WO2015186072A1 - Chiffrement et déchiffrement de données entre un dispositif de communication et une carte intelligente ayant une fonction de communication en champ proche - Google Patents

Chiffrement et déchiffrement de données entre un dispositif de communication et une carte intelligente ayant une fonction de communication en champ proche Download PDF

Info

Publication number
WO2015186072A1
WO2015186072A1 PCT/IB2015/054191 IB2015054191W WO2015186072A1 WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1 IB 2015054191 W IB2015054191 W IB 2015054191W WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1
Authority
WO
WIPO (PCT)
Prior art keywords
communications device
smart card
data
encrypted
decrypted
Prior art date
Application number
PCT/IB2015/054191
Other languages
English (en)
Other versions
WO2015186072A9 (fr
Inventor
Sun GUOHUA
Original Assignee
Jing King Tech Holdings Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jing King Tech Holdings Pte. Ltd. filed Critical Jing King Tech Holdings Pte. Ltd.
Priority to SG11201610205SA priority Critical patent/SG11201610205SA/en
Publication of WO2015186072A1 publication Critical patent/WO2015186072A1/fr
Publication of WO2015186072A9 publication Critical patent/WO2015186072A9/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • This invention relates to encryption and decryption of digital information based on Near Field Communication (NFC) technology, such as but is not limited to the encryption and decryption of mobile messages such as SMS and MMS, encryption and decryption of digital information in various internet environments for mobile devices such as mobile phones, encryption and decryption of computer data in various internet environments as well as the encryption and decryption technology of digital information for various digital devices with telecommunication functions (such as WIFI, Bluetooth, infrared sensor etc.) in various internet environments.
  • NFC Near Field Communication
  • the encryption and decryption of digital information in an internet environment is extremely important - any device connected to the internet carrying out information transmission faces such issues.
  • the SSL transmission is commonly adopted for information encryption and decryption where the security requirement is not high.
  • the secret key of this encryption and decryption is stored locally on the communication or computing device and is prone to attack and security compromise. Where the security requirement is high or more customized, additional hardware encryption and decryption methods are often adopted.
  • the present invention attempts to overcome at least in part some of the aforementioned disadvantages.
  • a method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising:- reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to achieve NFC communication; verifying legitimacy of the communications device and /or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting it to a specified algorithm together with a specified secret key to conduct the encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
  • NFC Near Field Communication
  • the data may take the form of digital information.
  • the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
  • the binding relation is verified via a unique identifier preset in the communications device and the smart card.
  • the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
  • PIN personal identification
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • MAC Media Access Control
  • markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
  • the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
  • a communications device installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
  • a smart card installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
  • NFC Near Field Communication
  • the data may take the form of digital information.
  • the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
  • the binding relation is verified via a unique identifier preset in the communications device and the smart card.
  • the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
  • PIN personal identification
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • MAC Media Access Control
  • markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
  • the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
  • FIG. 1 is a flow diagram of an embodiment of the invention. PREFERRED EMBODIMENT OF THE INVENTION
  • a method for encrypting and decrypting data between a communications device which has NFC capabilities and a smart card The communications device may be a mobile computing device such as a mobile phone, tablet, laptop, personal digital assistant etc..
  • the smart card may be an IC card which has NFC capabilities and computing capability (CPU).
  • the IC card chip provides symmetric or asymmetric algorithm; this algorithm can also be achieved by software in the chip storage space.
  • the data to be encrypted or decrypted may be digital information such as short messaging system (SMS) messages, multi-media messages (MMS) or any digital information received or stored in the phone, including audio, video and images, text, drawings, graphs, photographs or combinations of one or more of the above.
  • SMS short messaging system
  • MMS multi-media messages
  • the legitimacy verification can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
  • the verification of IC card PIN means that a user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone and communication between the phone and IC card is initiated (by the communication method between the NFC mobile phone and IC card), the PIN code of the phone is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
  • PIN code personal identification code
  • the verification of the binding relation between the phone and the IC card can further involve the user presetting a unique identifier such as an International Mobile Equipment Identity (IMEI) of phone and/or an International Mobile Subscriber Identity (IMSI) of a phone card in the IC card and before commencing the encryption and decryption of the digital information); an application on the phone such as a mobile app then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two sets of IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • the legitimacy verification 130 can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
  • the verification of IC card PIN means that the user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing the encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone (by the communication method between the NFC mobile phone and IC card), the PIN code is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
  • PIN code personal identification code
  • the verification of the binding relation between the phone and the IC card means that the user presets an IMEI of the phone and/or an IMSI of the phone card in the IC card before commencing the encryption and decryption of the digital information; the mobile App then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
  • the aforementioned "prescribed format" refers to the digital information encrypted and decrypted, which, depending on the various requirements of individual encryption and decryption content, can be the entire information of a complete document manifested as several character fields of equal length; the partial abstract of a complete document, such as: the beginning and/or the conclusion of the text, some numbers or diagrams in the document, and some image information of a video document, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the secret key and algorithm of encryption and decryption is stored in the IC card, which both ensures the security of the secret key storage and achieves the portability of information encryption and decryption.
  • the mobile phone is now one of the primary device for data interchange due to its versatility; as such, the encryption and decryption of digital information based on mobile phone and smart card would be the most convenient method in solving the problem of hardware encryption and decryption of mobile data such as SMS and MMS employing the most prevalent digital encryption and decryption device.
  • the communications device may take the form of a desktop or laptop computer and the unique identifier is a Media Access Control (MAC) address of the said device.
  • MAC Media Access Control
  • the digital information may take the form of may take the form of Short Messaging System (SMS) messages, Multimedia Messaging System (MMS) messages or other like messaging protocol.
  • SMS Short Messaging System
  • MMS Multimedia Messaging System

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système et un procédé pour chiffrer et déchiffrer des données entre un dispositif de communication et une carte intelligente ayant chacun une fonction de communication en champ proche (NFC), consistant à réserver un espace de stockage sur le dispositif de communication ; à placer la carte intelligente près ou en contact avec le dispositif de communication pour permettre une communication NFC ; à vérifier la légitimité du dispositif de communication et/ou de la carte intelligente ; à envoyer des données à chiffrer ou à déchiffrer du dispositif de communication à la carte intelligente dans un format prescrit ; à recevoir des données devant être chiffrées ou déchiffrées par la carte intelligente et à soumettre lesdites données à un algorithme spécifié conjointement avec une clé secrète spécifiée pour réaliser un chiffrement ou un déchiffrement, ensuite, à envoyer les données chiffrées ou déchiffrées au dispositif de communication dans le format prescrit.
PCT/IB2015/054191 2014-06-04 2015-06-03 Chiffrement et déchiffrement de données entre un dispositif de communication et une carte intelligente ayant une fonction de communication en champ proche WO2015186072A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
SG11201610205SA SG11201610205SA (en) 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410243848.7A CN103985042A (zh) 2014-06-04 2014-06-04 一种基于nfc手机及ic卡的数字信息加解密方法
CN201410243848.7 2014-06-04

Publications (2)

Publication Number Publication Date
WO2015186072A1 true WO2015186072A1 (fr) 2015-12-10
WO2015186072A9 WO2015186072A9 (fr) 2016-02-25

Family

ID=51277001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2015/054191 WO2015186072A1 (fr) 2014-06-04 2015-06-03 Chiffrement et déchiffrement de données entre un dispositif de communication et une carte intelligente ayant une fonction de communication en champ proche

Country Status (3)

Country Link
CN (1) CN103985042A (fr)
SG (1) SG11201610205SA (fr)
WO (1) WO2015186072A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103985042A (zh) * 2014-06-04 2014-08-13 孙国华 一种基于nfc手机及ic卡的数字信息加解密方法
CN104318436A (zh) * 2014-10-21 2015-01-28 上海鹏逸电子商务有限公司 一种基于移动终端的安全支付方法及系统和移动终端
CN104778579A (zh) * 2015-04-30 2015-07-15 北京奇虎科技有限公司 基于电子身份识别载体的感应支付方法及相应装置
CN106557708B (zh) * 2016-11-21 2020-03-17 武汉斗鱼网络科技有限公司 一种安全保护方法和系统
CN113840271B (zh) * 2021-09-27 2024-04-19 北京字节跳动网络技术有限公司 一种nfc数据的传输方法、装置、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140189359A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN103985042A (zh) * 2014-06-04 2014-08-13 孙国华 一种基于nfc手机及ic卡的数字信息加解密方法
US20150134536A1 (en) * 2012-06-08 2015-05-14 Zte Corporation Mobile terminal and method and system for inquiring information of intelligent card

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001253034A1 (en) * 2000-03-29 2001-10-08 Vadium Technology, Inc. One-time-pad encryption with central key service and keyable characters
CN100353787C (zh) * 2004-06-23 2007-12-05 华为技术有限公司 一种移动终端内存储的资料信息的安全保障方法
CN102609641A (zh) * 2011-12-28 2012-07-25 潘铁军 一种基于分布式密钥的drm系统
CN103457724B (zh) * 2012-06-05 2017-02-08 中兴通讯股份有限公司 一种进行点对点数据安全传输的方法和系统
CN103279692A (zh) * 2013-05-03 2013-09-04 广东欧珀移动通信有限公司 基于手机的文件加密解密方法及装置
CN103577220A (zh) * 2013-08-31 2014-02-12 成都西可科技有限公司 一种通过nfc标签开启私密应用或数据的系统及方法
CN103580870A (zh) * 2013-11-07 2014-02-12 李宾 一种手机身份认证终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150134536A1 (en) * 2012-06-08 2015-05-14 Zte Corporation Mobile terminal and method and system for inquiring information of intelligent card
US20140189359A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN103985042A (zh) * 2014-06-04 2014-08-13 孙国华 一种基于nfc手机及ic卡的数字信息加解密方法

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHEN, W.D. ET AL.: "NFC mobile payment with Citizen Digital Certificate", THE 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION INFORMATION TECHNOLOGY (ICNIT, 21 June 2011 (2011-06-21), pages 120 - 126, XP031907545 *
MANTORO, T. ET AL.: "Smart card authentication for Internet applications using NFC enabled phone", 2010 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M, 13 December 2010 (2010-12-13), pages D13 - D18., XP032007097 *

Also Published As

Publication number Publication date
WO2015186072A9 (fr) 2016-02-25
SG11201610205SA (en) 2017-01-27
CN103985042A (zh) 2014-08-13

Similar Documents

Publication Publication Date Title
CN110177354B (zh) 一种车辆的无线控制方法及系统
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
KR102671176B1 (ko) 제1 요인 비접촉식 카드 인증 시스템 및 방법
KR101941049B1 (ko) 암호화된 통신을 위한 방법 및 시스템
US7891557B2 (en) System and method for managing multiple smart card sessions
US9344882B2 (en) Apparatus and methods for preventing information disclosure
US20090298468A1 (en) System and method for deleting data in a communication device
US20080011827A1 (en) Automatic management of security information for a security token access device with multiple connections
US8997179B2 (en) Shared secret identification for secure communication
WO2015186072A1 (fr) Chiffrement et déchiffrement de données entre un dispositif de communication et une carte intelligente ayant une fonction de communication en champ proche
CN105512576A (zh) 一种数据安全存储的方法及电子设备
EP4050838A1 (fr) Procédé de partage de dispositif et dispositif électronique
US11006464B2 (en) Method, apparatus, storage medium, and terminal for establishing a Wi-Fi connection
CN114450990A (zh) 经由非接触式卡为安全消息提供凭证的多因素认证
CN105376059A (zh) 基于电子钥匙进行应用签名的方法和系统
US9654455B2 (en) Communication system, communication device, key management apparatus, and communication method
JP2017538223A (ja) 認証方法
US11838755B2 (en) Techniques for secure authentication of the controlled devices
EP2658297A1 (fr) Procédé et système pour accéder à un service
CN109995527B (zh) 秘钥交互方法、装置、上位机、下位机和存储介质
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN104270342B (zh) 虚拟桌面的访问方法和系统
TWI632795B (zh) Method and device for pairing Bluetooth devices
CN101621795A (zh) 一种实现无线数据终端私有性的方法、系统及装置
TWI577145B (zh) 近場通訊設備資料之加密傳輸方法及其系統

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15803928

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15803928

Country of ref document: EP

Kind code of ref document: A1