CN109472150A - A kind of setting read method of the file information - Google Patents
A kind of setting read method of the file information Download PDFInfo
- Publication number
- CN109472150A CN109472150A CN201811284829.3A CN201811284829A CN109472150A CN 109472150 A CN109472150 A CN 109472150A CN 201811284829 A CN201811284829 A CN 201811284829A CN 109472150 A CN109472150 A CN 109472150A
- Authority
- CN
- China
- Prior art keywords
- file information
- code
- tag uid
- cryptographic hash
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of setting read methods of the file information, comprising the following steps: input file information and RF tag UID in the database;Cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtains cryptographic Hash corresponding to the file information;It is in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;The RF tag UID of file is obtained using radio-frequency card reader;Using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, and operation is decoded to cryptographic Hash and obtains corresponding the file information.The present invention carries out cryptographic operation to each the file information inputted by SHA-1 hash algorithm, obtain the cryptographic Hash of each the file information, the cryptographic Hash of each the file information and RF tag UID are associated again, can guarantee the safety of information when reading the file information.
Description
Technical field
The present invention relates to a kind of setting of the file information and read method, this method is mainly used in based on RFID (radio frequency
Identification) technology file management system.
Background technique
Currently, many industries all employ Radio Frequency Identification Technology, for example, label is attached to industrial production in the industrial production
In product, the progress of the tracing product that manufacturer can be convenient in the production line;The traffic that people are commonly used in daily life
Block, is commonly used the technology in identity card.But be used to that the system that file is managed to be currently mainly used is bar shaped
Code technology and planar bar code technology, two dimensional code optical recognition is as current the most widely used tag identification technologies, really
Real, it has rapidly captured market with extremely cheap manufacturing cost.But just because of its technology content is too low, it is also with regard to only
The reliability of its entrained information can be ensured in a short time.Its limitation clearly, mainly due to two dimensional code discomfort
Cooperation protects stored medium for needs for a long time.Bar codes technique equally also has drawbacks described above.
The normal process for reading information using Radio Frequency Identification Technology in the prior art is as follows, obtains RF tag first
UID recycles the UID information of RF tag to search out the file information associated with it in the database later, but this text
The acquisition process safety of part information is insufficient, is easy illegally to be obtained by other people.
Summary of the invention
The technical problem to be solved by the present invention is how to improve the safety of the file information acquisition in file management system
Property.
The solution that the present invention solves its technical problem is:
A kind of setting read method of the file information, comprising the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtained corresponding to the file information
Cryptographic Hash;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to Kazakhstan
Uncommon value is decoded operation and obtains corresponding the file information.
As a further improvement of the above technical scheme, the RF tag UID includes information code and secret key code, difference
Secret key code and different Encryption Algorithm it is corresponding, the information code is source code to be added by Encryption Algorithm corresponding to secret key code
It is obtained after close, enables source code associated with the cryptographic Hash of the file information in the database, RF tag UID is obtained in step 5
Operation is decrypted to information code according to Encryption Algorithm corresponding to secret key code afterwards and obtains source code.
As a further improvement of the above technical scheme, after the step 3, further include step 3a, establish classification tree mould
Type classifies to source code all in database using classification-tree method, all source codes is divided into multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, it is fixed
After position goes out the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, behaviour is decoded to cryptographic Hash
Obtain corresponding the file information.
As a further improvement of the above technical scheme, the source code includes several verification code bits, the check code
The quantity of position is corresponding with the quantity of classification-tree method level, and each verification code bit is respectively as each in classification-tree method
The variable parameter of hierarchy node.
The beneficial effects of the present invention are: the present invention carries out each the file information inputted by SHA-1 hash algorithm
Cryptographic operation obtains the cryptographic Hash of each the file information, then the cryptographic Hash of each the file information is associated with RF tag UID
Get up, can guarantee the safety of information when reading the file information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described.Obviously, described attached drawing is a part of the embodiments of the present invention, rather than is all implemented
Example, those skilled in the art without creative efforts, can also be obtained according to these attached drawings other designs
Scheme and attached drawing.
Fig. 1 is the method flow diagram of the invention.
Specific embodiment
It is carried out below with reference to technical effect of the embodiment and attached drawing to design of the invention, specific structure and generation clear
Chu, complete description, to be completely understood by the purpose of the present invention, feature and effect.Obviously, described embodiment is this hair
Bright a part of the embodiment, rather than whole embodiments, based on the embodiment of the present invention, those skilled in the art are not being paid
Other embodiments obtained, belong to the scope of protection of the invention under the premise of creative work.In addition, be previously mentioned in text
All connection relationships not singly refer to that component directly connects, and referring to can be according to specific implementation situation, by adding or reducing connection
Auxiliary, Lai Zucheng more preferably connection structure.Each technical characteristic in the invention, under the premise of not conflicting conflict
It can be with combination of interactions.
Referring to Fig.1, this application discloses a kind of setting read methods of the file information, comprising the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtained corresponding to the file information
Cryptographic Hash;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to Kazakhstan
Uncommon value is decoded operation and obtains corresponding the file information.
Specifically, the present invention carries out cryptographic operation to each the file information inputted by SHA-1 hash algorithm, obtains
The cryptographic Hash of each the file information, then the cryptographic Hash of each the file information and RF tag UID are associated, reading text
It can guarantee the safety of information when part information.
It is further used as preferred embodiment, in the application specific embodiment, the RF tag UID includes information
Code and secret key code, different secret key codes and different Encryption Algorithm are corresponding, and the information code is source code by secret key code
It is obtained after corresponding Encryption Algorithm encryption, enables source code associated with the cryptographic Hash of the file information in the database, step 5
Operation is decrypted to information code according to Encryption Algorithm corresponding to secret key code after middle acquisition RF tag UID and obtains source code.
For the safety for further increasing the file information acquisition, the application also carries out cryptographic operation to RF tag simultaneously, and encrypts
Used algorithm needs to carry out respective operations according to the particular content of secret key code when with decryption, and safety greatly improves.
It is further used as preferred embodiment, in the application specific embodiment, needing when executing step 5 will be acquired
Source code and database in all stored source codes compared one by one, when depositing original number of codes mistake in database
When more, read access time is seriously affected.To solve the above problems, the application after the step 3, further includes step 3a, establish
Classification-tree method classifies to source code all in database using classification-tree method, all source codes is divided into
Multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, it is fixed
After position goes out the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, behaviour is decoded to cryptographic Hash
Obtain corresponding the file information.
It is further used as preferred embodiment, in the application specific embodiment, the source code includes several schools
Code bit is tested, the quantity of the verification code bit is corresponding with the quantity of classification-tree method level, and each verification code bit is made respectively
For the variable parameter of hierarchy node each in classification-tree method.
Better embodiment of the invention is illustrated above, but the invention is not limited to the implementation
Example, those skilled in the art can also make various equivalent modifications on the premise of without prejudice to spirit of the invention or replace
It changes, these equivalent variation or replacement are all included in the scope defined by the claims of the present application.
Claims (4)
1. a kind of setting read method of the file information, which comprises the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtains Kazakhstan corresponding to the file information
Uncommon value;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to cryptographic Hash
It is decoded operation and obtains corresponding the file information.
2. a kind of setting read method of the file information according to claim 1, which is characterized in that the RF tag
UID includes information code and secret key code, and different secret key codes and different Encryption Algorithm are corresponding, and the information code is source code
It is obtained after the encryption of the Encryption Algorithm corresponding to the secret key code, enables cryptographic Hash phase of the source code with the file information in the database
It is associated with, information code is decrypted according to Encryption Algorithm corresponding to secret key code after acquisition RF tag UID in step 5 and is operated
To source code.
3. a kind of setting read method of the file information according to claim 2, which is characterized in that after the step 3,
Further include step 3a, establish classification-tree method, is classified using classification-tree method to source code all in database, by institute
Some source codes are divided into multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, is oriented
After the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, cryptographic Hash is decoded and is operated
To corresponding the file information.
4. a kind of setting read method of the file information according to claim 3, which is characterized in that the source code includes
The quantity of several verification code bits, the verification code bit is corresponding with the quantity of classification-tree method level, each check code
Variable parameter of the position respectively as hierarchy node each in classification-tree method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811284829.3A CN109472150B (en) | 2018-10-31 | 2018-10-31 | Method for setting and reading file information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811284829.3A CN109472150B (en) | 2018-10-31 | 2018-10-31 | Method for setting and reading file information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109472150A true CN109472150A (en) | 2019-03-15 |
CN109472150B CN109472150B (en) | 2021-06-29 |
Family
ID=65672474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811284829.3A Active CN109472150B (en) | 2018-10-31 | 2018-10-31 | Method for setting and reading file information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109472150B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111739190A (en) * | 2020-05-27 | 2020-10-02 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
CN113840162A (en) * | 2021-09-27 | 2021-12-24 | 中通服创立信息科技有限责任公司 | IPTV video file tamper-proof method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070255530A1 (en) * | 2006-04-21 | 2007-11-01 | Ricoh Co., Ltd. | Secure and efficient methods for logging and synchronizing data exchanges |
CN101354753A (en) * | 2008-09-10 | 2009-01-28 | 张其善 | Method for making product label, method and system for verifying product genuine-fake |
CN101894282A (en) * | 2010-06-17 | 2010-11-24 | 深圳市科陆软件有限公司 | Access method of mass data in RFID (Radio Frequency Identification Device) electronic tag |
CN202887256U (en) * | 2012-10-31 | 2013-04-17 | 华南理工大学 | Internet of things supply chain traceability system for livestock type agricultural products |
CN103440548A (en) * | 2013-08-13 | 2013-12-11 | 北京科技大学 | Method for converting radio frequency label into two-dimensional codes |
CN104091272A (en) * | 2014-07-09 | 2014-10-08 | 北京信长城技术研究院 | Identifying and tracing system with unique identity and method |
CN105354233A (en) * | 2015-10-08 | 2016-02-24 | 西安电子科技大学 | Linear SVM classification service query system and method with two-way privacy protection |
US20170048060A1 (en) * | 2014-06-16 | 2017-02-16 | Verizon Deutschland Gmbh | Data exchange in the internet of things |
-
2018
- 2018-10-31 CN CN201811284829.3A patent/CN109472150B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070255530A1 (en) * | 2006-04-21 | 2007-11-01 | Ricoh Co., Ltd. | Secure and efficient methods for logging and synchronizing data exchanges |
CN101354753A (en) * | 2008-09-10 | 2009-01-28 | 张其善 | Method for making product label, method and system for verifying product genuine-fake |
CN101894282A (en) * | 2010-06-17 | 2010-11-24 | 深圳市科陆软件有限公司 | Access method of mass data in RFID (Radio Frequency Identification Device) electronic tag |
CN202887256U (en) * | 2012-10-31 | 2013-04-17 | 华南理工大学 | Internet of things supply chain traceability system for livestock type agricultural products |
CN103440548A (en) * | 2013-08-13 | 2013-12-11 | 北京科技大学 | Method for converting radio frequency label into two-dimensional codes |
US20170048060A1 (en) * | 2014-06-16 | 2017-02-16 | Verizon Deutschland Gmbh | Data exchange in the internet of things |
CN104091272A (en) * | 2014-07-09 | 2014-10-08 | 北京信长城技术研究院 | Identifying and tracing system with unique identity and method |
CN105354233A (en) * | 2015-10-08 | 2016-02-24 | 西安电子科技大学 | Linear SVM classification service query system and method with two-way privacy protection |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111739190A (en) * | 2020-05-27 | 2020-10-02 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
CN113840162A (en) * | 2021-09-27 | 2021-12-24 | 中通服创立信息科技有限责任公司 | IPTV video file tamper-proof method |
CN113840162B (en) * | 2021-09-27 | 2023-07-25 | 中通服创立信息科技有限责任公司 | IPTV video file tamper-proof method |
Also Published As
Publication number | Publication date |
---|---|
CN109472150B (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101042736B (en) | Smart card and method for accessing objects in smart card | |
CN101923660B (en) | Dynamic password identity authorization system and method based on RFID | |
CN103218591A (en) | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN101593264A (en) | Method for anti-counterfeit based on radio-frequency (RF) identification | |
CN101945123A (en) | RFID mobile phone and combination key technology-based authenticity identification method | |
CN107194706B (en) | Anti-counterfeiting tracing method based on multi-spectrum wavelength | |
CN103496350A (en) | Electronic license plate and method for reading information in electronic license plate | |
CN101452539A (en) | Mobile identification method based on NFC | |
CN109472150A (en) | A kind of setting read method of the file information | |
CN104866775A (en) | Bleaching method for financial data | |
CN101685503A (en) | Method and system for inquiring product information | |
CN108082723B (en) | Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof | |
CN101118589A (en) | Read-write machine dedicated for false proof based on radio frequency recognizing technology and management method | |
CN114897536A (en) | Commodity anti-counterfeiting tracing method based on RFID (radio frequency identification) label and block chain | |
CN102411748A (en) | Safety anti-counterfeiting system and method based on two wireless radio frequency tags | |
CN101667247A (en) | Method for anti-counterfeiting metal parts | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
CN102521626B (en) | Method and system for multi-application management of intelligent cards | |
CN112887297B (en) | Privacy-protecting differential data determining method, device, equipment and system | |
CN113159245A (en) | Industrial Internet label analysis method and device and electronic equipment | |
CN103413155A (en) | Electronic anti-counterfeiting tracing tag design compatible with high-frequency RFID and NFC system | |
CN101593286A (en) | A kind of RFID tag and recognition methods | |
CN109191127A (en) | A kind of method and tool of digital asset secure storage | |
CN107423804B (en) | Smart card, smart card management system and management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |