CN106874743A - The method and system that a kind of cryptographic smart cardses are preserved and extracted - Google Patents
The method and system that a kind of cryptographic smart cardses are preserved and extracted Download PDFInfo
- Publication number
- CN106874743A CN106874743A CN201611247618.3A CN201611247618A CN106874743A CN 106874743 A CN106874743 A CN 106874743A CN 201611247618 A CN201611247618 A CN 201611247618A CN 106874743 A CN106874743 A CN 106874743A
- Authority
- CN
- China
- Prior art keywords
- password
- personal terminal
- memory space
- card
- cipher text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Abstract
The method and system for being preserved the invention provides a kind of cryptographic smart cardses and being extracted, specifically include:Personal terminal stores password according to the following steps when first with smart card communications:S11:After receiving the password of verification operation, password is encrypted, obtains encrypted cipher text;S12:Personal terminal stores encrypted cipher text in the memory space of personal terminal in a distributed manner;Then personal terminal it is non-first with smart card communications when, password is extracted according to the following steps:S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;S22:Encrypted cipher text is decrypted treatment, the password for verification operation is obtained.The present invention is by way of user verifies that password automatically saves password after first, so that remaining sum and inquiring result by no longer needing password during historical transaction record in inquirying card again, it is easy to use, and by the encrypted cipher text distributed storage of password, improve the security of encrypted cipher text data.
Description
Technical field
Password storage and extractive technique field the present invention relates to personal terminal stored value card, more particularly to a kind of smart card are close
The method and system that code is preserved and extracted.
Background technology
With the development of individual terminal devices technology, current personal terminal stored value card starts appearance, and user can be by certainly
Communicated with stored value card (smart card) between the personal terminal of body, will pass through more than personal terminal directly inquired about in stored value card
Volume and historical transaction record.
For example, with establish for PBOC1.0 specifications, PBOC2.0, sinopec IC-card specification, petrochina IC-card specification,
The protocol specification of the smart cards such as public transport calliper model, smart card comes into vogue.But existing individual terminal devices read Stored Value
IC-card, remaining sum and during historical transaction record in inquirying card, is required for input card PIN code (password) every time, can after being verified
Result is inquired, when repeatedly inquiring about, more inconvenience.In addition, for a user, Stored Value IC is being inquired about using individual terminal devices
Remaining sum or historical transaction record in card, comparatively level of security is not too high for these operations, and repeatable operation process is easy
Password is caused to reveal.How to make the experience of user more humane, more convenient and improve user to read stored value card by personal terminal
Remaining sum and historical data security, be this area problem demanding prompt solution.
The content of the invention
The method and system for being preserved it is an object of the invention to provide a kind of cryptographic smart cardses and being extracted, it is existing to solve
Remaining sum and during historical transaction record in personal terminal inquiry stored value card, after being required for correctly entering card PIN code (password) every time,
Result can be inquired, the experience of existing user is poor, inconvenience and the poor problem of security.
The second object of the present invention is to provide the method and system that a kind of cryptographic smart cardses are preserved and extracted so that user
If after correctly entering a secondary card PIN code (password), later need not input card PIN code (password), convenient use again.
To achieve the above object, it is the invention provides a kind of preservation of cryptographic smart cardses and the method extracted including following interior
Hold:
Personal terminal stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
It is preferred that personal terminal is when first with smart card communications, while being encrypted to the card number of smart card, and will add
Close card number is stored in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, encrypted after being encrypted to the card number of smart card first
Card number, then searched in memory space whether have identical encrypt card number, if any, then extract correspondence card number password.
It is preferred that the encryption in the step S11 includes:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;
Then, the decryption processing in the step S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains described close
Code.
It is preferred that the predetermined encryption algorithm includes some groups of default encryption keys and decruption key, personal terminal exists
When receiving the password of verification operation first, one of which encryption key and decruption key, and the encryption to choose are randomly selected
Key carries out initial encryption to the password, during decryption, is initially decrypted with corresponding decruption key.
It is preferred that the unique identifier is the card number of smart card or the chip id of smart card.
It is preferred that the step S12 is further included:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage
The memory space address of ciphertext block data;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encryption being distributed in the memory space of personal terminal is extracted according to the memory space address
Ciphertext.
It is preferred that the memory space address is independently stored in the memory space of personal terminal in the form of a file,
The personal terminal is by calling the memory space address in this document acquisition file.
The system for being preserved present invention also offers a kind of cryptographic smart cardses and being extracted, including:It is arranged at individual mobile terminal
On memory, processor and smartcard identification unit, wherein, the smartcard identification unit is used for identification intelligent card and receives
The password of verification operation;
The processor be used for the password is encrypted and decrypted, and control carry out ciphertext distributed storage and
Read;
The memory includes several independent memory spaces, for storing the ciphertext in a distributed manner.
It is preferred that the processor includes:
Unique identifier acquiring unit, the unique identification for obtaining the smart card by the smartcard identification unit
Code;
Initial encryption/decryption unit, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains initial
Encrypted cipher text, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption ciphertext;
Smart card encryption/decryption element, for adding the unique knowledge related to smart card in the initial encryption ciphertext
Other code, obtains encrypted cipher text, and the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm,
Obtain the password;
Storage control unit, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner, with
And personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
It is preferred that the storage control unit includes:
Ciphertext block data splits module, and several ciphertext data are turned into for pressing default rule and splitting the encrypted cipher text
Block;
Distributed storage control module, the storage for the ciphertext block data to be stored different address in a distributed manner is empty
Between in;
Random data fills module, for adding random filling in the free space between the memory space of different address
Data;
It is preferred that the memory also includes a file area, the storage of ciphertext block data for independent stored record
The file of space address.
It is preferred that the smartcard identification unit includes:
Password acceptance unit, for receiving the password of verification operation, and is transmitted to the processor;
Intelligent card reader, for reading the card image of the smart card communicated with personal terminal and being transmitted to the treatment
Device, so that the processor judges whether the smart card communicates with personal terminal first.
It is preferred that the processor also includes:Card number ciphering unit, is encrypted for the card number to smart card, obtains
The card number of encryption;In personal terminal when first with smart card communications, by storage control unit will encrypt card number in a distributed manner
In storing the memory space of personal terminal.
The present invention program has the advantages that:
1) by after user verifies that PIN code (password) passes through first, automatically saving PIN code (password) in terminal device
Mode;So that next time remaining sum and no longer needs input PIN code (password), terminal meeting during historical transaction record in inquirying card again
PIN code (password) checking is automatically extracted, result is inquired, it is easy to use, it is to avoid repeatedly input password causes password to reveal, safety
Property is higher;
2) the correct PIN code (password) of user input is encrypted by AESs such as traditional AES, RSA, DES,
Those AES technology maturations, are difficult to crack, and security is preferable;
3) by add other elements participate in encryption in, such as unique ID of card number, chip etc. preferably ensure that ciphertext
Uniqueness so that individual terminal devices can simultaneously store the password of multiple cards, be easy to distinguish different smart cards;
4) by the encrypted cipher text distributed storage of each smart card in individual terminal devices, encrypted cipher text data are improved
Security, further adds random padding data by idle memory space, better assures that personal terminal sets
The security of standby middle encrypted cipher text so that the password of smart card is difficult maliciously to be stolen and cracked.
Brief description of the drawings
Figure 1A is the cryptographic smart cardses store method flow chart of the preferred embodiment of the present invention;
Figure 1B is the cryptographic smart cardses extracting method flow chart of the preferred embodiment of the present invention;
Fig. 2A is the cryptographic smart cardses encryption method flow chart of preferred embodiment;
Fig. 2 B are the cryptographic smart cardses decryption method flow chart of preferred embodiment;
Fig. 3 is the ciphertext storage method flow chart of preferred embodiment;
The system composition figure that Fig. 4 is preserved and extracted for the cryptographic smart cardses of preferred embodiment;
Fig. 5 is the composition figure of the processor of preferred embodiment;
Fig. 6 is the encrypted cipher text storage schematic diagram of instantiation.
Specific embodiment
For the present invention is better described, hereby with a preferred embodiment, and accompanying drawing is coordinated to elaborate the present invention, specifically
It is as follows:
Present embodiments provide a kind of method that cryptographic smart cardses are preserved and extracted, including herein below:
Personal terminal as shown in Figure 1A, stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, as shown in Figure 1B, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
Wherein, in a preferred embodiment, as shown in Figure 2 A, the encryption in step S11 includes:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;
Then as shown in Figure 2 B, the decryption processing in above-mentioned steps S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains described close
Code.
Further in a preferred embodiment, as shown in figure 3, the process that encrypted cipher text is stored in step S12 is specifically included:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage
The memory space address of ciphertext block data;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encryption being distributed in the memory space of personal terminal is extracted according to the memory space address
Ciphertext.
Preferably, above-mentioned memory space address is independently stored in the memory space of personal terminal in the form of a file
In, the personal terminal by calling this document by memory space address in direct access this document.
Further, the predetermined encryption algorithm in the present embodiment includes some groups of default encryption keys and decruption key,
Personal terminal randomly selects one of which encryption key and decruption key when the password of verification operation is first received, and with
The encryption key of selection carries out initial encryption to the password, during decryption, is initially decrypted with corresponding decruption key.
Preferably, the unique identifier in the present embodiment can be arranged as required to card number or smart card for smart card
Chip id, or other data, the characters uniquely related to smart card etc..
In another preferred embodiment of the invention, personal terminal is when first with smart card communications, while to intelligence
The card number of card is encrypted, and the card number of encryption stored into the memory space of personal terminal in a distributed manner;Then personal terminal
It is non-first with smart card communications when, the card number encrypted after being encrypted to the card number of smart card first, then in storage
Whether the card number for having identical to encrypt is searched in space, if any then extraction corresponds to the password of card number.Wherein, to the card of smart card
Number being encrypted can cause that card number of the storage in intelligent terminal is safer, so that ensure the user profile of smart card
Security.
In a preferred embodiment, card number and password are stored in memory space in a distributed manner after encrypting respectively.Wherein,
Encryption mode for card number can as needed take predetermined encryption algorithm to be encrypted, and the predetermined encryption algorithm can be with
The algorithm for carrying out initial encryption to password is identical or different, and those skilled in the art can unrestricted choice as needed.
As shown in figure 4, the present embodiment additionally provides the system that a kind of cryptographic smart cardses are preserved and extracted, including:It is arranged at
Memory 410, processor 420 and smartcard identification unit 430 on individual mobile terminal 400, wherein, smartcard identification unit
430 are used for identification intelligent card and receive the password of verification operation;Processor 420 is used to that the password to be encrypted and decrypted,
And control carries out distributed storage and the reading of ciphertext;Memory 410 includes several independent memory spaces, for being distributed
The formula ground storage ciphertext.
Preferably, shown in Figure 5, processor 420 includes:
Unique identifier acquiring unit 421, for obtaining the unique of the smart card by the smartcard identification unit
Identification code;
Initial encryption/decryption unit 422, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains
Initial encryption ciphertext, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption close
Text;
Smart card encryption/decryption element 423, it is related to smart card unique for being added in the initial encryption ciphertext
Identification code, obtains encrypted cipher text, and the initial encryption ciphertext is solved with the corresponding decipherment algorithm of predetermined encryption algorithm
It is close, obtain the password;
Storage control unit 424, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner,
And personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
Preferably, storage control unit 424 includes:
Ciphertext block data splits module, and several ciphertext data are turned into for pressing default rule and splitting the encrypted cipher text
Block;
Distributed storage control module, the storage for the ciphertext block data to be stored different address in a distributed manner is empty
Between in;
Random data fills module, for adding random filling in the free space between the memory space of different address
Data.
Preferably, memory 410 includes an also file area 411, the depositing for ciphertext block data for independent stored record
Store up the file of space address.
Preferably, smartcard identification unit 430 includes:
Password acceptance unit, for receiving the password of verification operation, and is transmitted to the processor;
Intelligent card reader, for reading the card image of the smart card communicated with personal terminal and being transmitted to the treatment
Device, so that the processor judges whether the smart card communicates with personal terminal first.Wherein, intelligent card reader here can
It is wireless near field communication NFC chip to be arranged as required to, and is communicated with reading intelligence with intelligent card chip by the NFC chip
The card image that can block, the card number of smart card described above or the chip id of smart card.
In another preferred embodiment, above-mentioned processor also includes:Card number ciphering unit, for the card number to smart card
It is encrypted, the card number encrypted;In personal terminal when first with smart card communications, by storage control unit by encrypt
Card number is stored in the memory space of personal terminal in a distributed manner.
Technical scheme is illustrated with an instantiation below:
Remaining sum is being carried out in the card of inquiry Stored Value IC-card for the first time using personal terminal and during historical transaction record, inquiry stream
Journey is as follows:User's plug-in card is pointed out by personal terminal or by card near personal terminal, treat user's plug-in card or by card near individual
After terminal, personal terminal reads card image, and it is " 10001137000068017XX " for example to read card number, then first by reading
Whether card number is encrypted, the card number encrypted, preserved in the ciphertext data search memory space of the card number according to encryption
The information of this IC-card.As do not found, then personal terminal judges that the card is inquired about for first time, while personal terminal prompting user
Input password, after user input password, respectively be encrypted for card number and password by personal terminal, obtains encrypted cipher text and goes forward side by side
Row distributed storage is in the memory space of personal terminal.Simultaneously, you can to user's display card number, remaining sum and historical transaction record
Etc. information.
Wherein, during encryption, first using AESs such as AES, RSA, DES to the correct PIN code of user input
(password) carries out initial encryption, and a group encryption keys and decruption key are randomly selected during encryption, is carried out initially using encryption key
The encryption by above-mentioned algorithm, while preserving corresponding decruption key.Encryption to card number can be calculated with using above-mentioned encryption
Method is encrypted, and the AES of card number may be the same or different with the AES of password.It is close after initial encryption for password
Text adds other elements, such as unique ID of card number, chip etc., by adding the unique related unique identifier of those and card can
To ensure the uniqueness of the ciphertext of password.In order to further ensure the safety of the ciphertext of card number and password, the present embodiment is to upper
The encrypted cipher text stated is split, and several data blocks are divided into by default rule, is such as equally divided into some segment data length phases
Deng data block, or be divided into different data block of several data lengths etc..By those data block distributed storages after segmentation
Shown in Figure 6 in the memory space of personal terminal, the present embodiment cuts according to the packet captured in individual terminal devices
Figure, it can be seen that data block 601 and data block 602 be respectively stored in address for 130h (0~7 byte) in the present embodiment and
140h (8~f bytes), and record the storage address of those data blocks.While the data in order to further ensure the ciphertext of storage
Security, increases the reading difficulty of malice reading and its decrypting process is interfered, and the present embodiment is 130h (0 also to address
~7 bytes) and 140h (8~f bytes) between idle data space carried out random padding data, referring to address be 130h (8~
F bytes) and 140h (0~7 byte) place data block 603 and 604, the data of data block 603 and 604 without any physical meaning,
The data of only random filling, serve good interference effect.
Remaining sum and history in the card that the non-Stored Value IC-card of inquiry first such as second or third time is carried out using personal terminal
During transaction record, querying flow is as follows:User's plug-in card is pointed out by personal terminal or by card near personal terminal, treat user's plug-in card
Or by card after personal terminal, personal terminal reads card image, and the card letter of the card is found in personal terminal
Breath, after finding, encrypted cipher text is extracted in memory space and decryption processing is carried out according to card image is automatic, obtains original close
Code.Simultaneously the personal terminal password is verified automatically, after being verified by user show the smart card card number,
The information such as remaining sum and historical transaction record.
Specifically, during decryption, the corresponding encryption of its password is obtained according to the card image of the Stored Value IC-card by personal terminal
The storage address of ciphertext is 130h (0~7 byte) and 140h (8~f bytes), is combined after then extracting two data of address
Encrypted cipher text is obtained, initial encryption ciphertext is obtained being resolved according to card image (such as card number), then using the decruption key for preserving
The ciphertext is decrypted by AES corresponding decryption rule, obtains original password.
In a preferred embodiment, the upper limit of the card image that individual terminal devices are stored can be set, such as storage 10
The information and password of card are opened, when there is new card, the information and password of storage time card at most is override automatically, it is real
Show the renewal of card image, improve the repeatable utilization rate of memory space.Certainly, the how many information of card are specifically stored
And password, those skilled in the art can be according to the amount of capacity of the memory of individual terminal devices and the disposal ability of processor
And adaptability set, here not its quantity of concrete restriction number.
It should be appreciated that in above process for each smart card, when being communicated with personal terminal, personal terminal will be first
The card image of the card is first read to determine whether to read the card first, namely the smart card that whether is stored with personal terminal
Password.
Personal terminal in above-described embodiment can be PMC equipment (as having and smart card communications function
Mobile phone, flat board etc.), or personal stored value card reads equipment (such as POS or the corresponding identification equipment of other extraordinary IC-cards).
The above, specific embodiment only of the invention, but protection scope of the present invention is not limited thereto, and it is any
Those skilled in the art the invention discloses technical scope in, to the present invention deformation or replacement done, should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.
Claims (12)
1. a kind of method that cryptographic smart cardses are preserved and extracted, it is characterised in that including herein below:
Personal terminal stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
2. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that personal terminal is first
During with smart card communications, while being encrypted to the card number of smart card, and the card number of encryption is stored personal whole in a distributed manner
In the memory space at end;
Then personal terminal it is non-first with smart card communications when, the card encrypted after being encrypted to the card number of smart card first
Number, whether the card number for having identical to encrypt then is searched in memory space, if any then extraction corresponds to the password of card number.
3. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that in the step S11
Encryption include:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;Then, the step
Decryption processing in rapid S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains the password.
4. the method that cryptographic smart cardses according to claim 3 are preserved and extracted, it is characterised in that the predetermined encryption is calculated
Method includes some groups of default encryption keys and decruption key, personal terminal when the password of verification operation is first received, with
Machine chooses one of which encryption key and decruption key, and initial encryption is carried out to the password with the encryption key chosen, and solves
When close, initially decrypted with corresponding decruption key.
5. the method that cryptographic smart cardses according to claim 3 are preserved and extracted, it is characterised in that the unique identifier
It is the card number or the chip id of smart card of smart card.
6. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that the step S12 enters
One step includes:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage ciphertext
The memory space address of data block;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encrypted cipher text being distributed in the memory space of personal terminal is extracted according to the memory space address.
7. the method that cryptographic smart cardses according to claim 6 are preserved and extracted, it is characterised in that the memory space ground
Location is independently stored in the memory space of personal terminal in the form of a file, and the personal terminal is obtained by calling this document
Memory space address in file.
8. the system that a kind of cryptographic smart cardses are preserved and extracted, it is characterised in that including:It is arranged at depositing on individual mobile terminal
Reservoir, processor and smartcard identification unit, wherein, the smartcard identification unit is used for identification intelligent card and receives checking behaviour
The password of work;
The processor is used to that the password to be encrypted and decrypted, and control carries out distributed storage and the reading of ciphertext
Take;
The memory includes several independent memory spaces, for storing the ciphertext in a distributed manner.
9. the system that cryptographic smart cardses according to claim 8 are preserved and extracted, it is characterised in that the processor bag
Include:
Unique identifier acquiring unit, the unique identifier for obtaining the smart card by the smartcard identification unit;
Initial encryption/decryption unit, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains initial encryption
Ciphertext, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption ciphertext;
Smart card encryption/decryption element, for adding the unique identifier related to smart card in the initial encryption ciphertext,
Encrypted cipher text is obtained, and the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtained
The password;
Storage control unit, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner, Yi Ji
Personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
10. the system that cryptographic smart cardses according to claim 9 are preserved and extracted, it is characterised in that the storage control
Unit includes:
Ciphertext block data splits module, and several ciphertext block datas are turned into for pressing default rule and splitting the encrypted cipher text;
Distributed storage control module, the memory space for the ciphertext block data to be stored different address in a distributed manner
In;
Random data fills module, for adding random filler in the free space between the memory space of different address
According to.
The system that 11. cryptographic smart cardses according to claim 10 are preserved and extracted, it is characterised in that, the memory
Including a file area, the file of the memory space address of ciphertext block data for independent stored record.
The system that 12. cryptographic smart cardses according to claim 9 are preserved and extracted, it is characterised in that the processor is also
Including:Card number ciphering unit, is encrypted for the card number to smart card, the card number encrypted;In personal terminal first
During with smart card communications, during the card number of encryption stored into the memory space of personal terminal in a distributed manner by storage control unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611247618.3A CN106874743B (en) | 2016-12-29 | 2016-12-29 | Method and system for storing and extracting smart card password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611247618.3A CN106874743B (en) | 2016-12-29 | 2016-12-29 | Method and system for storing and extracting smart card password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106874743A true CN106874743A (en) | 2017-06-20 |
CN106874743B CN106874743B (en) | 2020-07-10 |
Family
ID=59164438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611247618.3A Active CN106874743B (en) | 2016-12-29 | 2016-12-29 | Method and system for storing and extracting smart card password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874743B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337090A (en) * | 2018-05-21 | 2018-07-27 | 上海众人网络安全技术有限公司 | A kind of dynamic password acquisition methods, device, terminal and storage medium |
CN108900869A (en) * | 2018-05-04 | 2018-11-27 | 烽火通信科技股份有限公司 | A kind of communication group information encryption and decryption method and system |
CN109933994A (en) * | 2017-12-18 | 2019-06-25 | 北京三快在线科技有限公司 | Data classification storage and device and calculating equipment |
CN109977640A (en) * | 2019-02-21 | 2019-07-05 | 兴业数字金融服务(上海)股份有限公司 | Recycling keeping, application method and the device of admin password |
CN110795702A (en) * | 2019-10-12 | 2020-02-14 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, equipment and medium |
CN114360110A (en) * | 2022-01-06 | 2022-04-15 | 广东汇泰龙科技股份有限公司 | IC card encryption method, IC card verification method, device, equipment and medium |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1858824A (en) * | 2006-03-30 | 2006-11-08 | 华为技术有限公司 | Converting method for character string and method for forming and identifying intelligent net service card |
CN102098401A (en) * | 2009-12-11 | 2011-06-15 | 华为技术有限公司 | Voucher card generating, charging and inquiring methods and systems |
CN102158483A (en) * | 2011-03-11 | 2011-08-17 | 青岛海信传媒网络技术有限公司 | Method and system for authenticating access of intelligent television, intelligent television and authentication server |
CN102737308A (en) * | 2012-06-08 | 2012-10-17 | 中兴通讯股份有限公司 | Mobile terminal and method and system for inquiring information of intelligent card |
CN104683301A (en) * | 2013-11-28 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Password saving method and password saving device |
CN105847279A (en) * | 2016-05-03 | 2016-08-10 | 深圳市永兴元科技有限公司 | Distributed data processing method and data center |
-
2016
- 2016-12-29 CN CN201611247618.3A patent/CN106874743B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1858824A (en) * | 2006-03-30 | 2006-11-08 | 华为技术有限公司 | Converting method for character string and method for forming and identifying intelligent net service card |
CN102098401A (en) * | 2009-12-11 | 2011-06-15 | 华为技术有限公司 | Voucher card generating, charging and inquiring methods and systems |
CN102158483A (en) * | 2011-03-11 | 2011-08-17 | 青岛海信传媒网络技术有限公司 | Method and system for authenticating access of intelligent television, intelligent television and authentication server |
CN102737308A (en) * | 2012-06-08 | 2012-10-17 | 中兴通讯股份有限公司 | Mobile terminal and method and system for inquiring information of intelligent card |
CN104683301A (en) * | 2013-11-28 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Password saving method and password saving device |
CN105847279A (en) * | 2016-05-03 | 2016-08-10 | 深圳市永兴元科技有限公司 | Distributed data processing method and data center |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933994A (en) * | 2017-12-18 | 2019-06-25 | 北京三快在线科技有限公司 | Data classification storage and device and calculating equipment |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
CN108900869A (en) * | 2018-05-04 | 2018-11-27 | 烽火通信科技股份有限公司 | A kind of communication group information encryption and decryption method and system |
CN108900869B (en) * | 2018-05-04 | 2021-02-02 | 烽火通信科技股份有限公司 | Communication group information encryption and decryption method and system |
CN108337090A (en) * | 2018-05-21 | 2018-07-27 | 上海众人网络安全技术有限公司 | A kind of dynamic password acquisition methods, device, terminal and storage medium |
CN109977640A (en) * | 2019-02-21 | 2019-07-05 | 兴业数字金融服务(上海)股份有限公司 | Recycling keeping, application method and the device of admin password |
CN110795702A (en) * | 2019-10-12 | 2020-02-14 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, equipment and medium |
CN114360110A (en) * | 2022-01-06 | 2022-04-15 | 广东汇泰龙科技股份有限公司 | IC card encryption method, IC card verification method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN106874743B (en) | 2020-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106874743A (en) | The method and system that a kind of cryptographic smart cardses are preserved and extracted | |
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
US20120233462A1 (en) | Method and system for automatically logging in a client | |
CN1985464A (en) | Transferring data between two smart cards | |
CN102314731A (en) | Mobile payment method and equipment for implementing same | |
CN101739758B (en) | Method for encrypting and decrypting smart card, system and reader-writer | |
CN102867157B (en) | Mobile terminal and data guard method | |
CN104219044B (en) | A kind of key secret method for being used to encrypt storage device | |
RU2011130191A (en) | METHOD AND SYSTEM OF SAFE PROCESSING OF TRANSACTION | |
CN101753682A (en) | Right management method for user identification card and terminal unit | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
CN101488111A (en) | Identification authentication method and system | |
CN102307188A (en) | Subscriber identity module (SIM)-based universal serial bus (USB) key encryption/decryption system and encryption/decryption method | |
CN102866960A (en) | Method for realizing encryption in storage card, decrypting method and device | |
CN101866411B (en) | Security certification and encryption method and system of multi-application noncontact-type CPU card | |
CN104376465A (en) | Safe mobile payment method | |
CN104144174B (en) | Protect method, user equipment and the server of privacy of user data | |
CN102799540B (en) | Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption | |
RU2015137715A (en) | BODY COMMUNICATION SYSTEM | |
CN106156701A (en) | A kind of fingerprint identification device, fingerprint identification device identification system and recognition methods | |
KR20070094108A (en) | Data security device and method and mobile terminal including the same | |
CN110110504A (en) | Android system mobile phone application lock crack method based on Lian Fa section MTK processor communication agreement | |
CN105447402A (en) | Data processing method and data processing apparatus | |
CN101227682A (en) | Method and apparatus for protecting data safety in terminal | |
CN102665201A (en) | Mobile terminal and user information encryption method for same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |