CN106357404B - Data ciphering method based on NFC chip anti-fake certificate - Google Patents

Data ciphering method based on NFC chip anti-fake certificate Download PDF

Info

Publication number
CN106357404B
CN106357404B CN201610730212.4A CN201610730212A CN106357404B CN 106357404 B CN106357404 B CN 106357404B CN 201610730212 A CN201610730212 A CN 201610730212A CN 106357404 B CN106357404 B CN 106357404B
Authority
CN
China
Prior art keywords
data
encryption
irreversible
reversible
ciphertext data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610730212.4A
Other languages
Chinese (zh)
Other versions
CN106357404A (en
Inventor
马冠宇
王启祥
易志中
刘峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaoxiang Technology Co.,Ltd.
Original Assignee
Beijing Easy Network Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Easy Network Technology Group Co Ltd filed Critical Beijing Easy Network Technology Group Co Ltd
Priority to CN201610730212.4A priority Critical patent/CN106357404B/en
Publication of CN106357404A publication Critical patent/CN106357404A/en
Application granted granted Critical
Publication of CN106357404B publication Critical patent/CN106357404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The present invention relates to a kind of data ciphering methods based on NFC chip anti-fake certificate, which comprises the following steps: step 1: user inputs correct user name and password by mobile terminal, and verifying logs in;Step 2: after verifying user logins successfully, user name, password and timestamp being subjected to the code key that irreversible encryption generates string format.Interaction data between the mobile terminal APP (NFC mobile phone) and server-side (cloud server) is prevented to be maliciously tampered, cross-reference " reversible encryption " and " irreversible encryption " algorithm ensure that being perfectly safe for interaction data between mobile terminal and server-side.

Description

Data ciphering method based on NFC chip anti-fake certificate
Technical field
The present invention relates to a kind of data ciphering methods based on NFC chip anti-fake certificate.
Background technique
Traditional encryption is carried out data transmission with after reversible encryption method mostly, and no matter the data of reversible encryption are passing In defeated mode, or in the method for encryption it is how complicated, but theoretically for be reversible encryption mode, encipherer after all Data and code key can be subjected to a series of algorithm for encryption, be obtained used in ciphering process as long as decoding this in principle Code key is just there is a high likelihood that decode ciphertext data, so existing in a possibility that probability theory decoding, and very high.But It is if carrying out Data Encryption Transmission using irreversible encryption algorithm, ciphertext data can not be decoded by decoding this, but same Encrypting this also can not be by ciphertext data convert at clear data, so data are passed when transmitting using irreversible encryption data Defeated mode is worthless.
Summary of the invention
To overcome the shortcomings of existing technologies, the present invention provides a kind of data ciphering method based on NFC chip anti-fake certificate. The technical scheme is that
A kind of data ciphering method based on NFC chip anti-fake certificate, comprising the following steps:
Step 1: user inputs correct user name and password by mobile terminal, and verifying logs in;
Step 2: after verifying user logins successfully, user name, password and timestamp being subjected to irreversible encryption and generate character The code key of string format;
Step 3: business datum being spelled into upper timestamp and code key carries out Base64 Encryption Algorithm and carries out reversible encryption;
Step 4: and then by code key, encrypted business datum and system data, it can using the progress of Base64 Encryption Algorithm Reverse encryption is encrypted to reversible ciphertext data A1;
Step 5: A1 being subjected to irreversible encryption using symmetric encipherment algorithm again, is encrypted to irreversible ciphertext data B1;
Step 6: reversible ciphertext data A1 and irreversible ciphertext data B1 are sent to server-side;
Step 7: after server-side receives ciphertext data A1 and ciphertext data B1;
Step 8: first reversible ciphertext data A1 being decrypted according to code key with Base64 reversible encryption method;
Step 9: the clear data A2 after being decrypted;
Step 10: wherein clear data A2 includes that mobile terminal is transmitted through the system data come and encrypted business datum;Again It will obtain encrypted business datum to be decrypted with Base64 reversible encryption method, and obtain being transmitted through the industry come when the request of mobile terminal Business parameter;
Step 11: irreversible encryption method is carried out with symmetric encipherment algorithm again, and clear data A2 is subjected to irreversible encryption, Obtain encrypted irreversible ciphertext data B2;
Step 12: and then judge whether ciphertext data B2 and ciphertext data B1 are identical;
Step 13: if identical, then it represents that data are not maliciously tampered during transmission, and data are effective;If It is not identical, indicate that data are kidnapped and distorted by third party in transmission process, data invalid
Step 15: process execution terminates.
The system data includes timestamp sysTimetamp, mobile end equipment unique identifier deviceId, is used for Distinguish the identifier that the side for sending and requesting is the APP mobile phone either deviceType of dedicated writer, user's logging state The unique identification loginid of token and login user.
The business datum is data when mobile terminal is requested or when server-side return, including NFC label is uniquely marked Know batch unique identification Batchid, NFC of symbol UID, commodity unique identifier GSC, enterprise unique identifier Entid, commodity Tag state WriteStatus, production time Productiondate, validity period Expirydate.
The code key is to carry out the token generated after irreversible encryption operation according to timestamp after user logins successfully.
The invention has the advantages that
It prevents interaction data between the mobile terminal APP (NFC mobile phone) and server-side (cloud server) to be maliciously tampered, intersects " reversible encryption " and " irreversible encryption " algorithm is used, ensure that being perfectly safe for interaction data between mobile terminal and server-side.
Detailed description of the invention
Fig. 1 is flow diagram of the invention.
Specific embodiment
The invention will now be further described with reference to specific embodiments, the advantages and features of the present invention will be with description and It is apparent.But examples are merely exemplary for these, and it is not intended to limit the scope of the present invention in any way.Those skilled in the art Member it should be understood that without departing from the spirit and scope of the invention can details to technical solution of the present invention and form into Row modifications or substitutions, but these modifications and replacement are fallen within the protection scope of the present invention.
The present invention relates to a kind of data ciphering methods based on NFC chip anti-fake certificate, the following steps are included:
Step 1: user inputs correct user name and password by mobile terminal, and verifying logs in;
Step 2: after verifying user logins successfully, user name, password and timestamp being subjected to irreversible encryption and generate character The code key of string format;
Step 3: business datum being spelled into upper timestamp and code key carries out Base64 Encryption Algorithm and carries out reversible encryption;
Step 4: and then by code key, encrypted business datum and system data, it can using the progress of Base64 Encryption Algorithm Reverse encryption is encrypted to reversible ciphertext data A1;
Step 5: A1 being subjected to irreversible encryption using symmetric encipherment algorithm again, is encrypted to irreversible ciphertext data B1;
Step 6: reversible ciphertext data A1 and irreversible ciphertext data B1 are sent to server-side.
Step 7: after server-side receives ciphertext data A1 and ciphertext data B1;
Step 8: first reversible ciphertext data A1 being decrypted according to code key with Base64 reversible encryption method;
Step 9: the clear data A2 after being decrypted;
Step 10: wherein clear data A2 includes that mobile terminal is transmitted through the system data come and encrypted business datum;Again It will obtain encrypted business datum to be decrypted with Base64 reversible encryption method, and obtain being transmitted through the industry come when the request of mobile terminal Business parameter;
Step 11: irreversible encryption method is carried out with symmetric encipherment algorithm again, and clear data A2 is subjected to irreversible encryption, Obtain encrypted irreversible ciphertext data B2;
Step 12: and then judge whether ciphertext data B2 and ciphertext data B1 are identical;
Step 13: if identical, then it represents that data are not maliciously tampered during transmission, and data are effective;If It is not identical, indicate that data are kidnapped and distorted by third party in transmission process, data invalid.
Step 15: process execution terminates.
The system data includes timestamp sysTimetamp, mobile end equipment unique identifier deviceId, is used for Distinguish the identifier that the side for sending and requesting is the APP mobile phone either deviceType of dedicated writer, user's logging state The unique identification loginid of token and login user.
The business datum is data when mobile terminal is requested or when server-side return, including NFC label is uniquely marked Know batch unique identification Batchid, NFC of symbol UID, commodity unique identifier GSC, enterprise unique identifier Entid, commodity The information such as tag state WriteStatus, production time Productiondate, validity period Expirydate.
The code key is to carry out the token generated after irreversible encryption operation according to timestamp after user logins successfully.

Claims (4)

1. a kind of data ciphering method based on NFC chip anti-fake certificate, which comprises the following steps:
Step 1: user inputs correct user name and password by mobile terminal, and verifying logs in;
Step 2: after verifying user logins successfully, user name, password and timestamp being subjected to irreversible encryption and generate character string lattice The code key of formula;
Step 3: business datum being spelled into upper timestamp and code key carries out Base64 Encryption Algorithm and carries out reversible encryption;
Step 4: and then by code key, encrypted business datum and system data, reversible add is carried out using Base64 Encryption Algorithm It is close, it is encrypted to reversible ciphertext data A1;
Step 5: A1 being subjected to irreversible encryption using symmetric encipherment algorithm again, is encrypted to irreversible ciphertext data B1;
Step 6: reversible ciphertext data A1 and irreversible ciphertext data B1 are sent to server-side;
Step 7: after server-side receives ciphertext data A1 and ciphertext data B1;
Step 8: first reversible ciphertext data A1 being decrypted according to code key with Base64 reversible encryption method;
Step 9: the clear data A2 after being decrypted;
Step 10: wherein clear data A2 includes that mobile terminal is transmitted through the system data come and encrypted business datum;It incites somebody to action again It is decrypted to encrypted business datum with Base64 reversible encryption method, obtains the business ginseng for being transmitted through to come when the request of mobile terminal Number;
Step 11: carrying out irreversible encryption method with symmetric encipherment algorithm again and clear data A2 is subjected to irreversible encryption, obtain Encrypted irreversible ciphertext data B2;
Step 12: and then judge whether ciphertext data B2 and ciphertext data B1 are identical;
Step 13: if identical, then it represents that data are not maliciously tampered during transmission, and data are effective;If not phase It is same then indicate that data are kidnapped and distorted by third party in transmission process, data invalid;
Step 15: process execution terminates.
2. the data ciphering method according to claim 1 based on NFC chip anti-fake certificate, which is characterized in that described System data includes timestamp sysTimetamp, mobile end equipment unique identifier deviceId, for distinguishing transmission request Side is APP the mobile phone either deviceType of dedicated writer, the identifier token of user's logging state and login user Unique identification loginid.
3. the data ciphering method according to claim 1 based on NFC chip anti-fake certificate, which is characterized in that described Business datum is data when mobile terminal is requested or when server-side return, including NFC label unique identifier UID, commodity are only One identifier GSC, enterprise unique identifier Entid, the batch unique identification Batchid of commodity, NFC label state WriteStatus, production time Productiondate and validity period Expirydate.
4. the data ciphering method according to claim 1 based on NFC chip anti-fake certificate, which is characterized in that described Code key is to carry out the token generated after irreversible encryption operation according to timestamp after user logins successfully.
CN201610730212.4A 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate Active CN106357404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610730212.4A CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610730212.4A CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Publications (2)

Publication Number Publication Date
CN106357404A CN106357404A (en) 2017-01-25
CN106357404B true CN106357404B (en) 2019-06-18

Family

ID=57854733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610730212.4A Active CN106357404B (en) 2016-08-26 2016-08-26 Data ciphering method based on NFC chip anti-fake certificate

Country Status (1)

Country Link
CN (1) CN106357404B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN110691225B (en) * 2019-11-05 2021-04-06 杭州视洞科技有限公司 High-security encryption method for playing of AP direct connection/local area network camera
CN111506912A (en) * 2020-04-21 2020-08-07 北京思特奇信息技术股份有限公司 Interface security interaction method and system
CN111565177B (en) * 2020-04-26 2022-07-19 蘑菇车联信息科技有限公司 Vehicle-mounted machine data encryption transmission method and device
CN111931206A (en) * 2020-07-31 2020-11-13 银盛支付服务股份有限公司 Data encryption method based on APP
CN112532626A (en) * 2020-11-30 2021-03-19 南威软件股份有限公司 Point-to-point encrypted chatting method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420686A (en) * 2008-11-28 2009-04-29 重庆邮电大学 Industrial wireless network security communication implementation method based on cipher key
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN102347957A (en) * 2011-11-18 2012-02-08 王鑫 Cloud network admission identifying system and admission identifying technology
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL2010454C2 (en) * 2013-03-14 2014-09-16 Onlock B V A method and system for authenticating and preserving data within a secure data repository.
US9721248B2 (en) * 2014-03-04 2017-08-01 Bank Of America Corporation ATM token cash withdrawal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420686A (en) * 2008-11-28 2009-04-29 重庆邮电大学 Industrial wireless network security communication implementation method based on cipher key
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN102347957A (en) * 2011-11-18 2012-02-08 王鑫 Cloud network admission identifying system and admission identifying technology
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service

Also Published As

Publication number Publication date
CN106357404A (en) 2017-01-25

Similar Documents

Publication Publication Date Title
CN106357404B (en) Data ciphering method based on NFC chip anti-fake certificate
US20220342973A1 (en) Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
CN104219228B (en) A kind of user's registration, user identification method and system
CN103051628B (en) Obtain the method and system of authentication token based on server
CN105528695B (en) Mobile payment method and mobile payment system based on marks
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN106685973B (en) Remember method and device, log-in control method and the device of log-on message
US20200059470A1 (en) Industrial internet encryption system
JP6417036B2 (en) Entity authentication method and apparatus based on pre-shared key
CN105391554B (en) A kind of method and system for realizing fingerprint matching using ciphertext
CN106603636B (en) Error transaction standardization method and device
CN110070363B (en) Account management method and verification method in block chain network and terminal equipment
CN105306423B (en) Unified login method for distribution Web web station system
US20210328799A1 (en) Automated authentication of a new network element
WO2017181518A1 (en) Method, apparatus and system for encrypting communication
WO2017066995A1 (en) Method and device for preventing unauthorized access to server
CN102970676A (en) Method for processing original data, internet of thing system and terminal
KR20130037607A (en) Authentication process using of one time password
CN104579673B (en) Interactive authentication method between RFID card and card reader
CN105187219A (en) Method for preventing tampering of identity information in real name authentication
CN108234126B (en) System and method for remote account opening
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
CN104252591A (en) Authorization and information encrypted communication method based on USBKey
KR102085376B1 (en) Method for encrypting card information and system for the same
CN109067727B (en) Network system self-verification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190528

Address after: Room 084, 4th floor, West Street, Wanshou Road, Haidian District, Beijing 100036

Applicant after: Beijing Easy Network Technology Group Co., Ltd.

Address before: 100036 Boya Hotel, Laodao, 2 Wanshou Road West Street, Haidian District, Beijing, 7th Floor 701

Applicant before: YILIAN (BEIJING) INTERNET OF NETWORK TECHNOLOGY CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220208

Address after: 100068 1s04-4, 1st floor, building 2, Caoqiao Xinyuan Third District, Fengtai District, Beijing

Patentee after: Beijing Xiaoxiang Technology Co.,Ltd.

Address before: Room 084, 4th floor, West Street, Wanshou Road, Haidian District, Beijing 100036

Patentee before: Beijing Easy Network Technology Group Co.,Ltd.

TR01 Transfer of patent right