamic s-box, ie, A, B, C and D respectively with the labels 1, 2 3 and 4 one-to-one correspondence, according to the sub-function subscript order of the function F (*) as the chaotic replacement order.
e)由A、B、C、D的最后bit位查找并计算f(*)。e) Find and calculate f(*) from the last bit of A, B, C, D.
f)判断原始数据是处理否完毕,是则输出4n字节的Hash值A、B、C、D否则转向b)步骤。f) Determine whether the original data is processed or not, and output a 4n-byte hash value A, B, C, D, otherwise go to step b).
实施例2:系统总控制文件下应用文件的定义与应用Embodiment 2: Definition and application of application files under the system total control file
在区块链加密射频芯片上建立文件系统根目上建立系统总控制文件。存放区块链加密射频芯片的公共信息文件,并且为所有的应用程序服务。在总控制文件上根据使用情况分别建立多个应用目录文件,例如为区块链金融环境包括密钥信息、个人信息等,接着定义金融接触式的应用环境,根据中国金融区块链加密射频芯片规范可定义此应用的文件名为1PAY.SYS.DDF01。同样可定义金融非接触式系统环境,并定义为2PAY.SYS.DDF01。金融接触式的应用环境与金融接触式的应用环境都为系统总控制文件之下的不同应用文件,应用文件通过文件名实现不同应用的选择从而实现射频芯片的多种应用。Establish a system total control file on the root of the file system on the blockchain encryption radio chip. The blockchain encrypts the public information files of the RF chip and serves all applications. Create multiple application catalog files according to the usage conditions on the total control file, for example, the blockchain financial environment including key information, personal information, etc., and then define the financial contact application environment, and encrypt the radio frequency chip according to the Chinese financial blockchain. The specification defines the file name for this application as 1PAY.SYS.DDF01. The financial contactless system environment can also be defined and defined as 2PAY.SYS.DDF01. The financial contact application environment and the financial contact application environment are different application files under the system total control file, and the application file realizes various application selections by using the file name to realize various applications of the radio frequency chip.
实施例3:密钥结构的具体规划Embodiment 3: Specific Planning of Key Structure
密钥管理是一口涉及密钥的产生、检验、分配、传递、使用、保管、销毁的综合性技术,并且与密钥的行政管理制度和人员的素质有密切的关系。目前国际标准化組织ISO己经制定了密钥管理标准。但是由于加密系统实际使用情况的不同,具体的系统都有具体的实际要求,因此在标准化上很难统一。Key management is a comprehensive technology involving the generation, inspection, distribution, transmission, use, storage and destruction of keys, and is closely related to the key management system and the quality of personnel. At present, the ISO has developed a key management standard. However, due to the actual use of the encryption system, the specific system has specific practical requirements, so it is difficult to unify in standardization.
目前的密钥系统一般采用层次结构,使用密钥保护密钥的基本思想来进行设计。对于第(i+1)层的密钥设计由第i层的密钥来保护,同时本身也受到再上一层密钥的保护。密钥为层次化保护机制,下一层的密钥由上面层次的密钥保护。 The current key system generally adopts a hierarchical structure and is designed using the basic idea of a key protection key. The key design for the (i+1)th layer is protected by the key of the i-th layer, and is itself protected by the key of the previous layer. The key is a hierarchical protection mechanism, and the key of the next layer is protected by the key of the above hierarchy.
在实际使用中往往根据加密系统的功能结构来确定密钥系统的层次结构,如果系统功能相对简单,则密钥层次就可相应减少。如果功能相对复杂则需要适当增加密钥结构层数。通过分层模式的设计可大大提升密钥管理系统的安全性。由于在每一层中都可使用新的协议进行变化、进行管理,因此整个密钥系统为动态特征,而不仅仅是一个静态的存储机制,伴随着每一层密钥,都存在相应的协议。In actual use, the hierarchical structure of the key system is often determined according to the functional structure of the encryption system. If the system function is relatively simple, the key hierarchy can be correspondingly reduced. If the function is relatively complicated, it is necessary to increase the number of key structure layers as appropriate. The security of the key management system can be greatly improved by the design of the layered mode. Since the new protocol can be used to change and manage in each layer, the entire key system is a dynamic feature, not just a static storage mechanism. With each layer of keys, there is a corresponding protocol. .
在区块链加密射频芯片系统中使用3层密钥管理系统,分别为主密钥层,子密钥层和对话密钥层。在智能区块链加密射频芯片和读卡器中存有相同的系统主密钥,根据系统的实际情况不同,有的智能卡或者读卡器中会有一个或多个主密钥,以提高系统的安全性。本系统中只使用了一个主密钥。使用可变的主密钥参数对主密钥进行加密就能得到子密钥,同时采用另外的可变主密钥参数对子密钥进行加密就能得到第三层对话密钥。对于读卡器和芯片之间传输的数据采用对话密钥进行加密。通常情况下,对话密钥只能被用一次,这样即使对话密钥被攻击者破译,泄露的也仅仅只是一次传输数据。并且,无法从对话密钥反推求得系统主密钥。A layer 3 key management system is used in the blockchain encryption radio chip system, which is a master key layer, a subkey layer and a session key layer, respectively. The same system master key exists in the intelligent blockchain encryption radio chip and the card reader. According to the actual situation of the system, some smart cards or card readers have one or more master keys to improve the system. Security. Only one master key is used in this system. The subkey is obtained by encrypting the master key using a variable master key parameter, and the third layer session key is obtained by encrypting the subkey with another variable master key parameter. The data transmitted between the reader and the chip is encrypted using a session key. Normally, the session key can only be used once, so that even if the session key is deciphered by the attacker, only the data is transmitted once. Also, the system master key cannot be derived from the session key.
对话密钥生成方式:在区块链加密射频芯片内都设有态片制造标识码,应用序列号或者区块链加密射频芯片序列号,其中,根据区块链加密射频芯片的序列号有且唯一。另外,在交易时系统通常记录交易的时间,在某些卡片内还有相应的计数器来控制读写次数。当卡片被执行某条指令后计数器自动增加。这就保证了每次交易的时候,计数器的值和交易时间不一致。因此使用主密钥对卡的制造商识别码,卡的序列号进行加密生成子密钥。虽然使用相同的主密钥,但是由于序列号各不相同,因此各卡生成的子密钥也是不相同的。为了确保对于每张卡上的对话密钥只使用一次,使用子密钥对交易时间和计数器值进行加密生成对话密钥。这样对于同一张卡,每次交易使用的对话密钥都是不同的。对于一个多用途的芯片而言,不同的应用常常使用不同的主密钥,因此这使得破译系统的工作量很大,而且破译的意义也不大。The session key generation method includes: a state-of-the-art manufacturing identification code is used in the blockchain encryption radio frequency chip, and the serial number or the blockchain is used to encrypt the radio frequency chip serial number, wherein the serial number of the radio frequency chip is encrypted according to the blockchain. only. In addition, the system usually records the time of the transaction at the time of the transaction, and there are corresponding counters in some cards to control the number of readings and writes. The counter is automatically incremented when the card is executed with an instruction. This ensures that the value of the counter and the trading time are inconsistent each time a transaction is made. Therefore, the manufacturer's identification code of the card is used by the master key, and the serial number of the card is encrypted to generate a subkey. Although the same master key is used, since the serial numbers are different, the subkeys generated by each card are also different. To ensure that the session key on each card is used only once, the transaction time and counter values are encrypted using a subkey to generate a session key. Thus, for the same card, the session key used for each transaction is different. For a multi-purpose chip, different applications often use different master keys, so this makes the deciphering system a lot of work, and the meaning of deciphering is not great.
主密钥可由多个信任的人彼此独立提出一段数据然后有机合成一个密钥,然后再加入安全随机数加密运算获得。因此主密钥的生成和变化方式都难预测。系 统主密钥在装载的过程中如果不谨慎就会造成密钥的泄露,因此主密钥的装载必须在安全的环境下进行。由于需要人为地将系统主密钥装载入射频芯片及读卡器,因此确保装载过程必须在专口的设备上进行,下载时的环境必须安全的,在射频卡在接触上不能丢失信息。在卡内操作系统确保主密钥在装载入后就无法再无法读出。读卡器内无法进行密钥装载十分麻烦,往往加入安全模块用以存放密钥,以实现加密与解密算法。The master key can be presented by a plurality of trusted persons independently of each other and then organically synthesized into a key, and then added by a secure random number encryption operation. Therefore, the generation and change of the master key are difficult to predict. Department If the master key is not careful during the loading process, the key will be leaked. Therefore, the master key must be loaded in a secure environment. Since the system master key needs to be manually loaded into the radio frequency chip and the card reader, it is ensured that the loading process must be performed on the dedicated device, and the environment at the time of downloading must be secure, and the information cannot be lost when the radio frequency card is in contact. The in-card operating system ensures that the master key cannot be read again after it has been loaded. It is very troublesome to load the key in the card reader, and a security module is often added to store the key to implement the encryption and decryption algorithm.
加密解密算法使用了数字混沌序列,能在不过多增加运算量的前提下,对数字混沌迭代过程加以改进,使整个系统所产生的伪随机序列更加类似噪声,并且减少弱密钥的比例,扩大可用密钥的空间,使密钥的选取具有更大的随机性。由于数字混沌系统迭代所产生的伪混沌序列周期不可预测,难于精确分析,并且远远小于2N(N是实现精度)。虽然提高了实现精度,伪混沌序列的平均周期仍然不会有大的提高,并且还是会存在序列被吸引到某个固定值的情况。为了改进伪混沌序列的周期特性,延长并且控制其序列周期,利用m序列对混沌迭代系统进行扰动的方法。 The encryption and decryption algorithm uses a digital chaotic sequence, which can improve the digital chaotic iterative process without increasing the amount of computation, so that the pseudo-random sequence generated by the whole system is more similar to noise, and the proportion of weak keys is reduced and expanded. The space of the available keys makes the selection of keys more random. The pseudo-chaotic sequence period generated by the iteration of the digital chaotic system is unpredictable, difficult to accurately analyze, and far less than 2 N (N is the implementation accuracy). Although the accuracy of the implementation is improved, the average period of the pseudo-chaotic sequence is still not greatly improved, and there is still a case where the sequence is attracted to a certain fixed value. In order to improve the periodic characteristics of pseudo-chaotic sequences, extend and control the sequence period, the m-sequence is used to perturb the chaotic iterative system.

Claims (1)

  1. 一种区块链加密射频芯片的存储设计方法,其特征在于,包括以下步骤:A storage design method for a blockchain encryption radio frequency chip, characterized in that the method comprises the following steps:
    第一步,设计区块链加密射频芯片的数据结构;The first step is to design the blockchain to encrypt the data structure of the RF chip;
    第二步,设计区块链加密射频芯片中的数据在用户存储器中组织存放形式;In the second step, the data in the blockchain encryption radio frequency chip is designed to be organized and stored in the user memory;
    第三步,设计区块链加密射频芯片的加密、解密过程;The third step is to design the encryption and decryption process of the blockchain encryption radio frequency chip;
    所述区块链加密射频芯片的数据结构包含用户数据、认证数据和账户数据;The data structure of the blockchain encryption radio frequency chip includes user data, authentication data, and account data;
    所述用户数据包括读取控制数据A、用户姓名、用户电话、用户ID以及用户口令;The user data includes read control data A, a user name, a user phone, a user ID, and a user password;
    其中,所述读取控制数据A用于存储所述用户数据读取的信息,所述用户姓名用于存储用户的姓名信息,所述用户电话用于存储用户的电话信息,所述用户ID存放内部用户编号,所述用户口令用于存储用户设定的使用密码;The read control data A is used to store the information read by the user data, the user name is used to store the name information of the user, the user phone is used to store the phone information of the user, and the user ID is stored. An internal user number, the user password is used to store a user-set password;
    所述认证数据包括:读取控制数据B、用户口令Hash值、认证密钥、账户主公钥;The authentication data includes: read control data B, a user password hash value, an authentication key, and an account master public key;
    其中,所述读取控制数据B用于存储所述认证数据读取的信息,并且对所述认证数据读取的信息进行提取标记,并加上本地时间戳得到用户防伪标记,防止篡改,最后把所述用户防伪标记的值和所述用户口令的值经过Hash加密算法变换成实际安全认证所需长度的所述用户口令Hash值,对所述认证数据读取的信息进行提取标记的过程为:The read control data B is used to store the information read by the authentication data, and extracts and marks the information read by the authentication data, and adds a local time stamp to obtain a user anti-counterfeit flag to prevent tampering, and finally And the process of extracting the information of the authentication data by extracting the value of the user security token and the value of the user password into a user password hash value of a length required for actual security authentication by a hash encryption algorithm is :
    首先将任意长度的所述认证数据读取的信息划分而生成长度相等为8字节的子信息段,之后通过Hash函数将所述子信息段转换生成8字节长度的Hash值,通过加上所述本地时间戳得到所述用户防伪标记,能在所述区块链加密射频芯片遗失情况下,避免非法用户暴力破解所述用户口令,最后所述认证密钥用于所述读取控制数据B和所述用户口令Hash值之间的安全认证,所述账户主公钥用于解密所述用户防伪标记,以用于查询上各个账户的余额;First, the information read by the authentication data of any length is divided to generate a sub-information segment of length 8 bytes, and then the sub-information segment is converted into a hash value of 8 bytes by a hash function, and is added by adding The local timestamp obtains the user anti-counterfeiting flag, and can prevent the illegal user from violently cracking the user password in the case that the blockchain encryption radio frequency chip is lost, and finally the authentication key is used for the read control data. Security authentication between B and the user password hash value, the account master public key is used to decrypt the user security token for querying the balance of each account;
    所述账户数据包括:读取控制数据C、主密钥密文、主私钥密文;The account data includes: read control data C, a master key ciphertext, and a master private key ciphertext;
    其中,所述读取控制数据C用于存储所述账户数据读取的信息,所述主密 钥密文用于关联所述用户口令及主密钥,提升所述账户主公钥的加密参数,提高破解难度,使账户更加安全;所述主私钥密文用于加大所述区块链加密射频芯片的加密、解密过程的复杂度,进一步提高所述区块链加密射频芯片的安全性;The read control data C is used to store information read by the account data, the primary key The key ciphertext is used to associate the user password with the master key, improve the encryption parameter of the account master public key, improve the difficulty of cracking, and make the account more secure; the master private key ciphertext is used to enlarge the block. The complexity of the encryption and decryption process of the chain encryption radio frequency chip further improves the security of the blockchain encryption radio frequency chip;
    所述区块链加密射频芯片中的数据在所述用户存储器中组织存放形式为树型文件结构,具有多层次文件结构的形态,所述树型文件结构被分成三种层次:第一个层次是总控制文件,是所述树型文件结构的根,作为所述树型文件结构的根目录,用于存放所述区块链加密射频芯片的公共信息文件,并且为所有的应用程序服务;第二个层次是应用文件,在所述总控制文件之下,作为所述树型文件结构的子目录,根据使用情况分别建立多个所述应用文件,所述应用文件用于实现所述区块链加密射频芯片的多种应用功能;第三个层次是原子文件,用于存储实际应用数据和相应的系统管理信息,所述用户数据、所述认证数据和所述账户数据就存放于所述原子文件中,当所述应用文件需要时可调用相应的所述原子文件;The data in the blockchain encryption radio frequency chip is organized into a tree file structure in the user memory, and has a multi-level file structure, and the tree file structure is divided into three levels: a first level Is a total control file, is the root of the tree file structure, as the root directory of the tree file structure, is used to store the public information file of the blockchain encryption radio frequency chip, and serves all applications; The second level is an application file, and under the total control file, as a subdirectory of the tree file structure, a plurality of the application files are respectively created according to usage, and the application file is used to implement the area. The blockchain encrypts multiple application functions of the radio frequency chip; the third level is an atomic file for storing actual application data and corresponding system management information, and the user data, the authentication data, and the account data are stored in the In the atomic file, the corresponding atom file may be called when the application file needs it;
    所述区块链加密射频芯片的加密、解密过程为:The encryption and decryption process of the blockchain encryption radio frequency chip is:
    (1)加密:所述区块链加密射频芯片随机生成一个32字节主密钥,同时读取所述用户口令,并且存储到一个数组矩阵,所述数组矩阵中所述用户口令作为行向量,所述主密钥作为列向量,并用加密算法加密,得到所述主密钥密文;所述主密钥经过所述用户防伪标记,通过加密算法,生成所述区块链加密射频芯片的主私钥;(1) Encryption: the blockchain encryption radio frequency chip randomly generates a 32-byte master key, reads the user password at the same time, and stores it in an array matrix, wherein the user password is used as a row vector in the array matrix The master key is used as a column vector, and is encrypted by an encryption algorithm to obtain the master key ciphertext; the master key is generated by the user anti-counterfeiting mark, and the blockchain encryption radio frequency chip is generated by an encryption algorithm. Master private key
    (2)解密:从所述账户数据中读取所述主密钥密文,同时读取所述用户口令,并且存储到另一个数组矩阵,其中所述用户口令作为行向量,所述主密钥密文作为列向量,通过解密算法将所述主密钥密文还原成所述主密钥,然后从所述区块链加密射频芯片中读取所述主私钥密文,通过所述用户防伪标记的验证,并且结合所述主密钥将所述主私钥密文还原成主私钥。 (2) decryption: reading the master key ciphertext from the account data, simultaneously reading the user password, and storing to another array matrix, wherein the user password is used as a row vector, the primary secret The key ciphertext is used as a column vector, and the master key ciphertext is restored to the master key by a decryption algorithm, and then the master private key ciphertext is read from the blockchain encrypted radio frequency chip, Verification of the user security token, and the primary private key ciphertext is restored to the primary private key in conjunction with the master key.
PCT/CN2017/101304 2016-09-12 2017-09-11 Storage design method of blockchain encrypted radio frequency chip WO2018046008A1 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201610815590 2016-09-12
CN201610818054 2016-09-12
CN201610818053.3 2016-09-12
CN201610815590.2 2016-09-12
CN201610818054.8 2016-09-12
CN201610818053 2016-09-12

Publications (1)

Publication Number Publication Date
WO2018046008A1 true WO2018046008A1 (en) 2018-03-15

Family

ID=61561350

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2017/101304 WO2018046008A1 (en) 2016-09-12 2017-09-11 Storage design method of blockchain encrypted radio frequency chip
PCT/CN2017/101305 WO2018046009A1 (en) 2016-09-12 2017-09-11 Block chain identity system

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101305 WO2018046009A1 (en) 2016-09-12 2017-09-11 Block chain identity system

Country Status (2)

Country Link
TW (2) TWI750223B (en)
WO (2) WO2018046008A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896A (en) * 2018-03-29 2018-07-20 上海交通大学 A kind of substation's condition monitoring system and method with data protection function
CN110532293A (en) * 2019-09-02 2019-12-03 浪潮软件股份有限公司 A kind of data flow lifecycle management method and system based on block chain technology
CN110570309A (en) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 Method and system for replacing leader of blockchain network
CN110990808A (en) * 2019-11-21 2020-04-10 杭州趣链科技有限公司 Notarization number shaking method based on block chain
CN111327568A (en) * 2018-12-14 2020-06-23 中国电信股份有限公司 Identity authentication method and system
CN111428253A (en) * 2020-03-24 2020-07-17 福建福链科技有限公司 Data protection method and system suitable for block chain
CN111522809A (en) * 2019-02-02 2020-08-11 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN112184974A (en) * 2020-09-27 2021-01-05 江苏天创科技有限公司 Monitoring system based on 5G communication node
CN113364596A (en) * 2021-05-27 2021-09-07 南方科技大学 Ore digging method and device based on block chain, mobile terminal and storage medium
CN113570321A (en) * 2021-04-29 2021-10-29 国家能源集团新能源有限责任公司 Hydrogen energy data management system
CN116132174A (en) * 2023-02-13 2023-05-16 华中师范大学 Remote secure communication method, system and terminal of 5G Internet of vehicles supply chain

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768933B (en) * 2018-04-11 2020-11-03 深圳技术大学 Autonomous supervision digital identity authentication system on block chain platform
CN109257342B (en) * 2018-09-04 2020-05-26 阿里巴巴集团控股有限公司 Block chain cross-chain authentication method, system, server and readable storage medium
CN109255619A (en) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 A kind of identity identifying method and equipment based on block chain
CN109583215B (en) * 2018-09-28 2022-11-15 创新先进技术有限公司 Method and device for processing credit investigation data and block chain data sharing system
CN109598518A (en) 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for anti-counterfeit and device, electronic equipment based on block chain
US10970372B2 (en) 2018-11-01 2021-04-06 Microsoft Technology Licensing, Llc Revocable biometric print based identification
CN109447029B (en) * 2018-11-12 2022-09-02 公安部第三研究所 Electronic identity card photo generation system and method
CN111224804B (en) * 2018-11-26 2022-12-09 中国移动通信集团辽宁有限公司 Internet of things equipment initialization method and device, internet of things equipment and storage medium
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109861996B (en) * 2019-01-17 2023-06-02 深圳壹账通智能科技有限公司 Block chain-based relationship proving method, device, equipment and storage medium
WO2019120326A2 (en) 2019-03-29 2019-06-27 Alibaba Group Holding Limited Managing sensitive data elements in a blockchain network
CN110516451B (en) * 2019-07-24 2021-03-02 杭州电子科技大学 Block chain-based derived ciphertext piece secret level change and decryption reminding notification method
CN110457954B (en) * 2019-07-29 2023-08-25 创新先进技术有限公司 Contract management device and method
CN110781140B (en) * 2019-09-06 2023-08-18 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for signing data in blockchain
CN111092851A (en) * 2019-09-23 2020-05-01 上海唯链信息科技有限公司 Data verification method and device of Internet of things temperature detection equipment based on block chain
TWI711000B (en) * 2019-09-30 2020-11-21 辰光能源科技有限公司 Environmental health and product quality establishment system
TWI740234B (en) * 2019-10-16 2021-09-21 辰光能源科技有限公司 Real Food System
TWI727474B (en) * 2019-10-25 2021-05-11 李婷婷 Digital identity management system and method
CN114143041A (en) * 2020-03-03 2022-03-04 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
TWI729781B (en) * 2020-04-21 2021-06-01 麥睿資訊股份有限公司 Data authentication system and data authentication method thereof
CN111914270A (en) * 2020-07-08 2020-11-10 广西佳壹大数据科技股份有限公司 Programmable authentication service method and system based on block chain technology
CN112073661B (en) * 2020-08-03 2022-10-25 浙江旅游职业学院 Tamper-proof video monitoring system for sterile workshop
CN112447291B (en) * 2020-11-23 2023-03-28 四川大学华西医院 Block chain-based method for sharing hospital data
CN112561006B (en) * 2020-12-04 2023-08-29 中国联合网络通信集团有限公司 Electronic license plate management method, radio frequency identification reader-writer, node, equipment and medium
CN112749409B (en) * 2021-01-06 2024-03-08 上海零数众合信息科技有限公司 Encryption method based on random number in block chain
CN112819628B (en) * 2021-02-01 2024-02-02 网易(杭州)网络有限公司 Transaction replay prevention detection method, device and system, electronic equipment and storage medium
CN112989392B (en) * 2021-04-19 2022-08-30 河北科技大学 Battlefield situation perception method, system and terminal equipment
CN114584343B (en) * 2022-01-24 2023-05-02 厦门理工学院 Data protection method and system for cloud computing center and readable storage medium
CN114900348B (en) * 2022-04-28 2024-01-30 福建福链科技有限公司 Block chain sensor data verification method and terminal
CN115002779B (en) * 2022-07-29 2022-11-22 杭州宇链科技有限公司 Pseudo base station prevention and control method and system based on block chain and security chip
CN116828457B (en) * 2023-08-30 2023-11-17 四川轻化工大学 Intelligent wireless monitoring method, system and medium applied to cellar

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6831982B1 (en) * 1999-11-19 2004-12-14 Storage Technology Corporation Encryption key management system using multiple smart cards
CN101308546A (en) * 2008-05-20 2008-11-19 上海华申智能卡应用系统有限公司 Radio frequency label of safe storage structure having multi-stage protection and method thereof
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
GB9930145D0 (en) * 1999-12-22 2000-02-09 Kean Thomas A Method and apparatus for secure configuration of a field programmable gate array
TWI351864B (en) * 2005-03-25 2011-11-01 Via Tech Inc Apparatus and method for employing cyrptographic f
CN101490688A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Content control system and method using certificate revocation lists
KR101366243B1 (en) * 2006-12-04 2014-02-20 삼성전자주식회사 Method for transmitting data through authenticating and apparatus therefor
CN102144371B (en) * 2008-09-10 2015-06-03 Lg电子株式会社 Method for selectively encrypting control signal
JP5813380B2 (en) * 2011-06-03 2015-11-17 株式会社東芝 Semiconductor memory device
US10102510B2 (en) * 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
US10346814B2 (en) * 2014-06-04 2019-07-09 MONI Limited System and method for executing financial transactions
TWI528217B (en) * 2014-07-02 2016-04-01 柯呈翰 A method and system for adding dynamic labels to a file and encrypting the file
CN205003731U (en) * 2015-09-30 2016-01-27 深圳市招股科技有限公司 Digital cash hardware wallet based on two interfaces IC -card
CN105701372B (en) * 2015-12-18 2019-04-09 布比(北京)网络技术有限公司 A kind of building of block chain identity and verification method
CN105790954B (en) * 2016-03-02 2019-04-09 布比(北京)网络技术有限公司 A kind of method and system constructing electronic evidence

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6831982B1 (en) * 1999-11-19 2004-12-14 Storage Technology Corporation Encryption key management system using multiple smart cards
CN101308546A (en) * 2008-05-20 2008-11-19 上海华申智能卡应用系统有限公司 Radio frequency label of safe storage structure having multi-stage protection and method thereof
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896B (en) * 2018-03-29 2023-06-23 上海交通大学 Substation state monitoring system and method with data protection function
CN108306896A (en) * 2018-03-29 2018-07-20 上海交通大学 A kind of substation's condition monitoring system and method with data protection function
CN111327568A (en) * 2018-12-14 2020-06-23 中国电信股份有限公司 Identity authentication method and system
CN111327568B (en) * 2018-12-14 2022-04-01 中国电信股份有限公司 Identity authentication method and system
CN111522809B (en) * 2019-02-02 2023-04-21 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN111522809A (en) * 2019-02-02 2020-08-11 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN110532293A (en) * 2019-09-02 2019-12-03 浪潮软件股份有限公司 A kind of data flow lifecycle management method and system based on block chain technology
CN110570309A (en) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 Method and system for replacing leader of blockchain network
CN110570309B (en) * 2019-09-16 2023-06-16 上海保险交易所股份有限公司 Method and system for replacing a leader of a blockchain network
CN110990808A (en) * 2019-11-21 2020-04-10 杭州趣链科技有限公司 Notarization number shaking method based on block chain
CN111428253A (en) * 2020-03-24 2020-07-17 福建福链科技有限公司 Data protection method and system suitable for block chain
CN111428253B (en) * 2020-03-24 2023-04-07 福建福链科技有限公司 Data protection method and system suitable for block chain
CN112184974A (en) * 2020-09-27 2021-01-05 江苏天创科技有限公司 Monitoring system based on 5G communication node
CN113570321A (en) * 2021-04-29 2021-10-29 国家能源集团新能源有限责任公司 Hydrogen energy data management system
CN113364596A (en) * 2021-05-27 2021-09-07 南方科技大学 Ore digging method and device based on block chain, mobile terminal and storage medium
CN116132174A (en) * 2023-02-13 2023-05-16 华中师范大学 Remote secure communication method, system and terminal of 5G Internet of vehicles supply chain
CN116132174B (en) * 2023-02-13 2024-04-16 华中师范大学 Remote secure communication method, system and terminal of 5G Internet of vehicles supply chain

Also Published As

Publication number Publication date
TW201812630A (en) 2018-04-01
TW201812638A (en) 2018-04-01
WO2018046009A1 (en) 2018-03-15
TWI749061B (en) 2021-12-11
TWI750223B (en) 2021-12-21

Similar Documents

Publication Publication Date Title
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
CN107070660B (en) Storage design method of block chain encryption radio frequency chip
CN106534092B (en) The privacy data encryption method of key is depended on based on message
US8208627B2 (en) Format-preserving cryptographic systems
CN105024803B (en) Behavior fingerprint in white box realization
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN101149768B (en) Special processor software encryption and decryption method
JP2020522205A (en) Progressive key encryption algorithm
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
RU2584500C2 (en) Cryptographic authentication and identification method with real-time encryption
US20130339252A1 (en) Format-preserving cryptographic systems
CN106888081B (en) Wide coding of intermediate values within white-box implementations
MX2007014237A (en) Implementation of an integrity-protected secure storage.
CN102725737A (en) V erifiable, leak-resistant encryption and decryption
KR20160008560A (en) System and methods for encrypting data
CN105306194B (en) For encrypted file and/or the multiple encryption method and system of communications protocol
CN105184115B (en) For including to the method in white box realization by implicit integrality or credibility check
US20120063594A1 (en) Method for creating asymmetrical cryptographic key pairs
CN1322431C (en) Encryption retention and data retrieve based on symmetric cipher key
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
CN106209346B (en) White-box cryptography interleaving lookup table
CN108537537A (en) A kind of safe and reliable digital cash Wallet System
US8181869B2 (en) Method for customizing customer identifier
EP3214567B1 (en) Secure external update of memory content for a certain system on chip
CN105978680A (en) Implementing padding in a white-box implementation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17848181

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17848181

Country of ref document: EP

Kind code of ref document: A1