[go: up one dir, main page]

CN106452797A - Consumable and equipment pairing method, consumable use method, consumable and equipment - Google Patents

Consumable and equipment pairing method, consumable use method, consumable and equipment Download PDF

Info

Publication number
CN106452797A
CN106452797A CN201611087052.2A CN201611087052A CN106452797A CN 106452797 A CN106452797 A CN 106452797A CN 201611087052 A CN201611087052 A CN 201611087052A CN 106452797 A CN106452797 A CN 106452797A
Authority
CN
China
Prior art keywords
equipment
consumptive material
authorization code
consumable
eigenvalue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611087052.2A
Other languages
Chinese (zh)
Inventor
刘复鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Original Assignee
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Midea Group Co Ltd, Midea Smart Home Technology Co Ltd filed Critical Midea Group Co Ltd
Priority to CN201611087052.2A priority Critical patent/CN106452797A/en
Publication of CN106452797A publication Critical patent/CN106452797A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of consumable anti-counterfeiting design, and discloses a consumable and equipment pairing method, a consumable use method, a consumable and equipment, wherein the consumable and equipment pairing method comprises the following steps that a safety chip arranged in the consumable decrypts an authorization code of equipment associated with the consumable through a stored private key, wherein the authorization code is obtained by encrypting according to an equipment feature value; when a value obtained by decrypting the authorization code is matched with the feature value of the equipment associated with the consumable, the condition that the consumable is applicable to the equipment is determined. By using the technical scheme, the safety chip in the consumable decrypts the authorization code of the equipment associated with the consumable through the stored private key; the condition that the consumable is applicable to the equipment is determined through judging that the value obtained through decrypting the authorization code is matched with the feature value of the equipment associated with the consumable; verification on authenticity of the consumable is realized, so that the consumable cannot be counterfeited; or the counterfeited consumable cannot be used on the equipment.

Description

Consumptive material and device pairing method, consumptive material using method, consumptive material and equipment
Technical field
The present invention relates to consumptive material anti-counterfeiting design field, in particular it relates to a kind of consumptive material is used with device pairing method, consumptive material Method, consumptive material and equipment.
Background technology
All there is the scene of consumptive material replacing in the equipment such as printer, water purifier, air-conditioning, if using the unauthorized consumption of third party Material, or the false consumptive material that forges, may cause extreme influence, or even damage equipment to the performance of equipment.
By taking the consumptive material of printer as an example.In order to prevent that consumptive material is forged, structure-based deemed-to-satisfy4 guarantor in prior art, is proposed Shield, however adulterator only need to obtain mould can be carried out counterfeit.In order to solve the problems, such as structural anti false, prior art In propose chip solution.Initially chip is recognizing machine, is the key of a connection consumptive material and whole machine, the print cartridge of microarray strip, Powder box, drum box-packed enter machine on can make machine connect start working.But if this part of machine " short circuit ", so that it may so that With any forgery consumptive material.In order to solve this problem, it is proposed that a kind of chip, it is counting chip, when drum box use predetermined Number, no matter either with or without powder, drum core can be used, it is necessary to change.Similar, chip also is type self-destroyed, and powder box is used Complete chip is just bad, it is not possible to use again.However as the development of the technology of forgery, whether counting chip or self-destruction chip, are making Make all and no longer there is difficulty.Consumptive material anti-counterfeiting technology in prior art not have to be forged.
For above-mentioned technical problem, good solution in prior art, is there is no.
Content of the invention
It is an object of the invention to provide a kind of method and apparatus, the method and equipment can make consumptive material have high false proof energy Power.
To achieve these goals, the present invention provides a kind of consumptive material and device pairing method, and the method includes:
The equipment that the safety chip being arranged in the consumptive material is associated with the consumptive material by the private key deciphering of storage Authorization code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
During the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material, institute is determined State consumptive material and be applied to the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment ?.
Further, the eigenvalue of the equipment is device mac address or the character string comprising the device mac address.
Further, the eigenvalue of the equipment includes the device mac address and random number.
Further, the eigenvalue of the equipment is that 2048 bit strings, wherein random number is 2000 bits.
A kind of another aspect of the present invention, there is provided consumptive material using method, the method includes:
The consumptive material is installed to equipment, wherein, the consumptive material includes to be stored with the safety chip of private key, and the equipment is deposited Contain authorization code;
The authorization code is deciphered using the private key by the safety chip;And
When the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determine that the consumptive material is applied to institute State equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment ?.
A kind of another aspect of the invention, there is provided consumptive material, the consumptive material includes:
Safety chip, the private key being configured to store for deciphering the authorization code being associated with equipment;
The safety chip is further configured to, when decipher value that the authorization code obtains with and the equipment that is associated of the consumptive material Eigenvalue coupling when, determine the consumptive material be applied to the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment ?.
Further, the safety chip is cryptography safety chip.
A kind of still another aspect of the present invention, there is provided equipment, the equipment includes:
Memorizer, is configured to store and encrypts the authorization code for obtaining, wherein the authorization code energy according to the eigenvalue of equipment Enough private key deciphering by the safety chip being arranged in consumptive material by storage, when decipher value that the authorization code obtains and with described During the eigenvalue coupling of equipment, the consumptive material can be used in the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment ?.
By technique scheme, the safety chip in consumptive material is associated with the consumptive material by the private key deciphering of storage The authorization code of equipment, by judge the eigenvalue of value that the deciphering authorization code obtains and the equipment be associated with consumptive material mate come Determine that the consumptive material is applied to the equipment, it is achieved that the checking to consumptive material verity, so that consumptive material is forged, or make forgery Consumptive material is not used to equipment.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Description of the drawings
Accompanying drawing is used to provide a further understanding of the present invention, and constitutes the part of description, with following tool Body embodiment is used for explaining the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the consumptive material and device pairing method flow diagram that embodiment of the present invention is provided;
Fig. 2 is the consumptive material using method flow chart that embodiment of the present invention is provided;
Fig. 3 is the consumptive material composition structural representation that embodiment of the present invention is provided;
Fig. 4 is the equipment composition structural representation that embodiment of the present invention is provided.
Description of reference numerals
1 consumptive material, 2 safety chip
3 equipment, 4 memorizer.
Specific embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.It should be appreciated that this place is retouched The specific embodiment that states is merely to illustrate and explains the present invention, is not limited to the present invention.
Fig. 1 is the consumptive material and device pairing method flow diagram that embodiment of the present invention is provided.As shown in figure 1, reality of the present invention The mode of applying provides a kind of consumptive material with device pairing method, and the method includes:
S101, private key deciphering and setting that the consumptive material be associated of the safety chip being arranged in the consumptive material by storage Standby authorization code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
S102, during the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material, Determine that the consumptive material is applied to the equipment.
By technique scheme, the safety chip in consumptive material is associated with the consumptive material by the private key deciphering of storage The authorization code of equipment, by judge the eigenvalue of value that the deciphering authorization code obtains and the equipment be associated with consumptive material mate come Determine that the consumptive material is applied to the equipment, it is achieved that the checking to consumptive material verity, so that consumptive material is forged, or make forgery Consumptive material is not used to equipment.
In embodiments, authorization code can be according to the eigenvalue of equipment by the public key encryption corresponding with the private key Obtain.Public key used in embodiment of the present invention and private key are the key pair for being obtained by special algorithm, wherein public key It is part disclosed in cipher key pair, private key is then private part.Public key is generally used for encrypted session key, checking numeral and signs Name, or encryption can be with the data of corresponding private key deciphering.The key for being obtained by this algorithm is unique to can guarantee that.Make With this key to when, if with one of key encrypt one piece of data, it is necessary to use another secret key decryption.Such as use Public key encryption data are necessary for being deciphered with private key, if must also use public key decryptions with private key encryption, otherwise deciphering will not become Work(.Embodiment of the present invention establishes unique corresponding relation using above-mentioned encryption and deciphering principle between consumptive material and equipment.
In embodiments, the safety chip being arranged in consumptive material can be the chip with memory element and arithmetic element Circuit or chip package.Can be with memorizer, for storing authorization code in the equipment being associated with consumptive material.
In embodiments, the eigenvalue of equipment can be device mac address or the character comprising the device mac address String.In order to improve confidentiality further, the eigenvalue of the equipment can include device mac address and random number.
In a preferred embodiment, the eigenvalue of equipment can be 2048 bit strings, and wherein random number is 2000 Bit, and device mac address is 48 bits.
Based on above-mentioned encryption and deciphering principle, another aspect of the present invention provides a kind of consumptive material using method, such as Fig. 2 Shown, consumptive material using method includes:
S201, the consumptive material is installed to equipment, and wherein, the consumptive material includes to be stored with the safety chip of private key, described Equipment is stored with authorization code;
S202, deciphers the authorization code by the safety chip using the private key;And
S203, when the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determines that the consumptive material is fitted For the equipment.
In embodiments, authorization code can according to the eigenvalue of the equipment of such as device mac address or ID by with private The corresponding public key encryption of key is obtained.The encryption of private key and public key and deciphering principle as above, will not be described here.
In addition to the above methods, embodiments of the present invention additionally provide a kind of consumptive material, as shown in figure 3, embodiment party of the present invention The consumptive material 1 that formula is provided can include:
Safety chip 2, the safety chip 2 may be configured to store the private for deciphering the authorization code being associated with equipment Key;The safety chip 2 is further configured to, when decipher value that the authorization code obtains with and the spy of equipment that is associated of the consumptive material During value indicative coupling, determine that the consumptive material is applied to the equipment.
In embodiments, the safety chip 2 being arranged in consumptive material 1 can be the core with memory element and arithmetic element Piece circuit or chip package.Wherein, memory element can be stored with for deciphering the private key of authorization code and executing decrypting process Program code.Arithmetic element can be extracted private key and program code from memory element and execute decrypting process, when deciphering is authorized The value that obtains of code with and when the eigenvalue of equipment that is associated of consumptive material mates, arithmetic element can determine the consumptive material suitable for institute Stating equipment and equipment is allowed using the consumptive material.In a preferred embodiment, the safety chip 2 can be the safe core of cryptography Piece.
In embodiments, the example of consumptive material 1 includes but is not limited to the equipment such as printer, water purifier, air-conditioning, sphygomanometer makes Consumptive material.
Another aspect of the present invention, additionally provides a kind of equipment, as shown in figure 4, embodiment of the present invention provide set Standby 3 can include:
Memorizer 4, the storage its 4 may be configured to store according to the eigenvalue of equipment encrypt obtain authorization code, its Described in authorization code can be by the safety chip being arranged in consumptive material by storage private key deciphering, obtain when the authorization code is deciphered The value that arrives and when mating with the eigenvalue of the equipment 3, the consumptive material can be used in the equipment 3.
In embodiments, the example of equipment 3 includes but is not limited to printer, water purifier, air-conditioning, sphygomanometer etc..
In embodiments of the present invention, safety chip 2 can store secure private key, and public key can be stored in equipment In.Splice the random number of upper 2000 bit using the MAC Address of equipment, constitute the character string of 2048 bits, then using public key Encryption, generates authorization code, it is, in principle, that the authorization code only could normally solve equipment using corresponding safety chip private key MAC Address.In actual production process, by the authorization code mandate plant produced consumptive material of safety chip and respective amount and can set Standby.Wherein, safety chip can be with paster on consumptive material circuit, by authorization code burning in device memory (for example, flash memory).? When use, when consumptive material is assemblied in equipment, safety chip can be decrypted to authorization code, and is sent the result to equipment and entered Row verification.Equipment passes through to parse plaintext, thinks that consumptive material is legal if it can index the MAC Address with the machine coupling, Carry out normal work.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the present invention, multiple letters can be carried out to technical scheme Monotropic type, these simple variant belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned specific embodiment, in not lance In the case of shield, can be combined by any suitable means.In order to avoid unnecessary repetition, the present invention to various can The compound mode of energy is no longer separately illustrated.
Additionally, combination in any can also be carried out between a variety of embodiments of the present invention, as long as which is without prejudice to this The thought of invention, which should equally be considered as content disclosed in this invention.

Claims (12)

1. a kind of consumptive material and device pairing method, it is characterised in that the method includes:
The mandate of the equipment that the safety chip being arranged in the consumptive material is associated with the consumptive material by the private key deciphering of storage Code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
During the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material, the consumption is determined Material is applied to the equipment.
2. method according to claim 1, it is characterised in that the authorization code according to the eigenvalue of equipment by with described The corresponding public key encryption of private key is obtained.
3. method according to claim 1, it is characterised in that the eigenvalue of the equipment is device mac address or includes The character string of the device mac address.
4. method according to claim 1, it is characterised in that the eigenvalue of the equipment includes the device mac address And random number.
5. method according to claim 4, it is characterised in that the eigenvalue of the equipment be 2048 bit strings, its Middle random number is 2000 bits.
6. a kind of consumptive material using method, it is characterised in that the method includes:
The consumptive material is installed to equipment, wherein, the consumptive material includes to be stored with the safety chip of private key, and the equipment is stored with Authorization code;
The authorization code is deciphered using the private key by the safety chip;And
When the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determine that the consumptive material is applied to described setting Standby.
7. method according to claim 6, it is characterised in that the authorization code according to the eigenvalue of equipment by with described The corresponding public key encryption of private key is obtained.
8. a kind of consumptive material, it is characterised in that the consumptive material includes:
Safety chip, the private key being configured to store for deciphering the authorization code being associated with equipment;
The safety chip is further configured to, when decipher value that the authorization code obtains with and the spy of equipment that is associated of the consumptive material During value indicative coupling, determine that the consumptive material is applied to the equipment.
9. consumptive material according to claim 8, it is characterised in that the authorization code according to the eigenvalue of equipment by with described The corresponding public key encryption of private key is obtained.
10. consumptive material according to claim 8, it is characterised in that the safety chip be.
11. a kind of equipment, it is characterised in that the equipment includes:
Memorizer, is configured to store and encrypts the authorization code for obtaining according to the eigenvalue of equipment, and the wherein authorization code can be by Be arranged on the private key deciphering of safety chip in consumptive material by storage, when decipher value that the authorization code obtains and with the equipment Eigenvalue coupling when, the consumptive material can be used in the equipment.
12. equipment according to claim 11, it is characterised in that the authorization code according to the eigenvalue of equipment by with institute State the corresponding public key encryption of private key to obtain.
CN201611087052.2A 2016-11-30 2016-11-30 Consumable and equipment pairing method, consumable use method, consumable and equipment Pending CN106452797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611087052.2A CN106452797A (en) 2016-11-30 2016-11-30 Consumable and equipment pairing method, consumable use method, consumable and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611087052.2A CN106452797A (en) 2016-11-30 2016-11-30 Consumable and equipment pairing method, consumable use method, consumable and equipment

Publications (1)

Publication Number Publication Date
CN106452797A true CN106452797A (en) 2017-02-22

Family

ID=58223385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611087052.2A Pending CN106452797A (en) 2016-11-30 2016-11-30 Consumable and equipment pairing method, consumable use method, consumable and equipment

Country Status (1)

Country Link
CN (1) CN106452797A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107599631A (en) * 2017-09-14 2018-01-19 北京赛腾标识系统股份公司 A kind of spray printing device control system and method
CN107633574A (en) * 2017-08-25 2018-01-26 广东美的暖通设备有限公司 Electronics lock management method, management system and computer equipment
CN109859067A (en) * 2018-12-28 2019-06-07 无锡井通网络科技有限公司 Auxiliary manufacture verification method, device and electronic equipment based on block chain
CN110798447A (en) * 2019-09-18 2020-02-14 广州朗国电子科技有限公司 Intelligent terminal local authorization method, device and system based on network communication
CN112052432A (en) * 2020-09-01 2020-12-08 禾麦科技开发(深圳)有限公司 Terminal device authorization method and device
CN113836516A (en) * 2021-09-13 2021-12-24 北京安御道合科技有限公司 Printer selenium drum anti-counterfeiting and printing frequency protection system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547824A (en) * 2001-08-24 2004-11-17 Zih��˾ Method and apparatus for article authentication
CN102087684A (en) * 2009-12-04 2011-06-08 徐峰 Method for encrypting consumable items through radio frequency identification electronic tag
CN102145596A (en) * 2010-11-11 2011-08-10 童国海 Method, system and ink box for controlling printing
CN104553384A (en) * 2014-12-25 2015-04-29 珠海艾派克微电子有限公司 Consumable chip as well as identification method and device for serial number of consumable chip
CN204774130U (en) * 2015-06-25 2015-11-18 重庆品胜科技有限公司 Anti -fake printer encryption device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547824A (en) * 2001-08-24 2004-11-17 Zih��˾ Method and apparatus for article authentication
CN102087684A (en) * 2009-12-04 2011-06-08 徐峰 Method for encrypting consumable items through radio frequency identification electronic tag
CN102145596A (en) * 2010-11-11 2011-08-10 童国海 Method, system and ink box for controlling printing
CN104553384A (en) * 2014-12-25 2015-04-29 珠海艾派克微电子有限公司 Consumable chip as well as identification method and device for serial number of consumable chip
CN204774130U (en) * 2015-06-25 2015-11-18 重庆品胜科技有限公司 Anti -fake printer encryption device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633574A (en) * 2017-08-25 2018-01-26 广东美的暖通设备有限公司 Electronics lock management method, management system and computer equipment
CN107599631A (en) * 2017-09-14 2018-01-19 北京赛腾标识系统股份公司 A kind of spray printing device control system and method
CN109859067A (en) * 2018-12-28 2019-06-07 无锡井通网络科技有限公司 Auxiliary manufacture verification method, device and electronic equipment based on block chain
CN110798447A (en) * 2019-09-18 2020-02-14 广州朗国电子科技有限公司 Intelligent terminal local authorization method, device and system based on network communication
CN112052432A (en) * 2020-09-01 2020-12-08 禾麦科技开发(深圳)有限公司 Terminal device authorization method and device
CN113836516A (en) * 2021-09-13 2021-12-24 北京安御道合科技有限公司 Printer selenium drum anti-counterfeiting and printing frequency protection system and method
CN113836516B (en) * 2021-09-13 2023-08-29 北京安御道合科技有限公司 Printer selenium drum anti-counterfeiting and printing frequency protection system and method

Similar Documents

Publication Publication Date Title
CN106452797A (en) Consumable and equipment pairing method, consumable use method, consumable and equipment
US9253162B2 (en) Intelligent card secure communication method
EP2955871B1 (en) Cryptographic method for securely exchanging messages and device and system for implementing this method
CN102904712A (en) Information encrypting method
TW202121868A (en) Data encryption and decryption method and device, storage medium and encrypted file
CN104637117B (en) Method, intelligent lock core, lockset and key that intelligent lock core and key are realized
CN101917267B (en) Method for storing random key based on encryption file capable of storing softdog
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN107135070A (en) Method for implanting, framework and the system of RSA key pair and certificate
EP1841122A1 (en) Encryption method for highest security applications
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN104268447A (en) Encryption method of embedded software
CN103746805A (en) External authentication key generation method and system
CN105281915A (en) Ciphertext generating method of password keyboard
CN106453380A (en) Secret key negotiation method and apparatus
CN105227312A (en) Intelligent code key password authentification extracting method
US20230188336A1 (en) Automatic Key Rolling for Link Encryption
CN107766725B (en) Template attack resistant data transmission method and system
CN105120425B (en) M2M recognition methods and device, internet-of-things terminal, M2M identifying system
CN108599927A (en) The protective relaying device of integrated national secret algorithm security module
CN102968598B (en) The decryption method of digital document
CN107070658A (en) A kind of improved method of system encryption authentication mechanism
KR20170019679A (en) Efficient white-box based encryption-decryption method and tag generation and verification method
TWI665901B (en) Encryption method and decryption method
CN103475466A (en) USBKey bus protection implementation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222