TW465213B - Method for performing encryption and decryption via computer and IC card - Google Patents
Method for performing encryption and decryption via computer and IC card Download PDFInfo
- Publication number
- TW465213B TW465213B TW88122156A TW88122156A TW465213B TW 465213 B TW465213 B TW 465213B TW 88122156 A TW88122156 A TW 88122156A TW 88122156 A TW88122156 A TW 88122156A TW 465213 B TW465213 B TW 465213B
- Authority
- TW
- Taiwan
- Prior art keywords
- card
- server
- client
- computer
- password
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
465213 五、發明說明⑴ , 【發明領域】 ' 本發明為一種加密與解密的方法,特別是一種透過電 腦與IC卡進行加密與解密的方法。 【發明背景】 k著網絡技術的不斷發展’伺服器端(s e r v e r)和客戶 端(Cl ient)的訊息傳送日益頻繁,但是並不是所有伺服器 端的訊息都是無償提供的(例如由廠商自行開發,放在網 站上的一些教學軟體),伺服器端只有識別有=效客戶端硬 體’才能提供某些服務’因此迫切需要成本較低,加密程 度較高’方便操作的方法。 傳統純,體力σ密方法為交互式用戶識別(Interactive Identification)法,其目的是遠程(或近程)對使用者身 分鑑別的一種方法’此法可以用來解決一些重要的問題, 例如用來管理員工出入建築物的控制、使用者用以對遠距 離的電腦做訪問控制、電腦可以用其對網路上的伺服器做 ,問控制、軍事上可以用以做為"敵我識別M及傳統使用者 鐵別方法,即通行碼(P a s s w 〇 r d )等。 由.於人類不擅 3C* 短,易記的“當做通行碼,%:;因—此!常都是選用 登錄輸入通行碼時,因通行碼⑧使用者遠程(或近系 容易被人解密,進而給攻擊 數有限,而且上傳過程 此外,、若將通行碼直可乘之機。 性亦將造成威脅,S為使用者:驗證者’對通行碼的機 同秘密,且驗證者必♦ 驗證者必需事前分享一 者义而對共享的秘密加以保護,所以在465213 V. Description of the invention , [Field of the invention] The present invention is a method of encryption and decryption, especially a method of encryption and decryption through a computer and an IC card. [Background of the Invention] With the continuous development of network technology, server and client (Client) messages are increasingly transmitted, but not all server messages are provided free of charge (for example, developed by manufacturers themselves) , Some teaching software on the website), the server side only needs to identify effective client hardware 'can provide certain services', so it is urgently needed to have a lower cost and a higher degree of encryption' a convenient operation method. The traditional pure, physical σ-dense method is the Interactive Identification method, whose purpose is to identify the user's identity remotely (or at short range). 'This method can be used to solve some important problems, such as Management of employees 'access to buildings, users' access control to remote computers, computers can use it to server on the network, control, and military use can be used as " identity of friends and foes " Traditional user iron identification methods, that is, pass codes (Pssw 〇rd). Because humans are not good at 3C * short, easy to remember "as pass code,% :; therefore-this! Often when you choose to enter the pass code to log in, because the pass code is too remote for the user (or close to it, it is easy to be decrypted) In addition, the number of attacks is limited, and in addition to the upload process, if the passcode is directly used, it will also pose a threat. S is the user: the verifier's secret to the passcode machine, and the verifier must The verifier must share the righteousness in advance and protect the shared secret, so in
__
4652 7 34652 7 3
行上有其技術與保密上的困難。 於疋1知技術中,經,使用一種不需要雙方事患分享 f密$父互式用戶气別—方法’不過必莩存在一所謂的秘錄 簽署中。(Xs^Xu Xh i_CLQ^ C e n t e r ;MC)負責管理一 切使用者。因此每位使用者都^須到秘鑰簽署中心註冊, 惟有註冊完成的合法一使!者1能^兔^些^進識別 ,且在識別過程ί,秘鑰簽署中心是不需介入的。 而當今藉由秘鑰簽署申心的加密方法中,知用丨c卡是 個理想的選擇,由於成本低廉、加密度高、技術難讀度 也車又易莩握。且一般使用的1C電話卡,1C電費卡,1C銀行 卡等均沒有聽說過被仿冒的情況,由此可見其加密度之高 【發明之概述及目的】 鐾於上述發明背景,本發明是利用 合’亦即將使用者電腦加上密碼,達到 時也給網站上軟體加密。 電腦與IC卡相互結 硬體辨識目的,同 本發明所提出之方法,是當客戶端透過網路訪問網站 請求服務時,在飼服 碼"的内容是否正確,如果不對的# ~ 、下一比敉山一 嘖求。 - — —的為去j吏用者j絕 另外’如果真的有非法使用 在網站上發現有兩個(或以上)相 則亦不能允fi請求。 者做出相同的密碼,只要 一同的密後時上網時,There are technical and confidential difficulties in the industry. In the first known technique, a method is used that does not require both parties to share the f secret $ parent interactive user identification—the method ', but it must exist in a so-called secret signing. (Xs ^ Xu Xh i_CLQ ^ Ce n t e r; MC) is responsible for managing all users. Therefore, every user must register at the key signing center, but only if the registration is legal! Person 1 can ^ rabbit ^ some ^ into the recognition, and in the recognition process, the key signing center does not need to be involved. However, in today's encryption method that uses a secret key to sign Shenxin, it is known that using a C card is an ideal choice. Due to its low cost, high encryption, and technical difficulty to read, it is also easy to handle. And the commonly used 1C phone card, 1C electricity bill card, 1C bank card, etc. have never heard of being counterfeited. It can be seen that the degree of encryption is high. [Summary and purpose of the invention] In the context of the above invention, the present invention uses It will also add a password to the user's computer and encrypt the software on the website when it is reached. The purpose of hardware identification between the computer and the IC card is the same as the method proposed by the present invention. When the client accesses the website to request service through the Internet, is the content of the feed code "quote correct? Ask for one more than Laoshan. ---It is necessary to go to the public and use it. In addition, if there are two (or more) phases found on the website, it is not allowed to request fi. The same password, as long as the same password is used when surfing the Internet,
__
有關本發明乏詳細内容及技術 茲就配合圖式說明如The details and technology related to the present invention are described below with reference to the drawings.
465213 五、發明說明(3) 下: 【圖式簡單說明】 第1圖為本發明之硬體連線圖; 第2圖為本發明之第一實施例之流程圖;及 第3圖為本發明之第二實施例之流程圖。 【符號說明】 101 1C卡 102 i C卡讀寫裝置 103 RS232介面 104 電腦 - 201 客戶端(Client) 202 伺服器端(Server) 步驟2 0 3 產生私有密鑰並傳送公開密鑰 步驟2 0 4 收到公開密鑰 205 1C卡 步驟2 0 6 讀IC卡密碼 步驟2 0 7 加密形成密文塊 步驟2 0 8 利用私有密鑰將密文塊解密得到 密碼1 步驟2 0 9 讀出伺服器資料庫中的密碼2 步驟2 1 0 比較密碼1和密碼2是否相同 步驟2 11 非法使用者,拒絕請求 春 步驟212 合法使用者,允許請求 步驟21 3 產生DES密碼 步驟2 1 4 利用公開密鑰加密DES密碼並傳送給伺服器端465213 V. Description of the invention (3) Below: [Simplified description of the drawing] Fig. 1 is a hardware connection diagram of the present invention; Fig. 2 is a flowchart of the first embodiment of the present invention; and Fig. 3 is a flowchart of the first embodiment of the present invention; A flowchart of a second embodiment of the invention. [Symbol description] 101 1C card 102 i C card reading and writing device 103 RS232 interface 104 Computer-201 Client (Client) 202 Server (Server) Step 2 0 3 Generate private key and send public key Step 2 0 4 Receive the public key 205 1C card Step 2 0 6 Read the IC card password Step 2 0 7 Encrypt to form a ciphertext block Step 2 0 8 Use the private key to decrypt the ciphertext block to obtain the password 1 Step 2 0 9 Read the server information Password 2 in the library Step 2 1 0 Compare whether password 1 and password 2 are the same Step 2 11 Illegal user, refuse to request spring Step 212 Legal user, allow request to step 21 3 Generate DES password Step 2 1 4 Use public key encryption DES password and send it to the server
4 652 1 34 652 1 3
五、發明說明¢4) 步驟215 利用私有密鑰解出DES密碼 步棘21 6 兩DES密碼將應用下載軟體加密後傳办客戶端 步驟217 利用DES密碼將軟體解密’得到應用^載軟體 301 客戶端(Client) 302 -f司服器端(Server) 步驟3 0 3 產生隨機亂數 步驟3 0 4 收到並傳送隨機亂數 305 1C卡 , 步驟3 0 6 邏輯運算 步驟3 0 7 得到結果3 步驟3 0 8 讀取並傳送結果3 步驟3 0 9 邏輯運算 步驟3 1 0 得到結果4 步驟3 1 1 比較結果3和結果4是否相同 步驟3 12 非法使用者,拒絕請求 步驟3 1 3 合法使用者,允許請求 【發明之詳細說明】V. Description of the invention ¢ 4) Step 215 Use the private key to solve the DES password Step 21 6 Encrypt the application download software with two DES passwords and pass on the client Step 217 Use the DES password to decrypt the software to get the application ^ Load the software 301 Client Client 302 -f Server Step 3 0 3 Generate random random number Step 3 0 4 Receive and transmit random random number 305 1C card, Step 3 0 6 Logical operation step 3 0 7 Get result 3 Step 3 0 8 Read and transmit the result 3 Step 3 0 9 Logical operation step 3 1 0 Get the result 4 Step 3 1 1 Compare whether the result 3 and the result 4 are the same Step 3 12 Illegal user, refuse the request Step 3 1 3 Legal use Or permission to request [detailed description of invention]
—把電私應用與I C卡技術結合,吧矹定將便 上後、碼’已達到遠裎(或近程)使用者身份識別的目的。其 中在IC卡中儲存了特定内容,當進行遠程(或近_#) g -時 π 2,益通過权'密地解讀出1 c卡ΐ拉,尤與伺服 :用m定内容進行比較」即可以驗證考程'或 身刀’以達到硬體辨識的目的,同時也可以^ 上的軟體加密後-再下載,一防止非法使用者截取。%網枯—Combining the application of electric private with IC card technology, it will be determined that the code will be used for the long-distance (or short-range) user identification purpose. Among them, specific content is stored in the IC card. When remote (or near_ #) g-time π 2 is used, it is possible to closely interpret the 1 c card pull through the right, especially compared with the servo: use m to determine the content. " That is, you can verify the test schedule or body knife to achieve the purpose of hardware identification. At the same time, the software on ^ can be encrypted and downloaded again to prevent interception by illegal users. % Net dry
第7頁 465213 五、發明說明(5) — — "一— 丨· 、依據本發明所提透過電腦與1C卡進行加密與解密的方 法,其硬體連線如第i圖所示,將1(:卡101插入一 ic卡讀寫 裝置102中’藉由RS232介面103與電腦104做連接,使Ic卡 1 0 1與電腦1 0 4之間能有效地進行資料的辨認與傳送^Page 7 465213 V. Description of the invention (5) — " 一 — 丨 · According to the method for encrypting and decrypting through a computer and a 1C card according to the present invention, the hardware connection is as shown in Fig. I. 1 (: Card 101 is inserted into an IC card reading and writing device 102. 'The RS232 interface 103 is connected to the computer 104, so that the Ic card 1 0 1 and the computer 1 0 4 can effectively identify and transmit data.
第2圖為本發明之第一實施例之流程圖,首先客戶端 (Client)201向伺服器端(server)2〇2發出服務請求,在伺 服器端(Server) 20 2產生一私有密鑰,並傳送公開密鑰(步 驟2 0 3 );此時在客戶端(c 1 i e n t) 2 0 1收到該公開舂鑰(步驟 204)後’從1C卡20 5中讀1C卡密碼(步驟20 6 ),並加密形成 密文塊(步驟207 );並利用私有密鑰將該密文塊解密得到 密碼1 (步驟2 0 8 )’接著將讀出伺服器資料庫中的密碼2 (步驟20 9 )後’比較密碼1和密碼2是否相同(步驟21〇),如 果不相同,則為非法使用者’拒絕請求(步驟2 1 1若比 較結果相同’則為合法使用者,允許請求(步驟2 1 2 )。 在步驟2 0 7中’加密形成密文塊後,產生DES(DataFIG. 2 is a flowchart of a first embodiment of the present invention. First, a client 201 sends a service request to a server 202, and a private key is generated on the server 202. And transmit the public key (step 203); at this time, after the client (c 1 ient) 2 0 1 receives the public key (step 204), 'read the 1C card password from the 1C card 20 5 (step 20 6), and encrypt to form a ciphertext block (step 207); and use the private key to decrypt the ciphertext block to obtain a password 1 (step 2 0 8) ', and then read out the password 2 in the server database (step 20 9) after 'Compare whether password 1 and password 2 are the same (step 21〇), if they are not the same, it is an illegal user' to reject the request (if the comparison result in step 2 1 1 is a legitimate user, allow the request ( Step 2 1 2). After 'encrypting to form a ciphertext block in step 2 07, DES (Data
Encryption Standard)密碼(步驟213),該DES 密碼係為一 區塊加密法’亦即對一定大小的明文塊或密文塊做加密或 解密的工作。並利用公開密餘加密D E S密碼並傳送給飼服 器端(步驟2 1 4 );此時在祠服器端(S e r v e r ) 2 0 2,利用私有 密鑰解出DES密碼(步驟215),再用DES密碼將應用下載軟 體加密後傳給客戶端(步驟2 1 6 ),此時使用者即可利用d e s 密碼將軟體解密,得到應用下載軟體(步驟2 1 7 )。 本發明之第二實施例之流程圖如第3圖所示,同樣地 客戶端(Client)301向伺服器端(Server)3〇2發出服務請求Encryption Standard) cipher (step 213). The DES cipher is a block encryption method, that is, a certain size plaintext block or ciphertext block is encrypted or decrypted. And use the public secret to encrypt the DES cipher and send it to the feeder (step 214); at this time on the ceremonial server (Server) 2 02, use the private key to extract the DES cipher (step 215), Then use the DES password to encrypt the application download software and send it to the client (step 2 16). At this time, the user can use the des password to decrypt the software to obtain the application download software (step 2 1 7). The flowchart of the second embodiment of the present invention is shown in FIG. 3. Similarly, the client 301 sends a service request to the server 30
第8頁 465213 五、發明說明(6) 在伺服器^(Server)202產生隨機乱數〔+碑qfjq),捲签 在客戶端(⑴㈣301收到並傳送隨機/數=〇)4)接: 由1C卡305執行邏輯運舁(步驟306),並得到結果3 (步驟 307) ’客戶端(ciient)301再將結果3讀取並傳送至伺服器 端(Se]:ver)202(步驟308 );在伺服器端(Server)2〇2產生 一隨機亂數(步驟303)時,進行邏輯運算(步驟3〇9),並得 到結果4 (步驟3 1 0 );接著比較結果3和結果4是否相同(步 驟3 11 ),如果不相同,則為非法使用者,拒絕請求(步驟 3 1 2 );如果相同’則為合法使用者,允許請求(步驟3 1 3 ) 。此外,若發現有兩個(或以上)相同的密碼3或密碼4在同 時上網時,則亦不能允許請求。 雖然本發明以如述之較佳實施例揭露如上,然其並非 用以限定本發明,任何熟習此技藝者,在不脫離本^明之 精神和範圍内,當可作些許之更動與潤飾,因此本^明 保護範圍當視後附之申請專利範圍所界定者為準。"之·Page 8 465213 V. Description of the invention (6) Random random numbers (+ tablet qfjq) are generated on the server ^ (Server) 202, and the volume label is received on the client (⑴㈣301 receives and transmits random / number = 0) 4) then: The 1C card 305 executes the logical operation (step 306) and obtains the result 3 (step 307). The client (ciient) 301 reads the result 3 and sends it to the server (Se): ver) 202 (step 308) ); When a random random number is generated on the server (Server) 202 (step 303), a logical operation (step 3009) is performed, and a result 4 is obtained (step 3 1 0); then the result 3 is compared with the result 4 is the same (step 3 11), if not, it is an illegal user and the request is rejected (step 3 1 2); if it is the same, then it is a legal user and the request is allowed (step 3 1 3). In addition, if two (or more) same passwords 3 or 4 are found online at the same time, the request cannot be allowed. Although the present invention is disclosed in the above-mentioned preferred embodiments, it is not intended to limit the present invention. Any person skilled in the art can make some changes and decorations without departing from the spirit and scope of the present invention. The scope of protection of this patent shall be determined by the scope of the attached patent application. " of
第9頁Page 9
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW88122156A TW465213B (en) | 1999-12-16 | 1999-12-16 | Method for performing encryption and decryption via computer and IC card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW88122156A TW465213B (en) | 1999-12-16 | 1999-12-16 | Method for performing encryption and decryption via computer and IC card |
Publications (1)
Publication Number | Publication Date |
---|---|
TW465213B true TW465213B (en) | 2001-11-21 |
Family
ID=21643416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW88122156A TW465213B (en) | 1999-12-16 | 1999-12-16 | Method for performing encryption and decryption via computer and IC card |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW465213B (en) |
-
1999
- 1999-12-16 TW TW88122156A patent/TW465213B/en active
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1689297B (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
US11233653B2 (en) | Dongle for ciphering data | |
EP2548331B1 (en) | System and method for communicating between different entities using different data portions for different channels | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
EP1734686A2 (en) | Cipher communication system using device authentication keys | |
CA2374655A1 (en) | System and methods for maintaining and distributing personal security devices | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
TW200818838A (en) | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords | |
JP2011513839A (en) | System and method for conducting wireless money transactions | |
JP2009526321A (en) | System for executing a transaction in a point-of-sale information management terminal using a changing identifier | |
US20220360986A1 (en) | Multi-factor authentication providing a credential via a contactless card for secure messaging | |
CN101770619A (en) | Multiple-factor authentication method for online payment and authentication system | |
CN108323230B (en) | Method for transmitting key, receiving terminal and distributing terminal | |
JP2022542095A (en) | Hardened secure encryption and decryption system | |
CN108401494B (en) | Method and system for transmitting data | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
CN103916834A (en) | Short message encryption method and system allowing user to have exclusive secret key | |
CN108881300A (en) | A kind of file encryption that supporting mobile phone terminal security cooperation and sharing method and system | |
CN103929722A (en) | Short message encryption method and system | |
JP4140617B2 (en) | Authentication system using authentication recording medium and method of creating authentication recording medium | |
TW465213B (en) | Method for performing encryption and decryption via computer and IC card | |
TW202101267A (en) | Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer | |
CN110113152A (en) | Based on unsymmetrical key pond to and digital signature quantum communications service station cryptographic key negotiation method and system | |
JP3923229B2 (en) | Authentication processing method and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent |