{"id":"https://openalex.org/W4416143067","doi":"https://doi.org/10.3103/s0146411625700579","title":"A Secure Operation Method Based on Secure Chip Identity Authentication","display_name":"A Secure Operation Method Based on Secure Chip Identity Authentication","publication_year":2025,"publication_date":"2025-08-01","ids":{"openalex":"https://openalex.org/W4416143067","doi":"https://doi.org/10.3103/s0146411625700579"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411625700579","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700579","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101168006","display_name":"Qingqin Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165204","display_name":"Zhuhai Institute of Advanced Technology","ror":"https://ror.org/05r1mzq61","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761","https://openalex.org/I4210165204"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingqin Fu","raw_affiliation_strings":["ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China"],"affiliations":[{"raw_affiliation_string":"ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China","institution_ids":["https://openalex.org/I4210165204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073572996","display_name":"Zhengquan Ang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166468","display_name":"Beijing Aerospace Flight Control Center","ror":"https://ror.org/007a14354","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210166468"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengquan Ang","raw_affiliation_strings":["Beijing Aerospace Flight Control Center, 100094, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Aerospace Flight Control Center, 100094, Beijing, China","institution_ids":["https://openalex.org/I4210166468"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101576003","display_name":"Fan He","orcid":"https://orcid.org/0000-0003-0588-3343"},"institutions":[{"id":"https://openalex.org/I4210165204","display_name":"Zhuhai Institute of Advanced Technology","ror":"https://ror.org/05r1mzq61","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761","https://openalex.org/I4210165204"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan He","raw_affiliation_strings":["ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China"],"affiliations":[{"raw_affiliation_string":"ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China","institution_ids":["https://openalex.org/I4210165204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068188378","display_name":"Pingjiang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089056","display_name":"Beijing Microelectronics Technology Institute","ror":"https://ror.org/007y7ej30","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210089056"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pingjiang Xu","raw_affiliation_strings":["Beijing Chip Microelectronics Technology Co., Ltd., 100192, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Chip Microelectronics Technology Co., Ltd., 100192, Beijing, China","institution_ids":["https://openalex.org/I4210089056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112739408","display_name":"Guanglun Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165204","display_name":"Zhuhai Institute of Advanced Technology","ror":"https://ror.org/05r1mzq61","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761","https://openalex.org/I4210165204"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanglun Yang","raw_affiliation_strings":["ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China"],"affiliations":[{"raw_affiliation_string":"ZhongGuanCun XinHaiZeYou Technology Co. Ltd, 100094, Beijing, China","institution_ids":["https://openalex.org/I4210165204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101168006"],"corresponding_institution_ids":["https://openalex.org/I4210165204"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19129352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"59","issue":"4","first_page":"417","last_page":"425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0966000035405159,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0966000035405159,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.09319999814033508,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.08860000222921371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7239000201225281},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6942999958992004},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.5769000053405762},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.5565000176429749},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5536999702453613},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.4902999997138977},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4618000090122223},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.43560001254081726}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7975000143051147},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7239000201225281},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6942999958992004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6434999704360962},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.5769000053405762},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.5565000176429749},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5536999702453613},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.4902999997138977},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4618000090122223},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.43560001254081726},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4009000062942505},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.33160001039505005},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C2779795794","wikidata":"https://www.wikidata.org/wiki/Q7315343","display_name":"Reset (finance)","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.271699994802475},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26420000195503235},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.26350000500679016},{"id":"https://openalex.org/C174953433","wikidata":"https://www.wikidata.org/wiki/Q5532650","display_name":"Generic Bootstrapping Architecture","level":5,"score":0.2621999979019165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411625700579","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700579","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2313570386","https://openalex.org/W2324832597","https://openalex.org/W2606253141","https://openalex.org/W2606730688","https://openalex.org/W2902478849","https://openalex.org/W2902720253","https://openalex.org/W2902789930","https://openalex.org/W3004402811","https://openalex.org/W3017532160","https://openalex.org/W3019531564","https://openalex.org/W4200428271","https://openalex.org/W4200514563","https://openalex.org/W4211147257","https://openalex.org/W4223996212","https://openalex.org/W4245257378","https://openalex.org/W4313210374"],"related_works":[],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,40,57,65,82,90,95,118,124,140,149,159,168,185,206,232,255,290,307,321,362],"ensure":[3,150],"the":[4,49,59,66,70,74,83,92,97,107,120,126,135,141,151,154,161,164,170,180,186,201,237,244,278,292,309,328,334,343,357],"security":[5,21,26,54,84,109,165,196,212,238,358,367],"of":[6,9,35,153,204,236],"identity":[7,28,51,61,99,128,137,144,162,172,182,189,227,245,260,264,268,273,279,294,300,311,317,323,329,335,345,351],"authentication":[8,50,62,100,129,138,145,173,183,190,228,240,246,261,265,269,274,280,295,301,312,318,324,330,336,346,352],"electric":[10],"power,":[11],"financial":[12],"and":[13,80,215,225,298,315],"other":[14],"terminal":[15],"products,":[16],"this":[17,36,103,176],"paper":[18],"proposes":[19],"a":[20,250,284],"operation":[22,213,235],"method":[23,88,104,116,177],"based":[24,341],"on":[25,193,342],"chip":[27,55,110,166,239,359],"authentication.":[29,155],"There":[30],"are":[31],"four":[32,202],"main":[33],"methods":[34],"method,":[37,163],"which":[38,122,132],"need":[39,94],"be":[41,339,363],"completed":[42],"with":[43],"corresponding":[44,217],"instructions:":[45],"The":[46,53,86,114,156],"first":[47],"is":[48,72,89,117,158,248,282,288,305,332],"method.":[52],"needs":[56,123,167],"send":[58],"\u201cverify":[60],"pin\u201d":[63,101,130,174],"command":[64,297,314,320,348],"interface":[67,75],"device.":[68],"After":[69],"verification":[71],"passed,":[73],"device":[76],"can":[77,105,133,178,199,338,360],"legally":[78],"read":[79],"write":[81],"chip.":[85],"second":[87],"unlock":[91,263,310,322,344],"identity,":[93,121],"execute":[96,125,169,291,308],"\u201cunlock":[98],"command,":[102,131,175,354],"make":[106],"locked":[108,251,285],"restore":[111],"normal":[112],"operation.":[113],"third":[115],"reset":[119],"\u201creload":[127],"set":[134],"user\u2019s":[136],"pin":[139,184,247,281,296,302,313,319,331,337,347,353],"newly":[142,187],"entered":[143,188],"pin,":[146,229,262,266,270],"so":[147,230,355],"as":[148,221,231,258],"restorability":[152],"fourth":[157],"change":[160,226,272,299],"\u201cchange":[171],"update":[179],"original":[181],"pin.":[191,241,275,325],"Based":[192],"actual":[194],"application":[195,218],"requirements,":[197],"users":[198],"use":[200],"types":[203],"commands":[205,256],"reasonably":[207],"combine":[208],"applications,":[209],"select":[210],"different":[211],"methods,":[214],"perform":[216],"functions":[219],"such":[220,257],"verify,":[222],"unlock,":[223],"reload,":[224],"achieve":[233],"secure":[234],"Identify":[242],"whether":[243],"in":[249,253,283],"state":[252],"response":[254],"verify":[259,293],"reload":[267,316,350],"or":[271,349],"Recognizing":[276],"that":[277,356],"state,":[286],"it":[287,304],"prohibited":[289],"command;":[303],"allowed":[306],"Therefore,":[326],"after":[327],"locked,":[333],"unlocked":[340],"continue":[361],"used":[364],"while":[365],"meeting":[366],"requirements.":[368]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-12T00:00:00"}
