CN108537548A - NFC key cards configuration method, device and NFC key cards configure equipment - Google Patents
NFC key cards configuration method, device and NFC key cards configure equipment Download PDFInfo
- Publication number
- CN108537548A CN108537548A CN201810339252.5A CN201810339252A CN108537548A CN 108537548 A CN108537548 A CN 108537548A CN 201810339252 A CN201810339252 A CN 201810339252A CN 108537548 A CN108537548 A CN 108537548A
- Authority
- CN
- China
- Prior art keywords
- grade
- key
- private key
- kth
- nfc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
Abstract
A kind of NFC key cards configuration method of the application offer, device and NFC key cards configure equipment, and method includes:The 1st grade of private key of preset length is generated according to the seed password generated at random and payment cipher input by user;A kth grade random number is generated at random, for each kth grade private key, according to the kth grade private key and+1 grade of private key of kth of kth grade generating random number preset quantity;The private key of all generations is stored in the encryption chip of the 1st grade of NFC key card;Different k+1 grade private keys are stored in different k+1 grade NFC key cards, and are directed to each k+1 grades of private key, other private keys generated according to the k+1 grades of private key are stored in the corresponding NFC key cards of the k+1 grades of private key.In this way, after the NFC key cards distribution that will be configured by the above method, management and control can be carried out to the key under respective branch by possessing the department of upper level NFC key cards, to realize the domination management to department of subordinate assets.
Description
Technical field
This application involves the virtual token technical field of block chain, in particular to a kind of cipher key configuration method, apparatus and
Offline cipher key configuration equipment.
Background technology
With the development of decentralization and block chain technology, if the virtual token of bit coin is using more and more extensive, virtually
Token is used safely and asset management is increasingly taken seriously.In some asset management scenes, such as in multiple level departments
Company asset management in, assets are managed with needing hierarchical, higher level department need it will be seen that and control subordinate
The assets of department use.But in the virtual token of block chain in the prior art, user is generated by the private key of oneself and is corresponded to
Public key so that generate asset addresses, and process of exchange is encrypted by private key, is only capable of accomplishing to be managed the assets of oneself,
It is not suitable for the asset management scene with multi-layer.
Invention content
In order to overcome above-mentioned deficiency in the prior art, the application's is designed to provide a kind of NFC key cards configuration side
Method, the method includes:
The 1st grade of private key of preset length is generated according to the seed password generated at random and payment cipher input by user;
A kth grade random number is generated at random, for each kth grade private key, according to the kth grade private key and the kth grade
+ 1 grade of private key of kth of generating random number preset quantity, wherein k is more than or equal to 1;
The private key of all generations is stored in the encryption chip of the 1st grade of NFC key card, so that the 1st grade of NFC key
Card can export wherein any one private key by NFC communication mode;
Different k+1 grade private keys are stored in different k+1 grade NFC key cards, and are directed to each k+1 grades of private key, it will
Other private keys generated according to the k+1 grades of private key are stored in the corresponding k+1 grades of NFC key card of the k+1 grades of private key, so that kth+
1 grade of NFC key card can export any one private key in+1 grade of NFC key card of the kth by NFC communication mode.
Optionally, in the above-mentioned methods, the method includes:
The 1st grade of public key is generated according to the 1st grade of private key;
+ 1 grade of public key of kth is generated according to+1 grade of private key of the kth;
All public keys of generation are stored in the encryption chip of the 1st grade of NFC key card;
The corresponding public key of all private keys in the k+1 grades of NFC key card is stored in the encryption of+1 grade of NFC key card of the kth
In chip.
Optionally, in the above-mentioned methods, there are one according to other opposite private keys of the private key for the private key correspondence each generated
The private key number that hierarchical relationship generates,
The private key number of the private key is stored while storing private key.
The another object of the application is to provide a kind of NFC key cards configuration method, the method includes:
The 1st grade of private key of preset length is generated according to the seed password generated at random and payment cipher input by user;
A kth grade random number is generated at random, for each kth grade private key, according to the kth grade private key and the kth grade
+ 1 grade of private key of kth of generating random number preset quantity, wherein k is more than or equal to 1;
The 1st grade of private key and the 1st grade of random number are stored in the encryption chip of the 1st grade of NFC key card;
Different k+1 grade private keys are stored in different k+1 grade NFC key cards, and+1 grade of random number of kth is stored in
In+1 grade of NFC key card of kth.
The another object of the application is to provide a kind of NFC key cards configuration device, and described device includes:
First private key generation module, it is pre- for being generated according to the seed password and payment cipher input by user that generate at random
If the 1st grade of private key of length;
Second private key generation module, for generating a kth grade random number at random, for each kth grade private key, according to this
+ 1 grade of private key of kth of kth grade private key and the kth grade generating random number preset quantity, wherein k is more than or equal to 1;
First memory module, for the private key of all generations to be stored in the encryption chip of the 1st grade of NFC key card, with
Make the 1st grade of NFC key card that can export wherein any one private key by NFC communication mode;
Second memory module for different k+1 grade private keys to be stored in different k+1 grade NFC key cards, and is directed to
Other private keys generated according to the k+1 grades of private key are stored in the corresponding k+1 grades of NFC of the k+1 grades of private key by each k+1 grades of private keys
In key card, to keep+1 grade of NFC key card of kth arbitrary in+1 grade of NFC key card of the kth by exporting in a manner of NFC communication
One private key.
Optionally, in above-mentioned apparatus, described device includes:
First public key generation module, for generating the 1st grade of public key according to the 1st grade of private key;
Second public key generation module, for generating+1 grade of public key of kth according to+1 grade of private key of the kth;
Third memory module, the encryption chip for all public keys generated to be stored in the 1st grade of NFC key card
In;
4th memory module, for the corresponding public key of all private keys in the k+1 grades of NFC key card to be stored in the kth+1
In the encryption chip of grade NFC key cards.
Optionally, in above-mentioned apparatus, there are one according to other opposite private keys of the private key for the private key correspondence each generated
The private key number that hierarchical relationship generates,
The private key that first memory module or second memory module store the private key while storing private key is compiled
Number.
The another object of the application is to provide a kind of NFC key cards configuration device, and described device includes:
First private key generation module, it is pre- for being generated according to the seed password and payment cipher input by user that generate at random
If the 1st grade of private key of length;
Second private key generation module, for generating a kth grade random number at random, for each kth grade private key, according to this
+ 1 grade of private key of kth of kth grade private key and the kth grade generating random number preset quantity, wherein k is more than or equal to 1;
5th memory module, for by the 1st grade of private key and the 1st grade of random number be stored in the 1st grade of NFC key card plus
In close chip;
6th memory module, for different k+1 grade private keys to be stored in different k+1 grade NFC key cards, and by
K+1 grades of random numbers are stored in+1 grade of NFC key card of kth.
The another object of the application is to provide a kind of NFC key cards configuration equipment, including processing unit, machine readable deposits
Storage media, the machine readable storage medium is stored with the machine-executable instruction that can be executed by the processing unit, described
Processing unit executes the machine-executable instruction to realize NFC key cards configuration method provided by the present application.
The another object of the application is to provide a kind of machine readable storage medium, the machine readable storage medium storage
There is machine-executable instruction, the machine-executable instruction is when being called and being executed by processor, the machine-executable instruction
The processor is promoted to realize NFC key cards configuration method provided by the present application.
In terms of existing technologies, the application has the advantages that:
NFC key cards configuration method, device and NFC key cards provided by the present application configure equipment, pass through automatically iteration
The private key of multiple levels is generated, and by the key storage of different levels in the NFC key cards of different levels.In this way, that will lead to
After crossing the NFC key cards distribution of above method configuration, the department for possessing upper level NFC key cards can be to close under respective branch
Key carries out management and control, to realize the domination management to department of subordinate assets.
Description of the drawings
It, below will be to needed in the embodiment attached in order to illustrate more clearly of the technical solution of the embodiment of the present application
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram of NFC key cards configuration device provided by the embodiments of the present application;
Fig. 2 is one of the flow diagram of NFC key cards configuration method provided by the embodiments of the present application;
Fig. 3 is the two of the flow diagram of NFC key cards configuration method provided by the embodiments of the present application;
Fig. 4 is one of the schematic diagram of NFC key cards configuration device provided by the embodiments of the present application;
Fig. 5 is the two of the schematic diagram of NFC key cards configuration device provided by the embodiments of the present application.
Icon:100-NFC key cards configure equipment;110 (210)-NFC key card configuration devices;111 (211)-the first are private
Key generation module;112 (212)-the second private key generation module;The first memory modules of 113-;The second memory modules of 114-;115-
One public key generation module;116- the second public key generation modules;117- third memory modules;The 4th memory modules of 118-;213-
Five memory modules;The 6th memory modules of 214-;120- memories;130- processors;140-NFC communication units.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented
The component of example can be arranged and be designed with a variety of different configurations.
Therefore, below the detailed description of the embodiments herein to providing in the accompanying drawings be not intended to limit it is claimed
Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common
The every other embodiment that technical staff is obtained without creative efforts belongs to the model of the application protection
It encloses.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
In the description of the present application, it should be noted that term " first ", " second ", " third " etc. are only used for distinguishing and retouch
It states, is not understood to indicate or imply relative importance.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ",
" installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one
Connect to body;It can be mechanical connection, can also be electrical connection;It can be directly connected, it can also be indirect by intermediary
It is connected, can is the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition
State the concrete meaning of term in this application.
Fig. 1 is please referred to, Fig. 1 is the box signal for the NFC key cards configuration equipment 100 that the application preferred embodiment provides
Figure.NFC key cards configuration equipment 100 include NFC key cards configuration device 110 (210), memory 120, processor 130,
NFC communication unit 140.
The memory 120, processor 130 and 140 each element of NFC communication unit are directly or indirectly electric between each other
Property connection, to realize the transmission or interaction of data.For example, these elements between each other can by one or more communication bus or
Signal wire, which is realized, to be electrically connected.The NFC key cards configuration device 110 (210) include it is at least one can be with software or firmware
(firmware) form is stored in the memory 120 or is solidificated in the operation system of the NFC key cards configuration equipment 100
Software function module in system (operating system, OS).The processor 130 is for executing in the memory 120
The executable module of storage, such as the software function module included by the NFC key cards configuration device 110 (210) and calculating
Machine program etc..
Wherein, the memory 120 may be, but not limited to, random access memory (Random Access
Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable
Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only
Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only
Memory, EEPROM) etc..Wherein, memory 120 is for storing program, the processor 130 after receiving and executing instruction,
Execute described program.
The NFC communication unit 140 with NFC key cards for being communicated.
Fig. 2 is please referred to, Fig. 2 is a kind of NFC key cards configuration that equipment 100 is configured applied to NFC key cards shown in FIG. 1
The flow chart of method, below will be to the method includes each steps to be described in detail.
Step S110 generates the 1st of preset length according to the seed password generated at random and payment cipher input by user
Grade private key.
In the present embodiment, the NFC key cards configuration equipment 100 can receive branch input by user under off-line state
Pay password, and automated randomized generation seed password.Wherein, the seed password may include in English, Chinese or number
Any one or the combination between it.
In the present embodiment, after generating the seed password and the payment cipher, can according to the seed password and
The payment cipher generates the 1st grade of private key.
Further, in the present embodiment, the 1st grade of private is being generated according to the seed password and the payment cipher
After key, the 1st grade of public key is generated according to the 1st grade of private key.
Step S120 generates a kth grade random number at random, for each kth grade private key, according to the kth grade private key and
+ 1 grade of private key of kth of the kth grade generating random number preset quantity, wherein k is more than or equal to 1.
For example, city 2^32 the 2nd grade of private keys can be given birth to according to the 1st grade of private key and the 1st grade of random number, for each 2nd grade
Private key can generate 2^32 3rd level private key according to the 2nd grade of private key and the 2nd grade of random number generated at random, and so on,
Form the private key of multiple levels.
Further, in the present embodiment, default according to the kth grade private key and the kth grade generating random number described
After+1 grade of private key of kth of quantity ,+1 grade of public key of kth is generated according to+1 grade of private key of the kth.
The private key of all generations is stored in the encryption chip of the 1st grade of NFC key card by step S130, so that the described 1st
Grade NFC key cards can export wherein any one private key by NFC communication mode.
Further, in the present embodiment, all public keys of generation can also be stored in the 1st grade of NFC key card
Encryption chip in.
Based on above-mentioned steps, the 1st grade of NFC key card can be held by the highest user of permission, which can lead to
It crosses in 1 grade of NFC key card and manages all private keys, realize the administering of property that all private keys are corresponded to virtual token.
Different k+1 grade private keys are stored in different k+1 grade NFC key cards by step S140, and are directed to each k+1
Other private keys generated according to the k+1 grades of private key are stored in the corresponding k+1 grades of NFC key card of the k+1 grades of private key by grade private key
In, to keep+1 grade of NFC key card of kth private by exporting any one in+1 grade of NFC key card of the kth in a manner of NFC communication
Key.
Further, the corresponding public key of all private keys in the k+1 grades of NFC key card is stored in+1 grade of NFC key of the kth
In the encryption chip of card.
Based on above-mentioned steps ,+1 grade of NFC key card of the kth can be held by the leader user of the level, the user
It can be realized to all private keys pair under the branch by managing private key all under respective branches in the k+1 grades of NFC key card
Answer the administering of property of virtual token.
Further, in the present embodiment, there are one according to other opposite private keys of the private key for the private key correspondence each generated
Hierarchical relationship generate private key number, stored while store private key the private key private key number.In this way, needing to use
When private key is traded signature, it can be numbered by private key and search corresponding private key from NFC key cards.For example, the 1st grade of private key
It is denoted as m, the 2nd derived from grade private key is denoted as m/0 to m/2^32-1, and the private key that m/0 derives from is denoted as m/0/0 to m/
0/2^32-1。
Fig. 3 is please referred to, the present embodiment also provides another kind NFC cipher key configuration methods, below to each step of this method
It is illustrated.
Step S210 generates the 1st of preset length according to the seed password generated at random and payment cipher input by user
Grade private key.
This step is with step S110, and details are not described herein.
Step S220 generates a kth grade random number at random, for each kth grade private key, according to the kth grade private key and
+ 1 grade of private key of kth of the kth grade generating random number preset quantity, wherein k is more than or equal to 1.
This step is with step S120, and details are not described herein.
The 1st grade of private key and the 1st grade of random number are stored in the encryption chip of the 1st grade of NFC key card by step S230
In.
In this step, the 1st grade of private key and the 1st grade of random number are stored in the 1st grade of NFC key card, in this way, the
The holder of 1 and NFC key cards can manage the 1st grade of private key, and can the 2nd grade of private key of relatively independent generation, realize to next
Grade private key corresponds to the management and control of virtual token assets.
Different k+1 grade private keys are stored in different k+1 grade NFC key cards by step S240, and by+1 grade of kth with
Machine number is stored in+1 grade of NFC key card of kth.
In this step ,+1 grade of random number of+1 grade of private key of the kth and kth is stored in+1 grade of NFC key card of kth,
In this way, the holder of kth+1 and NFC key cards can manage+1 grade of private key of kth, and can+2 grades of privates of relatively independent generation kth
Key realizes the management and control that virtual token assets are corresponded to next stage private key.
Based on above-mentioned design, every grade of NFC key card can carry out the private key of oneself and the private key of respective branches next stage
Management.Each NFC key cards only store 1 private key and 1 random number, reduce the data storage capacity of NFC key cards.
Fig. 4 is please referred to, the present embodiment also provides a kind of NFC key cards configuration device 110, and described device includes the first private key
Generation module 111, the second private key generation module 112, the first memory module 113 and the second memory module 114.
The first private key generation module 111, for close according to the seed password and payment input by user that generate at random
Code generates the 1st grade of private key of preset length.
In the present embodiment, the first private key generation module 111 can be used for executing step S110 shown in Fig. 2, about institute
Description to the step S110 can be joined by stating the specific descriptions of the first private key generation module 111.
The second private key generation module 112, for generating a kth grade random number at random, for the private of each kth grade
Key, according to the kth grade private key and+1 grade of private key of kth of the kth grade generating random number preset quantity, wherein k is more than or equal to 1.
In the present embodiment, the second private key generation module 112 can be used for executing step S120 shown in Fig. 2, about institute
Description to the step S120 can be joined by stating the specific descriptions of the second private key generation module 112.
First memory module 113, the encryption core for the private key of all generations to be stored in the 1st grade of NFC key card
In piece, to make the 1st grade of NFC key card can be by exporting wherein any one private key in a manner of NFC communication.
In the present embodiment, first memory module 113 can be used for executing step S130 shown in Fig. 2, about described
The specific descriptions of one memory module 113 can join the description to the step S130.
Second memory module 114, for different k+1 grade private keys to be stored in different k+1 grade NFC key cards
In, and it is directed to each k+1 grades of private key, it is corresponding that other private keys generated according to the k+1 grades of private key are stored in the k+1 grades of private key
In k+1 grades of NFC key cards, to allow+1 grade of NFC key card of kth by exporting+1 grade of NFC key of the kth in a manner of NFC communication
Any one private key in card.
In the present embodiment, second memory module 114 can be used for executing step S140 shown in Fig. 2, about described
The specific descriptions of two memory modules 114 can join the description to the step S140.
Optionally, referring once again to Fig. 4, in the present embodiment, described device includes the first public key generation module 115, the
Two public key generation modules 116, third memory module 117 and the 4th memory module 118.
The first public key generation module 115, for generating the 1st grade of public key according to the 1st grade of private key.
The second public key generation module 116, for generating+1 grade of public key of kth according to+1 grade of private key of the kth.
The third memory module 117, for all public keys generated to be stored in adding for the 1st grade of NFC key card
In close chip.
4th memory module 118, for the corresponding public key of all private keys in the k+1 grades of NFC key card to be stored in
In the encryption chip of+1 grade of NFC key card of the kth.
Optionally, in the present embodiment, there are one according to other opposite private keys of the private key for the private key correspondence each generated
The private key number that hierarchical relationship generates,
First memory module 113 or second memory module 114 store the private key while storing private key
Private key is numbered.
Fig. 5 is please referred to, the present embodiment also provides another kind NFC key cards configuration device 210, and described device includes first private
Key generation module 211, the second private key generation module 212, the 5th memory module 213 and the 6th memory module 214.
The first private key generation module 211, for close according to the seed password and payment input by user that generate at random
Code generates the 1st grade of private key of preset length.
In the present embodiment, the first private key generation module 211 can be used for executing step S210 shown in Fig. 3, about institute
Description to the step S210 can be joined by stating the specific descriptions of the first private key generation module 211.
The second private key generation module 212, for generating a kth grade random number at random, for the private of each kth grade
Key, according to the kth grade private key and+1 grade of private key of kth of the kth grade generating random number preset quantity, wherein k is more than or equal to 1.
In the present embodiment, the second private key generation module 212 can be used for executing step S220 shown in Fig. 3, about institute
Description to the step S220 can be joined by stating the specific descriptions of the second private key generation module 212.
5th memory module 213, it is close for the 1st grade of private key and the 1st grade of random number to be stored in the 1st grade of NFC
In the encryption chip of key card.
In the present embodiment, the 5th memory module 213 can be used for executing step S230 shown in Fig. 3, about described
The specific descriptions of five memory modules 213 can join the description to the step S230.
6th memory module 214, for different k+1 grade private keys to be stored in different k+1 grade NFC key cards
In, and+1 grade of random number of kth is stored in+1 grade of NFC key card of kth.
In the present embodiment, the 6th memory module 214 can be used for executing step S240 shown in Fig. 3, about described
The specific descriptions of six memory modules 214 can join the description to the step S240.
In conclusion NFC key cards configuration method provided by the present application, device and NFC key cards configure equipment, by certainly
The private key of the dynamic ground multiple levels of grey iterative generation, and by the key storage of different levels in the NFC key cards of different levels.Such as
This, after the NFC key cards distribution that will be configured by the above method, the department for possessing upper level NFC key cards can be to corresponding
Key under branch carries out management and control, to realize the domination management to department of subordinate assets.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other
Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown
According to the device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the application
And operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or code
Point, a part for the module, section or code includes one or more for implementing the specified logical function executable
Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from
The sequence marked in figure occurs.For example, two continuous boxes can essentially be basically executed in parallel, they also may be used sometimes
To execute in the opposite order, this is depended on the functions involved.It is also noted that each of block diagram and or flow chart
The combination of box in box and block diagram and or flow chart, function or the dedicated of action are based on as defined in execution
The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each function module in each embodiment of the application can integrate to form an independent portion
Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of step.
And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific implementation mode of the application, but the protection domain of the application is not limited thereto, it is any
Those familiar with the art can easily think of the change or the replacement in the technical scope that the application discloses, and should all contain
It covers within the protection domain of the application.Therefore, the protection domain of the application shall be subject to the protection scope of the claim.
Claims (10)
1. a kind of NFC key cards configuration method, which is characterized in that the method includes:
The 1st grade of private key of preset length is generated according to the seed password generated at random and payment cipher input by user;
A kth grade random number is generated at random, it is random according to the kth grade private key and the kth grade for each kth grade private key
Number generates+1 grade of private key of kth of preset quantity, wherein k is more than or equal to 1;
The private key of all generations is stored in the encryption chip of the 1st grade of NFC key card, so that the 1st grade of NFC key card can
Wherein any one private key is exported by NFC communication mode;
Different k+1 grade private keys are stored in different k+1 grade NFC key cards, and are directed to each k+1 grades of private key, by basis
Other private keys that the k+1 grades of private key generates are stored in the corresponding k+1 grades of NFC key card of the k+1 grades of private key, so that+1 grade of kth
NFC key cards can export any one private key in+1 grade of NFC key card of the kth by NFC communication mode.
2. according to the method described in claim 1, it is characterized in that, the method includes:
The 1st grade of public key is generated according to the 1st grade of private key;
+ 1 grade of public key of kth is generated according to+1 grade of private key of the kth;
All public keys of generation are stored in the encryption chip of the 1st grade of NFC key card;
The corresponding public key of all private keys in the k+1 grades of NFC key card is stored in the encryption chip of+1 grade of NFC key card of the kth
In.
3. according to the method described in claim 1, it is characterized in that,
The private key each generated is corresponded to there are one the private key number according to the private key with respect to the hierarchical relationship generation of other private keys,
The private key number of the private key is stored while storing private key.
4. a kind of NFC key cards configuration method, which is characterized in that the method includes:
The 1st grade of private key of preset length is generated according to the seed password generated at random and payment cipher input by user;
A kth grade random number is generated at random, it is random according to the kth grade private key and the kth grade for each kth grade private key
Number generates+1 grade of private key of kth of preset quantity, wherein k is more than or equal to 1;
The 1st grade of private key and the 1st grade of random number are stored in the encryption chip of the 1st grade of NFC key card;
Different k+1 grade private keys are stored in different k+1 grade NFC key cards, and by+1 grade of random number of kth be stored in kth+
In 1 grade of NFC key card.
5. a kind of NFC key cards configuration device, which is characterized in that described device includes:
First private key generation module, for generating default length according to the seed password and payment cipher input by user that generate at random
1st grade of private key of degree;
Second private key generation module, for generating a kth grade random number at random, for each kth grade private key, according to the kth
+ 1 grade of private key of kth of grade private key and the kth grade generating random number preset quantity, wherein k is more than or equal to 1;
First memory module, for the private key of all generations to be stored in the encryption chip of the 1st grade of NFC key card, so that institute
Wherein any one private key can be exported by NFC communication mode by stating the 1st grade of NFC key card;
Second memory module, for different k+1 grade private keys to be stored in different k+1 grade NFC key cards, and for each
Other private keys generated according to the k+1 grades of private key are stored in the corresponding k+1 grades of NFC key of the k+1 grades of private key by k+1 grades of private keys
In card, to allow+1 grade of NFC key card of kth by exporting any one in+1 grade of NFC key card of the kth in a manner of NFC communication
Private key.
6. device according to claim 5, which is characterized in that described device includes:
First public key generation module, for generating the 1st grade of public key according to the 1st grade of private key;
Second public key generation module, for generating+1 grade of public key of kth according to+1 grade of private key of the kth;
Third memory module, for all public keys generated to be stored in the encryption chip of the 1st grade of NFC key card;
4th memory module, for the corresponding public key of all private keys in the k+1 grades of NFC key card to be stored in+1 grade of NFC of the kth
In the encryption chip of key card.
7. device according to claim 5, which is characterized in that there are one according to the private key phase for the private key correspondence each generated
The private key generated to the hierarchical relationship of other private keys is numbered,
First memory module or second memory module store the private key number of the private key while storing private key.
8. a kind of NFC key cards configuration device, which is characterized in that described device includes:
First private key generation module, for generating default length according to the seed password and payment cipher input by user that generate at random
1st grade of private key of degree;
Second private key generation module, for generating a kth grade random number at random, for each kth grade private key, according to the kth
+ 1 grade of private key of kth of grade private key and the kth grade generating random number preset quantity, wherein k is more than or equal to 1;
5th memory module, the encryption core for the 1st grade of private key and the 1st grade of random number to be stored in the 1st grade of NFC key card
In piece;
6th memory module, for different k+1 grade private keys to be stored in different k+1 grade NFC key cards, and by kth+1
Grade random number is stored in+1 grade of NFC key card of kth.
9. a kind of NFC key cards configure equipment, which is characterized in that including processing unit, machine readable storage medium, the machine
Readable storage medium storing program for executing is stored with the machine-executable instruction that can be executed by the processing unit, described in the processing unit executes
Machine-executable instruction is to realize any methods of claim 1-4.
10. a kind of machine readable storage medium, which is characterized in that the machine readable storage medium is stored with the executable finger of machine
It enables, for the machine-executable instruction when being called and being executed by processor, the machine-executable instruction promotes the processor
Realize any methods of claim 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810339252.5A CN108537548B (en) | 2018-04-16 | 2018-04-16 | NFC key fob configuration method and device and NFC key fob configuration equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810339252.5A CN108537548B (en) | 2018-04-16 | 2018-04-16 | NFC key fob configuration method and device and NFC key fob configuration equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108537548A true CN108537548A (en) | 2018-09-14 |
CN108537548B CN108537548B (en) | 2020-11-27 |
Family
ID=63481200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810339252.5A Active CN108537548B (en) | 2018-04-16 | 2018-04-16 | NFC key fob configuration method and device and NFC key fob configuration equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537548B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000025474A1 (en) * | 1998-10-26 | 2000-05-04 | Bradley Madison Company Doing Business As Evolv Adaptive Technology | Cryptographic protocol for financial transactions |
JP2001134738A (en) * | 1999-11-05 | 2001-05-18 | Ntt Data Corp | Ic card and ic card reader |
US20040064698A1 (en) * | 2002-10-01 | 2004-04-01 | Xiaomang Zhang | Electronic seal, memory medium, advanced authentication system, mobile device, and vehicle start control apparatus |
CN104901948A (en) * | 2015-04-15 | 2015-09-09 | 南方电网科学研究院有限责任公司 | Hierarchic attribute based encryption access control system and method in smart grid |
CN107317789A (en) * | 2016-04-27 | 2017-11-03 | 华为技术有限公司 | Key distribution, authentication method, apparatus and system |
CN107465507A (en) * | 2017-09-24 | 2017-12-12 | 吉林大学 | Based on hierarchical multi-layer one-way key chain time triggered In-vehicle networking message authentication method |
-
2018
- 2018-04-16 CN CN201810339252.5A patent/CN108537548B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000025474A1 (en) * | 1998-10-26 | 2000-05-04 | Bradley Madison Company Doing Business As Evolv Adaptive Technology | Cryptographic protocol for financial transactions |
JP2001134738A (en) * | 1999-11-05 | 2001-05-18 | Ntt Data Corp | Ic card and ic card reader |
US20040064698A1 (en) * | 2002-10-01 | 2004-04-01 | Xiaomang Zhang | Electronic seal, memory medium, advanced authentication system, mobile device, and vehicle start control apparatus |
CN104901948A (en) * | 2015-04-15 | 2015-09-09 | 南方电网科学研究院有限责任公司 | Hierarchic attribute based encryption access control system and method in smart grid |
CN107317789A (en) * | 2016-04-27 | 2017-11-03 | 华为技术有限公司 | Key distribution, authentication method, apparatus and system |
CN107465507A (en) * | 2017-09-24 | 2017-12-12 | 吉林大学 | Based on hierarchical multi-layer one-way key chain time triggered In-vehicle networking message authentication method |
Non-Patent Citations (1)
Title |
---|
王国伟等: "校园一卡通安全方案研究与设计", 《计算机与数字工程》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108537548B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102211374B1 (en) | Method and device for outputting risk information and constructing risk information | |
US11068316B2 (en) | Systems and method for managing memory resources used by smart contracts of a blockchain | |
CN106105146B (en) | Prove that Energy Resources Service's protection client specifies voucher in password | |
CN104205115B (en) | Wipe algorithm using different safety and wipe the chunk from the association of different level of securitys from file | |
CN108305072A (en) | Dispose method, equipment and the computer storage media of block chain network | |
CN107395557A (en) | A kind of processing method and processing device of service request | |
IL266731A (en) | System and method for interaction object reconciliation in a public ledger blockchain environment | |
TWI727281B (en) | Block chain-based data processing method and device, and electronic equipment | |
CN107590738A (en) | Processing method, device and the server of selection common recognition node | |
CN109150607A (en) | Classification management-control method and device for block chain network | |
CN105893853B (en) | The method and delegation system of one of multiple hardware security modules are assigned to guest system | |
CN109409885A (en) | Across chain method of commerce, device and storage medium on block chain | |
CN105337928A (en) | User identity identification method and apparatus, and safety protection problem generation method and apparatus | |
CN110022315A (en) | Weight management method, device and equipment in a kind of piece of chain type account book | |
CN107766738A (en) | A kind of binding method of smart machine, device and system, communication system | |
CN109460643A (en) | A kind of smart machine control method, device and equipment | |
CN108599935A (en) | Key generation method, device and offline key generation device | |
CN107577538A (en) | Container method for managing resource and system | |
CN107480554A (en) | A kind of right management method, rights management device and intelligent terminal | |
CN111461751A (en) | Block chain-based house property information chain organization method, historical state tracing method and device | |
CN110490459A (en) | A kind of protocol managerial approach and device | |
CN105227380B (en) | The method, apparatus and system of user data processing | |
CN109982150A (en) | The trust chain method for building up and Intelligent television terminal of Intelligent television terminal | |
CN103838720B (en) | Page file, which is loaded into, executes method and apparatus | |
CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd. Address before: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |