CN108537548B - NFC key fob configuration method and device and NFC key fob configuration equipment - Google Patents

NFC key fob configuration method and device and NFC key fob configuration equipment Download PDF

Info

Publication number
CN108537548B
CN108537548B CN201810339252.5A CN201810339252A CN108537548B CN 108537548 B CN108537548 B CN 108537548B CN 201810339252 A CN201810339252 A CN 201810339252A CN 108537548 B CN108537548 B CN 108537548B
Authority
CN
China
Prior art keywords
level
key
nfc
private
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810339252.5A
Other languages
Chinese (zh)
Other versions
CN108537548A (en
Inventor
田春燕
付鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201810339252.5A priority Critical patent/CN108537548B/en
Publication of CN108537548A publication Critical patent/CN108537548A/en
Application granted granted Critical
Publication of CN108537548B publication Critical patent/CN108537548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash

Abstract

The application provides an NFC key fob configuration method, an NFC key fob configuration device and NFC key fob configuration equipment, wherein the method comprises the following steps: generating a level 1 private key with a preset length according to the randomly generated seed password and a payment password input by a user; randomly generating a kth-level random number, and generating a preset number of (k + 1) th-level private keys according to the kth-level private key and the kth-level random number for each kth-level private key; storing all generated private keys in an encryption chip of a level 1 NFC key fob; different k + 1-level private keys are stored in different k + 1-level NFC key fobs, and for each k + 1-level private key, other private keys generated according to the k + 1-level private key are stored in the NFC key fob corresponding to the k + 1-level private key. In this way, after the NFC key fobs configured by the above method are distributed, a department owning an upper-level NFC key fob can manage and control keys under corresponding branches, so as to achieve management and control of assets of lower departments.

Description

NFC key fob configuration method and device and NFC key fob configuration equipment
Technical Field
The application relates to the technical field of block chain virtual tokens, in particular to a key configuration method and device and an offline key configuration device.
Background
With the development of decentralized and blockchain technologies, virtual tokens such as bitcoins are increasingly widely used, and the security of virtual token use and asset management are increasingly emphasized. In some asset management scenarios, such as asset management of companies in multiple hierarchical departments, it is desirable to manage assets hierarchically, and an upper level department needs to be able to understand and master asset usage in a lower level department. However, in the block chain virtual token in the prior art, a user generates a corresponding public key through a private key of the user to generate an asset address, and encrypts a transaction process through the private key, so that only the user can manage the user's own assets, and the method is not suitable for a multi-level asset management scenario.
Disclosure of Invention
In order to overcome the above-mentioned deficiencies in the prior art, the present application aims to provide an NFC key fob configuration method, the method comprising:
generating a level 1 private key with a preset length according to the randomly generated seed password and a payment password input by a user;
randomly generating a kth-level random number, and generating a preset number of (k + 1) th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is more than or equal to 1;
storing all generated private keys in an encryption chip of a level 1 NFC key fob so that the level 1 NFC key fob can output any one of the private keys in an NFC communication mode;
different k + 1-level private keys are stored in different k + 1-level NFC key fobs, and for each k + 1-level private key, other private keys generated according to the k + 1-level private key are stored in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-th-level NFC key fob can output any one private key in the k + 1-th-level NFC key fob in an NFC communication mode.
Optionally, in the above method, the method comprises:
generating a level 1 public key according to the level 1 private key;
generating a (k + 1) th level public key according to the (k + 1) th level private key;
storing all generated public keys in an encryption chip of the level 1 NFC key fob;
and storing public keys corresponding to all private keys in the k + 1-level NFC key fob in an encryption chip of the k + 1-level NFC key fob.
Optionally, in the above method, each generated private key corresponds to a private key number generated according to the hierarchical relationship of the private key with respect to other private keys,
the private key number of the private key is stored at the same time as the private key.
Another object of the present application is to provide an NFC key fob configuration method, the method comprising:
generating a level 1 private key with a preset length according to the randomly generated seed password and a payment password input by a user;
randomly generating a kth-level random number, and generating a preset number of (k + 1) th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is more than or equal to 1;
storing the level 1 private key and the level 1 random number in an encryption chip of a level 1 NFC key fob;
different level k +1 private keys are stored in different level k +1 NFC key fobs, and a level k +1 random number is stored in a level k +1 NFC key fob.
Another object of the present application is to provide an NFC key fob configuration device comprising:
the first private key generation module is used for generating a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user;
the second private key generation module is used for randomly generating a kth-level random number, and generating a preset number of (k + 1) -th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is greater than or equal to 1;
the first storage module is used for storing all generated private keys in an encryption chip of a level 1 NFC key fob so that the level 1 NFC key fob can output any one of the private keys in an NFC communication mode;
the second storage module is configured to store different k + 1-level private keys in different k + 1-level NFC key fobs, and for each k + 1-level private key, store other private keys generated according to the k + 1-level private key in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-th-level NFC key fob can output any one private key in the k + 1-th-level NFC key fob in an NFC communication manner.
Optionally, in the above apparatus, the apparatus comprises:
the first public key generating module is used for generating a level 1 public key according to the level 1 private key;
the second public key generating module is used for generating a (k + 1) th level public key according to the (k + 1) th level private key;
a third storage module, configured to store all generated public keys in an encryption chip of the level 1 NFC key fob;
and the fourth storage module is used for storing public keys corresponding to all private keys in the k + 1-level NFC key fob in an encryption chip of the k + 1-level NFC key fob.
Alternatively, in the above apparatus, each generated private key corresponds to a private key number generated according to a hierarchical relationship of the private key with respect to other private keys,
and the first storage module or the second storage module stores the private key number of the private key while storing the private key.
Another object of the present application is to provide an NFC key fob configuration device comprising:
the first private key generation module is used for generating a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user;
the second private key generation module is used for randomly generating a kth-level random number, and generating a preset number of (k + 1) -th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is greater than or equal to 1;
a fifth storage module, configured to store the level 1 private key and the level 1 random number in an encryption chip of a level 1 NFC key fob;
and the sixth storage module is used for storing different k + 1-level private keys in different k + 1-level NFC key fobs and storing the k + 1-level random number in the k + 1-level NFC key fobs.
Another object of the present application is to provide an NFC key fob configuration device, including a processing unit, a machine-readable storage medium storing machine-executable instructions executable by the processing unit, the processing unit executing the machine-executable instructions to implement the NFC key fob configuration methods provided herein.
It is another object of the present application to provide a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the NFC key fob configuration methods provided herein.
Compared with the prior art, the method has the following beneficial effects:
according to the NFC key fob configuration method, the NFC key fob configuration device and the NFC key fob configuration equipment, a plurality of levels of private keys are generated automatically in an iteration mode, and keys of different levels are stored in NFC key fobs of different levels. In this way, after the NFC key fobs configured by the above method are distributed, a department owning an upper-level NFC key fob can manage and control keys under corresponding branches, so as to achieve management and control of assets of lower departments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram of an NFC key fob configuration apparatus according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an NFC key fob configuration method according to an embodiment of the present disclosure;
fig. 3 is a second flowchart illustrating an NFC key fob configuration method according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of an NFC key fob configuration apparatus according to an embodiment of the present disclosure;
fig. 5 is a second schematic diagram of an NFC key fob configuration apparatus according to an embodiment of the present disclosure.
Icon: 100-NFC key fob configuration device; 110(210) -NFC key fob configuration means; 111(211) -a first private key generating module; 112(212) -a second private key generating module; 113-a first storage module; 114-a second storage module; 115-a first public key generating module; 116-a second public key generating module; 117-third storage module; 118-a fourth storage module; 213-a fifth storage module; 214-a sixth storage module; 120-a memory; 130-a processor; 140-NFC communication unit.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is noted that the terms "first", "second", "third", and the like are used merely for distinguishing between descriptions and are not intended to indicate or imply relative importance.
In the description of the present application, it is further noted that, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Referring to fig. 1, fig. 1 is a block diagram illustrating an NFC key fob configuration device 100 according to a preferred embodiment of the present application. The NFC key fob configuration device 100 includes an NFC key fob configuration means 110(210), a memory 120, a processor 130, an NFC communication unit 140.
The memory 120, the processor 130, and the NFC communication unit 140 are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The NFC key fob configuration means 110(210) includes at least one software function module that can be stored in the memory 120 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the NFC key fob configuration device 100. The processor 130 is configured to execute executable modules stored in the memory 120, such as software functional modules and computer programs included in the NFC key fob configuration device 110 (210).
The Memory 120 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 120 is used for storing a program, and the processor 130 executes the program after receiving the execution instruction.
The NFC communication unit 140 is configured to communicate with an NFC key fob.
Referring to fig. 2, fig. 2 is a flowchart illustrating an NFC key fob configuration method applied to the NFC key fob configuration device 100 shown in fig. 1, which includes various steps described in detail below.
And step S110, generating a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user.
In this embodiment, the NFC key fob configuration device 100 may receive a payment password input by a user in an offline state and automatically randomly generate a seed password. The seed password may include any one of english, chinese, or number, or a combination thereof.
In this embodiment, after the seed password and the payment password are generated, the level 1 private key may be generated according to the seed password and the payment password.
Further, in this embodiment, after the level 1 private key is generated according to the seed password and the payment password, the level 1 public key is generated according to the level 1 private key.
Step S120, a kth-level random number is randomly generated, and for each kth-level private key, a preset number of kth + 1-level private keys are generated according to the kth-level private key and the kth-level random number, wherein k is greater than or equal to 1.
For example, 2^32 level 2 private keys can be generated according to the level 1 private key and the level 1 random number, and for each level 2 private key, 2^32 level 3 private keys can be generated according to the level 2 private key and the randomly generated level 2 random number, and so on, so that a plurality of levels of private keys are formed.
Further, in this embodiment, after the preset number of (k + 1) th-level private keys are generated according to the (k + 1) th-level private key and the (k) th-level random number, the (k + 1) th-level public key is generated according to the (k + 1) th-level private key.
Step S130, storing all generated private keys in an encryption chip of the level 1 NFC key fob, so that the level 1 NFC key fob can output any one of the private keys in an NFC communication manner.
Further, in this embodiment, all generated public keys may also be stored in the encryption chip of the level 1 NFC key fob.
Based on the above steps, the level 1 NFC key fob may be held by a user with the highest authority, and the user may manage all private keys through the level 1 NFC key fob, thereby implementing property management on virtual tokens corresponding to all private keys.
Step S140, storing different k + 1-level private keys in different k + 1-level NFC key fobs, and for each k + 1-level private key, storing other private keys generated according to the k + 1-level private key in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-level NFC key fob can output any one private key in the k + 1-level NFC key fobs in an NFC communication manner.
Further, public keys corresponding to all private keys in the k + 1-level NFC key fob are stored in an encryption chip of the k + 1-level NFC key fob.
Based on the above steps, the k +1 th level NFC key fob may be held by a leader user at the level, and the user may manage all private keys under a corresponding branch through the k +1 level NFC key fob, so as to realize property management of virtual tokens corresponding to all private keys under the branch.
Further, in this embodiment, each generated private key corresponds to a private key number generated according to a hierarchical relationship between the private key and other private keys, and the private key number of the private key is stored while the private key is stored. Thus, when a transaction signature needs to be performed by using the private key, the corresponding private key can be searched from the NFC key fob through the private key number. For example, the level 1 private key is denoted m, its derived level 2 private key is denoted m/0 to m/2^32-1, and the m/0 derived private key is denoted m/0/0 to m/0/2^ 32-1.
Referring to fig. 3, the present embodiment further provides another NFC key configuration method, and the following describes steps of the method.
Step S210, a level 1 private key with a preset length is generated according to the randomly generated seed password and the payment password input by the user.
The step S110 is synchronized, and will not be described herein again.
Step S220, a kth-level random number is randomly generated, and for each kth-level private key, a preset number of kth + 1-level private keys are generated according to the kth-level private key and the kth-level random number, wherein k is greater than or equal to 1.
The step S120 is synchronized, and will not be described herein.
Step S230, storing the level 1 private key and the level 1 random number in an encryption chip of the level 1 NFC key fob.
In this step, the level 1 private key and the level 1 random number are stored in the level 1 NFC key fob, so that the holder of the level 1 and NFC key fob can manage the level 1 private key and can relatively independently generate the level 2 private key, thereby implementing management and control of the virtual token asset corresponding to the next level private key.
Step S240, storing different k + 1-level private keys in different k + 1-level NFC key fobs, and storing a k + 1-level random number in a k + 1-level NFC key fob.
In this step, the (k + 1) th-level private key and the (k + 1) th-level random number are stored in the (k + 1) th-level NFC key fob, so that the (k + 1) th-level private key and the NFC key fob holder can manage the (k + 1) th-level private key and can relatively independently generate the (k + 2) th-level private key, thereby realizing control over the virtual token asset corresponding to the next-level private key.
Based on the design, each stage of NFC key fob can manage the private key of the NFC key fob and the private key of the next stage of the corresponding branch. Each NFC key fob stores only 1 private key and 1 random number, reducing the data storage capacity of the NFC key fob.
Referring to fig. 4, the present embodiment further provides an NFC key fob configuration apparatus 110, which includes a first private key generation module 111, a second private key generation module 112, a first storage module 113, and a second storage module 114.
The first private key generating module 111 is configured to generate a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user.
In this embodiment, the first private key generating module 111 may be configured to execute step S110 shown in fig. 2, and the detailed description about the first private key generating module 111 may refer to the description about step S110.
The second private key generating module 112 is configured to randomly generate a kth-level random number, and generate, for each kth-level private key, a preset number of kth + 1-level private keys according to the kth-level private key and the kth-level random number, where k is greater than or equal to 1.
In this embodiment, the second private key generating module 112 may be configured to execute step S120 shown in fig. 2, and the detailed description about the second private key generating module 112 may refer to the description about step S120.
The first storage module 113 is configured to store all generated private keys in an encryption chip of the level 1 NFC key fob, so that the level 1 NFC key fob can output any one of the private keys through an NFC communication method.
In this embodiment, the first storage module 113 may be configured to execute step S130 shown in fig. 2, and reference may be made to the description of step S130 for a detailed description of the first storage module 113.
The second storage module 114 is configured to store different k + 1-level private keys in different k + 1-level NFC key fobs, and for each k + 1-level private key, store other private keys generated according to the k + 1-level private key in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-th level NFC key fob may output any one private key in the k + 1-th level NFC key fob in an NFC communication manner.
In this embodiment, the second storage module 114 may be configured to execute step S140 shown in fig. 2, and reference may be made to the description of step S140 for a detailed description of the second storage module 114.
Optionally, referring to fig. 4 again, in the present embodiment, the apparatus includes a first public key generating module 115, a second public key generating module 116, a third storage module 117, and a fourth storage module 118.
The first public key generating module 115 is configured to generate a level 1 public key according to the level 1 private key.
The second public key generating module 116 is configured to generate a (k + 1) th level public key according to the (k + 1) th level private key.
The third storage module 117 is configured to store all generated public keys in an encryption chip of the level 1 NFC key fob.
The fourth storage module 118 is configured to store public keys corresponding to all private keys in the k + 1-th-level NFC key fob in an encryption chip of the k + 1-th-level NFC key fob.
Optionally, in this embodiment, each generated private key corresponds to a private key number generated according to the hierarchical relationship of the private key with respect to other private keys,
the first storage module 113 or the second storage module 114 stores a private key number of a private key at the same time as storing the private key.
Referring to fig. 5, the present embodiment further provides another NFC key fob configuration apparatus 210, which includes a first private key generation module 211, a second private key generation module 212, a fifth storage module 213, and a sixth storage module 214.
The first private key generating module 211 is configured to generate a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user.
In this embodiment, the first private key generating module 211 may be configured to execute step S210 shown in fig. 3, and the detailed description about the first private key generating module 211 may refer to the description about step S210.
The second private key generating module 212 is configured to randomly generate a kth-level random number, and generate, for each kth-level private key, a preset number of kth + 1-level private keys according to the kth-level private key and the kth-level random number, where k is greater than or equal to 1.
In this embodiment, the second private key generation module 212 may be configured to execute step S220 shown in fig. 3, and the detailed description about the second private key generation module 212 may refer to the description about step S220.
The fifth storage module 213 is configured to store the level 1 private key and the level 1 random number in an encryption chip of the level 1 NFC key fob.
In this embodiment, the fifth storage module 213 may be configured to execute step S230 shown in fig. 3, and for a detailed description of the fifth storage module 213, refer to the description of step S230.
The sixth storage module 214 is configured to store different k + 1-level private keys in different k + 1-level NFC key fobs, and store a k + 1-level random number in a k + 1-level NFC key fob.
In this embodiment, the sixth storage module 214 may be configured to execute step S240 shown in fig. 3, and reference may be made to the description of step S240 for a detailed description of the sixth storage module 214.
In summary, according to the NFC key fob configuration method and apparatus and the NFC key fob configuration device provided by the present application, multiple levels of private keys are generated by automatically iterating, and different levels of keys are stored in different levels of NFC key fobs. In this way, after the NFC key fobs configured by the above method are distributed, a department owning an upper-level NFC key fob can manage and control keys under corresponding branches, so as to achieve management and control of assets of lower departments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. An NFC key fob configuration method, the method comprising:
generating a level 1 private key with a preset length according to the randomly generated seed password and a payment password input by a user;
randomly generating a kth-level random number, and generating a preset number of (k + 1) th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is more than or equal to 1;
storing all generated private keys in an encryption chip of a level 1 NFC key fob so that the level 1 NFC key fob can output any one of the private keys in an NFC communication mode;
different k + 1-level private keys are stored in different k + 1-level NFC key fobs, and for each k + 1-level private key, other private keys generated according to the k + 1-level private key are stored in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-th-level NFC key fob can output any one private key in the k + 1-th-level NFC key fob in an NFC communication mode.
2. The method according to claim 1, characterized in that it comprises:
generating a level 1 public key according to the level 1 private key;
generating a (k + 1) th level public key according to the (k + 1) th level private key;
storing all generated public keys in an encryption chip of the level 1 NFC key fob;
and storing public keys corresponding to all private keys in the k + 1-level NFC key fob in an encryption chip of the k + 1-level NFC key fob.
3. The method of claim 1,
each generated private key corresponds to a private key number generated according to the hierarchical relationship of the private key to other private keys,
the private key number of the private key is stored at the same time as the private key.
4. An NFC key fob configuration apparatus, the apparatus comprising:
the first private key generation module is used for generating a level 1 private key with a preset length according to the randomly generated seed password and the payment password input by the user;
the second private key generation module is used for randomly generating a kth-level random number, and generating a preset number of (k + 1) -th-level private keys according to the kth-level private key and the kth-level random number aiming at each kth-level private key, wherein k is greater than or equal to 1;
the first storage module is used for storing all generated private keys in an encryption chip of a level 1 NFC key fob so that the level 1 NFC key fob can output any one of the private keys in an NFC communication mode;
the second storage module is configured to store different k + 1-level private keys in different k + 1-level NFC key fobs, and for each k + 1-level private key, store other private keys generated according to the k + 1-level private key in the k + 1-level NFC key fob corresponding to the k + 1-level private key, so that the k + 1-th-level NFC key fob can output any one private key in the k + 1-th-level NFC key fob in an NFC communication manner.
5. The apparatus of claim 4, wherein the apparatus comprises:
the first public key generating module is used for generating a level 1 public key according to the level 1 private key;
the second public key generating module is used for generating a (k + 1) th level public key according to the (k + 1) th level private key;
a third storage module, configured to store all generated public keys in an encryption chip of the level 1 NFC key fob;
and the fourth storage module is used for storing public keys corresponding to all private keys in the k + 1-level NFC key fob in an encryption chip of the k + 1-level NFC key fob.
6. The apparatus of claim 4, wherein each generated private key corresponds to a private key number generated based on a hierarchical relationship of the private key to other private keys,
and the first storage module or the second storage module stores the private key number of the private key while storing the private key.
7. An NFC key fob configuration device comprising a processing unit, a machine-readable storage medium storing machine-executable instructions executable by the processing unit, the processing unit executing the machine-executable instructions to implement the method of any of claims 1-3.
8. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1-3.
CN201810339252.5A 2018-04-16 2018-04-16 NFC key fob configuration method and device and NFC key fob configuration equipment Active CN108537548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810339252.5A CN108537548B (en) 2018-04-16 2018-04-16 NFC key fob configuration method and device and NFC key fob configuration equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810339252.5A CN108537548B (en) 2018-04-16 2018-04-16 NFC key fob configuration method and device and NFC key fob configuration equipment

Publications (2)

Publication Number Publication Date
CN108537548A CN108537548A (en) 2018-09-14
CN108537548B true CN108537548B (en) 2020-11-27

Family

ID=63481200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810339252.5A Active CN108537548B (en) 2018-04-16 2018-04-16 NFC key fob configuration method and device and NFC key fob configuration equipment

Country Status (1)

Country Link
CN (1) CN108537548B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000025474A1 (en) * 1998-10-26 2000-05-04 Bradley Madison Company Doing Business As Evolv Adaptive Technology Cryptographic protocol for financial transactions
JP3588021B2 (en) * 1999-11-05 2004-11-10 株式会社エヌ・ティ・ティ・データ IC card and IC card reader
JP2004126889A (en) * 2002-10-01 2004-04-22 Sharp Corp Electronic seal, removable memory medium, advance authentication system, portable device, cellular telephone system, and vihicular starting controller
CN104901948B (en) * 2015-04-15 2017-11-10 南方电网科学研究院有限责任公司 Hierarchy attributes encrypted access control system and method are based in intelligent grid
CN107317789B (en) * 2016-04-27 2020-07-21 华为技术有限公司 Key distribution and authentication method, device and system
CN107465507A (en) * 2017-09-24 2017-12-12 吉林大学 Based on hierarchical multi-layer one-way key chain time triggered In-vehicle networking message authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Key/Card Access Control Policy for Faculty,Staff and Students;Creighton University;《Facilities Management》;20100412;第811-841页 *

Also Published As

Publication number Publication date
CN108537548A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
EP3044901B1 (en) Keying infrastructure
US20160260091A1 (en) Universal wallet for digital currency
US10635835B2 (en) Decentralized token table generation
CN105453102B (en) The system and method for the private cipher key leaked for identification
US10990687B2 (en) System and method for user managed encryption recovery using blockchain for data at rest
CN113283905A (en) Data storage and acquisition method and device based on block chain
CN110245506B (en) Intelligent contract management method and device based on block chain and electronic equipment
CN109067791B (en) User identity authentication method and device in network
US20180069697A1 (en) Method and Apparatus for Restoring Access to Digital Assets
US20210203481A1 (en) Systems and methods for storage, generation and verification of tokens used to control access to a resource
CN110046996B (en) Data processing method and device
CN110580413A (en) Private data query method and device based on down-link authorization
US20190138326A1 (en) Computer-implemented method for replacing a data string by a placeholder
CN108599935B (en) Key generation method and device and offline key generation equipment
CN111737654B (en) Infringement detection method and device based on block chain and electronic equipment
US20160092698A1 (en) Tokenization Column Replacement
CN108537548B (en) NFC key fob configuration method and device and NFC key fob configuration equipment
CN111753335A (en) Editing method and device for block content
US20160078218A1 (en) Login methodology
US9563773B2 (en) Systems and methods for securing BIOS variables
CN111383008B (en) Block chain transfer method and device based on account model
CN110175036B (en) Upgrading method and device for soft lock permission
CN103716791A (en) Mobile terminal theft prevention method and client
CN111460465A (en) Identity authentication method, equipment and medium based on block chain
CN113254731A (en) Block link point connection method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant