CN109472150A - A kind of setting read method of the file information - Google Patents

A kind of setting read method of the file information Download PDF

Info

Publication number
CN109472150A
CN109472150A CN201811284829.3A CN201811284829A CN109472150A CN 109472150 A CN109472150 A CN 109472150A CN 201811284829 A CN201811284829 A CN 201811284829A CN 109472150 A CN109472150 A CN 109472150A
Authority
CN
China
Prior art keywords
file information
code
tag uid
cryptographic hash
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811284829.3A
Other languages
Chinese (zh)
Other versions
CN109472150B (en
Inventor
刘柄鑫
邹九铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan University
Original Assignee
Foshan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan University filed Critical Foshan University
Priority to CN201811284829.3A priority Critical patent/CN109472150B/en
Publication of CN109472150A publication Critical patent/CN109472150A/en
Application granted granted Critical
Publication of CN109472150B publication Critical patent/CN109472150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of setting read methods of the file information, comprising the following steps: input file information and RF tag UID in the database;Cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtains cryptographic Hash corresponding to the file information;It is in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;The RF tag UID of file is obtained using radio-frequency card reader;Using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, and operation is decoded to cryptographic Hash and obtains corresponding the file information.The present invention carries out cryptographic operation to each the file information inputted by SHA-1 hash algorithm, obtain the cryptographic Hash of each the file information, the cryptographic Hash of each the file information and RF tag UID are associated again, can guarantee the safety of information when reading the file information.

Description

A kind of setting read method of the file information
Technical field
The present invention relates to a kind of setting of the file information and read method, this method is mainly used in based on RFID (radio frequency Identification) technology file management system.
Background technique
Currently, many industries all employ Radio Frequency Identification Technology, for example, label is attached to industrial production in the industrial production In product, the progress of the tracing product that manufacturer can be convenient in the production line;The traffic that people are commonly used in daily life Block, is commonly used the technology in identity card.But be used to that the system that file is managed to be currently mainly used is bar shaped Code technology and planar bar code technology, two dimensional code optical recognition is as current the most widely used tag identification technologies, really Real, it has rapidly captured market with extremely cheap manufacturing cost.But just because of its technology content is too low, it is also with regard to only The reliability of its entrained information can be ensured in a short time.Its limitation clearly, mainly due to two dimensional code discomfort Cooperation protects stored medium for needs for a long time.Bar codes technique equally also has drawbacks described above.
The normal process for reading information using Radio Frequency Identification Technology in the prior art is as follows, obtains RF tag first UID recycles the UID information of RF tag to search out the file information associated with it in the database later, but this text The acquisition process safety of part information is insufficient, is easy illegally to be obtained by other people.
Summary of the invention
The technical problem to be solved by the present invention is how to improve the safety of the file information acquisition in file management system Property.
The solution that the present invention solves its technical problem is:
A kind of setting read method of the file information, comprising the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtained corresponding to the file information Cryptographic Hash;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to Kazakhstan Uncommon value is decoded operation and obtains corresponding the file information.
As a further improvement of the above technical scheme, the RF tag UID includes information code and secret key code, difference Secret key code and different Encryption Algorithm it is corresponding, the information code is source code to be added by Encryption Algorithm corresponding to secret key code It is obtained after close, enables source code associated with the cryptographic Hash of the file information in the database, RF tag UID is obtained in step 5 Operation is decrypted to information code according to Encryption Algorithm corresponding to secret key code afterwards and obtains source code.
As a further improvement of the above technical scheme, after the step 3, further include step 3a, establish classification tree mould Type classifies to source code all in database using classification-tree method, all source codes is divided into multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, it is fixed After position goes out the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, behaviour is decoded to cryptographic Hash Obtain corresponding the file information.
As a further improvement of the above technical scheme, the source code includes several verification code bits, the check code The quantity of position is corresponding with the quantity of classification-tree method level, and each verification code bit is respectively as each in classification-tree method The variable parameter of hierarchy node.
The beneficial effects of the present invention are: the present invention carries out each the file information inputted by SHA-1 hash algorithm Cryptographic operation obtains the cryptographic Hash of each the file information, then the cryptographic Hash of each the file information is associated with RF tag UID Get up, can guarantee the safety of information when reading the file information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described.Obviously, described attached drawing is a part of the embodiments of the present invention, rather than is all implemented Example, those skilled in the art without creative efforts, can also be obtained according to these attached drawings other designs Scheme and attached drawing.
Fig. 1 is the method flow diagram of the invention.
Specific embodiment
It is carried out below with reference to technical effect of the embodiment and attached drawing to design of the invention, specific structure and generation clear Chu, complete description, to be completely understood by the purpose of the present invention, feature and effect.Obviously, described embodiment is this hair Bright a part of the embodiment, rather than whole embodiments, based on the embodiment of the present invention, those skilled in the art are not being paid Other embodiments obtained, belong to the scope of protection of the invention under the premise of creative work.In addition, be previously mentioned in text All connection relationships not singly refer to that component directly connects, and referring to can be according to specific implementation situation, by adding or reducing connection Auxiliary, Lai Zucheng more preferably connection structure.Each technical characteristic in the invention, under the premise of not conflicting conflict It can be with combination of interactions.
Referring to Fig.1, this application discloses a kind of setting read methods of the file information, comprising the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtained corresponding to the file information Cryptographic Hash;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to Kazakhstan Uncommon value is decoded operation and obtains corresponding the file information.
Specifically, the present invention carries out cryptographic operation to each the file information inputted by SHA-1 hash algorithm, obtains The cryptographic Hash of each the file information, then the cryptographic Hash of each the file information and RF tag UID are associated, reading text It can guarantee the safety of information when part information.
It is further used as preferred embodiment, in the application specific embodiment, the RF tag UID includes information Code and secret key code, different secret key codes and different Encryption Algorithm are corresponding, and the information code is source code by secret key code It is obtained after corresponding Encryption Algorithm encryption, enables source code associated with the cryptographic Hash of the file information in the database, step 5 Operation is decrypted to information code according to Encryption Algorithm corresponding to secret key code after middle acquisition RF tag UID and obtains source code. For the safety for further increasing the file information acquisition, the application also carries out cryptographic operation to RF tag simultaneously, and encrypts Used algorithm needs to carry out respective operations according to the particular content of secret key code when with decryption, and safety greatly improves.
It is further used as preferred embodiment, in the application specific embodiment, needing when executing step 5 will be acquired Source code and database in all stored source codes compared one by one, when depositing original number of codes mistake in database When more, read access time is seriously affected.To solve the above problems, the application after the step 3, further includes step 3a, establish Classification-tree method classifies to source code all in database using classification-tree method, all source codes is divided into Multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, it is fixed After position goes out the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, behaviour is decoded to cryptographic Hash Obtain corresponding the file information.
It is further used as preferred embodiment, in the application specific embodiment, the source code includes several schools Code bit is tested, the quantity of the verification code bit is corresponding with the quantity of classification-tree method level, and each verification code bit is made respectively For the variable parameter of hierarchy node each in classification-tree method.
Better embodiment of the invention is illustrated above, but the invention is not limited to the implementation Example, those skilled in the art can also make various equivalent modifications on the premise of without prejudice to spirit of the invention or replace It changes, these equivalent variation or replacement are all included in the scope defined by the claims of the present application.

Claims (4)

1. a kind of setting read method of the file information, which comprises the following steps:
Step 1, input file information and RF tag UID in the database;
Step 2, cryptographic operation is carried out to the file information using SHA-1 hash algorithm, obtains Kazakhstan corresponding to the file information Uncommon value;
Step 3, in the database that RF tag UID is associated with cryptographic Hash corresponding to the file information;
Step 4, the RF tag UID of file is obtained using radio-frequency card reader;
Step 5, using RF tag UID, cryptographic Hash associated with RF tag UID is found in the database, to cryptographic Hash It is decoded operation and obtains corresponding the file information.
2. a kind of setting read method of the file information according to claim 1, which is characterized in that the RF tag UID includes information code and secret key code, and different secret key codes and different Encryption Algorithm are corresponding, and the information code is source code It is obtained after the encryption of the Encryption Algorithm corresponding to the secret key code, enables cryptographic Hash phase of the source code with the file information in the database It is associated with, information code is decrypted according to Encryption Algorithm corresponding to secret key code after acquisition RF tag UID in step 5 and is operated To source code.
3. a kind of setting read method of the file information according to claim 2, which is characterized in that after the step 3, Further include step 3a, establish classification-tree method, is classified using classification-tree method to source code all in database, by institute Some source codes are divided into multiple code characters;
After the source code for obtaining RF tag UID in step 5, the source code is input in classification-tree method, is oriented After the affiliated code character of source code, then cryptographic Hash associated with RF tag UID is found, cryptographic Hash is decoded and is operated To corresponding the file information.
4. a kind of setting read method of the file information according to claim 3, which is characterized in that the source code includes The quantity of several verification code bits, the verification code bit is corresponding with the quantity of classification-tree method level, each check code Variable parameter of the position respectively as hierarchy node each in classification-tree method.
CN201811284829.3A 2018-10-31 2018-10-31 Method for setting and reading file information Active CN109472150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811284829.3A CN109472150B (en) 2018-10-31 2018-10-31 Method for setting and reading file information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811284829.3A CN109472150B (en) 2018-10-31 2018-10-31 Method for setting and reading file information

Publications (2)

Publication Number Publication Date
CN109472150A true CN109472150A (en) 2019-03-15
CN109472150B CN109472150B (en) 2021-06-29

Family

ID=65672474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811284829.3A Active CN109472150B (en) 2018-10-31 2018-10-31 Method for setting and reading file information

Country Status (1)

Country Link
CN (1) CN109472150B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111739190A (en) * 2020-05-27 2020-10-02 深圳市元征科技股份有限公司 Vehicle diagnostic file encryption method, device, equipment and storage medium
CN113840162A (en) * 2021-09-27 2021-12-24 中通服创立信息科技有限责任公司 IPTV video file tamper-proof method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070255530A1 (en) * 2006-04-21 2007-11-01 Ricoh Co., Ltd. Secure and efficient methods for logging and synchronizing data exchanges
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN101894282A (en) * 2010-06-17 2010-11-24 深圳市科陆软件有限公司 Access method of mass data in RFID (Radio Frequency Identification Device) electronic tag
CN202887256U (en) * 2012-10-31 2013-04-17 华南理工大学 Internet of things supply chain traceability system for livestock type agricultural products
CN103440548A (en) * 2013-08-13 2013-12-11 北京科技大学 Method for converting radio frequency label into two-dimensional codes
CN104091272A (en) * 2014-07-09 2014-10-08 北京信长城技术研究院 Identifying and tracing system with unique identity and method
CN105354233A (en) * 2015-10-08 2016-02-24 西安电子科技大学 Linear SVM classification service query system and method with two-way privacy protection
US20170048060A1 (en) * 2014-06-16 2017-02-16 Verizon Deutschland Gmbh Data exchange in the internet of things

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070255530A1 (en) * 2006-04-21 2007-11-01 Ricoh Co., Ltd. Secure and efficient methods for logging and synchronizing data exchanges
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN101894282A (en) * 2010-06-17 2010-11-24 深圳市科陆软件有限公司 Access method of mass data in RFID (Radio Frequency Identification Device) electronic tag
CN202887256U (en) * 2012-10-31 2013-04-17 华南理工大学 Internet of things supply chain traceability system for livestock type agricultural products
CN103440548A (en) * 2013-08-13 2013-12-11 北京科技大学 Method for converting radio frequency label into two-dimensional codes
US20170048060A1 (en) * 2014-06-16 2017-02-16 Verizon Deutschland Gmbh Data exchange in the internet of things
CN104091272A (en) * 2014-07-09 2014-10-08 北京信长城技术研究院 Identifying and tracing system with unique identity and method
CN105354233A (en) * 2015-10-08 2016-02-24 西安电子科技大学 Linear SVM classification service query system and method with two-way privacy protection

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111739190A (en) * 2020-05-27 2020-10-02 深圳市元征科技股份有限公司 Vehicle diagnostic file encryption method, device, equipment and storage medium
CN113840162A (en) * 2021-09-27 2021-12-24 中通服创立信息科技有限责任公司 IPTV video file tamper-proof method
CN113840162B (en) * 2021-09-27 2023-07-25 中通服创立信息科技有限责任公司 IPTV video file tamper-proof method

Also Published As

Publication number Publication date
CN109472150B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN101042736B (en) Smart card and method for accessing objects in smart card
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
CN103218591A (en) Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN101593264A (en) Method for anti-counterfeit based on radio-frequency (RF) identification
CN101945123A (en) RFID mobile phone and combination key technology-based authenticity identification method
CN107194706B (en) Anti-counterfeiting tracing method based on multi-spectrum wavelength
CN103496350A (en) Electronic license plate and method for reading information in electronic license plate
CN101452539A (en) Mobile identification method based on NFC
CN109472150A (en) A kind of setting read method of the file information
CN104866775A (en) Bleaching method for financial data
CN101685503A (en) Method and system for inquiring product information
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
CN101118589A (en) Read-write machine dedicated for false proof based on radio frequency recognizing technology and management method
CN114897536A (en) Commodity anti-counterfeiting tracing method based on RFID (radio frequency identification) label and block chain
CN102411748A (en) Safety anti-counterfeiting system and method based on two wireless radio frequency tags
CN101667247A (en) Method for anti-counterfeiting metal parts
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN102521626B (en) Method and system for multi-application management of intelligent cards
CN112887297B (en) Privacy-protecting differential data determining method, device, equipment and system
CN113159245A (en) Industrial Internet label analysis method and device and electronic equipment
CN103413155A (en) Electronic anti-counterfeiting tracing tag design compatible with high-frequency RFID and NFC system
CN101593286A (en) A kind of RFID tag and recognition methods
CN109191127A (en) A kind of method and tool of digital asset secure storage
CN107423804B (en) Smart card, smart card management system and management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant