CN109741067A - A kind of data processing method and device based on IC card unlocking - Google Patents

A kind of data processing method and device based on IC card unlocking Download PDF

Info

Publication number
CN109741067A
CN109741067A CN201811558843.8A CN201811558843A CN109741067A CN 109741067 A CN109741067 A CN 109741067A CN 201811558843 A CN201811558843 A CN 201811558843A CN 109741067 A CN109741067 A CN 109741067A
Authority
CN
China
Prior art keywords
card
target
read
code
write equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811558843.8A
Other languages
Chinese (zh)
Other versions
CN109741067B (en
Inventor
苏浩伟
谢振东
顾裕波
温晓丽
袁勇
邹大毕
李靖凯
李泽城
叶少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yang Cheng Tong Co Ltd
Original Assignee
Guangzhou Yang Cheng Tong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yang Cheng Tong Co Ltd filed Critical Guangzhou Yang Cheng Tong Co Ltd
Priority to CN201811558843.8A priority Critical patent/CN109741067B/en
Publication of CN109741067A publication Critical patent/CN109741067A/en
Application granted granted Critical
Publication of CN109741067B publication Critical patent/CN109741067B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of data processing method unlocked based on IC card and devices, wherein, it is a kind of based on IC card unlock data processing method include when read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in the identifying code;Identifying code is written in the target IC card by the read-write equipment, so that the target IC card generates the first MAC code according to the first default generating mode, the identifying code;The read-write equipment receives the first MAC code that the target IC card is sent;The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;When the verification result be by when, then read-write equipment control locking device is opened.The present invention can be improved in digitlization transaction, the Information Security of IC card.

Description

A kind of data processing method and device based on IC card unlocking
Technical field
The present invention relates to Internet technical field more particularly to a kind of data processing method unlocked based on IC card and dresses It sets.
Background technique
With the development of society, IC card is widely used in digitlization transaction, for example, IC card is taken as bus card to be used for Pay the expense to take public transport.Since IC card stores more important Transaction Information, once and the transaction of IC card Information, which is maliciously stolen, perhaps maliciously to be rewritten and will be brought more to the IC card person of holding or other related sides relevant to IC card Therefore serious economic loss in digitlization process of exchange, is handled IC card using cryptographic means, to improve IC card Information security be particularly important.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that providing a kind of data processing method unlocked based on IC card And device, for solving the problems, such as the existing Information Security during IC card is in digitlization transaction.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention discloses a kind of data unlocked based on IC card Processing method, this method comprises:
When read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in described test Demonstrate,prove code;
Identifying code is written in the target IC card by the read-write equipment, so that the target IC card is pre- according to first If generating mode, the identifying code generate the first MAC code;
The read-write equipment receives the first MAC code that the target IC card is sent;
The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;
When the verification result be by when, then read-write equipment control locking device is opened.
Optionally, the read-write equipment includes: according to preset proof rule verifying the first MAC code
The read-write equipment generates the 2nd MAC code according to the described first default generating mode, the identifying code;
The first MAC code is compared by the read-write equipment with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then the read-write equipment determines that the verification result is Pass through.
Optionally, before the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the data Processing method further include:
When the read-write equipment receives the unlocking request of user's triggering, the read-write equipment judges in its wireless identification It whether there is the target IC card in range, if so, the read-write equipment identifies the target IC card and reads the target The relevant information of IC card;
The read-write equipment determination recognizes the target IC card.
Optionally, the relevant information includes the ID of the target IC card, the use initial time of the target IC card, institute That states target IC card uses at least one of end time;
And the read-write equipment generates the 2nd MAC code and wraps according to the described first default generating mode, the identifying code It includes:
The read-write equipment is successively by the ID of the target IC card, the use initial time of the target IC card, the mesh Mark IC card is converted to single byte binary data stream using end time, the identifying code;
Institute's read-write equipment according to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with it is described The corresponding single byte binary data stream of the ID of target IC card, the target IC card use initial time correspond to single byte two into The use end time corresponding single byte binary data stream progress add operation of data flow, the target IC card processed;
When the read-write equipment successively originates the use of the add operation result of the target IC card, the target IC card Between add operation result, the target IC card the addition using the add operation result of end time, the identifying code transport Result is calculated to be spliced;
The read-write equipment is based on the raw 2nd MAC code of splicing result.
Optionally, the relevant information further includes the first authentication code being stored in advance in the target IC card;
And after the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the read-write dress It sets before identifying code is written in the target IC card, the data processing method further include:
The read-write equipment obtains the second authentication code of user's input;
Second authentication code is compared by the read-write equipment with first authentication code;
When first identity code is consistent with second identity code, then the identifying code is written to the target by execution In IC card.
Optionally, the relevant information can also include the history use information of the target IC card, wherein the history Use information includes the last time of the target IC card using region information;
And when the verification result be by when, and the read-write equipment control locking device open before, the side Method further include:
The read-write equipment obtains current geographic position information;
Whether the read-write equipment judges described last identical using region information and current geographic position information;
When the read-write equipment judges that the last time is not identical using region information and current geographic position information When, it states read-write equipment and generates abnormal login information and be abnormal using state by the status indication of the target IC card, with limitation The user unlocks;
The abnormal login information is showed the user by the read-write equipment, so that user inputs the target IC The password of card;
The read-write equipment receives the password of the target IC card of user's input;
The read-write equipment sends cipher inquiry request to Operation Server, so that the Operation Server is described close Code generates password authentification after being verified and successfully prompts, wherein cipher inquiry request include the target IC card ID and The password of the target IC card;
The read-write equipment receives the password authentification that the Operation Server is sent and successfully prompts and release the target IC The abnormal using state of card.
Optionally, it is successfully prompted in the password authentification that the read-write equipment receives the Operation Server transmission and releases institute After the abnormal using state for stating target IC card, the data processing method further include:
The read-write equipment, which generates, to be substituted confirmation prompt and replacement confirmation prompt is showed the user, so that The user confirms that prompt input substitutes confirmation instruction according to the replacement;
The read-write equipment receives the replacement confirmation instruction and the last time of the target IC card is used institute Substituting in area information is the current geographic position information.
Second aspect of the present invention discloses a kind of data processing equipment unlocked based on IC card, the data processing equipment packet It includes:
Identifying code generation module, for an identifying code when recognizing target IC card, to be randomly generated and keeps in described test Demonstrate,prove code;
Writing module, for after identifying code generation module is randomly generated an identifying code and keeps in the identifying code, Identifying code is written in the target IC card, so that the target IC card is according to the first default generating mode, the verifying Code generates the first MAC code;
Receiving module, for receiving the target after identifying code is written in the target IC card by writing module The first MAC code that IC card is sent;
MAC code authentication module, for after receiving module receives the first MAC code, according to preset proof rule Verify the first MAC code;
Drive module passes through for verifying the first MAC code according to preset proof rule when MAC code authentication module When, control locking device is opened.
Optionally, MAC code authentication module may include that the 2nd MAC code generates submodule, MAC code Comparative sub-module, first Determine submodule, in which:
2nd MAC code generates submodule, for generating second according to the described first default generating mode, the identifying code MAC code;
MAC code Comparative sub-module is used for after the 2nd MAC code generates submodule the 2nd MAC code of generation, will be described First MAC code is compared with the 2nd MAC code;
First determines submodule, is the first MAC code and described for the comparison result when MAC code Comparative sub-module When two MAC codes are identical, determine that the verification result is to pass through.
Optionally, the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention can also include identification mould Block, and, identification module may include the first judging submodule, the first reading submodule, the second determining submodule, in which:
First judging submodule judges when for receiving the unlocking request of user's triggering when the read-write equipment at it It whether there is the target IC card within the scope of wireless identification;
First reading submodule, for judging that there are the targets within the scope of its wireless identification when the first judging submodule When IC card, the relevant information for reading the target IC card is executed;
Second determines submodule, after the relevant information for reading the target IC card when the first reading submodule, Determination recognizes the target IC card.
Optionally, the relevant information includes the ID of the target IC card, the use initial time of the target IC card, institute That states target IC card uses at least one of end time;
And the 2nd MAC code generate submodule and execute and generate the according to the described first default generating mode, the identifying code The concrete mode of two MAC codes are as follows:
Successively by the ID of the target IC card, the use using initial time, the target IC card of the target IC card End time, the identifying code are converted to single byte binary data stream;
According to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with the target IC card The corresponding single byte binary data stream of ID, the target IC card use initial time correspond to single byte binary data stream, The target IC card carries out add operation using end time corresponding single byte binary data stream;
Based on the raw 2nd MAC code of splicing result.
Optionally, the relevant information further includes the first authentication code being stored in advance in the target IC card, with And the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention further includes authentication module, wherein identity Authentication module may include:
First acquisition submodule, the second authentication code for user's input;
Identity Comparative sub-module, for after the first acquisition submodule gets the second authentication code, by described second Authentication code is compared with first authentication code, when first identity code and second identity code are consistent then Trigger writing module starting.
Optionally, the relevant information can also include the history use information of the target IC card, wherein the history Use information includes the last time of the target IC card using region information;
And the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention can also include sentencing with logging in Disconnected module, further alternative, logging in ground judgment module may include:
Second acquisition submodule, for obtaining current geographic position information;
Second judgment submodule is used for after the second acquisition submodule obtains current geographic position information, described in judgement Whether the last time is identical using region information and current geographic position information;
Submodule is marked, for judging that the read-write equipment judges that the last time uses institute when second judgment submodule When area information and current geographic position information be not identical, abnormal login information is generated and by the state mark of the target IC card It is denoted as abnormal using state, is unlocked with limiting the user;
First shows submodule, after marking submodule to generate abnormal login information, by the abnormal login information The user is showed, so that user inputs the password of the target IC card;
Password acceptance submodule, the password of the target IC card for receiving user's input;
Inquiry request sending submodule, for sending cipher inquiry request to Operation Server, so that the operation takes Business device generates password authentification after the password authentification passes through and successfully prompts, wherein the cipher inquiry request includes the mesh Mark the ID of IC card and the password of the target IC card;
Receiving submodule is prompted, is successfully prompted for receiving the password authentification that the Operation Server is sent;
It is abnormal to release submodule, for prompt receiving submodule receive password authentification that the Operation Server is sent at After function prompt, the abnormal using state of the target IC card is released.
Optionally, the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention further includes substituting module, Wherein, substituting module may include:
Substitute prompt and generate submodule, substitutes confirmation prompt for generating;
Second displaying submodule is used for after substituting prompt generation submodule generation replacement confirmation and prompting, by described in more The user is showed for confirmation prompt;
Command reception submodule is confirmed, for replacement confirmation prompt to be showed the use in the second displaying submodule After family, the replacement confirmation instruction is received;
Submodule is replaced, for being received after replacements confirmation instructs in confirmation command reception submodule, the mesh It is the current geographic position information that the last time for marking IC card is substituted using region information.
Another data processing equipment unlocked based on IC card is also disclosed in third aspect present invention, which includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes first aspect present invention The disclosed data processing method unlocked based on IC card.
A kind of computer readable storage medium is also disclosed in fourth aspect present invention, includes in the computer readable storage medium Data processor based on IC card when the data processor based on IC is executed by processor, executes the present invention first The disclosed data processing method unlocked based on IC card of aspect.
Compare compared with prior art, the invention has the following advantages:
In the present invention, an identifying code and temporary institute can be randomly generated when recognizing target IC card in read-write equipment Identifying code is stated, identifying code is written to the target IC card, so that the target IC card is according to the first default generating mode, institute It states identifying code and generates the first MAC code, and then the read-write equipment receives the first MAC code that the target IC card is sent, and The first MAC code is verified according to preset proof rule and generates verification result, finally after being verified, read-write equipment control Locking device is unlocked.As it can be seen that the present invention can verify the information in IC card when user is unlocked using IC card, thus Provide a kind of higher IC card unlocking mode of Information Security.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of the disclosed data processing method unlocked based on IC card of the embodiment of the present invention one;
Fig. 2 is the flow diagram of the disclosed data processing method unlocked based on IC card of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention three
Fig. 4 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention five.
Specific embodiment
In order to better understand and implement, following will be combined with the drawings in the embodiments of the present invention, in the embodiment of the present invention Technical solution be clearly and completely described, it is clear that the described embodiment is only a part of the embodiment of the present invention, without It is whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig. 1, Fig. 1 is a kind of stream for the data processing method unlocked based on IC card disclosed in the embodiment of the present invention one Journey schematic diagram, wherein it is a kind of based on IC card unlock data processing method can be applied in the read-write equipment of IC card, the present invention It does not limit this.As shown in Figure 1, the data processing method that should be unlocked based on IC card may include following operating procedure:
101, when recognizing target IC card, an identifying code and temporary identifying code is randomly generated;
102, identifying code is written in target IC card, so that target IC card is according to the first default generating mode, verifying Code generates the first MAC code;
103, the first MAC code that target IC card is sent is received;
104, the first MAC code is verified according to preset proof rule and generate verification result;
105, when verification result be by when, then control locking device unlatching.
In embodiments of the present invention, optionally, read-write equipment can be frequency read/write, and wherein frequency read/write includes penetrating Frequency module, network communication module, SAM module, antenna, central controller, driving motor, I/O port.Wherein, radio-frequency module is for sending out The radiofrequency signal of predeterminated frequency is sent, antenna is used to receive the radiofrequency signal of predeterminated frequency.SAM module includes SAM chip, optional , SAM chip may include pre-stored certification master key, and central controller can be single-chip microcontroller, driving motor with set The locking device connection in sharing articles is set, so, read-write equipment can detect within the scope of the wireless identification of antenna With the presence or absence of target IC card, carry out when detecting target IC card, radio-frequency module emit radiofrequency signal realize with target IC card it Between communication, and then central controller controls drive module according to the data of the data of SAM chip and target IC card, so that driving Motor drives locking device to unlock, final to realize that article is shared.Further alternative, frequency read/write can also include network communication Module, wherein network communication module can be 2G communication module, be also possible to 3G communication module, 4G communication module or other can Realize the communication module of telecommunication, network communication module can be communicated with remote server, for example, logical with Operation Server Letter.
In embodiments of the present invention, frequency read/write can use low frequency radio frequency reader, be also possible to high-frequency radio frequency reading One of device, super high frequency radio frequency reader or frequency read/write of other frequencies are write, this is not limited by the present invention.It needs It is bright, low frequency radio frequency reader refer to working frequency the band limits used be 10KHz~1MHz, common main rule Lattice have 125KHz, 135KHz etc..The electronic tag of this general frequency range is all passive type, carries out energy by inductive coupling mode Amount supply and data transmission.The biggest advantage of low frequency is that label when its label is on the article of metal or liquid is subject to Influence smaller, while low frequency system is highly developed, read-write equipment it is cheap.But the disadvantage is that read apart from it is short, can not be simultaneously It carries out multi-tag reading (anti-collision) and information content is lower, general memory capacity is at 128 to 512.It is mainly used in Access control system, animal chip, car alarm and toy etc..Although low frequency system is mature, read-write equipment is cheap, by Low in its resonance frequency, labeling requirement makes the very big wire-wound inductor of inductance value, and usually needs the outer resonant capacitance of case chip, The cost of label is higher than other frequency ranges instead.
In embodiments of the present invention, the frequency range of super high frequency radio frequency reader is 868~950MHz, high-frequency radio frequency reader Frequency range is 1MHz~400MHz, and the frequency range of low frequency radio frequency reader is 0MHz~1MHz.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein To show service life information, so, user can know the remaining access times of target IC card in time, so that User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point, Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment IC card, wherein target IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention. Preferably, the target IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include day Line, resonance circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can root Work charge is generated according to the received radiofrequency signal of the antenna of IC card, control chip can work under the driving of work charge.Into One step and it is optional, control chip includes central controller (such as EEPROM (Electrically Erasable Programmable read only memory, band electric erazable programmable read-write memory)), memory, wherein in memory It is previously stored with the program that can be executed by central controller.
As it can be seen that an identifying code and temporary identifying code can be randomly generated when recognizing target IC card in read-write equipment, it will Identifying code is written to target IC card, so that target IC card generates the first MAC code according to the first default generating mode, identifying code, And then read-write equipment receives the first MAC code that target IC card is sent, and verifies the first MAC code and life according to preset proof rule At verification result, finally after being verified, read-write equipment controls locking device and unlocks.As it can be seen that the present invention can be used in user When IC card is unlocked, the information in IC card is verified, to provide a kind of higher IC card unlocking mode of Information Security.
Embodiment two
Referring to Fig. 2, Fig. 2 is a kind of stream for the data processing method unlocked based on IC card disclosed in the embodiment of the present invention two Journey schematic diagram, wherein it is a kind of based on IC card unlock data processing method can be applied in the read-write equipment of IC card, the present invention It does not limit this.As shown in Fig. 2, the data processing method that should be unlocked based on IC card may include following operating procedure:
201, when receiving the unlocking request of user's triggering, judge within the scope of its wireless identification with the presence or absence of target IC Card, if so then execute step 202;
202, read-write equipment reads the relevant information of target IC card;
203, determination recognizes target IC card;
204, an identifying code and temporary identifying code is randomly generated;
205, the second authentication code of user's input is obtained;Relevant information further includes being stored in advance in target IC card First authentication code;
206, the second authentication code is compared with the first authentication code, when the first identity code and the second identity code Unanimously, step 207 is executed;
207, identifying code is written in target IC card, so that target IC card is according to the first default generating mode, verifying Code generates the first MAC code;
208, the first MAC code that target IC card is sent is received;
209, the first MAC code is verified according to preset proof rule, when being verified, executes step 210;
210, current geographic position information is obtained;, relevant information can also include the history use information of target IC card, In, history use information includes the last time of target IC card using region information;
211, the judgement last time is identical using region information and current geographic position information, if last use institute It is not identical as current geographic position information in area information, execute step 212;
212, it generates abnormal login information and is abnormal using state by the status indication of target IC card, opened with limiting user Lock;
213, abnormal login information is showed into user, so that user inputs the password of target IC card;
214, cipher inquiry request is sent to Operation Server, so that Operation Server generates after password authentification passes through Password authentification successfully prompts, wherein cipher inquiry request includes the ID of target IC card and the password of target IC card;
215, the password authentification that Operation Server is sent is received successfully to prompt and release the abnormal using state of target IC card;
216, it generates to substitute and confirms prompt and replacement confirmation prompt is showed into user, so that user confirms according to replacement Prompt input substitutes confirmation instruction;
217, it receives replacement confirmation instruction and the use of region information replacement is current by the last time of target IC card Geographical location information;
218, control locking device is opened.
In an alternative embodiment, verifying the first MAC code according to preset proof rule includes:
The 2nd MAC code is generated according to the first default generating mode, identifying code;
First MAC code is compared with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then read-write equipment determines that verification result is to pass through.
In another optional embodiment, when relevant information includes that the use of the ID of target IC card, target IC card originate Between, target IC card at least one of using end time;And the is generated according to the first default generating mode, identifying code Two MAC codes include:
Successively by the ID of target IC card, target IC card use initial time, target IC card using the end time, verifying Code is converted to single byte binary data stream;
It is according to DES algorithm that the certification master key being stored in advance in read-write equipment is successively corresponding with the ID of target IC card Single byte binary data stream, target IC card correspond to single byte binary data stream using initial time, target IC card makes Add operation is carried out with end time corresponding single byte binary data stream;
Read-write equipment is successively by the add operation using initial time of the add operation result of target IC card, target IC card As a result, target IC card is spliced using the add operation result of end time, the add operation result of identifying code;
Read-write equipment is based on the raw 2nd MAC code of splicing result.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target The safety in utilization of IC card.
Embodiment three
Referring to Fig. 3, Fig. 3 is a kind of knot for the data processing equipment unlocked based on IC card disclosed in the embodiment of the present invention three Structure schematic diagram, wherein should can be used for executing the data processing method based on IC card based on the data processing equipment that IC card is unlocked. As shown in figure 3, the data processing equipment that should be unlocked based on IC card may include:
Identifying code generation module 301, for an identifying code and temporary verifying when recognizing target IC card, to be randomly generated Code;
Writing module 302, for identifying code generation module 301 be randomly generated an identifying code and temporary identifying code it Afterwards, identifying code is written in target IC card, so that target IC card generates first according to the first default generating mode, identifying code MAC code;
Receiving module 303, for receiving target IC after identifying code is written in target IC card by writing module 302 Block the first MAC code sent;
MAC code authentication module 304, for being advised according to preset verifying after receiving module 303 receives the first MAC code Then verify the first MAC code;
Drive module 305 passes through for verifying the first MAC code according to preset proof rule when MAC code authentication module 304 When, control locking device is opened.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target The safety in utilization of IC card.
Example IV
Referring to Fig. 4, Fig. 4 is a kind of knot for the data processing equipment unlocked based on IC card disclosed in the embodiment of the present invention four Structure schematic diagram, wherein should can be used for executing the data processing method based on IC card based on the data processing equipment that IC card is unlocked. As shown in figure 4, the data processing equipment that should be unlocked based on IC card in addition to including identifying code generation module 301, writing module 302, Except receiving module 303, MAC code authentication module 304, drive module 305, it can also include identification module 306, log in ground judgement Module 307 substitutes module 308.
It should be noted that drive module 305 can trigger the starting of identification module 306.
Identification module 306 may include the first judging submodule 3061, the determining submodule of the first reading submodule 3062, second Block 3063, wherein:
First judging submodule 3061 judges when for receiving the unlocking request of user's triggering when read-write equipment at it It whether there is target IC card within the scope of wireless identification;
First reading submodule 3062, for judging exist within the scope of its wireless identification when the first judging submodule 3061 When target IC card, the relevant information for reading target IC card is executed;
Second determines submodule 3063, and the relevant information for reading target IC card when the first reading submodule 3062 finishes Afterwards, determination recognizes target IC card.
In embodiments of the present invention, relevant information can also include the history use information of target IC card, wherein history makes Region information is used with the last time that information includes target IC card, and, logging in ground judgment module 307 may include second Acquisition submodule 3071, second judgment submodule 3072, label submodule 3073, first show submodule 3074, password acceptance Submodule 3075, inquiry request sending submodule 3076, prompt receiving submodule 3077, abnormal releasing submodule 3078, in which:
Second acquisition submodule 3071, for obtaining current geographic position information;
Second judgment submodule 3072 is used for after the second acquisition submodule 3071 obtains current geographic position information, Judge last whether identical using region information and current geographic position information;
Submodule 3073 is marked, uses institute for judging that read-write equipment judgement is last when second judgment submodule 3072 When area information and current geographic position information be not identical, generate abnormal login information and be by the status indication of target IC card Abnormal using state, to limit user's unlocking;
First shows submodule 3074, after marking submodule 3073 to generate abnormal login information, by abnormal login Information shows user, so that user inputs the password of target IC card;
Password acceptance submodule 3075, the password of the target IC card for receiving user's input;
It should be noted that can be triggered after abnormal login information is showed user by the first displaying submodule 3074 Password acceptance submodule 3075 starts.
Inquiry request sending submodule 3076, for sending cipher inquiry request to Operation Server, so that operation clothes Business device generates password authentification after password authentification passes through and successfully prompts, wherein cipher inquiry request ID including target IC card and The password of target IC card;
It should be noted that after password acceptance submodule 3075 receives the password of the target IC card of user's input, it can be with Inquiry request sending submodule 3076 is triggered to start.
Receiving submodule 3077 is prompted, the password authentification for receiving Operation Server transmission successfully prompts;
It should be noted that inquiry request sending submodule 3076 is requesting it to Operation Server transmission cipher inquiry Afterwards, prompt receiving submodule 3077 can be triggered to start.
It is abnormal to release submodule 3078, it is tested for receiving the password that Operation Server is sent in prompt receiving submodule 3077 After demonstrate,proving successfully prompt, the abnormal using state of target IC card is released.
It should be noted that can trigger login ground judgment module 307 after MAC code authentication module 304 is finished and open It is dynamic, and after login ground judgment module 307 is finished, it can trigger and substitute the starting of module 308.
Substituting module 308 may include substituting prompt to generate the displaying of submodule 3081, second submodule 3082, confirmation instruction Receiving submodule 3083, replacement submodule 3084, in which:
Substitute prompt and generate submodule 3081, substitutes confirmation prompt for generating;
Second displaying submodule 3082 is used for after substituting the prompt generation generation replacement confirmation of submodule 3081 and prompting, Confirmation prompt will be substituted and show user;
Confirm command reception submodule 3083, is showed for confirmation prompt will to be substituted in the second displaying submodule 30843 After user, replacement confirmation instruction is received;
Replace submodule 3084, for confirmation command reception submodule 3083 receive replacement confirmation instruction after, mesh It is current geographic position information that the last time for marking IC card is substituted using region information.
In an alternative embodiment, MAC code authentication module 304 may include the 2nd MAC code generate submodule 3041, MAC code Comparative sub-module 3042, first determines submodule 3043, in which:
2nd MAC code generates submodule 3041, for generating the 2nd MAC code according to the first default generating mode, identifying code;
MAC code Comparative sub-module 3042 is used for after the 2nd MAC code generates the 2nd MAC code of generation of submodule 3041, will First MAC code is compared with the 2nd MAC code;
First determines submodule 3043, is the first MAC code and for the comparison result when MAC code Comparative sub-module 3042 When two MAC codes are identical, determine that verification result is to pass through.
In the optional embodiment, optionally, relevant information includes the use starting of the ID of target IC card, target IC card At least one of time, use end time of target IC card;And in the optional embodiment, the 2nd MAC code is generated It may include following operation that submodule 3041, which generates the concrete mode of the 2nd MAC code according to the first default generating mode, identifying code, Step:
Successively by the ID of target IC card, target IC card use initial time, target IC card using the end time, verifying Code is converted to single byte binary data stream;
It is according to DES algorithm that the certification master key being stored in advance in read-write equipment is successively corresponding with the ID of target IC card Single byte binary data stream, target IC card correspond to single byte binary data stream using initial time, target IC card makes Add operation is carried out with end time corresponding single byte binary data stream;
Based on the raw 2nd MAC code of splicing result.
In another optional embodiment, the data processing equipment unlocked based on IC card may include authentication module 309, optionally, authentication module 309 may include the first acquisition submodule 3091, identity Comparative sub-module 3092, in which:
First acquisition submodule 3091, the second authentication code for user's input;
Identity Comparative sub-module 3092, for inciting somebody to action after the first acquisition submodule 3091 gets the second authentication code Second authentication code is compared with the first authentication code, when the first identity code is consistent with the second identity code, triggers write-in Module 302 starts.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target The safety in utilization of IC card.
Embodiment five
Referring to Fig. 5, the structure that Fig. 5 is the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention five is shown It is intended to, wherein the device can be used for executing the data processing method unlocked based on IC card.As shown in figure 5, should be opened based on IC card The data processing equipment of lock includes:
It is stored with the memory 501 of executable program code;
The processor 502 coupled with memory 501;
Processor 502 calls the executable program code stored in memory 501, executes embodiment one into embodiment two Step in the described data processing method unlocked based on IC card of any one embodiment.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode, Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Embodiment six
The embodiment of the present invention six discloses a kind of computer readable storage medium, stores based on electronic data interchange Calculation machine program, wherein the computer program makes computer execute any one the embodiment institute into embodiment two of embodiment one Step in the data processing method of description unlocked based on IC card.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode, Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Embodiment seven
The embodiment of the present invention seven discloses a kind of computer program product, which includes storing calculating The non-transient computer readable storage medium of machine program, and the computer program is operable to that computer is made to execute embodiment one The step in data processing method unlocked described in any one embodiment based on IC card into embodiment two.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode, Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Installation practice described above is only illustrative, wherein as illustrated by the separation member unit can be or Person, which may not be, to be physically separated, and component shown as a unit may or may not be physical unit With in one place, or may be distributed over multiple network units.Portion therein can be selected according to the actual needs Point or whole module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor In the case where, it can it understands and implements.
By the specific descriptions of above embodiment, those skilled in the art can be understood that each embodiment It can realize by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, Substantially the part that contributes to existing technology can be embodied in the form of software products above-mentioned technical proposal in other words, The computer software product may be stored in a computer readable storage medium, and storage medium includes read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), Erasable Programmable Read Only Memory EPROM (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only memory (One-time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of storing data.

Claims (10)

1. a kind of data processing method unlocked based on IC card, which is characterized in that the data processing method includes:
When read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in the verifying Code;
Identifying code is written in the target IC card by the read-write equipment, so that the target IC card is according to the first default life The first MAC code is generated at mode, the identifying code;
The read-write equipment receives the first MAC code that the target IC card is sent;
The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;
When the verification result be by when, then read-write equipment control locking device is opened.
2. data processing method as described in claim 1, which is characterized in that the read-write equipment is according to preset proof rule Verifying the first MAC code includes:
The read-write equipment generates the 2nd MAC code according to the described first default generating mode, the identifying code;
The first MAC code is compared by the read-write equipment with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then the read-write equipment determines that the verification result is logical It crosses.
3. data processing method as claimed in claim 2, which is characterized in that a verifying is randomly generated in the read-write equipment Code and before keeping in the identifying code, the data processing method further include:
When the read-write equipment receives the unlocking request of user's triggering, the read-write equipment judges in its wireless identification range It is interior to whether there is the target IC card, if so, the read-write equipment reads the relevant information of the target IC card;
The read-write equipment determination recognizes the target IC card.
4. data processing method as claimed in claim 3, which is characterized in that the relevant information includes the target IC card ID, the target IC card use initial time, the target IC card at least one of using end time;
And the read-write equipment includes: according to the described first default generating mode, the identifying code the 2nd MAC code of generation
The read-write equipment is successively by the ID of the target IC card, the use initial time of the target IC card, the target IC Card is converted to single byte binary data stream using end time, the identifying code;
Institute's read-write equipment according to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with the target The corresponding single byte binary data stream of the ID of IC card, the target IC card use initial time correspond to single byte binary number Add operation is carried out according to the use end time corresponding single byte binary data stream of stream, the target IC card;
The read-write equipment successively by the add operation result of the target IC card, the target IC card using initial time Add operation result, the target IC card use the add operation result of end time, the add operation knot of the identifying code Fruit is spliced;
The read-write equipment is based on the raw 2nd MAC code of splicing result.
5. data processing method as claimed in claim 3, which is characterized in that the relevant information further includes being stored in advance in institute State the first authentication code in target IC card;
And after the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the read-write equipment will Before identifying code is written in the target IC card, the data processing method further include:
The read-write equipment obtains the second authentication code of user's input;
Second authentication code is compared by the read-write equipment with first authentication code;
When first identity code is consistent with second identity code, then the identifying code is written to the target IC card by execution In.
6. data processing method as claimed in claim 3, which is characterized in that the relevant information can also include the target The history use information of IC card, wherein the history use information includes the last time of the target IC card using region Information;
And when the verification result be by when, and the read-write equipment control locking device open before, the method is also Include:
The read-write equipment obtains current geographic position information;
Whether the read-write equipment judges described last identical using region information and current geographic position information;
When the read-write equipment judges described last not identical using region information and current geographic position information, institute It states read-write equipment to generate abnormal login information and be abnormal using state by the status indication of the target IC card, described in limitation User unlocks;
The abnormal login information is showed the user by the read-write equipment, so that user inputs the target IC card Password;
The read-write equipment receives the password of the target IC card of user's input;
The read-write equipment sends cipher inquiry request to Operation Server, so that the Operation Server is tested in the password Card generates password authentification after passing through and successfully prompts, wherein cipher inquiry request includes the ID of the target IC card and described The password of target IC card;
The read-write equipment receives the password authentification that the Operation Server is sent and successfully prompts and release the target IC card Abnormal using state.
7. data processing method as claimed in claim 6, it is characterised in that: receive the operating service in the read-write equipment After the password authentification that device is sent successfully prompts and releases the abnormal using state of the target IC card, the data processing method Further include:
The read-write equipment, which generates, to be substituted confirmation prompt and replacement confirmation prompt is showed the user, so that described User confirms that prompt input substitutes confirmation instruction according to the replacement;
The read-write equipment receives the replacement confirmation instruction and the last time of the target IC card is used location It is the current geographic position information that domain information, which substitutes,.
8. a kind of data processing equipment unlocked based on IC card, which is characterized in that the data processing equipment includes:
Identifying code generation module, for an identifying code when recognizing target IC card, to be randomly generated and keeps in the identifying code;
Writing module, for will test after identifying code generation module is randomly generated an identifying code and keeps in the identifying code Card code is written in the target IC card, so that the target IC card is raw according to the first default generating mode, the identifying code At the first MAC code;
Receiving module, for receiving the target IC card after identifying code is written in the target IC card by writing module The first MAC code sent;
MAC code authentication module, for being verified according to preset proof rule after receiving module receives the first MAC code The first MAC code;
Drive module, for controlling when MAC code authentication module is verified the first MAC code according to preset proof rule and passed through Locking device is opened.
9. a kind of unlocking apparatus, which is characterized in that the unlocking apparatus includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any The data processing method unlocked based on IC card described in.
10. a kind of computer readable storage medium, which is characterized in that include being based on IC card in the computer readable storage medium Unlocking program, when the unlocking program based on IC card is executed by processor, execute as claim 1-7 it is described in any item The data processing method unlocked based on IC card.
CN201811558843.8A 2018-12-19 2018-12-19 Data processing method and device based on IC card unlocking Active CN109741067B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811558843.8A CN109741067B (en) 2018-12-19 2018-12-19 Data processing method and device based on IC card unlocking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811558843.8A CN109741067B (en) 2018-12-19 2018-12-19 Data processing method and device based on IC card unlocking

Publications (2)

Publication Number Publication Date
CN109741067A true CN109741067A (en) 2019-05-10
CN109741067B CN109741067B (en) 2023-05-30

Family

ID=66360647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811558843.8A Active CN109741067B (en) 2018-12-19 2018-12-19 Data processing method and device based on IC card unlocking

Country Status (1)

Country Link
CN (1) CN109741067B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667308A (en) * 2008-09-04 2010-03-10 日电(中国)有限公司 Access control system, access control devices, access card and access control method
CN103338188A (en) * 2013-06-08 2013-10-02 北京大学 Dynamic authentication method of client side suitable for mobile cloud
CN103401880A (en) * 2013-08-15 2013-11-20 西南大学 Automatic login industrial control system and control method
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device
CN104727658A (en) * 2015-01-26 2015-06-24 湖南银宝科技发展有限公司 Intelligent lock, intelligent key and control method and device thereof
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
CN106936806A (en) * 2015-12-31 2017-07-07 阿里巴巴集团控股有限公司 A kind of recognition methods of account abnormal login and device
CN107135201A (en) * 2017-04-01 2017-09-05 网易(杭州)网络有限公司 A kind of webserver login authentication method and device
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN107578511A (en) * 2017-09-15 2018-01-12 林海航 A kind of smart lock and its Intelligent key
CN108171831A (en) * 2017-12-22 2018-06-15 武汉瑞纳捷电子技术有限公司 A kind of bidirectional safe authentication method based on NFC mobile phone and smart lock

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667308A (en) * 2008-09-04 2010-03-10 日电(中国)有限公司 Access control system, access control devices, access card and access control method
CN103338188A (en) * 2013-06-08 2013-10-02 北京大学 Dynamic authentication method of client side suitable for mobile cloud
CN103401880A (en) * 2013-08-15 2013-11-20 西南大学 Automatic login industrial control system and control method
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
CN104727658A (en) * 2015-01-26 2015-06-24 湖南银宝科技发展有限公司 Intelligent lock, intelligent key and control method and device thereof
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN106936806A (en) * 2015-12-31 2017-07-07 阿里巴巴集团控股有限公司 A kind of recognition methods of account abnormal login and device
CN107135201A (en) * 2017-04-01 2017-09-05 网易(杭州)网络有限公司 A kind of webserver login authentication method and device
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN107578511A (en) * 2017-09-15 2018-01-12 林海航 A kind of smart lock and its Intelligent key
CN108171831A (en) * 2017-12-22 2018-06-15 武汉瑞纳捷电子技术有限公司 A kind of bidirectional safe authentication method based on NFC mobile phone and smart lock

Also Published As

Publication number Publication date
CN109741067B (en) 2023-05-30

Similar Documents

Publication Publication Date Title
US8322608B2 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
US7407110B2 (en) Protection of non-promiscuous data in an RFID transponder
US9818244B2 (en) Method and system for permitting remote check-in and coordinating access control
CN107822208A (en) Electronic cigarette and electronic cigarette activation system
CN106652109A (en) Intelligent lock control method, device and lock management server
CN106952377A (en) The method and system of smart home door lock are opened by mobile fingerprint
CN109754505B (en) Unlocking method and device based on IC card
CN207867484U (en) Smart lock upgrade-system
CN102436686B (en) Method and device for locking or unlocking wireless radio frequency (RF) electronic lockset
CN105857246A (en) Control method, device and system for automobile starting lock
CN102289688B (en) Method and device for label processing and access
CN107392001A (en) A kind of authorization method, system and card
CN107423609A (en) A kind of authoring system, method and card
US9495570B2 (en) Method for authenticating an RFID tag
CN108734828A (en) Yunmen prohibits Information Authentication method, terminal and server
CN109741067A (en) A kind of data processing method and device based on IC card unlocking
CN108171830A (en) A kind of hardware encryption method unlocked based on contactless card, system and intelligent cloud lock
CN110610564A (en) Key management device, key management method, key management system, and readable storage medium
CN105225105A (en) The method for security protection that NFC pays and system
CN101964952B (en) Transmission method of electronic ticket
KR101226645B1 (en) Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus
CN205722048U (en) A kind of novel intelligent door lock
CN109218312B (en) A kind of safety certifying method, device, system and Intelligent input device
CN107346383A (en) A kind of authorization method and system
CN102314585A (en) Method suitable for testing secure communication of radio frequency identification tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant