CN106357404A - Data encryption method based on NFC chip security authentication - Google Patents

Data encryption method based on NFC chip security authentication Download PDF

Info

Publication number
CN106357404A
CN106357404A CN201610730212.4A CN201610730212A CN106357404A CN 106357404 A CN106357404 A CN 106357404A CN 201610730212 A CN201610730212 A CN 201610730212A CN 106357404 A CN106357404 A CN 106357404A
Authority
CN
China
Prior art keywords
data
encryption
reversible
irreversible
ciphertext data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610730212.4A
Other languages
Chinese (zh)
Other versions
CN106357404B (en
Inventor
马冠宇
王启祥
易志中
刘峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaoxiang Technology Co.,Ltd.
Original Assignee
Yilian (beijing) Internet Of Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yilian (beijing) Internet Of Network Technology Co Ltd filed Critical Yilian (beijing) Internet Of Network Technology Co Ltd
Priority to CN201610730212.4A priority Critical patent/CN106357404B/en
Publication of CN106357404A publication Critical patent/CN106357404A/en
Application granted granted Critical
Publication of CN106357404B publication Critical patent/CN106357404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The invention relates to a data encryption method based on NFC chip security authentication. The method comprises the following steps: 1. The correct user name and password are entered by the user through the mobile terminal to verify the login; 2. After the login of the user is confirmed to be successful, a secret key in character string format is generated through the irreversible encryption of the user name, password and timestamp. To prevent the interactive data between the APP mobile terminal (NFC mobile phone) and the server (cloud server) is maliciously tampered with, cross-use of the 'reversible encryption' and the 'irreversible encryption' algorithms is adopted to ensure that interactive data between the mobile and the server terminals is absolutely safe.

Description

Data ciphering method based on nfc chip anti-fake certificate
Technical field
The present invention relates to a kind of data ciphering method based on nfc chip anti-fake certificate.
Background technology
Traditional encryption is all to be carried out data transmission with after reversible encryption method mostly, and no matter the data of reversible encryption is passing In defeated mode or how complicated in the method for encryption, but in theory for be reversible encryption mode after all, encipherer Data and key can be carried out a series of algorithm for encryption, as long as decoding used in this obtains ciphering process in principle Key just there is a high likelihood that decoding ciphertext data, so the probability in theory of probability decoding exists and very high.But It is if carrying out Data Encryption Transmission using irreversible encryption algorithm, decode this and cannot decode ciphertext data, but equally Encrypt this and also ciphertext data convert cannot be become clear data, so being passed using irreversible encryption data during data transfer Defeated mode is worthless.
Content of the invention
For overcoming the defect of prior art, the present invention provides a kind of data ciphering method based on nfc chip anti-fake certificate. The technical scheme is that
A kind of data ciphering method based on nfc chip anti-fake certificate, comprises the following steps:
Step 1: user inputs correct user name and password by mobile terminal, checking logs in;
Step 2: after checking User logs in success, user name, password and timestamp are carried out irreversible encryption and generates character string lattice The key of formula;
Step 3: business datum is spelled upper timestamp and key carries out base64 AES and carries out reversible encryption;
Step 4: and then by the business datum after key, encryption and system data, carry out reversible adding using base64 AES Close, it is encrypted to reversible ciphertext data a1;
Step 5: again a1 is carried out irreversible encryption using symmetric encipherment algorithm, be encrypted to irreversible ciphertext data b1;
Step 6: reversible ciphertext data a1 and irreversible ciphertext data b1 are sent to service end;
Step 7: after service end receives ciphertext data a1 and ciphertext data b1;
Step 8: first reversible ciphertext data a1 is decrypted according to key with base64 reversible encryption method;
Step 9: the clear data a2 after being deciphered;
Step 10: wherein clear data a2 includes the business datum after mobile terminal is transmitted through next system data and encryption;To again Business datum to after encryption is decrypted with base64 reversible encryption method, obtains the business ginseng being transmitted through during the request of mobile terminal coming Number;
Step 11: carry out irreversible encryption method with symmetric encipherment algorithm again and clear data a2 is carried out irreversible encryption, obtain Irreversible ciphertext data b2 after encryption;
Step 12: and then judge whether ciphertext data b2 is identical with ciphertext data b1;
Step 13: if identical then it represents that data transmission during be not maliciously tampered, data is effective;If not phase Same then expression data has been kidnapped by third party in transmitting procedure and has been distorted, data invalid
Step 15: flow performing terminates.
Described system data includes timestamp systimetamp, mobile end equipment unique identifier deviceid, is used for Distinguishing and sending the side of request is the devicetype of app mobile phone or special writer, the identifier of User logs in state Token and unique mark loginid of login user.
Data when described business datum is asked for mobile terminal or when service end returns, uniquely marks including nfc label Know symbol uid, commodity unique identifier gsc, enterprise unique identifier entid, batch unique mark batchid, nfc of commodity Tag state writestatus, production time productiondate, effect duration expirydate.
Described key for carrying out the token generating after irreversible encryption operation according to timestamp after User logs in success.
The invention has the advantage that
Interaction data between app mobile terminal (nfc mobile phone) and service end (cloud server) is prevented to be maliciously tampered, cross-reference " reversible encryption " and " irreversible encryption " algorithm are it is ensured that being perfectly safe of interaction data between mobile terminal and service end.
Brief description
Fig. 1 is the schematic flow sheet of the present invention.
Specific embodiment
To further describe the present invention with reference to specific embodiment, advantages of the present invention and feature will be with description and Apparent.But these embodiments are only exemplary, any restriction is not constituted to the scope of the present invention.People in the art Member should be understood that can be to enter to the details of technical solution of the present invention and form under without departing from the spirit and scope of the present invention Row modification or replacement, but these modifications and replacement each fall within protection scope of the present invention.
The present invention relates to a kind of data ciphering method based on nfc chip anti-fake certificate, comprise the following steps:
Step 1: user inputs correct user name and password by mobile terminal, checking logs in;
Step 2: after checking User logs in success, user name, password and timestamp are carried out irreversible encryption and generates character string lattice The key of formula;
Step 3: business datum is spelled upper timestamp and key carries out base64 AES and carries out reversible encryption;
Step 4: and then by the business datum after key, encryption and system data, carry out reversible adding using base64 AES Close, it is encrypted to reversible ciphertext data a1;
Step 5: again a1 is carried out irreversible encryption using symmetric encipherment algorithm, be encrypted to irreversible ciphertext data b1;
Step 6: reversible ciphertext data a1 and irreversible ciphertext data b1 are sent to service end.
Step 7: after service end receives ciphertext data a1 and ciphertext data b1;
Step 8: first reversible ciphertext data a1 is decrypted according to key with base64 reversible encryption method;
Step 9: the clear data a2 after being deciphered;
Step 10: wherein clear data a2 includes the business datum after mobile terminal is transmitted through next system data and encryption;To again Business datum to after encryption is decrypted with base64 reversible encryption method, obtains the business ginseng being transmitted through during the request of mobile terminal coming Number;
Step 11: carry out irreversible encryption method with symmetric encipherment algorithm again and clear data a2 is carried out irreversible encryption, obtain Irreversible ciphertext data b2 after encryption;
Step 12: and then judge whether ciphertext data b2 is identical with ciphertext data b1;
Step 13: if identical then it represents that data transmission during be not maliciously tampered, data is effective;If not phase Same then expression data has been kidnapped by third party in transmitting procedure and has been distorted, data invalid.
Step 15: flow performing terminates.
Described system data includes timestamp systimetamp, mobile end equipment unique identifier deviceid, is used for Distinguishing and sending the side of request is the devicetype of app mobile phone or special writer, the identifier of User logs in state Token and unique mark loginid of login user.
Data when described business datum is asked for mobile terminal or when service end returns, uniquely marks including nfc label Know symbol uid, commodity unique identifier gsc, enterprise unique identifier entid, batch unique mark batchid, nfc of commodity The information such as tag state writestatus, production time productiondate, effect duration expirydate.
Described key for carrying out the token generating after irreversible encryption operation according to timestamp after User logs in success.

Claims (4)

1. a kind of data ciphering method based on nfc chip anti-fake certificate is it is characterised in that comprise the following steps:
Step 1: user inputs correct user name and password by mobile terminal, checking logs in;
Step 2: after checking User logs in success, user name, password and timestamp are carried out irreversible encryption and generates character string lattice The key of formula;
Step 3: business datum is spelled upper timestamp and key carries out base64 AES and carries out reversible encryption;
Step 4: and then by the business datum after key, encryption and system data, carry out reversible adding using base64 AES Close, it is encrypted to reversible ciphertext data a1;
Step 5: again a1 is carried out irreversible encryption using symmetric encipherment algorithm, be encrypted to irreversible ciphertext data b1;
Step 6: reversible ciphertext data a1 and irreversible ciphertext data b1 are sent to service end;
Step 7: after service end receives ciphertext data a1 and ciphertext data b1;
Step 8: first reversible ciphertext data a1 is decrypted according to key with base64 reversible encryption method;
Step 9: the clear data a2 after being deciphered;
Step 10: wherein clear data a2 includes the business datum after mobile terminal is transmitted through next system data and encryption;To again Business datum to after encryption is decrypted with base64 reversible encryption method, obtains the business ginseng being transmitted through during the request of mobile terminal coming Number;
Step 11: carry out irreversible encryption method with symmetric encipherment algorithm again and clear data a2 is carried out irreversible encryption, obtain Irreversible ciphertext data b2 after encryption;
Step 12: and then judge whether ciphertext data b2 is identical with ciphertext data b1;
Step 13: if identical then it represents that data transmission during be not maliciously tampered, data is effective;If not phase Same then expression data has been kidnapped by third party in transmitting procedure and has been distorted, data invalid;
Step 15: flow performing terminates.
2. the data ciphering method based on nfc chip anti-fake certificate according to claim 1 is it is characterised in that described System data includes timestamp systimetamp, mobile end equipment unique identifier deviceid, sends request for distinguishing Side is app mobile phone or the devicetype of special writer, the identifier token of User logs in state and login user Unique mark loginid.
3. the data ciphering method based on nfc chip anti-fake certificate according to claim 1 is it is characterised in that described Data when business datum is asked for mobile terminal or when service end returns, including nfc tags unique identifier symbol uid, commodity only One identifier gsc, enterprise unique identifier entid, batch unique mark batchid, the nfc tag state of commodity Writestatus, production time productiondate, effect duration expirydate.
4. the data ciphering method based on nfc chip anti-fake certificate according to claim 1 is it is characterised in that described Key for carrying out the token generating after irreversible encryption operation according to timestamp after User logs in success.
CN201610730212.4A 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate Active CN106357404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610730212.4A CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610730212.4A CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Publications (2)

Publication Number Publication Date
CN106357404A true CN106357404A (en) 2017-01-25
CN106357404B CN106357404B (en) 2019-06-18

Family

ID=57854733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610730212.4A Active CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Country Status (1)

Country Link
CN (1) CN106357404B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN110691225A (en) * 2019-11-05 2020-01-14 杭州视洞科技有限公司 High-security encryption scheme for playing of AP direct connection/local area network camera
CN111506912A (en) * 2020-04-21 2020-08-07 北京思特奇信息技术股份有限公司 Interface security interaction method and system
CN111565177A (en) * 2020-04-26 2020-08-21 蘑菇车联信息科技有限公司 Vehicle-mounted machine data encryption transmission method and device
CN111931206A (en) * 2020-07-31 2020-11-13 银盛支付服务股份有限公司 Data encryption method based on APP
CN112532626A (en) * 2020-11-30 2021-03-19 南威软件股份有限公司 Point-to-point encrypted chatting method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420686A (en) * 2008-11-28 2009-04-29 重庆邮电大学 Industrial wireless network security communication implementation method based on cipher key
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN102347957A (en) * 2011-11-18 2012-02-08 王鑫 Cloud network admission identifying system and admission identifying technology
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
US20140304512A1 (en) * 2013-03-14 2014-10-09 Sergei Pronin Method and system for authenticating and preserving data within a secure data repository
US20150254655A1 (en) * 2014-03-04 2015-09-10 Bank Of America Corporation Atm token cash withdrawal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420686A (en) * 2008-11-28 2009-04-29 重庆邮电大学 Industrial wireless network security communication implementation method based on cipher key
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN102347957A (en) * 2011-11-18 2012-02-08 王鑫 Cloud network admission identifying system and admission identifying technology
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
US20140304512A1 (en) * 2013-03-14 2014-10-09 Sergei Pronin Method and system for authenticating and preserving data within a secure data repository
US20150254655A1 (en) * 2014-03-04 2015-09-10 Bank Of America Corporation Atm token cash withdrawal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN110691225A (en) * 2019-11-05 2020-01-14 杭州视洞科技有限公司 High-security encryption scheme for playing of AP direct connection/local area network camera
CN110691225B (en) * 2019-11-05 2021-04-06 杭州视洞科技有限公司 High-security encryption method for playing of AP direct connection/local area network camera
CN111506912A (en) * 2020-04-21 2020-08-07 北京思特奇信息技术股份有限公司 Interface security interaction method and system
CN111565177A (en) * 2020-04-26 2020-08-21 蘑菇车联信息科技有限公司 Vehicle-mounted machine data encryption transmission method and device
CN111565177B (en) * 2020-04-26 2022-07-19 蘑菇车联信息科技有限公司 Vehicle-mounted machine data encryption transmission method and device
CN111931206A (en) * 2020-07-31 2020-11-13 银盛支付服务股份有限公司 Data encryption method based on APP
CN112532626A (en) * 2020-11-30 2021-03-19 南威软件股份有限公司 Point-to-point encrypted chatting method

Also Published As

Publication number Publication date
CN106357404B (en) 2019-06-18

Similar Documents

Publication Publication Date Title
US11544367B2 (en) Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
CN106357404A (en) Data encryption method based on NFC chip security authentication
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN105229965B (en) Equipment identification system and equipment authenticating method
CN104219228B (en) A kind of user's registration, user identification method and system
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN102238191B (en) Court electronic document server, court electronic document service client, court electronic document service system and court electronic document service method
WO2018040758A1 (en) Authentication method, authentication apparatus and authentication system
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN105528695B (en) Mobile payment method and mobile payment system based on marks
US8332628B2 (en) Method for accessing data safely suitable for electronic tag
CN105306211B (en) A kind of identity identifying method of client software
CN105391554B (en) A kind of method and system for realizing fingerprint matching using ciphertext
CN105790938A (en) System and method for generating safety unit key based on reliable execution environment
CN103391197A (en) Web identity authentication method based on mobile token and NFC technology
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
CN106411926A (en) Data encryption communication method and system
EP3128696B1 (en) Entity authentication method and device
CN106712939A (en) Offline key transmission method and device
CN103916363A (en) Communication security management method and system for encryption machine
KR101284155B1 (en) authentication process using of one time password
CN105281902A (en) Web system safety login method based on mobile terminal
JP2001177513A (en) Authenticating method in communication system, center equipment, and recording medium with authentication program recorded thereon
KR101358375B1 (en) Prevention security system and method for smishing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190528

Address after: Room 084, 4th floor, West Street, Wanshou Road, Haidian District, Beijing 100036

Applicant after: Beijing Easy Network Technology Group Co., Ltd.

Address before: 100036 Boya Hotel, Laodao, 2 Wanshou Road West Street, Haidian District, Beijing, 7th Floor 701

Applicant before: YILIAN (BEIJING) INTERNET OF NETWORK TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220208

Address after: 100068 1s04-4, 1st floor, building 2, Caoqiao Xinyuan Third District, Fengtai District, Beijing

Patentee after: Beijing Xiaoxiang Technology Co.,Ltd.

Address before: Room 084, 4th floor, West Street, Wanshou Road, Haidian District, Beijing 100036

Patentee before: Beijing Easy Network Technology Group Co.,Ltd.