WO2019233224A1 - 标签数据生成方法、标签及基于nfc标签的数据处理 - Google Patents

标签数据生成方法、标签及基于nfc标签的数据处理 Download PDF

Info

Publication number
WO2019233224A1
WO2019233224A1 PCT/CN2019/085246 CN2019085246W WO2019233224A1 WO 2019233224 A1 WO2019233224 A1 WO 2019233224A1 CN 2019085246 W CN2019085246 W CN 2019085246W WO 2019233224 A1 WO2019233224 A1 WO 2019233224A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
encrypted data
data
random key
count value
Prior art date
Application number
PCT/CN2019/085246
Other languages
English (en)
French (fr)
Inventor
鲁志军
蒋海俭
刘刚
林晋任
才华
章政
金可威
夏钦
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2019233224A1 publication Critical patent/WO2019233224A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present invention relates to computer technology, and in particular, to a method for generating tag data, a tag, a data processing method based on an NFC tag, a data processing system thereof, and a server.
  • the existing NFC tag only stores the tag ID. Since the tag is static, it can be easily copied, and the cost of copying multiple tags is low. Moreover, for a tag with only a tag ID, the acquirer can forge multiple orders and send it to the server. Since the server only recognizes the tag ID, it cannot prevent such forged orders.
  • Patent Document 1 discloses a secure NFC payment method and system, including an NFC payment card, a credit card device, and a settlement device.
  • the NFC payment card contains a video identification code (two-dimensional code, etc.) and an NFC module.
  • the video identification code carries a first payment key
  • the NFC module carries a second payment key.
  • the card swiping device reads the video identification code to obtain the first payment key, performs preset authentication calculation on the payment data to obtain the second authentication information
  • the NFC payment card receives the payment data, and uses the second payment key pair in the NFC module.
  • the payment data is subjected to preset authentication calculation to obtain first authentication information and returned to the credit card device.
  • the card swiping device sends the first authentication information, the second authentication information, and the payment data to the settlement device.
  • the settlement device uses reverse authentication calculation to verify the authenticity of the first authentication information and the second authentication information. After successful verification, the payment data is processed for payment.
  • the video identification code on the NFC payment card carries the first payment key
  • the NFC module carries the second payment key
  • the verification key in the settlement device is a fixed key, that is, for each For NFC payment cards and every settlement device, the key is fixed during each transaction, so there is a risk that the payment card or key will be copied.
  • the physical storage holding the key is breached and the key is stolen, the payment data will be at risk of being cracked in subsequent transactions.
  • a purpose is to provide a tag data generating method, a tag, a NFC tag-based data processing method, a data processing system, and a server capable of improving data security.
  • “one time at a time” is achieved by adding a first random key generated by the NFC tag's random number generator to the NFC tag. Since the first random key corresponds to the first random initial key stored by the merchant service platform (ie, the server), and the encryption algorithm is stored in the encryption domain of the tag, it is difficult to copy the tag from the merchant side.
  • the merchant service platform ie, the server
  • the acquirer side that is, the server
  • obtains the count value of the tag counter and the encrypted data of the first random key the order cannot be copied for forgery, thereby ensuring the security of the data.
  • a second random key can be further added.
  • the user terminal transmits the second random key to the NFC tag, and uses the first random key in the encryption field of the NFC tag.
  • the second random key encrypts the count value of the tag counter, thereby making it more difficult for the tag to be copied, and even if it is copied, the transaction cannot be successfully completed.
  • FIG. 1 is a schematic diagram showing a structure of a label according to an embodiment of the present invention.
  • FIG. 2 is a flowchart showing a tag data generating method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart showing decryption and verification of tag data according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram showing a specific process of decrypting and verifying tag data according to an embodiment of the present invention.
  • FIG. 5 is a flowchart showing a tag data generating method according to a second embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing a specific flow of decryption and verification of tag data according to a second embodiment of the present invention.
  • FIG. 7 is a schematic diagram showing a structure of a user terminal that performs data processing based on an NFC tag according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram showing a structure of a server that performs data processing based on an NFC tag according to an embodiment of the present invention.
  • FIG. 1 is a schematic diagram showing a structure of a label according to an embodiment of the present invention.
  • a tag As shown in FIG. 1, a tag according to an embodiment of the present invention includes a tag ID 10, a tag counter 20, a random number generator 30, an encryption domain 40, and a data domain 50.
  • the tag ID10 is an identification when the tag leaves the factory, and is unique.
  • the tag counter 20 is used to count the number of interactions of the tag and generate a count value, for example, the value of the tag counter 20 is increased by 1 after each interaction with the user terminal.
  • the random number generator 30 is configured to generate a first random key. After the user terminal interacts with the tag, a first random number is triggered to generate.
  • the first random number is a true random number and has a physical non-copyability, that is, a random key.
  • the encryption domain 40 is configured to perform an encryption operation on the count value output by the tag counter 20 and the first random key output by the random number generator 30 according to a predetermined encryption algorithm to generate encrypted encrypted data.
  • the data field 50 is used to store data, such as merchant data.
  • the data preprocessing module 60 is used to preprocess the count value output by the tag counter 20, the encrypted data encrypted by the encryption domain 40, the merchant data stored in the data domain 50, and the tag ID, and output the preprocessed data.
  • FIG. 2 is a flowchart showing a tag data generating method according to an embodiment of the present invention.
  • step S100 the user terminal touches the NFC tag
  • step S101 the user terminal initiates a tag data read request to the NFC tag
  • step S102 an encryption operation is performed in the tag
  • step S103 the NFC tag returns a tag data read response to the user terminal.
  • step S102 the specific content of the encryption operation in step S102 will be described with reference to FIG. 1.
  • the encryption operation includes the following steps:
  • the tag counter 20 counts, and the random number generator 30 performs a first random key
  • the tag counter 20 sends the result of the numerical calculation to the encryption domain 40, and the random number generator 30 also sends the generated first random key to the encryption domain 40;
  • the tag counter data i.e., the count value
  • the tag counter 20 and the first random encryption key Perform encryption operations based on the key to generate encrypted data
  • the tag sends the count value in the tag counter 20, the encrypted data in the encryption domain 40, the merchant data in the data domain 50, and the tag ID data in the tag ID to the data preprocessing module 60 for data preprocessing;
  • the data pre-processing module 60 sends the pre-processed data to the user terminal.
  • FIG. 3 is a flowchart showing a tag data decryption method according to an embodiment of the present invention.
  • the tag decryption and verification process is performed as shown in FIG. 3.
  • step S200 the user terminal touches the NFC tag to read the encrypted data, and in step S201, the user terminal sends a tag verification request to the merchant service platform (corresponding to the "server” in the claims).
  • step S202 the merchant service platform performs a decryption operation after receiving the tag verification request, after decryption, performs a verification operation in step S203, and returns a tag verification response to the user terminal in step S204.
  • FIG. 4 shows a specific flow of decrypting and verifying tag data according to an embodiment of the present invention.
  • the user terminal touches the NFC tag, and the user terminal sends the pre-processed data after the tag pre-processing to the merchant service platform.
  • the merchant service platform identifies the tag ID, calls the first decryption algorithm corresponding to the first encryption algorithm according to the tag ID (the decryption algorithm here can also be understood to include both decryption and verification), and calls the first random key with the tag ID Corresponding first random initial key (it can be understood that the first encryption algorithm corresponds to the first decryption algorithm based on the tag ID, and the first random key corresponds to the first random initial key based on the tag ID), using the first decryption algorithm Decrypt and verify the encrypted data, the tag counter data (that is, the count value), and the first random initial key, and return the decryption operation result and the verification result to the user terminal.
  • the user terminal system can send a random number to the NFC tag, it can be further verified by the following methods.
  • the merchant service platform saves a random number generator and generates a second random key.
  • a second random initial key corresponding to the tag ID and the second random key and a second decryption algorithm based on the tag ID and the corresponding second decryption algorithm (the decryption algorithm herein can also be understood to include both decryption and verification).
  • the decryption algorithm herein can also be understood to include both decryption and verification.
  • the tag counter data i.e., the count value
  • the random number generator 30 are output according to the encryption algorithm (herein referred to as the second encryption algorithm) stored in advance by the manufacturer. Based on the first random key and the second random key sent to the encryption domain 40 by the user terminal, an encryption operation is performed to generate encrypted data.
  • the user terminal When the user terminal touches the NFC tag, the user terminal sends the preprocessed data (including the encrypted first random key and the second random key) after the tag preprocessing to the merchant service platform, and calls the corresponding second based on the tag ID.
  • the decryption algorithm the first random initial key corresponding to the first random key, and the second random initial key corresponding to the second random key.
  • the second random key is decrypted.
  • the decrypted compare the second random key with the second random key generated by the merchant service platform and sent to the user terminal. If they are the same, then the label is a real label; if they are not, the label is a fake label.
  • the first random key is added to the tag to achieve "one-at-a-time secret". Since the random key corresponds to the first random initial key stored by the merchant service platform (also referred to as a server in the present invention), and the encryption algorithm is stored in the encryption domain of the tag, it is difficult for the merchant side to copy the tag.
  • the merchant service platform also referred to as a server in the present invention
  • the acquirer side that is, the merchant service platform
  • obtains the encrypted data for the tag counter and the first random key the order cannot be copied for forgery.
  • a second random key can be further added, making the tag more difficult to copy, and even if copied, the transaction cannot be successfully completed.
  • step S100 the user terminal touches the NFC tag
  • step S101 the user terminal initiates a tag data read request to the NFC tag
  • step S102 an encryption operation is performed in the NFC tag.
  • step S103 the NFC tag returns a tag data read response to the user terminal.
  • step S102 the specific content of the encryption operation in step S102 will be described with reference to FIG. 1.
  • the encryption operation includes the following steps:
  • the tag counter 20 After the user terminal touches the NFC tag, the tag counter 20 performs a counting operation and accumulates 1 by the previously saved value, that is, if the originally saved value is 100, the current value is calculated as "101";
  • the random number generator 30 performs a random operation to generate a first random key "100200"
  • the tag counter 20 sends the count value “101” to the encryption domain 40, and the random number generator 30 also sends the generated first random key “100200” to the encryption domain 40;
  • an encryption operation is performed based on the tag counter data (that is, the count value "101") and the first random key (that is, "100200") to generate Encrypted data.
  • the tag counter data "101" and the first random key "100200” are converted into a first random factor "100301", and the first random factor "100301” and the first random key "100200” are calculated again.
  • the encrypted data "100101” is formed.
  • the encryption algorithm is an algorithm set by the label manufacturer;
  • the tag counter data "101" in the tag counter 20 the encrypted data "100101” encrypted in the encryption domain 40, and the merchant data in the data domain 50 (e.g., transaction currency, country code, merchant name, merchant city , Merchant ID, merchant MCC, merchant code, etc.)
  • the tag ID data "1001” in the tag ID is sent to the data pre-processing module 60, and the pre-processed data "1001X101X100101 merchant data” is generated, where "X” is used as a separation of different types of data Character, because the encrypted data has a fixed length, there is no need for a separator between the encrypted data and the merchant data;
  • the data pre-processing module 60 sends the pre-processed data "1001X101X100101 merchant data" to the user terminal.
  • step S200 the user terminal touches the NFC tag to read the encrypted data.
  • step S201 the user terminal sends a tag verification request to the merchant service platform.
  • step S202 the merchant service platform receives the tag verification request.
  • step S203 the decryption operation is performed.
  • step S203 a verification operation is performed in step S203, and a tag verification response is returned to the user terminal in step S204.
  • the user terminal touches the NFC tag.
  • the tag pre-processing data "1001X101X100101 Merchant Data" is sent to the merchant service platform.
  • the merchant data in the data domain includes the transaction currency, country code, merchant name, merchant city, merchant ID, merchant MCC, merchant code, etc .;
  • the merchant service platform identifies the tag ID data "1001" in the tag pre-processing data "1001X101X100101 merchant data", and invokes the first decryption algorithm corresponding to the first encryption algorithm and the first random key corresponding to the first random key according to the tag ID
  • the first random initial key "100001” performs decryption and verification operations on the encrypted data "100101", the tag counter data "101", and the first random initial key "100001".
  • the decryption operation includes: the encrypted data "100101" and the first random initial key “100001” are obtained through the decryption operation to obtain the first random factor "100301” and the first random key "100200”; the first random key “ “100200” and the tag counter “101” generate a second random factor "100301” through a conversion operation.
  • the verification operation includes: if the first random factor "100301” and the second random factor "100301” are consistent, the label is true label.
  • the decryption operation is the operation corresponding to the encryption operation by the tag manufacturer, and the tag ID, the first random initial key corresponding to the tag ID, and the decryption operation method (including the conversion operation method and the verification operation method) are sent to the merchant service platform for execution. save;
  • FIG. 5 is a flowchart showing a tag data generating method according to a second embodiment of the present invention.
  • the user terminal system can send a random number to the NFC tag, the following method can be adopted to verify the authenticity of the tag.
  • the merchant service platform further has a random number generator to generate a second random key, and simultaneously stores a second random initial key corresponding to the second random key.
  • a second random key generated by the merchant service platform is additionally sent to the user terminal, and the user terminal sends to the encryption field of the NFC tag to participate in the encryption operation.
  • Encryption operation As shown in FIG. 5, the tag counter data “101”, the first random key “100200”, and the second random key “200400” form the encrypted data “300701” through the encryption operation.
  • a second encryption algorithm is used here, and the second encryption algorithm can be an operation set by the label manufacturer.
  • FIG. 6 shows a specific flow of decryption and verification of tag data according to the second embodiment of the present invention.
  • the second random key can participate in the decryption operation and can also be used as the verification result of the decryption operation.
  • the decryption operation is as shown in FIG. 6.
  • the encrypted data “300701”, the tag counter data “101”, the first random initial key “100100”, and the second random initial key “200200” pass.
  • the decryption operation generates a random key "200400".
  • the random key "200400" produced by the decryption operation is compared with the second random key saved before the merchant service platform, and if they are consistent, the verification is passed.
  • the data processing system for data processing based on the NFC tag of the present invention is implemented on a computer.
  • the data processing system of the present invention may be, for example, a user terminal (for example, a mobile phone) in the above description.
  • a user terminal for example, a mobile phone
  • FIG. 7 a user terminal that performs data processing based on an NFC tag according to an embodiment of the present invention will be described with reference to FIG. 7.
  • FIG. 7 is a schematic diagram showing a structure of a user terminal that performs data processing based on an NFC tag according to an embodiment of the present invention.
  • a user terminal 100 that performs data processing based on an NFC tag includes:
  • the tag reading module 110 reads data related to the NFC tag.
  • the data includes, for example, data fused by the pre-processing module 60 in the foregoing description, including a count value, encrypted data encrypted by the encryption domain 40, and a data domain. 50 merchant data, tag ID, etc .;
  • the verification request generating module 120 sends a verification request to verify the encrypted tag data based on the encrypted tag data and the NFC tag ID.
  • a verification response receiving module 130 receiving a reply to the verification request
  • the execution module 140 executes data processing based on the tag data if the response of the verification request is verification.
  • the random key transmitting and receiving module 150 is configured to receive a second random key from the outside and send it to the NFC tag, where the second random key is generated by the server and sent to the user terminal 100 every time the NFC tag interacts and is And used to encrypt the tag data to generate the encrypted tag data.
  • the data processing system of the present invention may be, for example, the merchant service platform (or server) in the above description.
  • FIG. 8 is a schematic diagram showing a structure of a server that performs data processing based on an NFC tag according to an embodiment of the present invention.
  • the server 200 for performing data processing based on the NFC tag of the present invention includes:
  • the server 200 for performing data processing based on the NFC tag of the present invention includes:
  • the receiving module 210 receives first encrypted data, wherein the first encrypted data is generated by encrypting tag data according to a first encryption algorithm, and the first encrypted data includes a tag ID;
  • the storage module 220 is configured to store first and second decryption algorithms corresponding to the ID in advance and store first and second random initial keys corresponding to the ID in advance;
  • a decryption verification module 230 configured to call the stored first decryption algorithm corresponding to the first encryption algorithm based on the tag ID to decrypt the first encrypted data and perform verification;
  • a random key generation module 240 is configured to generate and send a second random key each time an NFC tag interacts, wherein the second random key is also used to encrypt the tag data to generate the first encryption Data;
  • the sending module 250 is configured to send a verification success response and a decryption result if the verification succeeds.
  • the random key generation module 240 is an optional module. If the second random key is not required, the random key generation module 240 may not be provided.
  • the present invention also provides a computer-readable medium on which a computer program is stored, which is characterized in that when the computer program is executed by a processor, the above-mentioned NFC tag-based data processing method is implemented.
  • the present invention also provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor.
  • the processor executes the computer program, the data processing method based on the NFC tag is implemented. .
  • “one time at a time” is achieved by adding a first random key generated by the NFC tag's random number generator to the NFC tag. Since the first random key corresponds to the first random initial key stored by the merchant service platform (ie, the server), the first encryption algorithm and the second encryption algorithm are stored in the encryption domain of the tag, so it is more difficult from the merchant side Make a label copy.
  • the acquirer side that is, the server
  • obtains the count value of the tag counter and the encrypted data of the first random key the order cannot be copied for forgery, thereby ensuring the security of the data.
  • a second random key can be further added.
  • the user terminal transmits the second random key to the NFC tag, and uses the first random key in the encryption field of the NFC tag.
  • the second random key encrypts the count value of the tag counter, thereby making it more difficult for the tag to be copied, and even if it is copied, the transaction cannot be successfully completed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及一种标签数据生成方法、标签以及基于NFC标签的数据处理方法及其系统。该标签数据生成方法包括:计数步骤,对标签的交互次数进行计数并生成计数值;随机密钥生成步骤,生成第一随机密钥;加密步骤,采用第一加密算法对所述计数值和所述第一随机密钥进行加密运算,生成加密数据;以及预处理步骤,将所述计数值、所述加密数据、以及标签ID进行融合,其中,所述标签ID为标签的身份标识。根据本发明,能够有效保证标签数据的安全性,提升交易安全性。

Description

标签数据生成方法、标签及基于NFC标签的数据处理 技术领域
本发明涉及计算机技术,尤其涉及一种标签数据生成方法、标签、基于NFC标签的数据处理方法及其数据处理系统以及服务器。
背景技术
现有的NFC标签中只保存有标签ID,由于标签是静态的,很容易被复制,复制多个标签的成本很低。而且,对于只存在标签ID的标签,收单侧可以伪造多笔订单发送至服务器,服务器由于只认标签ID,所以无法防止该类伪造订单。
而且,在目前的NFC标签数据传输中,一般采用固定密钥。例如,在专利文献1(申请号:CN201410640133.5)中公开一种安全的NFC支付方法和系统,包括了NFC支付卡、刷卡设备和结算设备。NFC支付卡含有视频识别码(二维码等)和NFC模块,视频识别码承载第一支付密钥,NFC模块承载第二支付密钥。支付过程中,刷卡设备读取视频识别码获取第一支付密钥,对支付数据进行预设认证计算获取第二认证信息,NFC支付卡接收支付数据,利用NFC模块内的第二支付密钥对支付数据进行预设认证计算获取第一认证信息并返回刷卡设备。刷卡设备将第一认证信息、第二认证信息、支付数据发送至结算设备。结算设备采用逆向认证计算验证第一认证信息和第二认证信息的真实性。验证成功后,处理支付数据进行支付。
在该在专利文献1中,NFC支付卡上视频识别码承载第一支付密钥、NFC模块承载第二支付密钥以及结算设备中的验证密钥均为固定的密钥,即针对每一张NFC支付卡、每一个结算设备,在每次交易的过程中,密钥都是固定不变的,因此存在支付卡或者密钥被复制的风险。并且,如果保存该密钥的物理存储被攻破,密钥被窃取,则在后续交易中将面临支付数据被破解的风险。
公开于本发明背景部分的信息仅仅旨在增加对本发明的总体背景的理解,而不应当被视为承认或以任何形式暗示该信息构成已为本领域一般技术人员所公知的现有技术。
发明内容
鉴于此,针对上述问题旨在提供一种能够提高数据安全性的一种标签数据生成方法、标签、基于NFC标签的数据处理方法及其数据处理系统以及服务器。
如上所述,根据本发明,通过在NFC标签中加入由NFC标签的随机数生成器生成第一随机密钥,实现“一次一密”。由于该第一随机密钥与商户服务平台(即服务器)保存的第一随机初始密钥是对应的,加密算法保存于标签的加密域中,所以从商户侧较难进行标签复制。
而且,由于收单侧(即服务器)获取的为标签计数器的计数值和第一随机密钥的加密数据,因此也无法复制订单进行伪造,由此能够保证数据的安全性。
进一步,在用户终端允许向NFC标签传输数据的情况下,还能够进一步加入第二随机密钥,用户终端将第二随机密钥传输给NFC标签,在NFC标签的加密域使用第一随机密钥、第二随机密钥加密标签计数器的计数值,由此,使得标签更难被复制,即使被复制,也无法成功完成交易。
通过纳入本文的附图以及随后与附图一起用于说明本发明的某些原理的具体实施方式,本发明的方法和装置所具有的其它特征和优点将更为具体地变得清楚或得以阐明。
附图说明
图1是表示本发明一实施方式的标签的构造示意图。
图2是表示本发明一实施方式的标签数据生成方法的流程图。
图3是表示本发明一实施方式的标签数据的解密以及验证的流程图。
图4是表示本发明一实施方式的标签数据的解密以及验证具体流程的示意图。
图5是表示本发明第二实施方式的标签数据生成方法的流程图。
图6是表示本发明第二实施方式的标签数据的解密以及验证的具体流程的示意图。
图7是表示本发明一实施方式的基于NFC标签进行数据处理的用户终端的构造示意图。
图8是表示本发明的一实施方式的基于NFC标签进行数据处理的服务器的构造示意图。
具体实施方式
下面介绍的是本发明的多个实施例中的一些,旨在提供对本发明的基本了解。并不旨在确认本发明的关键或决定性的要素或限定所要保护的范围。
首先,对于本发明的标签以及标签数据的生成方法进行说明。
图1是表示本发明一实施方式的标签的构造示意图。
如图1所示,本发明一实施方式的标签具备:标签ID10、标签计数器20、随机数生成器30、加密域40以及数据域50。
其中,标签ID10为标签出厂时的身份标识,具有唯一性。
标签计数器20用于对标签的交互次数进行计数并生成计数值,例如在与用户终端每交互一次后标签计数器20值增加1。
随机数生成器30用于生成第一随机密钥,在用户终端与标签交互之后,触发生成第一随机数,该第一随机数是真随机数,具有物理不可复制,也即随机密钥。
加密域40用于按照规定加密算法对标签计数器20输出的计数值和随机数生成器30输出的第一随机密钥进行加密运算,生成加密后的加密数据。
数据域50用于保存数据,例如商户数据等。
数据预处理模块60用于对标签计数器20输出的计数值、加密域40加密后的加密数据、数据域50保存的例如商户数据、以及标签ID进行预处理并且输出预处理数据。
图2是表示本发明一实施方式的标签数据生成方法的流程图。
如图2所示,在步骤S100中用户终端触碰NFC标签,在步骤S101中用户终端向NFC标签发起读取标签数据请求,在步骤S102中NFC标签接收请求后,在标签内进行加密运算,在步骤S103中NFC标签向用户终端返回读取标签数据应答。
接着,对于步骤S102中的加密运算的具体内容参照图1进行说明。
加密运算的具体包括下述步骤:
(1)用户终端触碰NFC标签后,标签计数器20进行计数,随机数生成器30进行第一随机密钥;
(2)标签计数器20将数值计算的结果发送至加密域40,随机数生成器30也将生成的第一随机密钥发送至加密域40;
(3)在加密域40中按照厂商预先保存的加密算法(这里称为第一加密算法)以标签计数器20输出的标签计数器数据(即计数值)和随机数生成器30输出的第一随机密钥为基础进行加密运算,生成加密数据;
(4)标签将标签计数器20中的计数值、加密域40中的加密数据、数据域50中的商户数据、标签ID中的标签ID数据发送至数据预处理模块60进行数据预处理;以及
(5)数据预处理模块60将预处理后的数据发送给至用户终端。
图3是表示本发明一实施方式的标签数据解密方法的流程图。
在标签加密流程之后,如图3所示进行标签解密及验证流程。
如图3所示,在步骤S200用户终端触碰NFC标签,读取加密完成后的数据,在步骤S201中用户终端向商户服务平台(对应于权利要求书中的“服务器”)发送标签验证请求,在步骤S202中商户服务平台接收标签验证请求后进行解密运算,在解密之后在步骤S203中进行验证运算,在步骤S204中向用户终端返回标签验证应答。
图4是表示本发明一实施方式的标签数据的解密以及验证的具体流程。
如图4所示,用户终端触碰NFC标签,用户终端向商户服务平台发送经过标签预处理后的预处理数据。商户服务平台识别标签ID,依据标签ID调用与第一加密算法对应的第一解密算法(这里的解密算法也可以理解为包含解密和验证两方面),并且根据标签ID调用与第一随机密钥对应的第一随机初始密钥(可以理解为,第一加密算法与第一解密算法基于标签ID对应,第一随机密钥与第一随机初始密钥基于标签ID对应),利用第一解密算法对于加密数据、标签计数器数据(即计数值)、第一随机初始密钥进行解密以及验证,将解密运算结果和验证结果返回用户终端。
作为一个变形方式,如果用户终端系统可以向NFC标签发送随机数,则可以进一步采取以下方式验证,例如,商户服务平台保存进一步具有随机数生成器,生成第二随机密钥,同时保存有与基于标签ID与该第二随机密钥对应的第二随机初始密钥以及基于标签ID与对应的第二解密算法(这里的解密算法也可以理解为包含解密和验证两方面)。当用户终端触碰NFC标签时,会额外由商户服务平台产生第二随机密钥发送至用户终端,由用户终端发送至NFC标签的加密 域中参与加密运算。
这样,在加密运算中,在加密域40中按照厂商预先保存的加密算法(这里称为第二加密算法)以标签计数器20输出的标签计数器数据(即计数值)、随机数生成器30输出的第一随机密钥、以及用户终端发送到加密域40的第二随机密钥为基础进行加密运算,生成加密数据。
当用户终端触碰NFC标签,用户终端向商户服务平台发送经过标签预处理后的预处理数据(包含被加密的第一随机密钥和第二随机密钥),基于标签ID调用对应的第二解密算法、与第一随机密钥对应的第一随机初始密钥、以及与第二随机密钥对应的第二随机初始密钥,解密出第二随机密钥,在验证运算中,将解密后的第二随机密钥与商户服务平台生成并发送给用户终端的第二随机密钥做对比。若一致,则该标签为真实的标签,若不一致,则为伪造标签。
如上所述,在本发明中,在标签中加入第一随机密钥,实现“一次一密”。由于该随机密钥与商户服务平台(在本发明中也称为服务器)保存的第一随机初始密钥是对应的,加密算法保存于标签的加密域中,所以商户侧较难进行标签复制。
而且,由于收单侧(即商户服务平台)获取的为标签计数器和第一随机密钥的加密数据,也无法复制订单进行伪造。
进一步,在用户终端系统允许向NFC标签中传输数据的情况下,还能够进一步加入第二随机密钥,使得标签更难被复制,即使被复制,也无法成功完成交易。
接着,对于本发明的基于NFC标签的数据处理方法的第一实施方式进行说明。该实施方式的说明也参照之前的图1至图4进行。
如图2所示,在步骤S100中用户终端触碰NFC标签,在步骤S101中用户终端向NFC标签发起读取标签数据请求,在步骤S102中NFC标签接收请求后,在NFC标签内进行加密运算,在步骤S103中NFC标签向用户终端返回读取标签数据应答。
接着,对于步骤S102中的加密运算的具体内容参照图1进行说明。
具体地,加密运算包括下述步骤:
(1)用户终端触碰NFC标签后,标签计数器20进行计数运算,在原先保存的数 值上累加1,即若原先保存的数值为100,则本次数值运算后为“101”;
(2)随机数生成器30进行随机运算,产生第一随机密钥“100200”;
(3)标签计数器20将计数值“101”发送至加密域40,随机数生成器30也将生成的第一随机密钥“100200”发送至加密域40;
(4)在加密域40中,按照厂商预先保存的第一加密算法,以标签计数器数据(即计数值“101”)和第一随机密钥(即“100200”)为基础进行加密运算,生成加密数据。例如,标签计数器数据“101”与第一随机密钥“100200”通过转化运算后形成第一随机因子“100301”,第一随机因子“100301”与第一随机密钥“100200”再次通过运算后形成加密数据“100101”。加密算法为标签厂商自行设置的算法;
(4)标签将标签计数器20中的标签计数器数据“101”、加密域40加密后的加密数据“100101”、数据域50中的商户数据(例如交易币种、国家代码、商户名称、商户城市、商户ID、商户MCC、商户编码等)、标签ID中的标签ID数据“1001”发送至数据预处理模块60,生成预处理数据“1001X101X100101商户数据”,其中“X”作为不同类型数据的分隔符,由于加密数据固定长度,所以与商户数据之间可以无需分隔符;
(5)数据预处理模块60将预处理数据“1001X101X100101商户数据”发送至用户终端。
在标签加密流程之后,如图3所示进行标签解密及验证流程。如图3所示,在步骤S200用户终端触碰NFC标签,读取加密完成后的数据,在步骤S201中用户终端向商户服务平台发送标签验证请求,在步骤S202中商户服务平台接收标签验证请求后进行解密运算,在解密之后在步骤S203中进行验证运算,在步骤S204中向用户终端返回标签验证应答。
具体解密验证过程如图4所示,包括下述具体步骤:
(1)用户终端触碰NFC标签,加密完成后,向商户服务平台发送标签预处理数据“1001X101X100101商户数据”,数据域中的商户数据包括交易币种、国家代码、商户名称、商户城市、商户ID、商户MCC、商户编码等;
(2)商户服务平台识别标签预处理数据“1001X101X100101商户数据”中的标签ID数据“1001”,依据标签ID调用对应于上述第一加密算法的第一解密算法 以及对应于第一随机密钥的第一随机初始密钥“100001”,对加密数据“100101”、标签计数器数据“101”、第一随机初始密钥“100001”进行解密及验证运算。
其中,解密运算包括:加密数据“100101”与第一随机初始密钥“100001”通过解密运算后获得了第一随机因子“100301”和第一随机密钥“100200”;第一随机密钥“100200”再与标签计数器“101”通过转化运算产生第二随机因子“100301”,验证运算包括:第一随机因子“100301”与第二随机因子“100301”是一致的,则该标签为真实的标签。这里解密运算为标签厂商与加密运算对应的运算,且需将标签ID、对应于标签ID的第一随机初始密钥、解密运算方法(包含转化运算方法、验证运算方法)发送至商户服务平台进行保存;
(3)标签解密和验证结束后,向用户终端返回验证结果,如返回参数“T=1”,表明标签为真实的。
其次,参照图5和图6对于本发明的基于NFC标签的数据处理方法的第二实施方式进行说明。
图5是表示本发明第二实施方式的标签数据生成方法的流程图。
在第二实施方式中,如果用户终端系统可以向NFC标签发送随机数,则可采取如下方法验证标签真伪。
商户服务平台进一步具有随机数生成器,生成第二随机密钥,同时保存有与该第二随机密钥对应的第二随机初始密钥。当用户终端触碰NFC标签时,会额外由商户服务平台产生第二随机密钥发送至用户终端,由用户终端发送至NFC标签的加密域中参与加密运算。加密运算:如图5所示,标签计数器数据“101”、第一随机密钥“100200”、第二随机密钥“200400”通过加密运算形成加密数据“300701”。这里采用第二加密算法,这里第二加密算法可以为标签厂商自行设置的运算。
图6是表示本发明第二实施方式的标签数据的解密以及验证的具体流程。
对应地,在解密及验证过程中,第二随机密钥可参与解密运算的过程中,也可作为解密运算的验证结果。若作为解密运算的验证结果,则解密运算如图6所示,加密数据“300701”、标签计数器数据“101”与第一随机初始密钥“100100”、第二随机初始密钥“200200”通过解密运算生成随机密钥“200400”。将解密运算生产的随机密钥“200400”与商户服务平台之前保存的第二随机密钥进行比对, 如果一致则通过验证。
接着,对于本发明的基于NFC标签进行数据处理的数据处理系统进行说明。本发明的基于NFC标签进行数据处理的数据处理系统在计算机上实现。
作为用户侧的一个实施方式,本发明的数据处理系统例如可以为上述说明中的用户终端(例如由手机实现)。接着,参照图7对于本发明的一实施方式的基于NFC标签进行数据处理的用户终端进行说明。
图7是表示本发明一实施方式的基于NFC标签进行数据处理的用户终端的构造示意图。
如图7所示,本发明一实施方式的基于NFC标签进行数据处理的用户终端100包括:
标签读取模块110,读取与NFC标签相关的数据,这些数据例如包括:由上述说明中的预处理模块60进行融合后的数据,包括:计数值、加密域40加密的加密数据、数据域50中的商户数据、标签ID等;
验证请求生成模块120,基于所述加密后的标签数据以及NFC标签ID发送验证所述加密后的标签数据的验证请求;
验证应答接收模块130,接收所述验证请求的应答;
执行模块140,在所述验证请求的应答为通过验证的情况下,基于所述标签数据执行数据处理;以及
随机密钥收发模块150,用于从外部接收第二随机密钥并发送给NFC标签,其中,所述第二随机密钥在每次NFC标签交互时被服务器生成并发送给用户终端100且被用于加密所述标签数据而生成所述被加密的标签数据。
作为后台侧(或者说商户侧)的一个实施方式,本发明的数据处理系统例如可以是上述说明中的商户服务平台(或者说是服务器)。
接着,参照图8对于本发明的一实施方式的基于NFC标签进行数据处理的服务器进行说明。
图8是表示本发明的一实施方式的基于NFC标签进行数据处理的服务器的构造示意图。
如图8所示,本发明的基于NFC标签进行数据处理的服务器200包括:本发明的基于NFC标签进行数据处理的服务器200包括:
接收模块210,接收第一加密数据,其中,所述第一加密数据按照第一加密算法加密标签数据而生成,所述第一加密数据包括标签ID;
存储模块220,用于对应于ID预先存储第一、第二解密算法以及对应于ID预先存储第一、第二随机初始密钥;
解密验证模块230,用于基于所述标签ID调用已存储的与第一加密算法对应的第一解密算法来解密所述第一加密数据并进行验证;
随机密钥生成模块240,用于在每次NFC标签交互时生成并发送第二随机密钥,其中,所述第二随机密钥也被用于加密所述标签数据而生成所述第一加密数据;以及
发送模块250,用于在所述验证通过的情况下发送验证成功应答以及解密结果。
其中,随机密钥生成模块240是可选模块,若不需要采用第二随机密钥的情况下,则可以不用设置随机密钥生成模块240。
本发明还提供一种计算机可读介质,其上存储有计算机程序,其特征在于,该计算机程序被处理器执行时实现上述的基于NFC标签的数据处理方法。
本发明还提供一种计算机设备,包括存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述的基于NFC标签的数据处理方法。
如上所述,根据本发明,通过在NFC标签中加入由NFC标签的随机数生成器生成第一随机密钥,实现“一次一密”。由于该第一随机密钥与商户服务平台(即服务器)保存的第一随机初始密钥是对应的,第一加密算法以及第二加密算法保存于标签的加密域中,所以从商户侧较难进行标签复制。
而且,由于收单侧(即服务器)获取的为标签计数器的计数值和第一随机密钥的加密数据,因此也无法复制订单进行伪造,由此能够保证数据的安全性。
进一步,在用户终端允许向NFC标签传输数据的情况下,还能够进一步加入第二随机密钥,用户终端将第二随机密钥传输给NFC标签,在NFC标签的加密域使用第一随机密钥、第二随机密钥加密标签计数器的计数值,由此,使得标签更难被复制,即使被复制,也无法成功完成交易。
以上例子主要说明了本发明的NFC标签生成方法、NFC标签、基于NFC标签的数据处理方法以及服务器。尽管只对其中一些本发明的具体实施方式进行 了描述,但是本领域普通技术人员应当了解,本发明可以在不偏离其主旨与范围内以许多其他的形式实施。因此,所展示的例子与实施方式被视为示意性的而非限制性的,在不脱离如所附各权利要求所定义的本发明精神及范围的情况下,本发明可能涵盖各种的修改与替换。

Claims (24)

  1. 一种标签数据生成方法,其特征在于,包括:
    计数步骤,对标签的交互次数进行计数并生成计数值;
    随机密钥生成步骤,生成第一随机密钥;
    加密步骤,对所述计数值和所述第一随机密钥进行加密运算,生成加密数据;以及
    预处理步骤,将所述计数值、所述加密数据、以及标签ID进行融合并生成第一加密数据,其中,所述标签ID为标签的身份标识。
  2. 如权利要求1所述的标签数据生成方法,其特征在于,
    在所述加密步骤中,按照第一加密算法对所述计数值和所述第一随机密钥进行加密运算生成加密数据。
  3. 如权利要求1所述的标签数据生成方法,其特征在于,
    在所述加密步骤中,按照第二加密算法对被输入的第二随机密钥、所述计数值以及所述第一随机密钥一起进行加密运算生成加密数据,其中,所述第二随机密钥在每次标签ID交互时被随机生成并被输入。
  4. 一种标签,其特征在于,具备:
    标签计数器,用于对标签的交互次数进行计数并生成计数值;
    随机数生成器,用于生成第一随机密钥;
    加密域,用于对所述计数值和所述第一随机密钥进行加密运算,生成加密后的加密数据;以及
    数据预处理模块,用于将所述计数值、所述加密数据、以及标签ID进行融合并生成第一加密数据。
  5. 如权利要求4所述的标签,其特征在于,进一步具备:
    数据域,用于存储预设信息,
    其中,所述数据预处理模块将所述计数值、所述加密数据、标签ID以及所述预设信息进行融合。
  6. 如权利要求4所述的标签,其特征在于,
    所述加密域用于按照第一加密算法对所述计数值和所述第一随机密钥进行加密运算生成加密数据。
  7. 如权利要求4所述的标签,其特征在于,
    所述加密域用于按照第二加密算法将被输入的第二随机密钥、所述计数值和所述第一随机密钥一起进行加密运算并生成加密数据,
    其中,所述第二随机密钥在每次标签ID交互时被随机生成并被输入。
  8. 一种基于NFC标签的数据处理方法,其特征在于,包括:
    加密步骤,采用对标签的交互次数进行计数并生成的计数值以及随机产生的第一随机密钥加密标签数据并生成第一加密数据,其中,所述加密数据包括标签ID;读取步骤,读取所述第一加密数据;
    解密验证步骤,基于标签对所述第一加密数据进行解密和验证;以及
    执行步骤,在所述解密验证步骤验证成功的情况下,基于所述标签数据执行数据处理。
  9. 如权利要求8所述的基于NFC标签的数据处理方法,其特征在于,
    在所述加密步骤中,按照第一加密算法对所述计数值、所述第一随机密钥进行加密运算并生成加密数据,将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据。
  10. 如权利要求8所述的基于NFC标签的数据处理方法,其特征在于,
    在所述加密步骤中,按照第二加密算法对所述计数值、所述第一随机密钥以及每次交互被随机生成并被输入的第二随机密钥进行加密运算并生成加密数据,将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据。
  11. 一种基于NFC标签的数据处理方法,其特征在于,包括:
    标签读取步骤,读取第一加密数据,其中,所述第一加密数据是用对标签的交互次数进行计数并生成的计数值以及随机产生的第一随机密钥加密标签数据而生成,所述第一加密数据包括标签ID;
    请求生成步骤,基于所述第一加密数据发送解密并验证所述第一加密数据的验证请求;
    应答接收步骤,接收所述解密及验证请求的应答;以及
    执行步骤,在所述验证请求的应答为通过验证的情况下,基于解密后的标签数据执行数据处理。
  12. 如权利要求11所述的基于NFC标签的数据处理方法,其特征在于,
    其中,所述第一加密数据是用第一加密算法对所述计数值、所述第一随机密钥进行加密运算并生成加密数据并将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据。
  13. 如权利要求11所述的基于NFC标签的数据处理方法,其特征在于,在所述标签读取步骤之前进一步具备:
    随机密钥收发步骤,从外部接收第二随机密钥并发送,其中,所述第二随机密钥在每次NFC标签交互时被生成并且被也用于加密所述标签数据而生成所述第一加密数据,
    其中,所述第一加密数据是用第二加密算法对所述计数值、所述第一随机密钥以及所述第二随机密钥进行加密运算并生成加密数据并且将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据。
  14. 一种基于NFC标签的数据处理方法,其特征在于,包括:
    接收步骤,接收第一加密数据,其中,所述第一加密数据是用对标签的交互次数进行计数并生成的计数值以及随机产生的第一随机密钥加密标签数据而生成,所述第一加密数据包括标签ID;
    解密验证步骤,基于所述标签ID解密所述第一加密数据并进行验证;以及
    发送步骤,若所述验证通过则发送验证成功的应答。
  15. 如权利要求14所述的基于NFC标签的数据处理方法,其特征在于,
    其中,在所述接收步骤中,所述第一加密数据是按照第一加密算法对所述计数值和所述第一随机密钥进行加密运算生成加密后的加密数据并将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据,
    在所述解密验证步骤中,基于所述标签ID调用预先存储的与第一加密算法对应的第一解密算法以及与第一随机密钥对应的第一随机初始密钥解密所述第一加密数据并进行验证。
  16. 如权利要求14所述的基于NFC标签的数据处理方法,其特征在于,
    在所述接收步骤之前进一步具备:
    随机密钥生成步骤,生成并发送第二随机密钥,其中,所述第二随机密钥在每次NFC标签交互时并且也被用于加密所述标签数据而生成所述第一加密数据,
    其中,所述第一加密数据是按照第二加密算法对被输入的所述第二随机密钥、所述计数值以及所述第一随机密钥一起进行加密运算生成加密数据并将所述加密数据、所述计数值和所述标签ID融合生成第一加密数据,
    其中,在所述解密验证步骤中,基于所述标签ID调用预先存储的与所述第一随机密钥对应的第一随机初始密钥、与所述第二随机密钥对应的第二随机初始密钥以及与所述第二加密算法对应的第二解密算法来解密所述第一加密数据并进行验证。
  17. 一种基于NFC标签的数据处理系统,所述数据处理系统在计算机上实现,其特征在于,包括:
    标签读取模块,用于读取第一加密数据,其中,所述第一加密数据是用对标签的交互次数进行计数并生成的计数值以及随机产生的第一随机密钥加密标签数据而生成,所述第一加密数据包括标签ID;
    请求生成模块,用于基于所述第一加密数据发送解密并验证所述第一加密数据的解密验证请求;
    应答接收模块,接收所述解密及验证请求的应答;以及
    执行模块,在所述验证请求的应答为通过验证的情况下,基于解密后的标签数据执行数据处理。
  18. 如权利要求13所述的基于NFC标签的数据处理系统,其特征在于,
    其中,所述第一加密数据是按照第一加密算法对所述计数值和所述第一随机密钥进行加密运算生成加密后的加密数据并将所述加密数据、所述计数值和所述标签ID融合而生成。
  19. 如权利要求13所述的基于NFC标签的数据处理系统,其特征在于,进一步具备:
    随机密钥收发模块,用于从外部接收第二随机密钥并发送,其中,所述第二随机密钥在每次NFC标签交互时被生成并且也被用于加密所述标签数据而生成所述第一加密数据,
    其中,所述第一加密数据是按照第二加密算法对被输入的所述第二随机密钥、所 述计数值以及所述第一随机密钥一起进行加密运算生成加密数据并将所述加密数据、所述计数值和所述标签ID融合而生成。
  20. 一种服务器,其特征在于,包括:
    接收模块,接收第一加密数据,其中,所述第一加密数据是用对标签的交互次数进行计数并生成的计数值以及随机产生的第一随机密钥加密标签数据而生成,所述第一加密数据包括标签ID;
    存储模块,用于存储基于标签ID对应于所述第一随机密钥的第一随机初始密钥;解密验证模块,用于基于所述标签ID调用已存储的所述第一随机初始密钥来解密所述第一加密数据并进行验证;以及
    发送模块,用于在所述验证通过的情况下发送验证成功应答以及解密结果。
  21. 如权利要求20所述的服务器,其特征在于,
    其中,所述第一加密数据是按照第一加密算法所述计数值和所述第一随机密钥进行加密运算生成加密后的加密数据并将所述加密数据、所述计数值和所述标签ID融合生成,
    所述存储模块进一步用于存储基于标签ID对应于与所述第一加密算法的第一解密算法,
    所述解密验证模块基于所述标签ID调用已存储的所述第一随机初始密钥以及所述第一解密算法来解密所述第一加密数据并进行验证。
  22. 如权利要求20所述的服务器,其特征在于,进一步具备:
    随机密钥生成模块,用于在每次NFC标签交互时生成并发送第二随机密钥,其中,所述第二随机密钥也被用于加密所述标签数据而生成所述第一加密数据,
    其中,所述第一加密数据是按照第二加密算法对被输入的所述第二随机密钥、所涉及计数值以及所述第一随机密钥一起进行加密运算生成加密数据并将所述加密数据、所述计数值和所述标签ID融合而生成,
    所述存储模块用于存储基于标签ID对应于所述第二随机密钥的第二随机初始密钥以及基于标签ID对应于所述第二加密算法的第二解密算法,
    所述解密验证模块基于所述标签ID调用已存储的所述第一随机初始密钥、所述第二随机初始密钥以及所述第二解密算法来解密所述第一加密数据并进行验证。
  23. 一种计算机可读介质,其上存储有计算机程序,其特征在于, 该计算机程序被处理器执行时实现权利要求5~12中任意一项所述的基于NFC标签的数据处理方法。
  24. 一种计算机设备,包括存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求8~16中任意一项所述的基于NFC标签的数据处理方法。
PCT/CN2019/085246 2018-06-08 2019-04-30 标签数据生成方法、标签及基于nfc标签的数据处理 WO2019233224A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810586177.2A CN109120395B (zh) 2018-06-08 2018-06-08 标签数据生成方法、标签及基于nfc标签的数据处理
CN201810586177.2 2018-06-08

Publications (1)

Publication Number Publication Date
WO2019233224A1 true WO2019233224A1 (zh) 2019-12-12

Family

ID=64821864

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/085246 WO2019233224A1 (zh) 2018-06-08 2019-04-30 标签数据生成方法、标签及基于nfc标签的数据处理

Country Status (3)

Country Link
CN (1) CN109120395B (zh)
TW (1) TWI719470B (zh)
WO (1) WO2019233224A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984988A (zh) * 2020-09-01 2020-11-24 深圳壹账通智能科技有限公司 加密代码的生成方法、系统、计算机设备与存储介质
CN112885434A (zh) * 2021-03-23 2021-06-01 中国人民解放军联勤保障部队第九六〇医院 无网络环境下便携性信息采集与心理测试综合系统及方法
CN113742704A (zh) * 2021-08-25 2021-12-03 深圳市晨北科技有限公司 设备生产测试控制方法、设备及存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120395B (zh) * 2018-06-08 2021-12-07 中国银联股份有限公司 标签数据生成方法、标签及基于nfc标签的数据处理
CN111565105A (zh) * 2020-05-08 2020-08-21 福建汇天软件科技股份有限公司 一种基于校园的智能巡检方法及系统
CN114492491B (zh) * 2022-01-24 2022-09-13 芯电智联(北京)科技有限公司 一种nfc标签应用的数据管理系统
CN114786160B (zh) * 2022-04-12 2022-11-11 芯电智联(北京)科技有限公司 一种nfc标签密钥管理系统
CN116842479B (zh) * 2023-08-29 2023-12-12 腾讯科技(深圳)有限公司 图像处理方法、装置、计算机设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588386A (zh) * 2004-08-02 2005-03-02 上海质尊电子科技有限公司 射频识别与移动通信结合实现物品信息查验的系统和方法
CN102045356A (zh) * 2010-12-14 2011-05-04 中国科学院软件研究所 一种面向云存储的可信存储验证方法和系统
US20180077124A1 (en) * 2016-03-24 2018-03-15 Vincent Ramoutar Secure wireless communication device and method
CN107886333A (zh) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 一种具有动态防伪信息的防伪系统及其防伪方法
CN109120395A (zh) * 2018-06-08 2019-01-01 中国银联股份有限公司 标签数据生成方法、标签及基于nfc标签的数据处理

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7590840B2 (en) * 2003-09-26 2009-09-15 Randy Langer Method and system for authorizing client devices to receive secured data streams
US20070239615A1 (en) * 2004-04-23 2007-10-11 Natsume Matsuzaki Personal Information Management Device, Distributed Key Storage Device, and Personal Information Management System
US8010801B2 (en) * 2006-11-30 2011-08-30 Broadcom Corporation Multi-data rate security architecture for network security
US8832167B2 (en) * 2011-07-21 2014-09-09 Vixs Systems, Inc. Random number generator
CN103095460B (zh) * 2013-01-22 2015-07-22 飞天诚信科技股份有限公司 一种智能卡安全通讯的方法
CN103985043A (zh) * 2013-02-08 2014-08-13 江苏东仁网络科技有限公司 电子加密标签、防伪标签系统、物品防伪系统及方法
EP2913973A1 (en) * 2014-02-27 2015-09-02 Nxp B.V. Trusted NFC smart poster tag
CN105989481B (zh) * 2014-11-07 2020-05-15 天地融科技股份有限公司 数据交互方法及系统
US9516000B2 (en) * 2015-03-27 2016-12-06 International Business Machines Corporation Runtime instantiation of broadcast encryption schemes
CN205507872U (zh) * 2016-03-31 2016-08-24 中国银联股份有限公司 一种移动支付终端和支付系统
CN206961165U (zh) * 2017-06-16 2018-02-02 深圳信息职业技术学院 一种nfc防伪系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588386A (zh) * 2004-08-02 2005-03-02 上海质尊电子科技有限公司 射频识别与移动通信结合实现物品信息查验的系统和方法
CN102045356A (zh) * 2010-12-14 2011-05-04 中国科学院软件研究所 一种面向云存储的可信存储验证方法和系统
US20180077124A1 (en) * 2016-03-24 2018-03-15 Vincent Ramoutar Secure wireless communication device and method
CN107886333A (zh) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 一种具有动态防伪信息的防伪系统及其防伪方法
CN109120395A (zh) * 2018-06-08 2019-01-01 中国银联股份有限公司 标签数据生成方法、标签及基于nfc标签的数据处理

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984988A (zh) * 2020-09-01 2020-11-24 深圳壹账通智能科技有限公司 加密代码的生成方法、系统、计算机设备与存储介质
CN112885434A (zh) * 2021-03-23 2021-06-01 中国人民解放军联勤保障部队第九六〇医院 无网络环境下便携性信息采集与心理测试综合系统及方法
CN113742704A (zh) * 2021-08-25 2021-12-03 深圳市晨北科技有限公司 设备生产测试控制方法、设备及存储介质

Also Published As

Publication number Publication date
CN109120395B (zh) 2021-12-07
TW202002563A (zh) 2020-01-01
CN109120395A (zh) 2019-01-01
TWI719470B (zh) 2021-02-21

Similar Documents

Publication Publication Date Title
WO2019233224A1 (zh) 标签数据生成方法、标签及基于nfc标签的数据处理
US11877213B2 (en) Methods and systems for asset obfuscation
US8898086B2 (en) Systems and methods for transmitting financial account information
JP5959410B2 (ja) 決済方法、これを実行する決済サーバ、これを実行するためのプログラム及びこれを実行するシステム
CN104765999B (zh) 一种对用户资源信息进行处理的方法、终端及服务器
CN111201752A (zh) 基于哈希的数据验证系统
US20150106239A1 (en) Tokenization revocation list
CN111047313B (zh) 扫码支付、信息发送和密钥管理方法、装置和设备
GB2551775A (en) Communications device, point of sale device, payment device and methods
CN101162535B (zh) 利用ic卡实现磁条卡交易的方法及系统
CN110290134A (zh) 一种身份认证方法、装置、存储介质及处理器
US20140289129A1 (en) Method for secure contactless communication of a smart card and a point of sale terminal
CN103942896A (zh) 一种在atm机上实现无卡取款的系统
US20160292676A1 (en) Cryptographic apparatus
AU2023201327B2 (en) Techniques for secure channel communications
KR20210095705A (ko) 오프라인 인증을 안전하게 수행하기 위한 기법
US20240048395A1 (en) Method and system for authentication credential
CN111062717B (zh) 一种数据转移处理方法、装置和计算机可读存储介质
CN104125064A (zh) 一种动态密码认证方法、客户端及认证系统
US11070378B1 (en) Signcrypted biometric electronic signature tokens
KR102073563B1 (ko) Qr 코드 기반의 금융자동화기기를 이용한 금융거래 방법 및 시스템
US20200250670A1 (en) System for Secure Authentication of a User's Identity in an Electronic System for Banking Transactions
CN113595714A (zh) 带有多个旋转安全密钥的非接触式卡
KR102348823B1 (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법
CN107808284B (zh) 一种基于pos机系统的支付方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19814313

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19814313

Country of ref document: EP

Kind code of ref document: A1