CN106874743A - The method and system that a kind of cryptographic smart cardses are preserved and extracted - Google Patents

The method and system that a kind of cryptographic smart cardses are preserved and extracted Download PDF

Info

Publication number
CN106874743A
CN106874743A CN201611247618.3A CN201611247618A CN106874743A CN 106874743 A CN106874743 A CN 106874743A CN 201611247618 A CN201611247618 A CN 201611247618A CN 106874743 A CN106874743 A CN 106874743A
Authority
CN
China
Prior art keywords
password
personal terminal
memory space
card
cipher text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611247618.3A
Other languages
Chinese (zh)
Other versions
CN106874743B (en
Inventor
何笑维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Tower Intelligent Technology Co Ltd
Original Assignee
Shanghai Tower Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Tower Intelligent Technology Co Ltd filed Critical Shanghai Tower Intelligent Technology Co Ltd
Priority to CN201611247618.3A priority Critical patent/CN106874743B/en
Publication of CN106874743A publication Critical patent/CN106874743A/en
Application granted granted Critical
Publication of CN106874743B publication Critical patent/CN106874743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Abstract

The method and system for being preserved the invention provides a kind of cryptographic smart cardses and being extracted, specifically include:Personal terminal stores password according to the following steps when first with smart card communications:S11:After receiving the password of verification operation, password is encrypted, obtains encrypted cipher text;S12:Personal terminal stores encrypted cipher text in the memory space of personal terminal in a distributed manner;Then personal terminal it is non-first with smart card communications when, password is extracted according to the following steps:S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;S22:Encrypted cipher text is decrypted treatment, the password for verification operation is obtained.The present invention is by way of user verifies that password automatically saves password after first, so that remaining sum and inquiring result by no longer needing password during historical transaction record in inquirying card again, it is easy to use, and by the encrypted cipher text distributed storage of password, improve the security of encrypted cipher text data.

Description

The method and system that a kind of cryptographic smart cardses are preserved and extracted
Technical field
Password storage and extractive technique field the present invention relates to personal terminal stored value card, more particularly to a kind of smart card are close The method and system that code is preserved and extracted.
Background technology
With the development of individual terminal devices technology, current personal terminal stored value card starts appearance, and user can be by certainly Communicated with stored value card (smart card) between the personal terminal of body, will pass through more than personal terminal directly inquired about in stored value card Volume and historical transaction record.
For example, with establish for PBOC1.0 specifications, PBOC2.0, sinopec IC-card specification, petrochina IC-card specification, The protocol specification of the smart cards such as public transport calliper model, smart card comes into vogue.But existing individual terminal devices read Stored Value IC-card, remaining sum and during historical transaction record in inquirying card, is required for input card PIN code (password) every time, can after being verified Result is inquired, when repeatedly inquiring about, more inconvenience.In addition, for a user, Stored Value IC is being inquired about using individual terminal devices Remaining sum or historical transaction record in card, comparatively level of security is not too high for these operations, and repeatable operation process is easy Password is caused to reveal.How to make the experience of user more humane, more convenient and improve user to read stored value card by personal terminal Remaining sum and historical data security, be this area problem demanding prompt solution.
The content of the invention
The method and system for being preserved it is an object of the invention to provide a kind of cryptographic smart cardses and being extracted, it is existing to solve Remaining sum and during historical transaction record in personal terminal inquiry stored value card, after being required for correctly entering card PIN code (password) every time, Result can be inquired, the experience of existing user is poor, inconvenience and the poor problem of security.
The second object of the present invention is to provide the method and system that a kind of cryptographic smart cardses are preserved and extracted so that user If after correctly entering a secondary card PIN code (password), later need not input card PIN code (password), convenient use again.
To achieve the above object, it is the invention provides a kind of preservation of cryptographic smart cardses and the method extracted including following interior Hold:
Personal terminal stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
It is preferred that personal terminal is when first with smart card communications, while being encrypted to the card number of smart card, and will add Close card number is stored in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, encrypted after being encrypted to the card number of smart card first Card number, then searched in memory space whether have identical encrypt card number, if any, then extract correspondence card number password.
It is preferred that the encryption in the step S11 includes:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;
Then, the decryption processing in the step S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains described close Code.
It is preferred that the predetermined encryption algorithm includes some groups of default encryption keys and decruption key, personal terminal exists When receiving the password of verification operation first, one of which encryption key and decruption key, and the encryption to choose are randomly selected Key carries out initial encryption to the password, during decryption, is initially decrypted with corresponding decruption key.
It is preferred that the unique identifier is the card number of smart card or the chip id of smart card.
It is preferred that the step S12 is further included:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage The memory space address of ciphertext block data;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encryption being distributed in the memory space of personal terminal is extracted according to the memory space address Ciphertext.
It is preferred that the memory space address is independently stored in the memory space of personal terminal in the form of a file, The personal terminal is by calling the memory space address in this document acquisition file.
The system for being preserved present invention also offers a kind of cryptographic smart cardses and being extracted, including:It is arranged at individual mobile terminal On memory, processor and smartcard identification unit, wherein, the smartcard identification unit is used for identification intelligent card and receives The password of verification operation;
The processor be used for the password is encrypted and decrypted, and control carry out ciphertext distributed storage and Read;
The memory includes several independent memory spaces, for storing the ciphertext in a distributed manner.
It is preferred that the processor includes:
Unique identifier acquiring unit, the unique identification for obtaining the smart card by the smartcard identification unit Code;
Initial encryption/decryption unit, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains initial Encrypted cipher text, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption ciphertext;
Smart card encryption/decryption element, for adding the unique knowledge related to smart card in the initial encryption ciphertext Other code, obtains encrypted cipher text, and the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, Obtain the password;
Storage control unit, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner, with And personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
It is preferred that the storage control unit includes:
Ciphertext block data splits module, and several ciphertext data are turned into for pressing default rule and splitting the encrypted cipher text Block;
Distributed storage control module, the storage for the ciphertext block data to be stored different address in a distributed manner is empty Between in;
Random data fills module, for adding random filling in the free space between the memory space of different address Data;
It is preferred that the memory also includes a file area, the storage of ciphertext block data for independent stored record The file of space address.
It is preferred that the smartcard identification unit includes:
Password acceptance unit, for receiving the password of verification operation, and is transmitted to the processor;
Intelligent card reader, for reading the card image of the smart card communicated with personal terminal and being transmitted to the treatment Device, so that the processor judges whether the smart card communicates with personal terminal first.
It is preferred that the processor also includes:Card number ciphering unit, is encrypted for the card number to smart card, obtains The card number of encryption;In personal terminal when first with smart card communications, by storage control unit will encrypt card number in a distributed manner In storing the memory space of personal terminal.
The present invention program has the advantages that:
1) by after user verifies that PIN code (password) passes through first, automatically saving PIN code (password) in terminal device Mode;So that next time remaining sum and no longer needs input PIN code (password), terminal meeting during historical transaction record in inquirying card again PIN code (password) checking is automatically extracted, result is inquired, it is easy to use, it is to avoid repeatedly input password causes password to reveal, safety Property is higher;
2) the correct PIN code (password) of user input is encrypted by AESs such as traditional AES, RSA, DES, Those AES technology maturations, are difficult to crack, and security is preferable;
3) by add other elements participate in encryption in, such as unique ID of card number, chip etc. preferably ensure that ciphertext Uniqueness so that individual terminal devices can simultaneously store the password of multiple cards, be easy to distinguish different smart cards;
4) by the encrypted cipher text distributed storage of each smart card in individual terminal devices, encrypted cipher text data are improved Security, further adds random padding data by idle memory space, better assures that personal terminal sets The security of standby middle encrypted cipher text so that the password of smart card is difficult maliciously to be stolen and cracked.
Brief description of the drawings
Figure 1A is the cryptographic smart cardses store method flow chart of the preferred embodiment of the present invention;
Figure 1B is the cryptographic smart cardses extracting method flow chart of the preferred embodiment of the present invention;
Fig. 2A is the cryptographic smart cardses encryption method flow chart of preferred embodiment;
Fig. 2 B are the cryptographic smart cardses decryption method flow chart of preferred embodiment;
Fig. 3 is the ciphertext storage method flow chart of preferred embodiment;
The system composition figure that Fig. 4 is preserved and extracted for the cryptographic smart cardses of preferred embodiment;
Fig. 5 is the composition figure of the processor of preferred embodiment;
Fig. 6 is the encrypted cipher text storage schematic diagram of instantiation.
Specific embodiment
For the present invention is better described, hereby with a preferred embodiment, and accompanying drawing is coordinated to elaborate the present invention, specifically It is as follows:
Present embodiments provide a kind of method that cryptographic smart cardses are preserved and extracted, including herein below:
Personal terminal as shown in Figure 1A, stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, as shown in Figure 1B, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
Wherein, in a preferred embodiment, as shown in Figure 2 A, the encryption in step S11 includes:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;
Then as shown in Figure 2 B, the decryption processing in above-mentioned steps S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains described close Code.
Further in a preferred embodiment, as shown in figure 3, the process that encrypted cipher text is stored in step S12 is specifically included:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage The memory space address of ciphertext block data;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encryption being distributed in the memory space of personal terminal is extracted according to the memory space address Ciphertext.
Preferably, above-mentioned memory space address is independently stored in the memory space of personal terminal in the form of a file In, the personal terminal by calling this document by memory space address in direct access this document.
Further, the predetermined encryption algorithm in the present embodiment includes some groups of default encryption keys and decruption key, Personal terminal randomly selects one of which encryption key and decruption key when the password of verification operation is first received, and with The encryption key of selection carries out initial encryption to the password, during decryption, is initially decrypted with corresponding decruption key.
Preferably, the unique identifier in the present embodiment can be arranged as required to card number or smart card for smart card Chip id, or other data, the characters uniquely related to smart card etc..
In another preferred embodiment of the invention, personal terminal is when first with smart card communications, while to intelligence The card number of card is encrypted, and the card number of encryption stored into the memory space of personal terminal in a distributed manner;Then personal terminal It is non-first with smart card communications when, the card number encrypted after being encrypted to the card number of smart card first, then in storage Whether the card number for having identical to encrypt is searched in space, if any then extraction corresponds to the password of card number.Wherein, to the card of smart card Number being encrypted can cause that card number of the storage in intelligent terminal is safer, so that ensure the user profile of smart card Security.
In a preferred embodiment, card number and password are stored in memory space in a distributed manner after encrypting respectively.Wherein, Encryption mode for card number can as needed take predetermined encryption algorithm to be encrypted, and the predetermined encryption algorithm can be with The algorithm for carrying out initial encryption to password is identical or different, and those skilled in the art can unrestricted choice as needed.
As shown in figure 4, the present embodiment additionally provides the system that a kind of cryptographic smart cardses are preserved and extracted, including:It is arranged at Memory 410, processor 420 and smartcard identification unit 430 on individual mobile terminal 400, wherein, smartcard identification unit 430 are used for identification intelligent card and receive the password of verification operation;Processor 420 is used to that the password to be encrypted and decrypted, And control carries out distributed storage and the reading of ciphertext;Memory 410 includes several independent memory spaces, for being distributed The formula ground storage ciphertext.
Preferably, shown in Figure 5, processor 420 includes:
Unique identifier acquiring unit 421, for obtaining the unique of the smart card by the smartcard identification unit Identification code;
Initial encryption/decryption unit 422, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains Initial encryption ciphertext, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption close Text;
Smart card encryption/decryption element 423, it is related to smart card unique for being added in the initial encryption ciphertext Identification code, obtains encrypted cipher text, and the initial encryption ciphertext is solved with the corresponding decipherment algorithm of predetermined encryption algorithm It is close, obtain the password;
Storage control unit 424, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner, And personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
Preferably, storage control unit 424 includes:
Ciphertext block data splits module, and several ciphertext data are turned into for pressing default rule and splitting the encrypted cipher text Block;
Distributed storage control module, the storage for the ciphertext block data to be stored different address in a distributed manner is empty Between in;
Random data fills module, for adding random filling in the free space between the memory space of different address Data.
Preferably, memory 410 includes an also file area 411, the depositing for ciphertext block data for independent stored record Store up the file of space address.
Preferably, smartcard identification unit 430 includes:
Password acceptance unit, for receiving the password of verification operation, and is transmitted to the processor;
Intelligent card reader, for reading the card image of the smart card communicated with personal terminal and being transmitted to the treatment Device, so that the processor judges whether the smart card communicates with personal terminal first.Wherein, intelligent card reader here can It is wireless near field communication NFC chip to be arranged as required to, and is communicated with reading intelligence with intelligent card chip by the NFC chip The card image that can block, the card number of smart card described above or the chip id of smart card.
In another preferred embodiment, above-mentioned processor also includes:Card number ciphering unit, for the card number to smart card It is encrypted, the card number encrypted;In personal terminal when first with smart card communications, by storage control unit by encrypt Card number is stored in the memory space of personal terminal in a distributed manner.
Technical scheme is illustrated with an instantiation below:
Remaining sum is being carried out in the card of inquiry Stored Value IC-card for the first time using personal terminal and during historical transaction record, inquiry stream Journey is as follows:User's plug-in card is pointed out by personal terminal or by card near personal terminal, treat user's plug-in card or by card near individual After terminal, personal terminal reads card image, and it is " 10001137000068017XX " for example to read card number, then first by reading Whether card number is encrypted, the card number encrypted, preserved in the ciphertext data search memory space of the card number according to encryption The information of this IC-card.As do not found, then personal terminal judges that the card is inquired about for first time, while personal terminal prompting user Input password, after user input password, respectively be encrypted for card number and password by personal terminal, obtains encrypted cipher text and goes forward side by side Row distributed storage is in the memory space of personal terminal.Simultaneously, you can to user's display card number, remaining sum and historical transaction record Etc. information.
Wherein, during encryption, first using AESs such as AES, RSA, DES to the correct PIN code of user input (password) carries out initial encryption, and a group encryption keys and decruption key are randomly selected during encryption, is carried out initially using encryption key The encryption by above-mentioned algorithm, while preserving corresponding decruption key.Encryption to card number can be calculated with using above-mentioned encryption Method is encrypted, and the AES of card number may be the same or different with the AES of password.It is close after initial encryption for password Text adds other elements, such as unique ID of card number, chip etc., by adding the unique related unique identifier of those and card can To ensure the uniqueness of the ciphertext of password.In order to further ensure the safety of the ciphertext of card number and password, the present embodiment is to upper The encrypted cipher text stated is split, and several data blocks are divided into by default rule, is such as equally divided into some segment data length phases Deng data block, or be divided into different data block of several data lengths etc..By those data block distributed storages after segmentation Shown in Figure 6 in the memory space of personal terminal, the present embodiment cuts according to the packet captured in individual terminal devices Figure, it can be seen that data block 601 and data block 602 be respectively stored in address for 130h (0~7 byte) in the present embodiment and 140h (8~f bytes), and record the storage address of those data blocks.While the data in order to further ensure the ciphertext of storage Security, increases the reading difficulty of malice reading and its decrypting process is interfered, and the present embodiment is 130h (0 also to address ~7 bytes) and 140h (8~f bytes) between idle data space carried out random padding data, referring to address be 130h (8~ F bytes) and 140h (0~7 byte) place data block 603 and 604, the data of data block 603 and 604 without any physical meaning, The data of only random filling, serve good interference effect.
Remaining sum and history in the card that the non-Stored Value IC-card of inquiry first such as second or third time is carried out using personal terminal During transaction record, querying flow is as follows:User's plug-in card is pointed out by personal terminal or by card near personal terminal, treat user's plug-in card Or by card after personal terminal, personal terminal reads card image, and the card letter of the card is found in personal terminal Breath, after finding, encrypted cipher text is extracted in memory space and decryption processing is carried out according to card image is automatic, obtains original close Code.Simultaneously the personal terminal password is verified automatically, after being verified by user show the smart card card number, The information such as remaining sum and historical transaction record.
Specifically, during decryption, the corresponding encryption of its password is obtained according to the card image of the Stored Value IC-card by personal terminal The storage address of ciphertext is 130h (0~7 byte) and 140h (8~f bytes), is combined after then extracting two data of address Encrypted cipher text is obtained, initial encryption ciphertext is obtained being resolved according to card image (such as card number), then using the decruption key for preserving The ciphertext is decrypted by AES corresponding decryption rule, obtains original password.
In a preferred embodiment, the upper limit of the card image that individual terminal devices are stored can be set, such as storage 10 The information and password of card are opened, when there is new card, the information and password of storage time card at most is override automatically, it is real Show the renewal of card image, improve the repeatable utilization rate of memory space.Certainly, the how many information of card are specifically stored And password, those skilled in the art can be according to the amount of capacity of the memory of individual terminal devices and the disposal ability of processor And adaptability set, here not its quantity of concrete restriction number.
It should be appreciated that in above process for each smart card, when being communicated with personal terminal, personal terminal will be first The card image of the card is first read to determine whether to read the card first, namely the smart card that whether is stored with personal terminal Password.
Personal terminal in above-described embodiment can be PMC equipment (as having and smart card communications function Mobile phone, flat board etc.), or personal stored value card reads equipment (such as POS or the corresponding identification equipment of other extraordinary IC-cards).
The above, specific embodiment only of the invention, but protection scope of the present invention is not limited thereto, and it is any Those skilled in the art the invention discloses technical scope in, to the present invention deformation or replacement done, should all cover Within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.

Claims (12)

1. a kind of method that cryptographic smart cardses are preserved and extracted, it is characterised in that including herein below:
Personal terminal stores password according to the following steps when first with smart card communications:
S11:After receiving the password of verification operation, the password is encrypted, obtains encrypted cipher text;
S12:Personal terminal stores the encrypted cipher text in the memory space of personal terminal in a distributed manner;
Then personal terminal it is non-first with smart card communications when, extract password according to the following steps first:
S21:Extraction is distributed in the encrypted cipher text in the memory space of personal terminal;
S22:The encrypted cipher text is decrypted treatment, the password for verification operation is obtained.
2. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that personal terminal is first During with smart card communications, while being encrypted to the card number of smart card, and the card number of encryption is stored personal whole in a distributed manner In the memory space at end;
Then personal terminal it is non-first with smart card communications when, the card encrypted after being encrypted to the card number of smart card first Number, whether the card number for having identical to encrypt then is searched in memory space, if any then extraction corresponds to the password of card number.
3. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that in the step S11 Encryption include:
A. initial encryption is carried out to the password by predetermined encryption algorithm, obtains initial encryption ciphertext;
B. the unique identifier related to smart card is added in the initial encryption ciphertext, encrypted cipher text is obtained;Then, the step Decryption processing in rapid S22 includes:
A. the encrypted cipher text is initially decrypted according to the unique identifier, is obtained initial encryption ciphertext;
B. the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtains the password.
4. the method that cryptographic smart cardses according to claim 3 are preserved and extracted, it is characterised in that the predetermined encryption is calculated Method includes some groups of default encryption keys and decruption key, personal terminal when the password of verification operation is first received, with Machine chooses one of which encryption key and decruption key, and initial encryption is carried out to the password with the encryption key chosen, and solves When close, initially decrypted with corresponding decruption key.
5. the method that cryptographic smart cardses according to claim 3 are preserved and extracted, it is characterised in that the unique identifier It is the card number or the chip id of smart card of smart card.
6. the method that cryptographic smart cardses according to claim 1 are preserved and extracted, it is characterised in that the step S12 enters One step includes:
1) encrypted cipher text is pressed default rule and split turns into several ciphertext block datas;
2) during the ciphertext block data to store the memory space of different address in a distributed manner, and individually record storage ciphertext The memory space address of data block;
If 3) there is free space between the memory space of different address, random padding data to free space is added;
Then in the S21, the encrypted cipher text being distributed in the memory space of personal terminal is extracted according to the memory space address.
7. the method that cryptographic smart cardses according to claim 6 are preserved and extracted, it is characterised in that the memory space ground Location is independently stored in the memory space of personal terminal in the form of a file, and the personal terminal is obtained by calling this document Memory space address in file.
8. the system that a kind of cryptographic smart cardses are preserved and extracted, it is characterised in that including:It is arranged at depositing on individual mobile terminal Reservoir, processor and smartcard identification unit, wherein, the smartcard identification unit is used for identification intelligent card and receives checking behaviour The password of work;
The processor is used to that the password to be encrypted and decrypted, and control carries out distributed storage and the reading of ciphertext Take;
The memory includes several independent memory spaces, for storing the ciphertext in a distributed manner.
9. the system that cryptographic smart cardses according to claim 8 are preserved and extracted, it is characterised in that the processor bag Include:
Unique identifier acquiring unit, the unique identifier for obtaining the smart card by the smartcard identification unit;
Initial encryption/decryption unit, for carrying out initial encryption to the password by predetermined encryption algorithm, obtains initial encryption Ciphertext, and the encrypted cipher text is initially decrypted according to the unique identifier, obtain initial encryption ciphertext;
Smart card encryption/decryption element, for adding the unique identifier related to smart card in the initial encryption ciphertext, Encrypted cipher text is obtained, and the initial encryption ciphertext is decrypted with the corresponding decipherment algorithm of predetermined encryption algorithm, obtained The password;
Storage control unit, in the memory space that the encrypted cipher text is stored personal terminal in a distributed manner, Yi Ji Personal terminal it is non-first with smart card communications when extract be distributed in personal terminal memory space in encrypted cipher text.
10. the system that cryptographic smart cardses according to claim 9 are preserved and extracted, it is characterised in that the storage control Unit includes:
Ciphertext block data splits module, and several ciphertext block datas are turned into for pressing default rule and splitting the encrypted cipher text;
Distributed storage control module, the memory space for the ciphertext block data to be stored different address in a distributed manner In;
Random data fills module, for adding random filler in the free space between the memory space of different address According to.
The system that 11. cryptographic smart cardses according to claim 10 are preserved and extracted, it is characterised in that, the memory Including a file area, the file of the memory space address of ciphertext block data for independent stored record.
The system that 12. cryptographic smart cardses according to claim 9 are preserved and extracted, it is characterised in that the processor is also Including:Card number ciphering unit, is encrypted for the card number to smart card, the card number encrypted;In personal terminal first During with smart card communications, during the card number of encryption stored into the memory space of personal terminal in a distributed manner by storage control unit.
CN201611247618.3A 2016-12-29 2016-12-29 Method and system for storing and extracting smart card password Active CN106874743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611247618.3A CN106874743B (en) 2016-12-29 2016-12-29 Method and system for storing and extracting smart card password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611247618.3A CN106874743B (en) 2016-12-29 2016-12-29 Method and system for storing and extracting smart card password

Publications (2)

Publication Number Publication Date
CN106874743A true CN106874743A (en) 2017-06-20
CN106874743B CN106874743B (en) 2020-07-10

Family

ID=59164438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611247618.3A Active CN106874743B (en) 2016-12-29 2016-12-29 Method and system for storing and extracting smart card password

Country Status (1)

Country Link
CN (1) CN106874743B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337090A (en) * 2018-05-21 2018-07-27 上海众人网络安全技术有限公司 A kind of dynamic password acquisition methods, device, terminal and storage medium
CN108900869A (en) * 2018-05-04 2018-11-27 烽火通信科技股份有限公司 A kind of communication group information encryption and decryption method and system
CN109933994A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data classification storage and device and calculating equipment
CN109977640A (en) * 2019-02-21 2019-07-05 兴业数字金融服务(上海)股份有限公司 Recycling keeping, application method and the device of admin password
CN110795702A (en) * 2019-10-12 2020-02-14 山东英信计算机技术有限公司 Software anti-cracking method, device, equipment and medium
CN114360110A (en) * 2022-01-06 2022-04-15 广东汇泰龙科技股份有限公司 IC card encryption method, IC card verification method, device, equipment and medium
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858824A (en) * 2006-03-30 2006-11-08 华为技术有限公司 Converting method for character string and method for forming and identifying intelligent net service card
CN102098401A (en) * 2009-12-11 2011-06-15 华为技术有限公司 Voucher card generating, charging and inquiring methods and systems
CN102158483A (en) * 2011-03-11 2011-08-17 青岛海信传媒网络技术有限公司 Method and system for authenticating access of intelligent television, intelligent television and authentication server
CN102737308A (en) * 2012-06-08 2012-10-17 中兴通讯股份有限公司 Mobile terminal and method and system for inquiring information of intelligent card
CN104683301A (en) * 2013-11-28 2015-06-03 腾讯科技(深圳)有限公司 Password saving method and password saving device
CN105847279A (en) * 2016-05-03 2016-08-10 深圳市永兴元科技有限公司 Distributed data processing method and data center

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858824A (en) * 2006-03-30 2006-11-08 华为技术有限公司 Converting method for character string and method for forming and identifying intelligent net service card
CN102098401A (en) * 2009-12-11 2011-06-15 华为技术有限公司 Voucher card generating, charging and inquiring methods and systems
CN102158483A (en) * 2011-03-11 2011-08-17 青岛海信传媒网络技术有限公司 Method and system for authenticating access of intelligent television, intelligent television and authentication server
CN102737308A (en) * 2012-06-08 2012-10-17 中兴通讯股份有限公司 Mobile terminal and method and system for inquiring information of intelligent card
CN104683301A (en) * 2013-11-28 2015-06-03 腾讯科技(深圳)有限公司 Password saving method and password saving device
CN105847279A (en) * 2016-05-03 2016-08-10 深圳市永兴元科技有限公司 Distributed data processing method and data center

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933994A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data classification storage and device and calculating equipment
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN108900869A (en) * 2018-05-04 2018-11-27 烽火通信科技股份有限公司 A kind of communication group information encryption and decryption method and system
CN108900869B (en) * 2018-05-04 2021-02-02 烽火通信科技股份有限公司 Communication group information encryption and decryption method and system
CN108337090A (en) * 2018-05-21 2018-07-27 上海众人网络安全技术有限公司 A kind of dynamic password acquisition methods, device, terminal and storage medium
CN109977640A (en) * 2019-02-21 2019-07-05 兴业数字金融服务(上海)股份有限公司 Recycling keeping, application method and the device of admin password
CN110795702A (en) * 2019-10-12 2020-02-14 山东英信计算机技术有限公司 Software anti-cracking method, device, equipment and medium
CN114360110A (en) * 2022-01-06 2022-04-15 广东汇泰龙科技股份有限公司 IC card encryption method, IC card verification method, device, equipment and medium

Also Published As

Publication number Publication date
CN106874743B (en) 2020-07-10

Similar Documents

Publication Publication Date Title
CN106874743A (en) The method and system that a kind of cryptographic smart cardses are preserved and extracted
CN101662765B (en) Encryption system and method of short message of mobile telephone
US20120233462A1 (en) Method and system for automatically logging in a client
CN1985464A (en) Transferring data between two smart cards
CN102314731A (en) Mobile payment method and equipment for implementing same
CN101739758B (en) Method for encrypting and decrypting smart card, system and reader-writer
CN102867157B (en) Mobile terminal and data guard method
CN104219044B (en) A kind of key secret method for being used to encrypt storage device
RU2011130191A (en) METHOD AND SYSTEM OF SAFE PROCESSING OF TRANSACTION
CN101753682A (en) Right management method for user identification card and terminal unit
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN101488111A (en) Identification authentication method and system
CN102307188A (en) Subscriber identity module (SIM)-based universal serial bus (USB) key encryption/decryption system and encryption/decryption method
CN102866960A (en) Method for realizing encryption in storage card, decrypting method and device
CN101866411B (en) Security certification and encryption method and system of multi-application noncontact-type CPU card
CN104376465A (en) Safe mobile payment method
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN102799540B (en) Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption
RU2015137715A (en) BODY COMMUNICATION SYSTEM
CN106156701A (en) A kind of fingerprint identification device, fingerprint identification device identification system and recognition methods
KR20070094108A (en) Data security device and method and mobile terminal including the same
CN110110504A (en) Android system mobile phone application lock crack method based on Lian Fa section MTK processor communication agreement
CN105447402A (en) Data processing method and data processing apparatus
CN101227682A (en) Method and apparatus for protecting data safety in terminal
CN102665201A (en) Mobile terminal and user information encryption method for same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant