{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:46Z","timestamp":1773615766091,"version":"3.50.1"},"reference-count":31,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.3103\/s0146411625700579","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T12:41:47Z","timestamp":1762951307000},"page":"417-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Operation Method Based on Secure Chip Identity Authentication"],"prefix":"10.3103","volume":"59","author":[{"family":"Qingqin Fu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhengquan","family":"Ang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fan","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pingjiang","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guanglun","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"7846_CR1","first-page":"49","volume":"27","author":"P. Xu","year":"2011","unstructured":"Xu, P., Design of smart card file system based on linked list method, Microcomputer Information, 2011, vol. 27, no. 11, pp. 49\u201350.","journal-title":"Microcomputer Information"},{"key":"7846_CR2","first-page":"32","volume":"12","author":"D. Zhao","year":"2014","unstructured":"Zhao, D. and Wang, Yu., Implementation of a smart card write protection mechanism, Electronic Technology Application, 2014, vol. 12, pp. 32\u201334.","journal-title":"Electronic Technology Application"},{"key":"7846_CR3","first-page":"94","volume":"36","author":"Q. Fu","year":"2014","unstructured":"Fu, Q., Implementation of an improved smart card authentication method, Computer Engineering and Science, 2014, vol. 36, no. 1, pp. 94\u201398.","journal-title":"Computer Engineering and Science"},{"key":"7846_CR4","doi-asserted-by":"publisher","unstructured":"Lai, Y.-Y., Fu, Q.-Q., and Ang, Z.-Q., A grey lock method to support once pre-freezing mechanism in IC card, 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), Ottawa, 2014, IEEE, 2014, pp. 1411\u20131414. https:\/\/doi.org\/10.1109\/WARTIA.2014.6976548","DOI":"10.1109\/WARTIA.2014.6976548"},{"key":"7846_CR5","doi-asserted-by":"publisher","unstructured":"Lin, W.-B., Fu, Q.-Q., and Ang, Z.-Q., A mechanism for patching ROM smart card, 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), Ottawa, 2014, IEEE, 2014, pp. 1415\u20131417. https:\/\/doi.org\/10.1109\/WARTIA.2014.6976549","DOI":"10.1109\/WARTIA.2014.6976549"},{"key":"7846_CR6","doi-asserted-by":"publisher","unstructured":"Fu, Q., A grey lock method to support multiple pre-freezing mechanism in IC card, Electronics, Communications and Networks IV, Hussain, A. and Ivanovic, M., Eds., London: CRC Press\/Balkema, 2015, pp. 1395\u20131400. https:\/\/doi.org\/10.1201\/b18592-251","DOI":"10.1201\/b18592-251"},{"key":"7846_CR7","first-page":"109","volume":"2","author":"L. Yuyang","year":"2016","unstructured":"Yuyang, L., A high security network data transmission implementation, Information Security and Communication Confidentiality, 2016, vol. 2, pp. 109\u2013112.","journal-title":"Information Security and Communication Confidentiality"},{"key":"7846_CR8","doi-asserted-by":"crossref","unstructured":"Fu, Q.-Q., Kong, X., Yuan, Y.-F., Xu, P.-J., He, P., Nie, R., Liu, J., and Zhang, H., A novel power-down protection mechanism for secure chip based on CRC check, 2nd International Conference on Electrical and Electronics: Techniques and Applications (EETA2017), 2017, pp. 48\u201352.","DOI":"10.12783\/dtetr\/eeta2017\/7705"},{"key":"7846_CR9","doi-asserted-by":"crossref","unstructured":"Liu, J., Kong, X., Yuan, Y.-F., He, P., Nie, R., and Zhang, H., Implementation of IC card authentication method based on self-defined algorithm, 2nd International Conference on Electrical and Electronics: Techniques and Applications (EETA2017), 2017, pp. 324\u2013329.","DOI":"10.12783\/dtetr\/eeta2017\/7750"},{"key":"7846_CR10","doi-asserted-by":"publisher","unstructured":"Fu, Q., Ang, Zh., Liu, J., Xu, P., and Liang, Zh., A method for realizing secure chip multi-algorithm processing application, Fuzzy Systems and Data Mining IV, Tall\u00f3n-Ballesteros, A.J. and Li, K., Eds., Frontiers in Artificial Intelligence and Applications, vol. 309, Amsterdam: IOS Press, 2018, pp. 743\u2013748. https:\/\/doi.org\/10.3233\/978-1-61499-927-0-743","DOI":"10.3233\/978-1-61499-927-0-743"},{"key":"7846_CR11","doi-asserted-by":"publisher","unstructured":"Qingqin, F., Ang, Zh., Liu, J., Yuan, Ya., and Yuan, J., A new secure chip file access method based on security level information, Fuzzy Systems and Data Mining IV, Tall\u00f3n-Ballesteros, A.J. and Li, K., Eds., Frontiers in Artificial Intelligence and Applications, vol. 309, Amsterdam: IOS Press, 2018, pp. 749\u2013756. https:\/\/doi.org\/10.3233\/978-1-61499-927-0-749","DOI":"10.3233\/978-1-61499-927-0-749"},{"key":"7846_CR12","doi-asserted-by":"publisher","unstructured":"Xu, P., Yuan, Ya., Fu, Q., and Yuan, Yu., An Implementation of a Chip Security Mechanism, Fuzzy Systems and Data Mining IV, Tall\u00f3n-Ballesteros, A.J. and Li, K., Eds., Frontiers in Artificial Intelligence and Applications, vol. 309, Amsterdam: IOS Press, 2018, pp. 763\u2013770. https:\/\/doi.org\/10.3233\/978-1-61499-927-0-763","DOI":"10.3233\/978-1-61499-927-0-763"},{"key":"7846_CR13","first-page":"98","volume":"36","author":"P. Xu","year":"2019","unstructured":"Xu, P., State machine based chip access control implementation, Microelectronics and Computer, 2019, vol. 36, no. 7, pp. 98\u2013102.","journal-title":"Microelectronics and Computer"},{"key":"7846_CR14","doi-asserted-by":"publisher","unstructured":"Xu, P., Yuan, Ya., Fu, Q., and Yuan, Yu., Implementation of a high reliability read\/write mechanism for security chips, Fuzzy Systems and Data Mining IV, Tall\u00f3n-Ballesteros, A.J. and Li, K., Eds., Frontiers in Artificial Intelligence and Applications, vol. 309, Amsterdam: IOS Press, 2019, pp. 763\u2013770. https:\/\/doi.org\/10.3233\/978-1-61499-927-0-763","DOI":"10.3233\/978-1-61499-927-0-763"},{"key":"7846_CR15","volume-title":"Smart Grid Chip Technology and Application","author":"Sh. Du","year":"2019","unstructured":"Du, Sh. and Zhao, D., Smart Grid Chip Technology and Application, Beijing: China Electric Power Press, 2019."},{"key":"7846_CR16","doi-asserted-by":"publisher","unstructured":"Jia, L., Fu, Q., Ang, Zh., Zhang, Q., Yi, L., Feng, T., Bai, X., and Shi, Yu., A chip data security transmission method based on command control word mode, 2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China, 2019, IEEE, 2019, pp. 223\u2013226. https:\/\/doi.org\/10.1109\/ICISCAE48440.2019.221622","DOI":"10.1109\/ICISCAE48440.2019.221622"},{"key":"7846_CR17","doi-asserted-by":"publisher","unstructured":"Jia, L., Fu, Q., Ang, Zh., Xu, P., Lu, Yu., Liang, Zh., Yuan, J., and Nie, R., An improved security chip communication rate setting method, 2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China, 2019, IEEE, 2019, pp. 227\u2013230. https:\/\/doi.org\/10.1109\/ICISCAE48440.2019.221623","DOI":"10.1109\/ICISCAE48440.2019.221623"},{"key":"7846_CR18","doi-asserted-by":"publisher","unstructured":"Fu, Q., Liu, J., Nie, R., Ang, Zh., Liu, J., Li, Zh., Yi, L., Xu, P., Shi, Yu., Liang, Zh., and Yuan, J., Research on a power chip power-off test method based on MP300 device, Fuzzy Systems and Data Mining V, Tall\u00f3n-Ballesteros, A.J., Ed., Frontiers in Artificial Intelligence and Applications, vol. 320, Amsterdam: IOS Press, 2019, pp. 870\u2013875. https:\/\/doi.org\/10.3233\/FAIA190260","DOI":"10.3233\/FAIA190260"},{"key":"7846_CR19","unstructured":"Xu, P. et al., System architecture design and roadmap of power chip technology standards, Power Supply, 2020, vol. 3, pp. 39\u201344, 57."},{"key":"7846_CR20","first-page":"112","volume":"32","author":"W. Zhang","year":"2020","unstructured":"Zhang, W., Liang, Zh., Fu, Q., et al., A security chip operating system testing device, Information and Computer (Theoretical Edition), 2020, vol. 32, no. 19, pp. 112\u2013114.","journal-title":"Information and Computer"},{"key":"7846_CR21","unstructured":"Xu, P. et al.,  Analysis of the support of technical standards for enterprise R D, Standardization in China, 2021."},{"key":"7846_CR22","volume-title":"Analysis of the current situation of China\u2019s integrated circuit standards","author":"P. Xu","year":"2021","unstructured":"Xu, P. et al., Analysis of the current situation of China\u2019s integrated circuit standards, Standardization in China, 2021."},{"key":"7846_CR23","volume-title":"Analysis of the status quo of China\u2019s software industry standards","author":"P. Xu","year":"2021","unstructured":"Xu, P. et al., Analysis of the status quo of China\u2019s software industry standards, Standardization in China, 2021."},{"key":"7846_CR24","volume-title":"Design of a security chip business test system adapting to multi-core scenarios","author":"Zh. Jing","year":"2021","unstructured":"Jing, Zh. et al., Design of a security chip business test system adapting to multi-core scenarios, Software Engineering and Applications, 2021."},{"key":"7846_CR25","doi-asserted-by":"publisher","unstructured":"He, F., Ang, Zh., Fu, Q., Yang, G., Xu, P., Liu, J., Yi, L., Niu, Ch., Liu, J., and Jiang, Yu., A new security authentication method for master station and terminal, 2021 IEEE International Conference on Energy Internet (ICEI), Southampton, 2021, IEEE, 2021, pp. 131\u2013135. https:\/\/doi.org\/10.1109\/ICEI52466.2021.00029","DOI":"10.1109\/ICEI52466.2021.00029"},{"key":"7846_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.53106\/199115992021123206015","volume":"32","author":"Qingqin Fu","year":"2021","unstructured":"Qingqin Fu, Q.F., Qingqin Fu, Zh.A., Zhengquan Ang, L.Yi., Ling Yi, P.X., Pingjiang Xu, J.L., Jia Liu, Zh.L., Zhaoqing Liang, L.F., Lili Fu, Ch.Ya., and Chaobin Yang, G.F., A new terminal and electric meter legality authentication method, Journal of Computer, 2021, vol. 32, no. 6, pp. 176\u2013182. https:\/\/doi.org\/10.53106\/199115992021123206015","journal-title":"Journal of Computer"},{"key":"7846_CR27","doi-asserted-by":"publisher","unstructured":"He, F., Ang, Zh., Yang, G., Fu, Q., Yi, L., Xu, P., Liu, J., Liang, Zh., Niu, Ch., and Chen, J., A master station and terminal data exchange method based on symmetric and asymmetric algorithms, Proceedings of CECNet 2021, Tall\u00f3n-Ballesteros, A.J., Ed., Frontiers in Artificial Intelligence and Applications, vol. 345, Amsterdam: IOS Press, 2021, pp. 387\u2013393. https:\/\/doi.org\/10.3233\/FAIA210426","DOI":"10.3233\/FAIA210426"},{"key":"7846_CR28","volume-title":"Design method of security chip operating system","author":"Zh. Pang","year":"2022","unstructured":"Pang, Zh. et al., Design method of security chip operating system, Information Technology and Standardization, 2022."},{"key":"7846_CR29","volume-title":"Model and implementation of a general middleware for security chips","author":"P. Xu","year":"2022","unstructured":"Xu, P. et al., Model and implementation of a general middleware for security chips, Information Technology and Standardization, 2022."},{"key":"7846_CR30","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.3390\/electronics11081230","volume":"11","author":"M. Chen","year":"2022","unstructured":"Chen, M., Tian, S., He, F., Fu, Q., Gu, Q., and Wu, B., Modeling and calibration of active thermal-infrared visual system for industrial HMI, Electronics (Switzerland), 2022, vol. 11, no. 8, p. 1230. https:\/\/doi.org\/10.3390\/electronics11081230","journal-title":"Electronics"},{"key":"7846_CR31","doi-asserted-by":"publisher","unstructured":"Fu, Q., Ang, Zh., He, F., Yang, G., Fu, Yi., Xu, P., Liu, J., Yi, L., Xu, H., Lu, Zh., and Liu, B., A method for exchanging data between master station and terminal based on key agreement mechanism, Proceedings of CECNet 2022, Tall\u00f3n-Ballesteros, A.J., Ed., Frontiers in Artificial Intelligence and Applications, vol. 363, Amsterdam: IOS Press, 2022, pp. 32\u201339. https:\/\/doi.org\/10.3233\/FAIA220515","DOI":"10.3233\/FAIA220515"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700579.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700579","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700579.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:19Z","timestamp":1773612259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["7846"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700579","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"10 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}