CN107222306A - A kind of key updating method, apparatus and system - Google Patents
A kind of key updating method, apparatus and system Download PDFInfo
- Publication number
- CN107222306A CN107222306A CN201710053735.4A CN201710053735A CN107222306A CN 107222306 A CN107222306 A CN 107222306A CN 201710053735 A CN201710053735 A CN 201710053735A CN 107222306 A CN107222306 A CN 107222306A
- Authority
- CN
- China
- Prior art keywords
- key
- chip card
- certification
- backstage
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 230000005055 memory storage Effects 0.000 description 8
- 230000006378 damage Effects 0.000 description 7
- 238000003860 storage Methods 0.000 description 6
- 208000027418 Wounds and injury Diseases 0.000 description 4
- 208000014674 injury Diseases 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of key updating method, apparatus and system.This method includes:Backstage is according to strategy set in advance, it is determined that needing to update the certification key of chip card;Backstage is that chip card generates new key;Backstage sends update instruction to chip card, indicates that chip card updates local certification key, wherein, the ciphertext of crypto-synchronization information or crypto-synchronization information is carried in update instruction;The key synchronization of backstage receiving chip card is successfully indicated, the certification key of chip card is replaced with into new key.The scheme provided by the present invention, can avoid the certification key in chip card from being broken and bring potential safety hazard to user.
Description
Technical field
The present invention relates to a kind of electronic technology field, more particularly to a kind of key updating method, apparatus and system.
Background technology
Existing chip card (can be contact card can also be non-contact card) is used as the identification of user be
In system, the certification key of user is stored in chip card, when carrying out authentication, chip card is using certification key to be certified
Information is encrypted, and obtains authentication information, and authentication information is sent into authenticating device is authenticated, and authenticating device is using locally depositing
The certification key of the user of storage, is authenticated to the authentication information that chip card is sent, and certification confirms user's body after
Part.
But, in the prior art, the certification key stored in chip card is statically, to be lost in the chip card of validated user
Lose or illegally usurped, disabled user may break through the certification key stored in chip card, and then be forged using certification key
New chip card, pretends to be validated user, and background system can not also be found in time, so as to bring potential safety hazard to user.
The content of the invention
Present invention seek to address that the problem of certification key in said chip card is broken and brings potential safety hazard to user.
It is a primary object of the present invention to provide a kind of key updating method.
Another object of the present invention is to provide a kind of key update device.
A further object of the present invention is to provide a kind of key updating system.
To reach above-mentioned purpose, what technical scheme was specifically realized in:
One aspect of the present invention provides a kind of key updating method, and this method includes:Backstage according to strategy set in advance,
It is determined that needing to update the certification key of chip card;The backstage is that the chip card generates new key;The backstage is to the core
Piece card sends update instruction, indicates that the chip card updates local certification key, wherein, carried in the update instruction close
The ciphertext of key synchronizing information or the crypto-synchronization information;The key synchronization that the backstage receives the chip card successfully indicates,
The certification key of the chip card is replaced with into the new key.
Alternatively, the backstage is according to strategy set in advance, it is determined that need to update the certification key of chip card, including:
The backstage receives the certification request of the chip card of card reader transmission, wherein, carried in the certification request described
The identification information of chip card and information to be certified;The backstage obtains the chip card according to the identification information of the chip card
Certification key;The backstage is authenticated using the certification key to the information to be certified, in certification in the case of,
It is determined that needing to update the certification key of the chip card.
Alternatively, it is authenticated to the information to be certified in the case of, methods described also includes:It is described
Backstage determination is under attack using the chip card of the identification information, prohibits the use of the chip card of the identification information by recognizing
Card.
Alternatively, after platform is authenticated using the certification key to the information to be certified in the rear, the side
Method also includes:The authentication result that the backstage is authenticated obtaining to card reader return to the information to be certified.
Alternatively, the crypto-synchronization information includes:New key updating factor, indicates the chip card according to described Xinmi City
Local certification key updating is the new key by key updating factor.
Alternatively, the crypto-synchronization information includes:The new key, indicates the chip card by local certification key
It is updated to the new key.
Alternatively, the ciphertext of the crypto-synchronization information includes:Using the current certification key of the chip card to described
Obtained cipher-text information is encrypted in crypto-synchronization information.
According to another aspect of the present invention there is provided a kind of key update device, including:Determining module, for basis
Strategy set in advance, it is determined that needing to update the certification key of chip card;Generation module, for generating Xinmi City for the chip card
Key;Sending module, for sending update instruction to the chip card, indicates that the chip card updates local certification key, its
In, the ciphertext of crypto-synchronization information or the crypto-synchronization information is carried in the update instruction;Receiving module, for receiving
The key synchronization of the chip card is successfully indicated;Update module, successfully refers to for receiving the synchronization in the receiving module
After showing, the certification key of the chip card is replaced with into the new key.
According to a further aspect of the invention, including:Backstage, card reader and chip card, wherein, the backstage, for root
According to strategy set in advance, it is determined that needing to update the certification key of the chip card, it is the chip card generation new key, passes through
The card reader sends update instruction to the chip card, indicates that the chip card updates local certification key, wherein, it is described
The ciphertext of crypto-synchronization information or the crypto-synchronization information is carried in update instruction;The card reader, for receiving and inciting somebody to action
The update instruction is sent to chip card;The chip card, for receiving the update instruction, and according to the update instruction,
It is the new key by local certification key updating, after being updated successfully, sends key synchronization to the card reader and successfully indicate;
The card reader, is additionally operable to receive and successfully indicates the key synchronization to be sent to the backstage;The backstage, for receiving
The key synchronization is successfully indicated, the certification key of the chip card is replaced with into the new key.
Alternatively, the backstage is specifically for determining to need the certification key of renewal chip card in the following manner:Receive
The certification request of the chip card sent to the card reader, wherein, the chip card is carried in the certification request
Identification information and information to be certified;The certification key of the chip card is obtained according to the identification information of the chip card;After described
Platform is authenticated using the certification key to the information to be certified, in certification in the case of, it is determined that needing to update institute
State the certification key of chip card.
Alternatively, the backstage is additionally operable to:It is authenticated to the information to be certified in the case of, it is determined that
Chip card using the identification information is under attack, prohibits the use of the chip card of the identification information to pass through certification.
Alternatively, the backstage is additionally operable to:Platform is carried out using the certification key to the information to be certified in the rear
After certification, the authentication result for being authenticated obtaining to the information to be certified to card reader return.
As seen from the above technical solution provided by the invention, the invention provides a kind of Scheme of Key Update, at this
In scheme, backstage judges whether the certification key for needing to update chip card according to strategy set in advance, if it is desired, then for
Chip card generates new key, and indicates that chip card updates local certification key, and receive the key synchronization of chip card into
After work(is indicated, local chip card certification key is replaced with into the new key.The technical scheme provided by the present invention, after
Platform can update the certification key of chip card on suitable opportunity, so that same user is within the same period, can only
There is a chip card by certification, if the certification key for the chip card that the user uses within the period differs with backstage
Cause, then can not by the certification on backstage, therefore, even if third party has broken through the certification key of chip card memory storage, but due to
During third party breaks through the certification key of chip card memory storage, the certification that backstage may have updated the chip card is close
Key, former certification key has failed, so that old certification key can not be used by certification, so that backstage can be found in time
Whether chip card is forged usurps, it is to avoid the person of user or the injury of property.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of flow chart for key updating method that the embodiment of the present invention 1 is provided;
Fig. 2 is a kind of configuration diagram for key updating system that the embodiment of the present invention 2 is provided;
Fig. 3 is a kind of structural representation for key update device that the embodiment of the present invention 3 is provided.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this
The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ",
The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are
Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than indicate or dark
Specific orientation must be had, with specific azimuth configuration and operation by showing the device or element of meaning, therefore it is not intended that right
The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying and be relative
Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can
To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected to by intermediary, Ke Yishi
The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Embodiment 1
Present embodiments provide a kind of key updating method.
A kind of flow chart for key updating method that Fig. 1 provides for the present embodiment, as shown in figure 1, this method master include with
Lower step S102- steps S108.
Step S102, backstage is according to strategy set in advance, it is determined that needing to update the certification key of chip card.
In the present embodiment, chip card can be contact card or non-contact card, specific the present embodiment
It is not construed as limiting.
In specific implementation process, corresponding certification key updating can be set according to the concrete application scene of chip card
Strategy, for example, can be updated by use time, for example, updating once daily.Or, it can also be carried out according to access times
Update, for example, after chip card often carries out once certification using certification key, just updating once certification key.Or, can also
More new key is determined the need for by frequency of use, for example, having been used n times within one day, then the certification key of chip card is updated
Deng specific the present embodiment is not construed as limiting.
Can be that chip card is often carried out using once certification key in an optional embodiment of the embodiment of the present invention
After certification, backstage is the certification key for determining to need to update the chip card.Therefore, in an optional reality of the embodiment of the present invention
Apply in scheme, step S102 may comprise steps of:
Step 1, backstage receives the certification request of the chip card of card reader transmission, wherein, in the certification request
Carry the identification information and information to be certified of the chip card;
During concrete application, information to be certified can be that chip card is believed the mark of chip card using its certification key
Breath carries out the value that certain computing is obtained, for example, the obtained signature value etc. that to the identification information of chip card sign, or,
Can be that the identification information of chip card is encrypted using certification key to obtain encryption information etc., specific the present embodiment is not limited
It is fixed.
Step 2, backstage obtains the certification key of the chip card according to the identification information of the chip card;
Step 3, backstage is authenticated using the certification key to the information to be certified, situation about passing through in certification
Under, it is determined that needing to update the certification key of the chip card.
By above-mentioned optional embodiment, the certification or swiped the card in specified equipment of swiping the card every time is recognized by certification backstage
To need the certification key for updating chip card, the renewal speed of certification key is improved, reduces the usage cycles of same key,
The effective time that attacker cracks to the key is have compressed, if old certification key is cracked more than usage cycles, due to old
Certification key be revoked, therefore, will not also take harm to user even if being cracked, improve security.
In above-mentioned optional embodiment, further, the information to be certified is authenticated on backstage but certification does not have
In the case of, as a kind of optional embodiment, backstage determines to use the chip card of the identification information under attack,
The chip card of the identification information is prohibitted the use of to pass through certification.In the optional embodiment, backstage is being sent to chip card
Authentication information is authenticated in the case of, it is believed that current chip card exist it is pseudo- block so that by the mark of current chip card
Know information and add blacklist, prohibit the use of the chip card of the identification information to pass through certification.By the optional embodiment, even if non-
Method user has cracked the certification key of chip card the use interim in chip card twice, and is obtained using puppet card from backstage
New certification key, but because true card does not get new certification key, therefore, card is swiped the card surely when being authenticated, certification
It can not pass through, so that backstage can know that current chip card has pseudo- card in time, disable current chip card, it is to avoid user's
Loss continues.
In above-mentioned optional embodiment, backstage is treated after authentication information is authenticated using certification key, alternatively,
This method can also include:The authentication result that backstage is authenticated obtaining to card reader return to the information to be certified.Card Reader
Device can perform further operation after the authentication result is received according to the authentication result.For example, in gate control system,
Card reader can decide whether that access control electric lock is opened according to authentication result.
Step S104, backstage is that the chip card generates new key.
In specific implementation process, backstage can generate new key updating factor for chip card, be updated according to new key
The current authentication key of the factor and chip card, uses preset algorithm to generate new key for the chip card.Wherein, key updating because
Son can be event factor or time factor, can also be the combination of event factor and time factor, this specific implementation
Example is not construed as limiting.
Or, backstage can also be set in a certification cipher key list, the certification cipher key list and wrapped for every chip card
Include several certification keys, for chip card generate new key when, backstage is chosen from the list one with chip card currently
The certification key that certification key is differed, when choosing, backstage, which can sequentially select to come in certification cipher key list, current to be recognized
Next certification key after key is demonstrate,proved, can also be randomly choosed, or, can also be by Else Rule, for example, selection certification
The certification keys one or more with current certification key interval after current certification key are come in cipher key list, are had
Body mode the present embodiment is not construed as limiting.
Step S106, backstage sends update instruction to the chip card, indicates that the chip card updates local certification close
Key, wherein, the ciphertext of crypto-synchronization information or the crypto-synchronization information is carried in the update instruction.
In the present embodiment, backstage is after it is determined that need the certification key to chip card to be updated, for the chip
After card generation new key, update instruction is sent to chip card, it is the new key by its certification key updating to indicate chip card.
In specific implementation process, backstage to chip card can send the update instruction by card reader.
In an optional embodiment of the embodiment of the present invention, if backstage is in the information to be certified sent to chip card
Be authenticated and certification be after, it is determined that need update chip card certification key in the case of, backstage can refer to renewal
Show that carrying is sent to card reader in authentication result, to save the interaction flow between backstage and card reader.
Crypto-synchronization information can be directly carried in the embodiment of the present invention, update instruction, or, in order to ensure that key is same
The ciphertext that can also be crypto-synchronization information carried in the transmission safety of information, update instruction is walked, wherein, the ciphertext can be
Crypto-synchronization information is encrypted what is obtained using chip card current certification key, chip card is receiving key synchronization letter
After the ciphertext of breath, the ciphertext is decrypted using local certification key, crypto-synchronization information is obtained, it is same further according to key
Walk the local certification key of information updating.
In an optional embodiment of the embodiment of the present invention, crypto-synchronization information can be new key updating factor,
Chip card after new key updating factor is received, using with backstage identical algorithm, be by local certification key updating
The new key, for example, chip card can according to new key updating factor and current certification key, using default algorithm,
The new key is obtained, the new key is reused and updates local certification key.
Or, in another optional embodiment of the present embodiment, crypto-synchronization information can also be backstage generation
The new key generated for chip card is sent to chip card by new key, i.e. backstage, and chip card is received
After the new key, local certification key is updated using the new key.
Certainly, however it is not limited to above two mode, in specific implementation process, crypto-synchronization information can also use other
Implementation, as long as chip card can be obtained and backstage identical new key according to the crypto-synchronization information.
Step S108, the key synchronization that backstage receives the chip card is successfully indicated, by the certification key of the chip card
Replace with the new key.
In the present embodiment, after chip card updates certification key according to update instruction, to backstage " return " key" it is synchronous into
Work(indicates, backstage successfully indicates to know that certification key updating has been successfully described Xinmi City by chip card according to the key synchronization
The certification key of the chip card is also replaced with the new key by key, therefore, backstage, so that the core of backstage storage
The certification key of piece card and the local certification key agreement of the chip card, and then ensure that the follow-up certification request of chip card
It can be passed through by backstage certification, it is ensured that the normal of chip card is used.
The key updating method provided by the present embodiment, backstage judges whether to need more according to strategy set in advance
The certification key of new chip card, if it is desired, then generate new key for chip card, and it is close to indicate that chip card updates local certification
Key, and after the key synchronization for receiving chip card is successfully indicated, local chip card certification key is replaced with described new
Key.The technical scheme provided by the present invention, backstage can update the certification key of chip card on suitable opportunity, so that
Same user is obtained within the same period, there can only be a chip card by certification, if the user makes within the period
The certification key of chip card and backstage are inconsistent, then can not be by the certification on backstage, therefore, even if third party has broken through core
During the certification key of piece card memory storage, but certification key due to breaking through chip card memory storage in third party, backstage can
The certification key of the chip card can be have updated, former certification key has failed, so that old certification key can not be used to pass through
Certification, usurp so that backstage can find whether chip card is forged in time, it is to avoid the person or the wound of property of user
Evil.
Embodiment 2
Present embodiments provide a kind of key updating system, the system can be used for realizing key described in embodiment 1 more
New method.
The system architecture schematic diagram for the key updating system that Fig. 2 provides for the present embodiment, as shown in Fig. 2 the system is main
Including:Backstage 10, card reader 20 and chip card 30.As shown in Fig. 2 a backstage 20 can communicate with multiple card reader 20, one
The individual card reader 20 same time can communicate with a chip card 30, certainly, however it is not limited to this, in a particular application, backstage 20
Only it can also be communicated with a card reader 20.
Function and the signal flow direction of each building block in the key updating system provided below the present embodiment are carried out
Description.
Backstage 10, for being chip card it is determined that needing to update the certification key of chip card 30 according to strategy set in advance
30 generation new keys, update instruction is sent by card reader 20 to chip card 30, indicates that chip card 30 updates local certification close
Key, wherein, the ciphertext of crypto-synchronization information or crypto-synchronization information is carried in update instruction;Card reader 20, for receiving simultaneously
Update instruction is sent to chip card 30;Chip card 30, for receiving update instruction, and according to update instruction, local is recognized
Card key updating is new key, after being updated successfully, and sending key synchronization to card reader 20 successfully indicates;Card reader 20, is additionally operable to
Receive and successfully indicate key synchronization to be sent to backstage 10;Backstage 10, is successfully indicated for receiving key synchronization, by chip card
30 certification key replaces with new key.
In specific implementation process, corresponding certification key can be set more according to the concrete application scene of chip card 30
New strategy, for example, can be updated by use time, for example, updating once daily.Or, it can also enter according to access times
Row updates, for example, after chip card 30 often carries out once certification using certification key, just updating once certification key.Or,
More new key can be determined the need for by frequency of use, for example, having been used n times within one day, then recognizing for chip card 30 is updated
Key etc. is demonstrate,proved, specific the present embodiment is not construed as limiting.
Can be that chip card 30 is often entered using once certification key in an optional embodiment of the embodiment of the present invention
After row certification, backstage 10 is the certification key for determining to need to update the chip card 30.Therefore, at one of the embodiment of the present invention
In optional embodiment, backstage 10 is specifically for determining to need the certification key of renewal chip card 30 in the following manner:Receive
The certification request of the chip card 30 sent to the card reader 20, wherein, the chip is carried in the certification request
The identification information and information to be certified of card 30;It is close according to the certification that the identification information of the chip card 30 obtains the chip card 30
Key;The information to be certified is authenticated using the certification key, in certification in the case of, it is determined that needing to update institute
State the certification key of chip card 30.
During concrete application, information to be certified can be that chip card 30 uses mark of its certification key to chip card 30
Know information and carry out the value that certain computing is obtained, for example, the obtained signature value etc. that to the identification information of chip card 30 sign, or
Person or the identification information of chip card 30 is encrypted using certification key obtains encryption information etc., this specific implementation
Example is not construed as limiting.
By above-mentioned optional embodiment, swipe the card certification or swiped the card in specified equipment equal by certification backstage 10 every time
Think the certification key for needing to update chip card 30, improve the renewal speed of certification key, reduce the use of same key
In the cycle, the effective time that attacker cracks to the key is have compressed, if old certification key is cracked more than usage cycles, by
It has been revoked in old certification key, therefore, will not have also taken harm to user even if being cracked, improve security.
In above-mentioned optional embodiment, further, the information to be certified is authenticated on backstage but certification does not have
In the case of, as a kind of optional embodiment, backstage 10 is additionally operable to:It is authenticated not having to the information to be certified
Have in the case of, it is determined that it is under attack using the chip card 30 of the identification information, prohibit the use of the identification information
Chip card 3030 passes through certification.In the optional embodiment, backstage 10 is recognized in the authentication information sent to chip card 30
Card is in the case of, it is believed that current chip card 30 has pseudo- card, so that the identification information of current chip card 30 be added
Blacklist, prohibits the use of the chip card 30 of the identification information by certification.By the optional embodiment, even if disabled user exists
The use interim of chip card 30 twice has cracked the certification key of chip card 30, and is obtained newly from backstage 10 using puppet card
Certification key, but because true card does not get new certification key, therefore, card is swiped the card surely when being authenticated, and certification is not
It can pass through, so that backstage 10 can know that current chip card 30 has pseudo- card, disabling current chip card 30, it is to avoid use in time
The loss at family continues.
In above-mentioned optional embodiment, backstage is treated after authentication information is authenticated using certification key, alternatively,
Backstage 10, which is additionally operable to return to the card reader 20, is authenticated obtained authentication result to the information to be certified.Card reader 20
After the authentication result is received, further operation can be performed according to the authentication result.For example, in gate control system, reading
Card device 20 can decide whether that access control electric lock is opened according to authentication result.
In specific implementation process, backstage 10 is including but not limited to following two when generating new key for chip card 30
Implementation:
(1) new key updating factor is generated for chip card 30, according to the current of new key updating factor and chip card 30
Certification key, uses preset algorithm to generate new key for the chip card 30.Wherein, the key updating factor can be event because
Son or time factor, can also be the combination of event factor and time factor, specific the present embodiment is not construed as limiting.
(2) backstage 10 can also be set in a certification cipher key list, the certification cipher key list for every chip card 30
Including several certification keys, when generating new key for chip card 30, one and chip card are chosen in backstage 10 from the list
The certification key that 30 current certification keys are differed, when choosing, backstage 10 can sequentially select to arrange in certification cipher key list
Next certification key after current certification key, can also be randomly choosed, or, can also be by Else Rule, example
Such as, come in selection certification cipher key list one or more with current certification key interval after current certification key
Certification key, concrete mode the present embodiment is not construed as limiting.
Corresponding, backstage 10, which returns to the crypto-synchronization information carried in the update instruction of card reader 20, to be:(1) it is new
The key updating factor, chip card 30 after new key updating factor is received, using with the identical algorithm of backstage 10, will be local
Certification key updating be the new key, for example, chip card 30 can be close according to new key updating factor and current certification
Key, using default algorithm, obtains the new key, reuses the new key and updates local certification key.(2) backstage 10 is given birth to
Into new key, i.e. the new key generated for chip card 30 is sent to chip card 30, core by backstage 10
Piece card 30 is received after the new key, and local certification key is updated using the new key.
Crypto-synchronization information can be directly carried in the update instruction that the embodiment of the present invention, backstage 10 are sent, or, it is
Ensure the ciphertext that can also be crypto-synchronization information carried in the transmission safety of crypto-synchronization information, update instruction, wherein,
The ciphertext can be encrypted to crypto-synchronization information using the current certification key of chip card 30 and be obtained, and chip card 30 exists
After the ciphertext for receiving crypto-synchronization information, the ciphertext is decrypted using local certification key, key synchronization is obtained
Information, local certification key is updated further according to crypto-synchronization information.
In an optional embodiment of the embodiment of the present invention, if backstage 10 is to be certified what is sent to chip card 30
Information is authenticated and certification is after, it is determined that in the case of needing to update the certification key of chip card 30, backstage 30 can be with
Update instruction is carried card reader 20 is sent in authentication result, update instruction is sent to chip card 30 by card reader 20,
To save the interaction flow between backstage 10 and card reader 20.
The key updating system provided by the present embodiment, backstage 10 judges whether needs according to strategy set in advance
Update the certification key of chip card 30, if it is desired, then generate new key for chip card 30, and chip is indicated by card reader 20
Card 30 updates local certification key, and after the key synchronization for receiving chip card 30 is successfully indicated, by local chip
Block 30 certification keys and replace with the new key.The technical scheme provided by the present invention, backstage 10 can be on suitable opportunity
The certification key of chip card 30 is updated, so that same user is within the same period, there can only be a chip card 30 to lead to
Certification is crossed, if the certification key for the chip card 30 that the user uses and backstage 10 are inconsistent within the period, can not be led to
Later the certification of platform 10, therefore, even if third party has broken through the certification key of the memory storage of chip card 30, but due to being attacked in third party
During the certification key of the broken memory storage of chip card 30, backstage 10 may have updated the certification key of the chip card 30,
Former certification key has failed, so that old certification key can not be used by certification, so that backstage 10 can be found in time
Whether chip card 30 is forged usurps, it is to avoid the person of user or the injury of property.
Embodiment 3
A kind of key update device is present embodiments provided, the device can be arranged on described in embodiment 1 and embodiment 2
Backstage in, for realizing the key updating method described by embodiment 1.
The structural representation for the key update device that Fig. 3 provides for the present embodiment, as shown in figure 3, the device mainly includes:
Determining module 300, generation module 302, sending module 304, receiving module 306 and update module 306.
The function of the modules of the main key update device provided the present embodiment is described below, other not most
Matters may be referred to the description of embodiment 1 and 2, will not be repeated here.
Determining module 300, for according to strategy set in advance, it is determined that needing to update the certification key of chip card;Generation
Module 302, for generating new key for the chip card;Sending module 304, for sending update instruction to the chip card,
Indicate that the chip card updates local certification key, wherein, crypto-synchronization information or described is carried in the update instruction
The ciphertext of crypto-synchronization information;Receiving module 306, the key synchronization for receiving the chip card is successfully indicated;Update module
308, for being received in the receiving module after the synchronization successfully indicates, the certification key of the chip card is replaced with
The new key.
In specific implementation process, corresponding certification key updating can be set according to the concrete application scene of chip card
Strategy, for example, can be updated by use time, for example, updating once daily.Or, it can also be carried out according to access times
Update, for example, after chip card often carries out once certification using certification key, just updating once certification key.Or, can also
More new key is determined the need for by frequency of use, for example, having been used n times within one day, then the certification key of chip card is updated
Deng specific the present embodiment is not construed as limiting.
Can be that chip card is often carried out using once certification key in an optional embodiment of the embodiment of the present invention
After certification, determining module 300 is the certification key for determining to need to update the chip card.Therefore, the one of the embodiment of the present invention
In individual optional embodiment, determining module 300 specifically for determining that the certification for needing to update the chip card is close in the following manner
Key:The certification request of the chip card of card reader transmission is received, wherein, the chip card is carried in the certification request
Identification information and information to be certified;The certification key of the chip card is obtained according to the identification information of the chip card;Use
The certification key is authenticated to the information to be certified, in certification in the case of, it is determined that needing to update the chip
The certification key of card.
By above-mentioned optional embodiment, swipe the card certification or swiped the card in specified equipment by certification determining module every time
300 think to need the certification key of renewal chip card, improve the renewal speed of certification key, reduce making for same key
With the cycle, the effective time that attacker cracks to the key is have compressed, if old certification key is cracked more than usage cycles,
Because old certification key has been revoked, therefore, it will not also take harm to user even if being cracked, improve security.
In above-mentioned optional embodiment, further, the information to be certified is being authenticated but certification is not led to
In the case of crossing, as a kind of optional embodiment, determining module 300 can be also used for:The information to be certified is carried out
Certification but certification is in the case of, it is determined that it is under attack using the chip card of the identification information, prohibit the use of described
The chip card of identification information passes through certification.In the optional embodiment, it is authenticated to the authentication information that chip card is sent
In the case of, determining module 300 think current chip card exist it is pseudo- block so that by the identification information of current chip card
Blacklist is added, prohibits the use of the chip card of the identification information to pass through certification.By the optional embodiment, even if disabled user
Crack the certification key of chip card in the use interim of chip card twice, and it is close using puppet card to obtain new certification
Key, but because true card does not get new certification key, therefore, card is swiped the card surely when being authenticated, and certification can not pass through, from
And allow key update device to know that current chip card has pseudo- card in time, disable current chip card, it is to avoid the damage of user
Lose and continue.
In specific implementation process, generation module 302 for the chip card generate new key when, include but is not limited to
Lower two ways:
(1) new key updating factor is generated for chip card, according to new key updating factor and the current authentication of chip card
Key, uses preset algorithm to generate new key for the chip card.Wherein, the key updating factor can be event factor, also may be used
To be time factor, the combination of event factor and time factor is can also be, specific the present embodiment is not construed as limiting.
(2) for every chip card, a certification cipher key list is set, the certification cipher key list includes several certifications
Key, when generating new key for chip card, it is close that generation module 302 chooses a certification current with chip card from the list
The certification key that key is differed, when choosing, generation module 302, which can sequentially select to come in certification cipher key list, current to be recognized
Next certification key after key is demonstrate,proved, can also be randomly choosed, or, can also be by Else Rule, for example, selection certification
The certification keys one or more with current certification key interval after current certification key are come in cipher key list, are had
Body mode the present embodiment is not construed as limiting.
Corresponding, the crypto-synchronization information carried in the update instruction that sending module 304 is returned can be:(1) new key
Updating factor, chip card 30 after new key updating factor is received, using with the identical algorithm of generation module 302, will this
The certification key updating on ground is the new key, for example, chip card can be close according to new key updating factor and current certification
Key, using default algorithm, obtains the new key, reuses the new key and updates local certification key.(2) generation module
Generation module 302 is that the new key that chip card is generated is believed as key synchronization by the new key of 302 generations, i.e. sending module 304
Breath is sent to chip card, and chip card is received after the new key, and local certification key is updated using the new key.
Crypto-synchronization information can be directly carried in the update instruction that the embodiment of the present invention, sending module 304 are sent, or
Person, in order to ensure the ciphertext that can also be crypto-synchronization information carried in the transmission safety of crypto-synchronization information, update instruction,
Wherein, the ciphertext can be encrypted to crypto-synchronization information using the current certification key of chip card and be obtained, chip card
After the ciphertext of crypto-synchronization information is received, the ciphertext is decrypted using local certification key, key is obtained same
Information is walked, local certification key is updated further according to crypto-synchronization information.
The key update device provided by the present embodiment, determining module 300 judges whether according to strategy set in advance
Need the certification key of renewal chip card, if it is desired, then generation module 302 is that chip card generates new key, sending module 304
Indicate that chip card updates local certification key by card reader, update module 308 receives chip card in receiving module 306
After key synchronization is successfully indicated, local chip card certification key is replaced with into the new key.There is provided by the present invention
Technical scheme, key update device can update the certification key of chip card on suitable opportunity, so that same user
Within the same period, there can only be a chip card by certification, if the chip card that the user uses within the period
Certification key and key update device are inconsistent, then can not be by the certification of key update device, therefore, even if third party breaks through
It is close during the certification key of chip card memory storage, but certification key due to breaking through chip card memory storage in third party
Key updating device may have updated the certification key of the chip card, and former certification key has failed, so as to can not use old
Certification key is usurped by certification so that key update device can find whether chip card is forged in time, it is to avoid
The person of user or the injury of property.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by shown or discussion suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried
Rapid to can be by program to instruct the hardware of correlation to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as
Fruit is realized using in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention
In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention
By appended claims and its equivalent limit.
Claims (12)
1. a kind of key updating method, it is characterised in that including:
Backstage is according to strategy set in advance, it is determined that needing to update the certification key of chip card;
The backstage is that the chip card generates new key;
The backstage sends update instruction to the chip card, indicates that the chip card updates local certification key, wherein, institute
State the ciphertext that crypto-synchronization information or the crypto-synchronization information are carried in update instruction;
The key synchronization that the backstage receives the chip card is successfully indicated, the certification key of the chip card is replaced with described
New key.
2. according to the method described in claim 1, it is characterised in that platform is according to strategy set in advance in the rear, it is determined that needing
The certification key of chip card is updated, including:
The backstage receives the certification request of the chip card of card reader transmission, wherein, carried in the certification request
The identification information of the chip card and information to be certified;
The backstage obtains the certification key of the chip card according to the identification information of the chip card;
The backstage is authenticated using the certification key to the information to be certified, in certification in the case of, it is determined that
Need to update the certification key of the chip card.
3. method according to claim 2, it is characterised in that the information to be certified is authenticated not over
In the case of, methods described also includes:
The backstage determination is under attack using the chip card of the identification information, prohibits the use of the chip card of the identification information
Pass through certification.
4. according to the method in claim 2 or 3, it is characterised in that platform uses the certification key to described in the rear
After information to be certified is authenticated, methods described also includes:The backstage is returned to the letter to be certified to the card reader
Breath is authenticated obtained authentication result.
5. the method according to any one of Claims 1-4, it is characterised in that the crypto-synchronization information includes:New key
Updating factor, it is described Xinmi City by local certification key updating according to the new key updating factor to indicate the chip card
Key.
6. the method according to any one of Claims 1-4, it is characterised in that the crypto-synchronization information includes:It is described new
Key, it is the new key by local certification key updating to indicate the chip card.
7. the method according to any one of claim 1 to 6, it is characterised in that the ciphertext of the crypto-synchronization information includes:
Obtained cipher-text information is encrypted to the crypto-synchronization information using the current certification key of the chip card.
8. a kind of key update device, it is characterised in that including:
Determining module, for according to strategy set in advance, it is determined that needing to update the certification key of chip card;
Generation module, for generating new key for the chip card;
Sending module, for sending update instruction to the chip card, indicates that the chip card updates local certification key, its
In, the ciphertext of crypto-synchronization information or the crypto-synchronization information is carried in the update instruction;
Receiving module, the key synchronization for receiving the chip card is successfully indicated;
Update module, for being received in the receiving module after the synchronization successfully indicates, by the certification of the chip card
Key replaces with the new key.
9. a kind of key updating system, it is characterised in that including:Backstage, card reader and chip card, wherein,
The backstage, for being the core it is determined that needing to update the certification key of the chip card according to strategy set in advance
Piece card generates new key, and update instruction is sent to the chip card by the card reader, indicates that the chip card updates local
Certification key, wherein, the ciphertext of crypto-synchronization information or the crypto-synchronization information is carried in the update instruction;
The card reader, for receiving and the update instruction being sent into chip card;
The chip card, for receiving the update instruction, and according to the update instruction, be by local certification key updating
The new key, after being updated successfully, sends key synchronization to the card reader and successfully indicates;
The card reader, is additionally operable to receive and successfully indicates the key synchronization to be sent to the backstage;
The backstage, is successfully indicated for receiving the key synchronization, the certification key of the chip card is replaced with described new
Key.
10. system according to claim 9, it is characterised in that the backstage is specifically for determining to need in the following manner
Update the certification key of chip card:The certification request for the chip card that the card reader is sent is received, wherein, it is described to recognize
The identification information and information to be certified of the chip card are carried in card request;Institute is obtained according to the identification information of the chip card
State the certification key of chip card;The information to be certified is authenticated using the certification key, situation about passing through in certification
Under, it is determined that needing to update the certification key of the chip card.
11. system according to claim 10, it is characterised in that the backstage is additionally operable to:To the information to be certified
It is authenticated in the case of, it is determined that it is under attack using the chip card of the identification information, prohibit the use of the mark
The chip card for knowing information passes through certification.
12. the system according to claim 10 or 11, it is characterised in that the backstage is additionally operable to:Platform is used in the rear
After the certification key is authenticated to the information to be certified, is returned to the card reader and the information to be certified is carried out
The authentication result that certification is obtained.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710053735.4A CN107222306A (en) | 2017-01-22 | 2017-01-22 | A kind of key updating method, apparatus and system |
PCT/CN2018/071395 WO2018133675A1 (en) | 2017-01-22 | 2018-01-04 | Key update method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710053735.4A CN107222306A (en) | 2017-01-22 | 2017-01-22 | A kind of key updating method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107222306A true CN107222306A (en) | 2017-09-29 |
Family
ID=59928119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710053735.4A Pending CN107222306A (en) | 2017-01-22 | 2017-01-22 | A kind of key updating method, apparatus and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107222306A (en) |
WO (1) | WO2018133675A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018133675A1 (en) * | 2017-01-22 | 2018-07-26 | 天地融科技股份有限公司 | Key update method, device and system |
CN109936552A (en) * | 2017-12-19 | 2019-06-25 | 方正国际软件(北京)有限公司 | A kind of cipher key authentication method, server and system |
CN110084947A (en) * | 2019-05-24 | 2019-08-02 | 中国联合网络通信集团有限公司 | Access information update method, device |
CN110113153A (en) * | 2019-04-23 | 2019-08-09 | 深圳数字电视国家工程实验室股份有限公司 | NFC secret key updating method, terminal and system |
CN111866870A (en) * | 2019-04-26 | 2020-10-30 | 华为技术有限公司 | Key management method and device |
WO2020259202A1 (en) * | 2019-06-26 | 2020-12-30 | 天地融科技股份有限公司 | Device authentication method in office environment, office equipment and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1835623A (en) * | 2005-08-08 | 2006-09-20 | 华为技术有限公司 | Updating method of controlled secret key |
CN1859734A (en) * | 2005-10-10 | 2006-11-08 | 华为技术有限公司 | Controlled key updating method |
EP1092297B1 (en) * | 1998-07-02 | 2007-04-25 | Cryptography Research Inc. | Leak-resistant cryptographic indexed key update |
CN101005357A (en) * | 2006-12-28 | 2007-07-25 | 北京飞天诚信科技有限公司 | Method and system for updating certification key |
CN101257358A (en) * | 2008-04-17 | 2008-09-03 | 中兴通讯股份有限公司 | Method and system for updating user cipher key |
CN101593380A (en) * | 2008-05-28 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of gate control system and authentication method that generates and verify based on dynamic password |
CN101729247A (en) * | 2008-10-22 | 2010-06-09 | 中兴通讯股份有限公司 | Method and system for updating key |
CN102129743A (en) * | 2010-01-18 | 2011-07-20 | 上海启电信息科技有限公司 | System for preventing bank card from being stolen |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008294861A (en) * | 2007-05-25 | 2008-12-04 | Nippon Telegr & Teleph Corp <Ntt> | KEY MANAGEMENT METHOD AND SYSTEM, SERVICE PROVIDING CENTER DEVICE, IC CARD, AND PROGRAM |
CN102945384B (en) * | 2012-11-27 | 2015-09-16 | 上海质尊溯源电子科技有限公司 | A kind of method strengthening high-frequency RF ID security |
CN106157028B (en) * | 2015-04-15 | 2021-03-26 | 航天信息股份有限公司 | Financial IC card multi-time card issuing system and method based on trusted platform |
CN107222306A (en) * | 2017-01-22 | 2017-09-29 | 天地融科技股份有限公司 | A kind of key updating method, apparatus and system |
-
2017
- 2017-01-22 CN CN201710053735.4A patent/CN107222306A/en active Pending
-
2018
- 2018-01-04 WO PCT/CN2018/071395 patent/WO2018133675A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1092297B1 (en) * | 1998-07-02 | 2007-04-25 | Cryptography Research Inc. | Leak-resistant cryptographic indexed key update |
CN1835623A (en) * | 2005-08-08 | 2006-09-20 | 华为技术有限公司 | Updating method of controlled secret key |
CN1859734A (en) * | 2005-10-10 | 2006-11-08 | 华为技术有限公司 | Controlled key updating method |
CN101005357A (en) * | 2006-12-28 | 2007-07-25 | 北京飞天诚信科技有限公司 | Method and system for updating certification key |
CN101257358A (en) * | 2008-04-17 | 2008-09-03 | 中兴通讯股份有限公司 | Method and system for updating user cipher key |
CN101593380A (en) * | 2008-05-28 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of gate control system and authentication method that generates and verify based on dynamic password |
CN101729247A (en) * | 2008-10-22 | 2010-06-09 | 中兴通讯股份有限公司 | Method and system for updating key |
CN102129743A (en) * | 2010-01-18 | 2011-07-20 | 上海启电信息科技有限公司 | System for preventing bank card from being stolen |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018133675A1 (en) * | 2017-01-22 | 2018-07-26 | 天地融科技股份有限公司 | Key update method, device and system |
CN109936552A (en) * | 2017-12-19 | 2019-06-25 | 方正国际软件(北京)有限公司 | A kind of cipher key authentication method, server and system |
CN109936552B (en) * | 2017-12-19 | 2021-06-15 | 方正国际软件(北京)有限公司 | Key authentication method, server and system |
CN110113153A (en) * | 2019-04-23 | 2019-08-09 | 深圳数字电视国家工程实验室股份有限公司 | NFC secret key updating method, terminal and system |
CN110113153B (en) * | 2019-04-23 | 2022-05-13 | 深圳数字电视国家工程实验室股份有限公司 | NFC secret key updating method, terminal and system |
CN111866870A (en) * | 2019-04-26 | 2020-10-30 | 华为技术有限公司 | Key management method and device |
CN111866870B (en) * | 2019-04-26 | 2022-02-01 | 华为技术有限公司 | Key management method and device |
CN110084947A (en) * | 2019-05-24 | 2019-08-02 | 中国联合网络通信集团有限公司 | Access information update method, device |
WO2020259202A1 (en) * | 2019-06-26 | 2020-12-30 | 天地融科技股份有限公司 | Device authentication method in office environment, office equipment and system |
Also Published As
Publication number | Publication date |
---|---|
WO2018133675A1 (en) | 2018-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107222306A (en) | A kind of key updating method, apparatus and system | |
CN110149209B (en) | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment | |
US9594909B2 (en) | Software updating apparatus, software updating system, invalidation method, and invalidation program | |
EP3918768B1 (en) | Method for handling data in a secure container | |
CN107026874A (en) | One kind instruction signature and verification method and system | |
US20100180343A1 (en) | Software updating apparatus, software updating system, alteration verification method and alteration verification program | |
CN113645590B (en) | Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm | |
CN111209558B (en) | Internet of things equipment identity authentication method and system based on block chain | |
CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN107992753A (en) | Method for the software of the control device of more new vehicle | |
CN106529221B (en) | A kind of FPGA program anti-copy method and PCI-E cipher card | |
CN111160879A (en) | Hardware wallet and security improving method and device thereof | |
CN108605042A (en) | Method and apparatus for the certification based on trust in SDN clustereds | |
CN102983969B (en) | Security login system and security login method for operating system | |
WO2007110852A2 (en) | Revocation list improvement | |
CN109407663A (en) | Unmanned information security guarantee method and system based on block chain | |
CN113935744A (en) | Equipment anti-counterfeiting method and device | |
CN109831300A (en) | A kind of cipher key destruction method and device | |
CN105391555B (en) | A kind of method, backstage and system accessing SAM device | |
CN111047849A (en) | Networking remote control password module and safe remote control system | |
CN102681672B (en) | Reusable encryption keyboard circuit and design method thereof | |
CN106056726B (en) | It is a kind of can two-way authentication CPU card access-control card reader safety certifying method | |
CN108449249B (en) | Bus control system and method | |
CN116132134A (en) | Data transmission method and device, electronic equipment and storage medium | |
CN112073199B (en) | A battery authentication method, device, terminal device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |