CN103985042A - Digital information encryption and decryption method based on NFC mobile phone and IC card - Google Patents

Digital information encryption and decryption method based on NFC mobile phone and IC card Download PDF

Info

Publication number
CN103985042A
CN103985042A CN201410243848.7A CN201410243848A CN103985042A CN 103985042 A CN103985042 A CN 103985042A CN 201410243848 A CN201410243848 A CN 201410243848A CN 103985042 A CN103985042 A CN 103985042A
Authority
CN
China
Prior art keywords
mobile phone
card
encryption
numerical information
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410243848.7A
Other languages
Chinese (zh)
Inventor
孙国华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
QINGDAO FENGHUA ERA INFORMATION TECHNOLOGY Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410243848.7A priority Critical patent/CN103985042A/en
Publication of CN103985042A publication Critical patent/CN103985042A/en
Priority to SG11201610205SA priority patent/SG11201610205SA/en
Priority to PCT/IB2015/054191 priority patent/WO2015186072A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A digital information encryption and decryption method based on an NFC mobile phone and an IC card comprises the steps that a storage space is set on the mobile phone and used for storing digital information to be encrypted or decrypted; the IC card is stuck to the back surface of the mobile phone to achieve NFC communication; the legality that the mobile and the IC card serve as encryption and decryption equipment is verified; the digital information to be encrypted or decrypted is sent to the IC card from the mobile phone in a batch mode; the IC card receives the digital information to be encrypted or decrypted from the mobile phone in a batch mode, the digital information is handed over to a specified algorithm and a specified secret key for encryption and decryption calculation, and the calculation result is sent to the mobile phone. The digital information encryption and decryption method based on the NFC mobile phone and the IC card has the advantages that the encryption and decryption secret key is stored in a smart card with an NFC function, the safety of storage of the secret key is guaranteed, the convenience of carrying out encryption and decryption of the digital information in a mobile and portable mode is achieved, data interaction in the encryption and decryption process is achieved through NFC communication between the mobile phone and the smart card, a drive or other auxiliary programs are not needed for supporting, and the problem of compatibility is avoided.

Description

A kind of numerical information encipher-decipher method based on NFC mobile phone and IC-card
Technical field
The present invention relates to the near-field communication based on NFC() application of the numerical information encryption and decryption of technology, as: the encryption and decryption of SMS, the encryption and decryption of mobile phone numerical information in multiple network communication environment, encryption and decryption that computer data transmits under variety of network environments, and the encryption and decryption technology of various digital device numerical informations under multiple network environment with communication function (as: Wifi, bluetooth, infrared etc.).
Background technology
The encryption and decryption of numerical information is extremely important in the application of net environment.Can say that any equipment being connected on network, if need to carry out communication, all needs to solve the encryption and decryption problem to transmission information.Under normal circumstances, for the not high internet information transmission of security requirement, often adopt SSL transmission encryption and decryption, this encryption and decryption key, is stored in this locality, and key itself is likely under attack.For having personalization, the higher encryption and decryption demand of security requirement, need to adopt extra hardware enciphering and deciphering method, at present common have hardware encryption machine, hardware encryption terminal (as: USB Key) etc., but be all wired connection, or with high costs as specialized equipment, can not carry; Or can only be applied to and have the equipment such as the computer (notebook) of general-purpose interface demand motive program, have the compatibility issue of hardware encryption terminal and computer, portability is also still bad.But nowadays, network interchange has become very important social life part, mobile payment, Mobile business, mobile office, mobile social activity etc., all have strong demand to data encrypting and deciphering.How realizing Mobile portable, convenient and safe numerical information encryption and decryption, particularly realize above-mentioned encryption and decryption based on the most universal current mobile phone, is the key problem that the present invention will solve.
Summary of the invention
Disclosed by the invention is mobile phone and the smart card that a kind of use has NFC communication function, realizes the method for numerical information encryption and decryption.
Technical scheme of the present invention is: a kind of numerical information encipher-decipher method based on NFC mobile phone and IC-card, it is characterized in that, and comprise the following steps:
(1), storage space is set on mobile phone, want numerical information encrypted or deciphering for storing;
(2) on mobile phone screen, point out, described IC-card is affixed on to the mobile phone back side, realize NFC communication;
(3) to mobile phone and (or) IC-card authenticates as the legitimacy of encryption and decryption equipment;
(4), according to the cannonical format of specifying, send to IC-card from mobile phone will be by the numerical information of encryption and decryption in batches;
(5) according to the cannonical format of specifying, received from mobile phone terminal by IC card will be by the numerical information of encryption and decryption in batches, and submit to the algorithm of appointment and the key of appointment carries out encryption and decryption computing in the lump, and operation result is sent to mobile phone terminal;
(6), when the numerical information sending finishes, the work of the mobile phone upper demonstration of curtain frequently numerical information encryption and decryption completes, and IC-card is removed from the mobile phone back side.
Described will numerical information encrypted or deciphering be SMS, multimedia message, or any numerical information that receives or preserve on mobile phone, comprises video, audio frequency, image, Word message.
The legitimacy certification of described step (3) realizes by verifying IC-card PIN or mobile phone and IC-card binding relationship.
In described step (4), in the time of sending and receiving numerical information in batches, at head or the afterbody of every batch of numerical information, the handset program mark of will annotating, so that in the time that abnormal interruption occurs in NFC communication, follow-up work can continue to be carried out, and avoids all to restart.
The cannonical format of described appointment, refer to the needs for different encryption and decryption contents, by the numerical information of encryption and decryption, it can be the full detail of a full document, be divided into some isometric character fields, also can be the part summary of full document, as: the beginning of document and/or/certain parts of images information of some numeral in ending, document or figure, video documents.
The beneficial effect that the present invention embodies is:
1, encryption and decryption key storage, on the smart card with NFC function, had both ensured the security of key storage, had realized again Mobile portable and carry out the convenience of numerical information encryption and decryption.
2, the data interaction in encryption and decryption process by NFC communication, realizes between mobile phone and smart card, and not other complementary program supports such as demand motive, do not exist compatible problem.
3, because mobile phone has the abundantest communication modes, mobile phone is also the mutual main body of current Mobile data, based on the numerical information encryption and decryption of mobile phone and smart card realization, be most convenient solution the problem of the hard encryption and decryption of data on the mobile phone such as note, multimedia message, be also the digital encryption and decryption equipment of tool versatility.
Brief description of the drawings
Fig. 1 is the process flow diagram of the embodiment of the present invention.
Embodiment
Due to disclosed by the invention be a kind of numerical information encipher-decipher method based on NFC mobile phone and IC-card, therefore first emphasize prior art involved in the present invention at this, in other words, fundamental technical specifications.Mobile phone of the present invention should be the smart mobile phone with NFC communication function, and IC-card of the present invention should be has NFC communication function, and has the smart card of arithmetic capability (CPU).And IC-card chip provides symmetry or asymmetric arithmetic, or the chip-stored space above-mentioned algorithm that provides software to realize.Above-mentioned fundamental technical specifications all can be realized by prior art.
With reference to accompanying drawing 1, implementation process of the present invention comprises mobile phone and IC-card two parts.
Mobile phone part:
1, storage space is set on mobile phone, wants numerical information encrypted or deciphering for storing.This numerical information can be SMS, multimedia message, or any numerical information that receives or preserve on mobile phone, comprises the fileinfos such as video, audio frequency, image, word.
2, on mobile phone screen, point out, described IC-card is affixed on to the mobile phone back side (realizing NFC communication).
3, to mobile phone and (or) IC-card authenticates as the legitimacy of encryption and decryption equipment.Authentication method can be realized by checking IC-card PIN or mobile phone and IC-card binding relationship.Wherein, checking IC-card PIN refers to, in IC-card, be set by the user in advance a PIN(PIN (Personal Identification Number)) code, then, before carrying out numerical information encryption and decryption, first user must input corresponding PIN code on mobile phone, after mobile phone and IC-card are pressed close to (mode of NFC mobile phone and IC-card communication), this PIN code be passed into IC-card and with IC-card in predefined PIN code compare, if PIN code is identical, the legitimacy of mobile phone and IC-card by certification.The checking of mobile phone and IC-card binding relationship refers to, in IC-card, be set by the user in advance the IMEI of a mobile phone and (or) the IMSI of Mobile phone card, then before carrying out numerical information encryption and decryption, first user must press close to mobile phone and IC-card (mode of NFC mobile phone and IC-card communication), by handset program (App) by the IMSI of the IMEI of mobile phone and (or) Mobile phone card import into IC-card and with IC-card in predefined mobile phone IMEI and (or) Mobile phone card IMSI compare, if IMEI and (or) IMSI are identical, the binding relationship of mobile phone and IC-card is by certification.
4, according to specifying cannonical format, send to IC-card from mobile phone will be by the numerical information of encryption and decryption in batches.Meanwhile, according to specifying cannonical format, receive by the numerical information of encryption and decryption from IC-card in batches, and be stored in mobile phone designated storage area.Note, in the time of sending and receiving numerical information in batches, at head or the afterbody of every batch of numerical information, the handset program mark of will annotating, so that in the time that abnormal interruption occurs in NFC communication, follow-up work can continue to be carried out, and avoids all to restart.This work is very important, because as NFC communication mode, occurs that communication abnormality belongs to normal phenomenon.
5, when mobile phone sends and receives after the end mark of numerical information, all worked, the work of the mobile phone upper demonstration of curtain frequently numerical information encryption and decryption completes, and IC-card is removed from the mobile phone back side.
IC-card part:
1, in the step 2 of above-mentioned mobile phone part, in mobile phone screen prompting, described IC-card is affixed on behind the mobile phone back side, implement following operation.
2, carry out legitimacy certification with mobile phone.Authentication method can be realized by checking IC-card PIN or mobile phone and IC-card binding relationship.Wherein, checking IC-card PIN refers to, in IC-card, be set by the user in advance a PIN(PIN (Personal Identification Number)) code, then, before carrying out numerical information encryption and decryption, first user must input corresponding PIN code on mobile phone, after mobile phone and IC-card are pressed close to (mode of NFC mobile phone and IC-card communication), this PIN code be passed into IC-card and with IC-card in predefined PIN code compare, if PIN code is identical, the legitimacy of mobile phone and IC-card by certification.The checking of mobile phone and IC-card binding relationship refers to, in IC-card, be set by the user in advance the IMEI of a mobile phone and (or) the IMSI of Mobile phone card, then before carrying out numerical information encryption and decryption, first user must press close to mobile phone and IC-card (mode of NFC mobile phone and IC-card communication), by handset program (App) by the IMSI of the IMEI of mobile phone and (or) Mobile phone card import into IC-card and with IC-card in predefined mobile phone IMEI and (or) Mobile phone card IMSI compare, if IMEI and (or) IMSI are identical, the binding relationship of mobile phone and IC-card is by certification.
3, according to the cannonical format of specifying, IC-card receives from mobile phone terminal in batches will be by the numerical information of encryption and decryption, and submit to the algorithm of appointment and the key of appointment carries out encryption and decryption computing in the lump.Operation result is sent to mobile phone terminal.
4 until after the appearance of numerical information end mark, stop sending.
Note, in the above-described embodiments, pointed " cannonical format of appointment " in the step 3 of the step 4 of mobile phone part and IC-card part, refer to the needs for different encryption and decryption contents, by the numerical information of encryption and decryption, can be the full detail of a full document, be divided into some isometric character fields, also can be the part summary of full document, as: the beginning of document and (or) certain parts of images information of some numeral in ending, document or figure, video documents.

Claims (5)

1. the numerical information encipher-decipher method based on NFC mobile phone and IC-card, is characterized in that, comprises the following steps:
(1), storage space is set on mobile phone, want numerical information encrypted or deciphering for storing;
(2) on mobile phone screen, point out, described IC-card is affixed on to the mobile phone back side, realize NFC communication;
(3) to mobile phone and (or) IC-card authenticates as the legitimacy of encryption and decryption equipment;
(4), according to the cannonical format of specifying, send to IC-card from mobile phone will be by the numerical information of encryption and decryption in batches;
(5) according to the cannonical format of specifying, received from mobile phone terminal by IC card will be by the numerical information of encryption and decryption in batches, and submit to the algorithm of appointment and the key of appointment carries out encryption and decryption computing in the lump, and operation result is sent to mobile phone terminal;
(6), when the numerical information sending finishes, the work of the mobile phone upper demonstration of curtain frequently numerical information encryption and decryption completes, and IC-card is removed from the mobile phone back side.
2. the numerical information encipher-decipher method based on NFC mobile phone and IC-card according to claim 1, it is characterized in that, described will numerical information encrypted or deciphering be SMS, multimedia message, or any numerical information that receives or preserve on mobile phone, comprise video, audio frequency, image, Word message.
3. the numerical information encipher-decipher method based on NFC mobile phone and IC-card according to claim 1, is characterized in that, the legitimacy certification of described step (3) realizes by verifying IC-card PIN or mobile phone and IC-card binding relationship.
4. the numerical information encipher-decipher method based on NFC mobile phone and IC-card according to claim 1, it is characterized in that, in described step (4), in the time of sending and receiving numerical information in batches, at head or the afterbody of every batch of numerical information, the handset program mark of will annotating, so that in the time there is abnormal interruption in NFC communication, follow-up work can continue to be carried out, and avoids all to restart.
5. the numerical information encipher-decipher method based on NFC mobile phone and IC-card according to claim 1, it is characterized in that, the cannonical format of described appointment, refer to the needs for different encryption and decryption contents, by the numerical information of encryption and decryption, can be the full detail of a full document, be divided into some isometric character fields, also can be the part summary of full document, as: the beginning of document and/or/certain parts of images information of some numeral in ending, document or figure, video documents.
CN201410243848.7A 2014-06-04 2014-06-04 Digital information encryption and decryption method based on NFC mobile phone and IC card Pending CN103985042A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201410243848.7A CN103985042A (en) 2014-06-04 2014-06-04 Digital information encryption and decryption method based on NFC mobile phone and IC card
SG11201610205SA SG11201610205SA (en) 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function
PCT/IB2015/054191 WO2015186072A1 (en) 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410243848.7A CN103985042A (en) 2014-06-04 2014-06-04 Digital information encryption and decryption method based on NFC mobile phone and IC card

Publications (1)

Publication Number Publication Date
CN103985042A true CN103985042A (en) 2014-08-13

Family

ID=51277001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410243848.7A Pending CN103985042A (en) 2014-06-04 2014-06-04 Digital information encryption and decryption method based on NFC mobile phone and IC card

Country Status (3)

Country Link
CN (1) CN103985042A (en)
SG (1) SG11201610205SA (en)
WO (1) WO2015186072A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318436A (en) * 2014-10-21 2015-01-28 上海鹏逸电子商务有限公司 Safety payment method and system based on mobile terminal and mobile terminal
CN104778579A (en) * 2015-04-30 2015-07-15 北京奇虎科技有限公司 Induction payment method and device based on electronic identity recognition carrier
WO2015186072A1 (en) * 2014-06-04 2015-12-10 Jing King Tech Holdings Pte. Ltd. Encryption and decryption of data between a communications device and smart card with near field communication function
CN106557708A (en) * 2016-11-21 2017-04-05 武汉斗鱼网络科技有限公司 A kind of method for security protection and system
CN113840271A (en) * 2021-09-27 2021-12-24 北京鲸鲮信息系统技术有限公司 NFC data transmission method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030016821A1 (en) * 2000-03-29 2003-01-23 Vadium Technology, Inc. One-time-pad encryption with keyable characters
CN1713756A (en) * 2004-06-23 2005-12-28 华为技术有限公司 Security guarantee for memory data information of mobile terminal
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN103279692A (en) * 2013-05-03 2013-09-04 广东欧珀移动通信有限公司 File encrypting and decrypting method and device based on mobile phone
CN103457724A (en) * 2012-06-05 2013-12-18 中兴通讯股份有限公司 Method and system for point-to-point data safe transmission
CN103580870A (en) * 2013-11-07 2014-02-12 李宾 Mobile phone identity authentication terminal
CN103577220A (en) * 2013-08-31 2014-02-12 成都西可科技有限公司 System and method for opening private application or private data through NFC (near field communication) label

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737308B (en) * 2012-06-08 2015-08-12 中兴通讯股份有限公司 The method and system of a kind of mobile terminal and inquiry smart card information thereof
WO2014106031A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN103985042A (en) * 2014-06-04 2014-08-13 孙国华 Digital information encryption and decryption method based on NFC mobile phone and IC card

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030016821A1 (en) * 2000-03-29 2003-01-23 Vadium Technology, Inc. One-time-pad encryption with keyable characters
CN1713756A (en) * 2004-06-23 2005-12-28 华为技术有限公司 Security guarantee for memory data information of mobile terminal
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN103457724A (en) * 2012-06-05 2013-12-18 中兴通讯股份有限公司 Method and system for point-to-point data safe transmission
CN103279692A (en) * 2013-05-03 2013-09-04 广东欧珀移动通信有限公司 File encrypting and decrypting method and device based on mobile phone
CN103577220A (en) * 2013-08-31 2014-02-12 成都西可科技有限公司 System and method for opening private application or private data through NFC (near field communication) label
CN103580870A (en) * 2013-11-07 2014-02-12 李宾 Mobile phone identity authentication terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015186072A1 (en) * 2014-06-04 2015-12-10 Jing King Tech Holdings Pte. Ltd. Encryption and decryption of data between a communications device and smart card with near field communication function
CN104318436A (en) * 2014-10-21 2015-01-28 上海鹏逸电子商务有限公司 Safety payment method and system based on mobile terminal and mobile terminal
CN104778579A (en) * 2015-04-30 2015-07-15 北京奇虎科技有限公司 Induction payment method and device based on electronic identity recognition carrier
CN106557708A (en) * 2016-11-21 2017-04-05 武汉斗鱼网络科技有限公司 A kind of method for security protection and system
CN113840271A (en) * 2021-09-27 2021-12-24 北京鲸鲮信息系统技术有限公司 NFC data transmission method and device, electronic equipment and storage medium
CN113840271B (en) * 2021-09-27 2024-04-19 北京字节跳动网络技术有限公司 NFC data transmission method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2015186072A9 (en) 2016-02-25
SG11201610205SA (en) 2017-01-27
WO2015186072A1 (en) 2015-12-10

Similar Documents

Publication Publication Date Title
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
CN101465019B (en) Method and system for implementing network authentication
CN113344570A (en) Method for transmitting and processing transaction message and data processing device
CN106611310B (en) Data processing method, wearable electronic device and system
CN103747012A (en) Security verification method, device and system of network transaction
CN103985042A (en) Digital information encryption and decryption method based on NFC mobile phone and IC card
JP2015532817A (en) Method for realizing encryption in memory card, decryption method and device
JP2016539605A (en) Method in network security and system in network security
CN103281183A (en) Conversion device and display system
KR102527330B1 (en) Input apparatus and the controlling method thereof
CN104915583A (en) Interface decryption processing method and mobile terminal
TW201717125A (en) Smart card having function of one time password (otp), and work method therefor
CN104063333A (en) Encrypted storage equipment and encrypted storage method
JP2013222338A (en) Information terminal device, information processing device, information processing system, method of generating password information, and method of processing information
KR101364859B1 (en) System and method for processing scanned images
CN114329541A (en) Data encryption method, device, equipment and storage medium
CN202014304U (en) Mobile phone privacy protection system based on code authentication
CN104159224A (en) Mobile terminal digital certification system and method
CN105847261A (en) Bluetooth wireless encryption and decryption-based electronic signature method
CN105490708A (en) Method and device for reading and writing smart card
US20140380061A1 (en) Implementation Method of a Multifunctional MCU and such Multifunctional MCU
CN101330685B (en) Method for ciphering and transmitting short message
CN102426635B (en) Display device for file information, display method and system
CN102426642B (en) Information reading processor, card swiping system and method for live transaction
CN103281182A (en) Conversion device and display system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: QINGDAO FENGHUA TIMES INFORMATION TECHNOLOGY CO.,

Free format text: FORMER OWNER: SUN GUOHUA

Effective date: 20141029

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 266071 QINGDAO, SHANDONG PROVINCE TO: 266109 QINGDAO, SHANDONG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20141029

Address after: Songyuan Road, national high tech Development Zone, Qingdao City, Shandong province 266109 No. 17 Qingdao Industrial Technology Research Institute A1 District 413

Applicant after: QINGDAO FENGHUA ERA INFORMATION TECHNOLOGY CO., LTD.

Address before: 9FA1 building G2 software industry base in Shandong province 266071 Shinan District of Qingdao City

Applicant before: Sun Guohua

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140813