[go: up one dir, main page]

CN108111311B - Method for realizing bank counter electronic signature based on state cryptographic algorithm - Google Patents

Method for realizing bank counter electronic signature based on state cryptographic algorithm Download PDF

Info

Publication number
CN108111311B
CN108111311B CN201711415790.XA CN201711415790A CN108111311B CN 108111311 B CN108111311 B CN 108111311B CN 201711415790 A CN201711415790 A CN 201711415790A CN 108111311 B CN108111311 B CN 108111311B
Authority
CN
China
Prior art keywords
terminal
certificate
signature
public key
national
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711415790.XA
Other languages
Chinese (zh)
Other versions
CN108111311A (en
Inventor
张恒
张登峰
段琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Centerm Information Co Ltd
Original Assignee
Fujian Centerm Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Centerm Information Co Ltd filed Critical Fujian Centerm Information Co Ltd
Priority to CN201711415790.XA priority Critical patent/CN108111311B/en
Publication of CN108111311A publication Critical patent/CN108111311A/en
Application granted granted Critical
Publication of CN108111311B publication Critical patent/CN108111311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a method for realizing bank counter electronic signature based on a national cryptographic algorithm, which needs to provide an equipment end, a terminal and a server end, and the method comprises the following steps: the terminal sends an instruction to the equipment end to generate a SM2 secret key pair for storage, and the public key is transferred to the server end through the terminal; after receiving the public key, the server side acquires and stores the national secret certificate through the public key and forwards the national secret certificate to the equipment side by the terminal; the equipment terminal analyzes the national secret certificate, judges whether the public key of the certificate is consistent with the public key stored by the equipment terminal, and reports a matching result to the terminal; when the terminal receives the matching result, the terminal issues the PDF document to the equipment terminal for display; after the client submits the handwritten signature, the equipment end synthesizes the handwritten signature into the current PDF document, and uses a national secret certificate and an SM2 private key to digitally sign the synthesized PDF document, and the terminal forwards the PDF document to the server end; and the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then archives the PDF document. The invention ensures the transmission security of three-party communication and prevents the document and the signature from being falsified.

Description

Method for realizing bank counter electronic signature based on state cryptographic algorithm
Technical Field
The invention relates to the field of banks, in particular to a method for realizing electronic signature of a bank counter based on a national cryptographic algorithm.
Background
Current lump bank has all expanded electronic handwritten signature business to counter devices such as traditional counter foreign currency to reduce the expense of paper document. The conventional electronic signature business process of the bank counter at present is as follows: the background sends the PDF document to the terminal, the terminal issues the PDF document to the equipment end through HID (human input device) or Bluetooth for displaying, after the client signs, the equipment end uploads the signature data (including picture and track data) to the terminal, and the terminal synthesizes the signature data into PDF and uploads the PDF to the background server for storage. In the business process, the formation and synthesis of the signature track are respectively carried out at the equipment end and the terminal end, and the server only participates in the storage work, which can cause the following risks:
(1) although the transmission security from the device side to the terminal is ensured through the encryption of the key, the PDF before the synthesis and the PDF displayed by the device side cannot be ensured to be matched, namely, the document viewed by the client and the document finally participating in the synthesis are possibly inconsistent;
(2) the terminal cannot guarantee that the signature data source is legal, i.e. the signature data participating in the synthesis may not come from the correct device;
(3) the server passively receives the final PDF document uploaded by the terminal, and cannot ensure whether the document is legal or not and confirm whether the document is tampered or not.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for realizing bank counter electronic signature based on a national cryptographic algorithm, which can prevent the document and the signature from being falsified while ensuring the transmission security of three-party communication.
The invention is realized by the following steps: a method for realizing bank counter electronic signature based on a state cryptographic algorithm needs to provide an equipment end, a terminal and a server end, and the method comprises the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device end synthesizes the handwritten signature of the client into the current PDF document, and uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, and sends the digitally signed PDF to the terminal, which is forwarded to the server end by the terminal;
and step S7, after the server side receives the PDF after the digital signature, the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then carries out archiving processing.
Further, the equipment end is cabinet outside cleaning equipment.
Furthermore, the equipment end adopts a hard encryption chip which accords with national password certification.
Furthermore, the equipment end is provided with an electromagnetic screen with a national password chip, and a signature track data source is acquired through the electromagnetic screen.
Further, the step S3 of "obtaining the national secret certificate through the public key" specifically includes that the server side submits the public key and the information of the bank party to the CA to apply for obtaining the national secret certificate.
Further, the step S6, where the step "the device side synthesizes the handwritten signature of the client into the current PDF document" specifically includes: and acquiring a dictionary object of the current signature page of the currently displayed PDF, calculating the area coordinate to be signed, and finally synthesizing the signature track into the designated position in the form of the watermark.
Further, the step S6 of "digitally signing the synthesized PDF document with the saved cryptographic certificate and the SM2 private key" specifically includes: the method comprises the steps of firstly calculating a PDF main body domain by using an SM3 algorithm to obtain a summary, then carrying out private key encryption on the summary by using an SM2 algorithm, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF after digital signature.
Further, the step S7 is specifically: after receiving the digitally signed PDF, the server side takes out a PKCS7 stream from the signature domain, splits a national secret certificate and signature data, compares the information of a certificate issuer, confirms that the certificate is legal, takes out a public key from the national secret certificate to decrypt the signature data by using an SM2 algorithm, calculates a main body domain in the PDF document according to the SM3 algorithm to generate a new abstract, compares the decryption result with the new abstract, and when the comparison result is consistent, indicates that the signature verification is successful, and performs filing processing.
The invention has the following advantages:
1. in the whole signature process, the SM2 public and private key pair is generated by the equipment end, so that the terminal does not need to issue a private key as the equipment end additionally, and the secret key is ensured not to be leaked;
2. the display, signature, synthesis and digital signature are integrated at the equipment end, so that the signature data is guaranteed not to be tampered to the maximum extent;
3. the output document is digitally signed by a national secret certificate and can be verified, and the requirement of a person on using a domestic encryption algorithm for encrypting and decrypting the financial data is met;
4. the server can check the final document, ensure that the document is generated by a specified device end, reduce the participation of the terminal, reduce the performance pressure of the terminal on one hand, and put an end to the risk that sensitive data is stolen or tampered in the transmission process or the local caching process on the other hand.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic flow chart of PDF digital signature according to the present invention.
Fig. 3 is a schematic flow chart of PDF signature verification according to the present invention.
Detailed Description
Referring to fig. 1 to 3, the method for implementing bank counter electronic signature based on the national cryptographic algorithm of the present invention needs to provide an equipment end, a terminal (teller operating terminal) and a server end, where the equipment end may be an equipment outside the counter, the equipment end may be provided with an electromagnetic screen with a national cryptographic chip, and a signature track data source is collected by the electromagnetic screen, so as to eliminate the possibility of track falsification by application layer software, and the equipment end employs a hard encryption chip conforming to the national cryptographic certification, so as to reduce the intervention of software application encryption and decryption results, and the method includes the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal; specifically, the public key and the information of the bank party can be submitted to a CA by the server to apply for obtaining the national secret certificate, and the CA may be a third party CA or a local bank CA. Wherein, the CA is a Certificate Authority (Certificate Authority) or Certificate Authority;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device side synthesizes the handwritten signature of the client into the current PDF document, and the synthesizing process specifically includes: acquiring a dictionary object of a current signature page to be signed of a currently displayed PDF, calculating the coordinates of an area to be signed, and finally synthesizing a signature track into a specified position in a watermark form; after the synthesis operation is completed, the equipment terminal uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, sends the digitally signed PDF to the terminal, and forwards the PDF to the server terminal; the process of the digital signature specifically comprises the following steps: calculating a PDF main body domain by using an SM3 algorithm to obtain an abstract, then carrying out private key encryption (signature) on the abstract by using an SM2 algorithm, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF subjected to digital signature;
step S7, after receiving the digitally signed PDF, the server side performs archive processing after confirming the validity of the PDF document by using the national secret certificate and the public key, where the step S7 specifically is: after the server side receives the PDF after digital signature, a PKCS7 stream is taken out from a signature domain, a national secret certificate and signature data are split, then information of a certificate issuer is compared, after the certificate is confirmed to be legal, a public key is taken out from the national secret certificate, signature data are decrypted (signature verification) by using an SM2 algorithm, a main body domain in the PDF document is calculated according to the SM3 algorithm to generate a new digest (digest 1), a decryption result (digest 2) is compared with the new digest (digest 1), when the comparison result is consistent, signature verification is successful, and filing processing is carried out.
The signature domain PDF document synthesis of the invention is carried out uniformly at the equipment end, which ensures that the document and the data are matched one by one, namely, the document seen by a user and the document participating in the synthesis are the same data source, avoids the additional risk of data falsification caused by secondary data copying, simultaneously, the equipment end directly synthesizes the track data which is adopted by the first hand and processed by a national secret chip into the PDF document, avoids the risk of falsification of a signature track, digitally signs the synthesized PDF document by using the national secret certificate at the equipment end, ensures the legality of the final document, effectively prevents the document from being falsified, namely, the equipment needs to generate a private key pair in advance and report a public key to a server end to apply for a unique national secret certificate, generates a summary by using a national secret algorithm when carrying out digital signature, synthesizes the summary together with the certificate into the signature domain of the PDF document, and applies for the national secret certificate at the equipment end to a server background by the terminal, and finally, the document is sent to the server side to be subjected to digital signature verification, so that the document legality is further enhanced. The whole signature process has less terminal workload, and the performance pressure of the terminal is reduced.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (7)

1. A method for realizing bank counter electronic signature based on a state cryptographic algorithm is characterized by comprising the following steps: the method comprises the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device end synthesizes the handwritten signature of the client into the current PDF document, and uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, and sends the digitally signed PDF to the terminal, which is forwarded to the server end by the terminal; the step S6 of "digitally signing the synthesized PDF document with the saved domestic secret certificate and the SM2 private key" specifically includes: calculating a PDF main body domain by using an SM3 algorithm to obtain an abstract, then encrypting the abstract by using an SM2 algorithm through a private key, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF after digital signature;
and step S7, after the server side receives the PDF after the digital signature, the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then carries out archiving processing.
2. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the equipment end is an external cabinet cleaning device.
3. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the equipment end adopts a hard encryption chip conforming to national password authentication.
4. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the device end is provided with an electromagnetic screen with a national password chip, and signature track data sources are collected through the electromagnetic screen.
5. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: in step S3, the step of "obtaining the national secret certificate through the public key" is specifically that the server side submits the public key and the information of the bank party to the CA to apply for obtaining the national secret certificate.
6. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the step S6, in which the device side synthesizes the handwritten signature of the client into the current PDF document, specifically includes: and acquiring a dictionary object of the current signature page of the currently displayed PDF, calculating the area coordinate to be signed, and finally synthesizing the signature track into the designated position in the form of the watermark.
7. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the step S7 specifically includes: after receiving the digitally signed PDF, the server side takes out a PKCS7 stream from the signature domain, splits a national secret certificate and signature data, compares the information of a certificate issuer, confirms that the certificate is legal, takes out a public key from the national secret certificate to decrypt the signature data by using an SM2 algorithm, calculates a main body domain in the PDF document according to the SM3 algorithm to generate a new abstract, compares the decryption result with the new abstract, and when the comparison result is consistent, indicates that the signature verification is successful, and performs filing processing.
CN201711415790.XA 2017-12-25 2017-12-25 Method for realizing bank counter electronic signature based on state cryptographic algorithm Active CN108111311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711415790.XA CN108111311B (en) 2017-12-25 2017-12-25 Method for realizing bank counter electronic signature based on state cryptographic algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711415790.XA CN108111311B (en) 2017-12-25 2017-12-25 Method for realizing bank counter electronic signature based on state cryptographic algorithm

Publications (2)

Publication Number Publication Date
CN108111311A CN108111311A (en) 2018-06-01
CN108111311B true CN108111311B (en) 2021-11-19

Family

ID=62212649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711415790.XA Active CN108111311B (en) 2017-12-25 2017-12-25 Method for realizing bank counter electronic signature based on state cryptographic algorithm

Country Status (1)

Country Link
CN (1) CN108111311B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110719162B (en) * 2019-09-04 2022-08-09 浪潮金融信息技术有限公司 Method for guaranteeing safety of bank self-service terminal system based on SM2 algorithm
CN111369364B (en) * 2020-03-02 2024-02-23 中国农业银行股份有限公司 Electronic signature method and device based on super counter
CN114499891B (en) * 2022-03-21 2024-05-31 宁夏凯信特信息科技有限公司 Signature server system and signature verification method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202677327U (en) * 2011-12-13 2013-01-16 北京握奇数据系统有限公司 Handwritten terminal for encrypting signatures
CN103338215A (en) * 2013-07-26 2013-10-02 中金金融认证中心有限公司 Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm
CN103888260A (en) * 2014-03-13 2014-06-25 北京数字认证股份有限公司 Digital signature device corresponding to handwritten signature reliably
CN105007162A (en) * 2015-07-01 2015-10-28 浪潮电子信息产业股份有限公司 A trusted electronic signature system and electronic signature method
CN105162607A (en) * 2015-10-12 2015-12-16 武汉瑞纳捷电子技术有限公司 Authentication method and system of payment bill voucher

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2819050B1 (en) * 2013-06-25 2019-12-25 Aliaslab S.p.A. Electronic signature system for an electronic document using a third-party authentication circuit

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202677327U (en) * 2011-12-13 2013-01-16 北京握奇数据系统有限公司 Handwritten terminal for encrypting signatures
CN103338215A (en) * 2013-07-26 2013-10-02 中金金融认证中心有限公司 Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm
CN103888260A (en) * 2014-03-13 2014-06-25 北京数字认证股份有限公司 Digital signature device corresponding to handwritten signature reliably
CN105007162A (en) * 2015-07-01 2015-10-28 浪潮电子信息产业股份有限公司 A trusted electronic signature system and electronic signature method
CN105162607A (en) * 2015-10-12 2015-12-16 武汉瑞纳捷电子技术有限公司 Authentication method and system of payment bill voucher

Also Published As

Publication number Publication date
CN108111311A (en) 2018-06-01

Similar Documents

Publication Publication Date Title
CN106452775B (en) Method and device for realizing electronic signature and signature server
CN107483212B (en) Method for generating digital signature by cooperation of two parties
KR100910378B1 (en) System and method for issuing electronic certificate using encrypted image
JP4870155B2 (en) Electronic passport authentication protocol with enhanced privacy
WO2022078367A1 (en) Payment secret key encryption and decryption method, payment authentication method, and terminal device
CN107508685B (en) A realization method of applying electronic signature service system in cloud computing environment
CN105635187B (en) Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp
WO2015161689A1 (en) Data processing method based on negotiation key
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
TWI673626B (en) Method for verifying electronic files using biometrics, terminal electronic device and computer readable recording medium
CN108111311B (en) Method for realizing bank counter electronic signature based on state cryptographic algorithm
KR101113446B1 (en) System and method for transmitting a certificate to a mobile device and system and method for transmitting and authenticating data using a multidimensional code
CN116611082A (en) A File Electronic Signature Algorithm That Can Improve the Security of Electronic Signature
WO2018211475A1 (en) Method for the creation of a document provided with a high-security digital signature
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
TWI734729B (en) Method and device for realizing electronic signature and signature server
WO2015109958A1 (en) Data processing method based on negotiation key, and mobile phone
JP2007060352A (en) System, program, and method for managing document
WO2023164616A1 (en) Privacy-preserving data deduplication
CN113300841B (en) Identity-based collaborative signature method and system
JP5159752B2 (en) Communication data verification device and computer program therefor
US12388624B2 (en) Apparatus and method for sharing data
CN114928469A (en) IDaaS system for access control based on mutual authentication mechanism
CN112380574A (en) Data chaining method based on block chain and SE chip
CN113497712A (en) KGC data processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant