CN109741067A - A kind of data processing method and device based on IC card unlocking - Google Patents
A kind of data processing method and device based on IC card unlocking Download PDFInfo
- Publication number
- CN109741067A CN109741067A CN201811558843.8A CN201811558843A CN109741067A CN 109741067 A CN109741067 A CN 109741067A CN 201811558843 A CN201811558843 A CN 201811558843A CN 109741067 A CN109741067 A CN 109741067A
- Authority
- CN
- China
- Prior art keywords
- card
- target
- read
- code
- write equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of data processing method unlocked based on IC card and devices, wherein, it is a kind of based on IC card unlock data processing method include when read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in the identifying code;Identifying code is written in the target IC card by the read-write equipment, so that the target IC card generates the first MAC code according to the first default generating mode, the identifying code;The read-write equipment receives the first MAC code that the target IC card is sent;The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;When the verification result be by when, then read-write equipment control locking device is opened.The present invention can be improved in digitlization transaction, the Information Security of IC card.
Description
Technical field
The present invention relates to Internet technical field more particularly to a kind of data processing method unlocked based on IC card and dresses
It sets.
Background technique
With the development of society, IC card is widely used in digitlization transaction, for example, IC card is taken as bus card to be used for
Pay the expense to take public transport.Since IC card stores more important Transaction Information, once and the transaction of IC card
Information, which is maliciously stolen, perhaps maliciously to be rewritten and will be brought more to the IC card person of holding or other related sides relevant to IC card
Therefore serious economic loss in digitlization process of exchange, is handled IC card using cryptographic means, to improve IC card
Information security be particularly important.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that providing a kind of data processing method unlocked based on IC card
And device, for solving the problems, such as the existing Information Security during IC card is in digitlization transaction.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention discloses a kind of data unlocked based on IC card
Processing method, this method comprises:
When read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in described test
Demonstrate,prove code;
Identifying code is written in the target IC card by the read-write equipment, so that the target IC card is pre- according to first
If generating mode, the identifying code generate the first MAC code;
The read-write equipment receives the first MAC code that the target IC card is sent;
The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;
When the verification result be by when, then read-write equipment control locking device is opened.
Optionally, the read-write equipment includes: according to preset proof rule verifying the first MAC code
The read-write equipment generates the 2nd MAC code according to the described first default generating mode, the identifying code;
The first MAC code is compared by the read-write equipment with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then the read-write equipment determines that the verification result is
Pass through.
Optionally, before the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the data
Processing method further include:
When the read-write equipment receives the unlocking request of user's triggering, the read-write equipment judges in its wireless identification
It whether there is the target IC card in range, if so, the read-write equipment identifies the target IC card and reads the target
The relevant information of IC card;
The read-write equipment determination recognizes the target IC card.
Optionally, the relevant information includes the ID of the target IC card, the use initial time of the target IC card, institute
That states target IC card uses at least one of end time;
And the read-write equipment generates the 2nd MAC code and wraps according to the described first default generating mode, the identifying code
It includes:
The read-write equipment is successively by the ID of the target IC card, the use initial time of the target IC card, the mesh
Mark IC card is converted to single byte binary data stream using end time, the identifying code;
Institute's read-write equipment according to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with it is described
The corresponding single byte binary data stream of the ID of target IC card, the target IC card use initial time correspond to single byte two into
The use end time corresponding single byte binary data stream progress add operation of data flow, the target IC card processed;
When the read-write equipment successively originates the use of the add operation result of the target IC card, the target IC card
Between add operation result, the target IC card the addition using the add operation result of end time, the identifying code transport
Result is calculated to be spliced;
The read-write equipment is based on the raw 2nd MAC code of splicing result.
Optionally, the relevant information further includes the first authentication code being stored in advance in the target IC card;
And after the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the read-write dress
It sets before identifying code is written in the target IC card, the data processing method further include:
The read-write equipment obtains the second authentication code of user's input;
Second authentication code is compared by the read-write equipment with first authentication code;
When first identity code is consistent with second identity code, then the identifying code is written to the target by execution
In IC card.
Optionally, the relevant information can also include the history use information of the target IC card, wherein the history
Use information includes the last time of the target IC card using region information;
And when the verification result be by when, and the read-write equipment control locking device open before, the side
Method further include:
The read-write equipment obtains current geographic position information;
Whether the read-write equipment judges described last identical using region information and current geographic position information;
When the read-write equipment judges that the last time is not identical using region information and current geographic position information
When, it states read-write equipment and generates abnormal login information and be abnormal using state by the status indication of the target IC card, with limitation
The user unlocks;
The abnormal login information is showed the user by the read-write equipment, so that user inputs the target IC
The password of card;
The read-write equipment receives the password of the target IC card of user's input;
The read-write equipment sends cipher inquiry request to Operation Server, so that the Operation Server is described close
Code generates password authentification after being verified and successfully prompts, wherein cipher inquiry request include the target IC card ID and
The password of the target IC card;
The read-write equipment receives the password authentification that the Operation Server is sent and successfully prompts and release the target IC
The abnormal using state of card.
Optionally, it is successfully prompted in the password authentification that the read-write equipment receives the Operation Server transmission and releases institute
After the abnormal using state for stating target IC card, the data processing method further include:
The read-write equipment, which generates, to be substituted confirmation prompt and replacement confirmation prompt is showed the user, so that
The user confirms that prompt input substitutes confirmation instruction according to the replacement;
The read-write equipment receives the replacement confirmation instruction and the last time of the target IC card is used institute
Substituting in area information is the current geographic position information.
Second aspect of the present invention discloses a kind of data processing equipment unlocked based on IC card, the data processing equipment packet
It includes:
Identifying code generation module, for an identifying code when recognizing target IC card, to be randomly generated and keeps in described test
Demonstrate,prove code;
Writing module, for after identifying code generation module is randomly generated an identifying code and keeps in the identifying code,
Identifying code is written in the target IC card, so that the target IC card is according to the first default generating mode, the verifying
Code generates the first MAC code;
Receiving module, for receiving the target after identifying code is written in the target IC card by writing module
The first MAC code that IC card is sent;
MAC code authentication module, for after receiving module receives the first MAC code, according to preset proof rule
Verify the first MAC code;
Drive module passes through for verifying the first MAC code according to preset proof rule when MAC code authentication module
When, control locking device is opened.
Optionally, MAC code authentication module may include that the 2nd MAC code generates submodule, MAC code Comparative sub-module, first
Determine submodule, in which:
2nd MAC code generates submodule, for generating second according to the described first default generating mode, the identifying code
MAC code;
MAC code Comparative sub-module is used for after the 2nd MAC code generates submodule the 2nd MAC code of generation, will be described
First MAC code is compared with the 2nd MAC code;
First determines submodule, is the first MAC code and described for the comparison result when MAC code Comparative sub-module
When two MAC codes are identical, determine that the verification result is to pass through.
Optionally, the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention can also include identification mould
Block, and, identification module may include the first judging submodule, the first reading submodule, the second determining submodule, in which:
First judging submodule judges when for receiving the unlocking request of user's triggering when the read-write equipment at it
It whether there is the target IC card within the scope of wireless identification;
First reading submodule, for judging that there are the targets within the scope of its wireless identification when the first judging submodule
When IC card, the relevant information for reading the target IC card is executed;
Second determines submodule, after the relevant information for reading the target IC card when the first reading submodule,
Determination recognizes the target IC card.
Optionally, the relevant information includes the ID of the target IC card, the use initial time of the target IC card, institute
That states target IC card uses at least one of end time;
And the 2nd MAC code generate submodule and execute and generate the according to the described first default generating mode, the identifying code
The concrete mode of two MAC codes are as follows:
Successively by the ID of the target IC card, the use using initial time, the target IC card of the target IC card
End time, the identifying code are converted to single byte binary data stream;
According to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with the target IC card
The corresponding single byte binary data stream of ID, the target IC card use initial time correspond to single byte binary data stream,
The target IC card carries out add operation using end time corresponding single byte binary data stream;
Based on the raw 2nd MAC code of splicing result.
Optionally, the relevant information further includes the first authentication code being stored in advance in the target IC card, with
And the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention further includes authentication module, wherein identity
Authentication module may include:
First acquisition submodule, the second authentication code for user's input;
Identity Comparative sub-module, for after the first acquisition submodule gets the second authentication code, by described second
Authentication code is compared with first authentication code, when first identity code and second identity code are consistent then
Trigger writing module starting.
Optionally, the relevant information can also include the history use information of the target IC card, wherein the history
Use information includes the last time of the target IC card using region information;
And the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention can also include sentencing with logging in
Disconnected module, further alternative, logging in ground judgment module may include:
Second acquisition submodule, for obtaining current geographic position information;
Second judgment submodule is used for after the second acquisition submodule obtains current geographic position information, described in judgement
Whether the last time is identical using region information and current geographic position information;
Submodule is marked, for judging that the read-write equipment judges that the last time uses institute when second judgment submodule
When area information and current geographic position information be not identical, abnormal login information is generated and by the state mark of the target IC card
It is denoted as abnormal using state, is unlocked with limiting the user;
First shows submodule, after marking submodule to generate abnormal login information, by the abnormal login information
The user is showed, so that user inputs the password of the target IC card;
Password acceptance submodule, the password of the target IC card for receiving user's input;
Inquiry request sending submodule, for sending cipher inquiry request to Operation Server, so that the operation takes
Business device generates password authentification after the password authentification passes through and successfully prompts, wherein the cipher inquiry request includes the mesh
Mark the ID of IC card and the password of the target IC card;
Receiving submodule is prompted, is successfully prompted for receiving the password authentification that the Operation Server is sent;
It is abnormal to release submodule, for prompt receiving submodule receive password authentification that the Operation Server is sent at
After function prompt, the abnormal using state of the target IC card is released.
Optionally, the disclosed data processing equipment unlocked based on IC card of second aspect of the present invention further includes substituting module,
Wherein, substituting module may include:
Substitute prompt and generate submodule, substitutes confirmation prompt for generating;
Second displaying submodule is used for after substituting prompt generation submodule generation replacement confirmation and prompting, by described in more
The user is showed for confirmation prompt;
Command reception submodule is confirmed, for replacement confirmation prompt to be showed the use in the second displaying submodule
After family, the replacement confirmation instruction is received;
Submodule is replaced, for being received after replacements confirmation instructs in confirmation command reception submodule, the mesh
It is the current geographic position information that the last time for marking IC card is substituted using region information.
Another data processing equipment unlocked based on IC card is also disclosed in third aspect present invention, which includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes first aspect present invention
The disclosed data processing method unlocked based on IC card.
A kind of computer readable storage medium is also disclosed in fourth aspect present invention, includes in the computer readable storage medium
Data processor based on IC card when the data processor based on IC is executed by processor, executes the present invention first
The disclosed data processing method unlocked based on IC card of aspect.
Compare compared with prior art, the invention has the following advantages:
In the present invention, an identifying code and temporary institute can be randomly generated when recognizing target IC card in read-write equipment
Identifying code is stated, identifying code is written to the target IC card, so that the target IC card is according to the first default generating mode, institute
It states identifying code and generates the first MAC code, and then the read-write equipment receives the first MAC code that the target IC card is sent, and
The first MAC code is verified according to preset proof rule and generates verification result, finally after being verified, read-write equipment control
Locking device is unlocked.As it can be seen that the present invention can verify the information in IC card when user is unlocked using IC card, thus
Provide a kind of higher IC card unlocking mode of Information Security.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the disclosed data processing method unlocked based on IC card of the embodiment of the present invention one;
Fig. 2 is the flow diagram of the disclosed data processing method unlocked based on IC card of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention three
Fig. 4 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention five.
Specific embodiment
In order to better understand and implement, following will be combined with the drawings in the embodiments of the present invention, in the embodiment of the present invention
Technical solution be clearly and completely described, it is clear that the described embodiment is only a part of the embodiment of the present invention, without
It is whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig. 1, Fig. 1 is a kind of stream for the data processing method unlocked based on IC card disclosed in the embodiment of the present invention one
Journey schematic diagram, wherein it is a kind of based on IC card unlock data processing method can be applied in the read-write equipment of IC card, the present invention
It does not limit this.As shown in Figure 1, the data processing method that should be unlocked based on IC card may include following operating procedure:
101, when recognizing target IC card, an identifying code and temporary identifying code is randomly generated;
102, identifying code is written in target IC card, so that target IC card is according to the first default generating mode, verifying
Code generates the first MAC code;
103, the first MAC code that target IC card is sent is received;
104, the first MAC code is verified according to preset proof rule and generate verification result;
105, when verification result be by when, then control locking device unlatching.
In embodiments of the present invention, optionally, read-write equipment can be frequency read/write, and wherein frequency read/write includes penetrating
Frequency module, network communication module, SAM module, antenna, central controller, driving motor, I/O port.Wherein, radio-frequency module is for sending out
The radiofrequency signal of predeterminated frequency is sent, antenna is used to receive the radiofrequency signal of predeterminated frequency.SAM module includes SAM chip, optional
, SAM chip may include pre-stored certification master key, and central controller can be single-chip microcontroller, driving motor with set
The locking device connection in sharing articles is set, so, read-write equipment can detect within the scope of the wireless identification of antenna
With the presence or absence of target IC card, carry out when detecting target IC card, radio-frequency module emit radiofrequency signal realize with target IC card it
Between communication, and then central controller controls drive module according to the data of the data of SAM chip and target IC card, so that driving
Motor drives locking device to unlock, final to realize that article is shared.Further alternative, frequency read/write can also include network communication
Module, wherein network communication module can be 2G communication module, be also possible to 3G communication module, 4G communication module or other can
Realize the communication module of telecommunication, network communication module can be communicated with remote server, for example, logical with Operation Server
Letter.
In embodiments of the present invention, frequency read/write can use low frequency radio frequency reader, be also possible to high-frequency radio frequency reading
One of device, super high frequency radio frequency reader or frequency read/write of other frequencies are write, this is not limited by the present invention.It needs
It is bright, low frequency radio frequency reader refer to working frequency the band limits used be 10KHz~1MHz, common main rule
Lattice have 125KHz, 135KHz etc..The electronic tag of this general frequency range is all passive type, carries out energy by inductive coupling mode
Amount supply and data transmission.The biggest advantage of low frequency is that label when its label is on the article of metal or liquid is subject to
Influence smaller, while low frequency system is highly developed, read-write equipment it is cheap.But the disadvantage is that read apart from it is short, can not be simultaneously
It carries out multi-tag reading (anti-collision) and information content is lower, general memory capacity is at 128 to 512.It is mainly used in
Access control system, animal chip, car alarm and toy etc..Although low frequency system is mature, read-write equipment is cheap, by
Low in its resonance frequency, labeling requirement makes the very big wire-wound inductor of inductance value, and usually needs the outer resonant capacitance of case chip,
The cost of label is higher than other frequency ranges instead.
In embodiments of the present invention, the frequency range of super high frequency radio frequency reader is 868~950MHz, high-frequency radio frequency reader
Frequency range is 1MHz~400MHz, and the frequency range of low frequency radio frequency reader is 0MHz~1MHz.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used
In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein
To show service life information, so, user can know the remaining access times of target IC card in time, so that
User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low
Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open
When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point,
Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit
State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or
Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment
IC card, wherein target IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention.
Preferably, the target IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include day
Line, resonance circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can root
Work charge is generated according to the received radiofrequency signal of the antenna of IC card, control chip can work under the driving of work charge.Into
One step and it is optional, control chip includes central controller (such as EEPROM (Electrically Erasable
Programmable read only memory, band electric erazable programmable read-write memory)), memory, wherein in memory
It is previously stored with the program that can be executed by central controller.
As it can be seen that an identifying code and temporary identifying code can be randomly generated when recognizing target IC card in read-write equipment, it will
Identifying code is written to target IC card, so that target IC card generates the first MAC code according to the first default generating mode, identifying code,
And then read-write equipment receives the first MAC code that target IC card is sent, and verifies the first MAC code and life according to preset proof rule
At verification result, finally after being verified, read-write equipment controls locking device and unlocks.As it can be seen that the present invention can be used in user
When IC card is unlocked, the information in IC card is verified, to provide a kind of higher IC card unlocking mode of Information Security.
Embodiment two
Referring to Fig. 2, Fig. 2 is a kind of stream for the data processing method unlocked based on IC card disclosed in the embodiment of the present invention two
Journey schematic diagram, wherein it is a kind of based on IC card unlock data processing method can be applied in the read-write equipment of IC card, the present invention
It does not limit this.As shown in Fig. 2, the data processing method that should be unlocked based on IC card may include following operating procedure:
201, when receiving the unlocking request of user's triggering, judge within the scope of its wireless identification with the presence or absence of target IC
Card, if so then execute step 202;
202, read-write equipment reads the relevant information of target IC card;
203, determination recognizes target IC card;
204, an identifying code and temporary identifying code is randomly generated;
205, the second authentication code of user's input is obtained;Relevant information further includes being stored in advance in target IC card
First authentication code;
206, the second authentication code is compared with the first authentication code, when the first identity code and the second identity code
Unanimously, step 207 is executed;
207, identifying code is written in target IC card, so that target IC card is according to the first default generating mode, verifying
Code generates the first MAC code;
208, the first MAC code that target IC card is sent is received;
209, the first MAC code is verified according to preset proof rule, when being verified, executes step 210;
210, current geographic position information is obtained;, relevant information can also include the history use information of target IC card,
In, history use information includes the last time of target IC card using region information;
211, the judgement last time is identical using region information and current geographic position information, if last use institute
It is not identical as current geographic position information in area information, execute step 212;
212, it generates abnormal login information and is abnormal using state by the status indication of target IC card, opened with limiting user
Lock;
213, abnormal login information is showed into user, so that user inputs the password of target IC card;
214, cipher inquiry request is sent to Operation Server, so that Operation Server generates after password authentification passes through
Password authentification successfully prompts, wherein cipher inquiry request includes the ID of target IC card and the password of target IC card;
215, the password authentification that Operation Server is sent is received successfully to prompt and release the abnormal using state of target IC card;
216, it generates to substitute and confirms prompt and replacement confirmation prompt is showed into user, so that user confirms according to replacement
Prompt input substitutes confirmation instruction;
217, it receives replacement confirmation instruction and the use of region information replacement is current by the last time of target IC card
Geographical location information;
218, control locking device is opened.
In an alternative embodiment, verifying the first MAC code according to preset proof rule includes:
The 2nd MAC code is generated according to the first default generating mode, identifying code;
First MAC code is compared with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then read-write equipment determines that verification result is to pass through.
In another optional embodiment, when relevant information includes that the use of the ID of target IC card, target IC card originate
Between, target IC card at least one of using end time;And the is generated according to the first default generating mode, identifying code
Two MAC codes include:
Successively by the ID of target IC card, target IC card use initial time, target IC card using the end time, verifying
Code is converted to single byte binary data stream;
It is according to DES algorithm that the certification master key being stored in advance in read-write equipment is successively corresponding with the ID of target IC card
Single byte binary data stream, target IC card correspond to single byte binary data stream using initial time, target IC card makes
Add operation is carried out with end time corresponding single byte binary data stream;
Read-write equipment is successively by the add operation using initial time of the add operation result of target IC card, target IC card
As a result, target IC card is spliced using the add operation result of end time, the add operation result of identifying code;
Read-write equipment is based on the raw 2nd MAC code of splicing result.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist
Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card
Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target
The safety in utilization of IC card.
Embodiment three
Referring to Fig. 3, Fig. 3 is a kind of knot for the data processing equipment unlocked based on IC card disclosed in the embodiment of the present invention three
Structure schematic diagram, wherein should can be used for executing the data processing method based on IC card based on the data processing equipment that IC card is unlocked.
As shown in figure 3, the data processing equipment that should be unlocked based on IC card may include:
Identifying code generation module 301, for an identifying code and temporary verifying when recognizing target IC card, to be randomly generated
Code;
Writing module 302, for identifying code generation module 301 be randomly generated an identifying code and temporary identifying code it
Afterwards, identifying code is written in target IC card, so that target IC card generates first according to the first default generating mode, identifying code
MAC code;
Receiving module 303, for receiving target IC after identifying code is written in target IC card by writing module 302
Block the first MAC code sent;
MAC code authentication module 304, for being advised according to preset verifying after receiving module 303 receives the first MAC code
Then verify the first MAC code;
Drive module 305 passes through for verifying the first MAC code according to preset proof rule when MAC code authentication module 304
When, control locking device is opened.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist
Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card
Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target
The safety in utilization of IC card.
Example IV
Referring to Fig. 4, Fig. 4 is a kind of knot for the data processing equipment unlocked based on IC card disclosed in the embodiment of the present invention four
Structure schematic diagram, wherein should can be used for executing the data processing method based on IC card based on the data processing equipment that IC card is unlocked.
As shown in figure 4, the data processing equipment that should be unlocked based on IC card in addition to including identifying code generation module 301, writing module 302,
Except receiving module 303, MAC code authentication module 304, drive module 305, it can also include identification module 306, log in ground judgement
Module 307 substitutes module 308.
It should be noted that drive module 305 can trigger the starting of identification module 306.
Identification module 306 may include the first judging submodule 3061, the determining submodule of the first reading submodule 3062, second
Block 3063, wherein:
First judging submodule 3061 judges when for receiving the unlocking request of user's triggering when read-write equipment at it
It whether there is target IC card within the scope of wireless identification;
First reading submodule 3062, for judging exist within the scope of its wireless identification when the first judging submodule 3061
When target IC card, the relevant information for reading target IC card is executed;
Second determines submodule 3063, and the relevant information for reading target IC card when the first reading submodule 3062 finishes
Afterwards, determination recognizes target IC card.
In embodiments of the present invention, relevant information can also include the history use information of target IC card, wherein history makes
Region information is used with the last time that information includes target IC card, and, logging in ground judgment module 307 may include second
Acquisition submodule 3071, second judgment submodule 3072, label submodule 3073, first show submodule 3074, password acceptance
Submodule 3075, inquiry request sending submodule 3076, prompt receiving submodule 3077, abnormal releasing submodule 3078, in which:
Second acquisition submodule 3071, for obtaining current geographic position information;
Second judgment submodule 3072 is used for after the second acquisition submodule 3071 obtains current geographic position information,
Judge last whether identical using region information and current geographic position information;
Submodule 3073 is marked, uses institute for judging that read-write equipment judgement is last when second judgment submodule 3072
When area information and current geographic position information be not identical, generate abnormal login information and be by the status indication of target IC card
Abnormal using state, to limit user's unlocking;
First shows submodule 3074, after marking submodule 3073 to generate abnormal login information, by abnormal login
Information shows user, so that user inputs the password of target IC card;
Password acceptance submodule 3075, the password of the target IC card for receiving user's input;
It should be noted that can be triggered after abnormal login information is showed user by the first displaying submodule 3074
Password acceptance submodule 3075 starts.
Inquiry request sending submodule 3076, for sending cipher inquiry request to Operation Server, so that operation clothes
Business device generates password authentification after password authentification passes through and successfully prompts, wherein cipher inquiry request ID including target IC card and
The password of target IC card;
It should be noted that after password acceptance submodule 3075 receives the password of the target IC card of user's input, it can be with
Inquiry request sending submodule 3076 is triggered to start.
Receiving submodule 3077 is prompted, the password authentification for receiving Operation Server transmission successfully prompts;
It should be noted that inquiry request sending submodule 3076 is requesting it to Operation Server transmission cipher inquiry
Afterwards, prompt receiving submodule 3077 can be triggered to start.
It is abnormal to release submodule 3078, it is tested for receiving the password that Operation Server is sent in prompt receiving submodule 3077
After demonstrate,proving successfully prompt, the abnormal using state of target IC card is released.
It should be noted that can trigger login ground judgment module 307 after MAC code authentication module 304 is finished and open
It is dynamic, and after login ground judgment module 307 is finished, it can trigger and substitute the starting of module 308.
Substituting module 308 may include substituting prompt to generate the displaying of submodule 3081, second submodule 3082, confirmation instruction
Receiving submodule 3083, replacement submodule 3084, in which:
Substitute prompt and generate submodule 3081, substitutes confirmation prompt for generating;
Second displaying submodule 3082 is used for after substituting the prompt generation generation replacement confirmation of submodule 3081 and prompting,
Confirmation prompt will be substituted and show user;
Confirm command reception submodule 3083, is showed for confirmation prompt will to be substituted in the second displaying submodule 30843
After user, replacement confirmation instruction is received;
Replace submodule 3084, for confirmation command reception submodule 3083 receive replacement confirmation instruction after, mesh
It is current geographic position information that the last time for marking IC card is substituted using region information.
In an alternative embodiment, MAC code authentication module 304 may include the 2nd MAC code generate submodule 3041,
MAC code Comparative sub-module 3042, first determines submodule 3043, in which:
2nd MAC code generates submodule 3041, for generating the 2nd MAC code according to the first default generating mode, identifying code;
MAC code Comparative sub-module 3042 is used for after the 2nd MAC code generates the 2nd MAC code of generation of submodule 3041, will
First MAC code is compared with the 2nd MAC code;
First determines submodule 3043, is the first MAC code and for the comparison result when MAC code Comparative sub-module 3042
When two MAC codes are identical, determine that verification result is to pass through.
In the optional embodiment, optionally, relevant information includes the use starting of the ID of target IC card, target IC card
At least one of time, use end time of target IC card;And in the optional embodiment, the 2nd MAC code is generated
It may include following operation that submodule 3041, which generates the concrete mode of the 2nd MAC code according to the first default generating mode, identifying code,
Step:
Successively by the ID of target IC card, target IC card use initial time, target IC card using the end time, verifying
Code is converted to single byte binary data stream;
It is according to DES algorithm that the certification master key being stored in advance in read-write equipment is successively corresponding with the ID of target IC card
Single byte binary data stream, target IC card correspond to single byte binary data stream using initial time, target IC card makes
Add operation is carried out with end time corresponding single byte binary data stream;
Based on the raw 2nd MAC code of splicing result.
In another optional embodiment, the data processing equipment unlocked based on IC card may include authentication module
309, optionally, authentication module 309 may include the first acquisition submodule 3091, identity Comparative sub-module 3092, in which:
First acquisition submodule 3091, the second authentication code for user's input;
Identity Comparative sub-module 3092, for inciting somebody to action after the first acquisition submodule 3091 gets the second authentication code
Second authentication code is compared with the first authentication code, when the first identity code is consistent with the second identity code, triggers write-in
Module 302 starts.
As it can be seen that the embodiment of the present invention can judge current goal IC card whether often log in ground, if target IC card does not exist
Ground often is being logged in, then is requiring user to input the password of target IC card, so, so that it may further increase making for target IC card
Use safety.At the same time, the embodiment of the present invention can also verify the identity information of user, to further increase target
The safety in utilization of IC card.
Embodiment five
Referring to Fig. 5, the structure that Fig. 5 is the disclosed data processing equipment unlocked based on IC card of the embodiment of the present invention five is shown
It is intended to, wherein the device can be used for executing the data processing method unlocked based on IC card.As shown in figure 5, should be opened based on IC card
The data processing equipment of lock includes:
It is stored with the memory 501 of executable program code;
The processor 502 coupled with memory 501;
Processor 502 calls the executable program code stored in memory 501, executes embodiment one into embodiment two
Step in the described data processing method unlocked based on IC card of any one embodiment.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card
Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode,
Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset
Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open
It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Embodiment six
The embodiment of the present invention six discloses a kind of computer readable storage medium, stores based on electronic data interchange
Calculation machine program, wherein the computer program makes computer execute any one the embodiment institute into embodiment two of embodiment one
Step in the data processing method of description unlocked based on IC card.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card
Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode,
Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset
Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open
It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Embodiment seven
The embodiment of the present invention seven discloses a kind of computer program product, which includes storing calculating
The non-transient computer readable storage medium of machine program, and the computer program is operable to that computer is made to execute embodiment one
The step in data processing method unlocked described in any one embodiment based on IC card into embodiment two.
The embodiment of the present invention can be randomly generated one and test by executing a kind of data processing method unlocked based on IC card
Demonstrate,prove code simultaneously temporary identifying code, identifying code be written in target IC card so that target IC card according to the first default generating mode,
Identifying code generates the first MAC code, and read-write equipment receives the first MAC code that target IC card is sent, and read-write equipment is tested according to preset
Card the first MAC code of rule verification simultaneously generates verification result;When verification result be by when, then read-write equipment control locking device open
It opens, thus, the embodiment of the present invention may be implemented safely to handle the interaction data between IC card and read-write equipment.
Installation practice described above is only illustrative, wherein as illustrated by the separation member unit can be or
Person, which may not be, to be physically separated, and component shown as a unit may or may not be physical unit
With in one place, or may be distributed over multiple network units.Portion therein can be selected according to the actual needs
Point or whole module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor
In the case where, it can it understands and implements.
By the specific descriptions of above embodiment, those skilled in the art can be understood that each embodiment
It can realize by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding,
Substantially the part that contributes to existing technology can be embodied in the form of software products above-mentioned technical proposal in other words,
The computer software product may be stored in a computer readable storage medium, and storage medium includes read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory
(Programmable Read-only Memory, PROM), Erasable Programmable Read Only Memory EPROM (Erasable
Programmable Read Only Memory, EPROM), disposable programmable read-only memory (One-time
Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory
(Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact
Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can
For carrying or any other computer-readable medium of storing data.
Claims (10)
1. a kind of data processing method unlocked based on IC card, which is characterized in that the data processing method includes:
When read-write equipment recognizes target IC card, the read-write equipment is randomly generated an identifying code and keeps in the verifying
Code;
Identifying code is written in the target IC card by the read-write equipment, so that the target IC card is according to the first default life
The first MAC code is generated at mode, the identifying code;
The read-write equipment receives the first MAC code that the target IC card is sent;
The read-write equipment verifies the first MAC code according to preset proof rule and generates verification result;
When the verification result be by when, then read-write equipment control locking device is opened.
2. data processing method as described in claim 1, which is characterized in that the read-write equipment is according to preset proof rule
Verifying the first MAC code includes:
The read-write equipment generates the 2nd MAC code according to the described first default generating mode, the identifying code;
The first MAC code is compared by the read-write equipment with the 2nd MAC code;
When the first MAC code is identical as the 2nd MAC code, then the read-write equipment determines that the verification result is logical
It crosses.
3. data processing method as claimed in claim 2, which is characterized in that a verifying is randomly generated in the read-write equipment
Code and before keeping in the identifying code, the data processing method further include:
When the read-write equipment receives the unlocking request of user's triggering, the read-write equipment judges in its wireless identification range
It is interior to whether there is the target IC card, if so, the read-write equipment reads the relevant information of the target IC card;
The read-write equipment determination recognizes the target IC card.
4. data processing method as claimed in claim 3, which is characterized in that the relevant information includes the target IC card
ID, the target IC card use initial time, the target IC card at least one of using end time;
And the read-write equipment includes: according to the described first default generating mode, the identifying code the 2nd MAC code of generation
The read-write equipment is successively by the ID of the target IC card, the use initial time of the target IC card, the target IC
Card is converted to single byte binary data stream using end time, the identifying code;
Institute's read-write equipment according to DES algorithm by the certification master key being stored in advance in the read-write equipment successively with the target
The corresponding single byte binary data stream of the ID of IC card, the target IC card use initial time correspond to single byte binary number
Add operation is carried out according to the use end time corresponding single byte binary data stream of stream, the target IC card;
The read-write equipment successively by the add operation result of the target IC card, the target IC card using initial time
Add operation result, the target IC card use the add operation result of end time, the add operation knot of the identifying code
Fruit is spliced;
The read-write equipment is based on the raw 2nd MAC code of splicing result.
5. data processing method as claimed in claim 3, which is characterized in that the relevant information further includes being stored in advance in institute
State the first authentication code in target IC card;
And after the read-write equipment is randomly generated an identifying code and keeps in the identifying code, the read-write equipment will
Before identifying code is written in the target IC card, the data processing method further include:
The read-write equipment obtains the second authentication code of user's input;
Second authentication code is compared by the read-write equipment with first authentication code;
When first identity code is consistent with second identity code, then the identifying code is written to the target IC card by execution
In.
6. data processing method as claimed in claim 3, which is characterized in that the relevant information can also include the target
The history use information of IC card, wherein the history use information includes the last time of the target IC card using region
Information;
And when the verification result be by when, and the read-write equipment control locking device open before, the method is also
Include:
The read-write equipment obtains current geographic position information;
Whether the read-write equipment judges described last identical using region information and current geographic position information;
When the read-write equipment judges described last not identical using region information and current geographic position information, institute
It states read-write equipment to generate abnormal login information and be abnormal using state by the status indication of the target IC card, described in limitation
User unlocks;
The abnormal login information is showed the user by the read-write equipment, so that user inputs the target IC card
Password;
The read-write equipment receives the password of the target IC card of user's input;
The read-write equipment sends cipher inquiry request to Operation Server, so that the Operation Server is tested in the password
Card generates password authentification after passing through and successfully prompts, wherein cipher inquiry request includes the ID of the target IC card and described
The password of target IC card;
The read-write equipment receives the password authentification that the Operation Server is sent and successfully prompts and release the target IC card
Abnormal using state.
7. data processing method as claimed in claim 6, it is characterised in that: receive the operating service in the read-write equipment
After the password authentification that device is sent successfully prompts and releases the abnormal using state of the target IC card, the data processing method
Further include:
The read-write equipment, which generates, to be substituted confirmation prompt and replacement confirmation prompt is showed the user, so that described
User confirms that prompt input substitutes confirmation instruction according to the replacement;
The read-write equipment receives the replacement confirmation instruction and the last time of the target IC card is used location
It is the current geographic position information that domain information, which substitutes,.
8. a kind of data processing equipment unlocked based on IC card, which is characterized in that the data processing equipment includes:
Identifying code generation module, for an identifying code when recognizing target IC card, to be randomly generated and keeps in the identifying code;
Writing module, for will test after identifying code generation module is randomly generated an identifying code and keeps in the identifying code
Card code is written in the target IC card, so that the target IC card is raw according to the first default generating mode, the identifying code
At the first MAC code;
Receiving module, for receiving the target IC card after identifying code is written in the target IC card by writing module
The first MAC code sent;
MAC code authentication module, for being verified according to preset proof rule after receiving module receives the first MAC code
The first MAC code;
Drive module, for controlling when MAC code authentication module is verified the first MAC code according to preset proof rule and passed through
Locking device is opened.
9. a kind of unlocking apparatus, which is characterized in that the unlocking apparatus includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any
The data processing method unlocked based on IC card described in.
10. a kind of computer readable storage medium, which is characterized in that include being based on IC card in the computer readable storage medium
Unlocking program, when the unlocking program based on IC card is executed by processor, execute as claim 1-7 it is described in any item
The data processing method unlocked based on IC card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811558843.8A CN109741067B (en) | 2018-12-19 | 2018-12-19 | Data processing method and device based on IC card unlocking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811558843.8A CN109741067B (en) | 2018-12-19 | 2018-12-19 | Data processing method and device based on IC card unlocking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109741067A true CN109741067A (en) | 2019-05-10 |
CN109741067B CN109741067B (en) | 2023-05-30 |
Family
ID=66360647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811558843.8A Active CN109741067B (en) | 2018-12-19 | 2018-12-19 | Data processing method and device based on IC card unlocking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109741067B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667308A (en) * | 2008-09-04 | 2010-03-10 | 日电(中国)有限公司 | Access control system, access control devices, access card and access control method |
CN103338188A (en) * | 2013-06-08 | 2013-10-02 | 北京大学 | Dynamic authentication method of client side suitable for mobile cloud |
CN103401880A (en) * | 2013-08-15 | 2013-11-20 | 西南大学 | Automatic login industrial control system and control method |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN104727658A (en) * | 2015-01-26 | 2015-06-24 | 湖南银宝科技发展有限公司 | Intelligent lock, intelligent key and control method and device thereof |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105099690A (en) * | 2014-05-19 | 2015-11-25 | 江苏博智软件科技有限公司 | OTP and user behavior-based certification and authorization method in mobile cloud computing environment |
CN106936806A (en) * | 2015-12-31 | 2017-07-07 | 阿里巴巴集团控股有限公司 | A kind of recognition methods of account abnormal login and device |
CN107135201A (en) * | 2017-04-01 | 2017-09-05 | 网易(杭州)网络有限公司 | A kind of webserver login authentication method and device |
CN107248212A (en) * | 2017-06-08 | 2017-10-13 | 深圳消费物联科技有限公司 | A kind of intelligent lock system and its method for unlocking based on NFC |
CN107578511A (en) * | 2017-09-15 | 2018-01-12 | 林海航 | A kind of smart lock and its Intelligent key |
CN108171831A (en) * | 2017-12-22 | 2018-06-15 | 武汉瑞纳捷电子技术有限公司 | A kind of bidirectional safe authentication method based on NFC mobile phone and smart lock |
-
2018
- 2018-12-19 CN CN201811558843.8A patent/CN109741067B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667308A (en) * | 2008-09-04 | 2010-03-10 | 日电(中国)有限公司 | Access control system, access control devices, access card and access control method |
CN103338188A (en) * | 2013-06-08 | 2013-10-02 | 北京大学 | Dynamic authentication method of client side suitable for mobile cloud |
CN103401880A (en) * | 2013-08-15 | 2013-11-20 | 西南大学 | Automatic login industrial control system and control method |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN105099690A (en) * | 2014-05-19 | 2015-11-25 | 江苏博智软件科技有限公司 | OTP and user behavior-based certification and authorization method in mobile cloud computing environment |
CN104727658A (en) * | 2015-01-26 | 2015-06-24 | 湖南银宝科技发展有限公司 | Intelligent lock, intelligent key and control method and device thereof |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN106936806A (en) * | 2015-12-31 | 2017-07-07 | 阿里巴巴集团控股有限公司 | A kind of recognition methods of account abnormal login and device |
CN107135201A (en) * | 2017-04-01 | 2017-09-05 | 网易(杭州)网络有限公司 | A kind of webserver login authentication method and device |
CN107248212A (en) * | 2017-06-08 | 2017-10-13 | 深圳消费物联科技有限公司 | A kind of intelligent lock system and its method for unlocking based on NFC |
CN107578511A (en) * | 2017-09-15 | 2018-01-12 | 林海航 | A kind of smart lock and its Intelligent key |
CN108171831A (en) * | 2017-12-22 | 2018-06-15 | 武汉瑞纳捷电子技术有限公司 | A kind of bidirectional safe authentication method based on NFC mobile phone and smart lock |
Also Published As
Publication number | Publication date |
---|---|
CN109741067B (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8322608B2 (en) | Using promiscuous and non-promiscuous data to verify card and reader identity | |
US7407110B2 (en) | Protection of non-promiscuous data in an RFID transponder | |
US9818244B2 (en) | Method and system for permitting remote check-in and coordinating access control | |
CN107822208A (en) | Electronic cigarette and electronic cigarette activation system | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN106952377A (en) | The method and system of smart home door lock are opened by mobile fingerprint | |
CN109754505B (en) | Unlocking method and device based on IC card | |
CN207867484U (en) | Smart lock upgrade-system | |
CN102436686B (en) | Method and device for locking or unlocking wireless radio frequency (RF) electronic lockset | |
CN105857246A (en) | Control method, device and system for automobile starting lock | |
CN102289688B (en) | Method and device for label processing and access | |
CN107392001A (en) | A kind of authorization method, system and card | |
CN107423609A (en) | A kind of authoring system, method and card | |
US9495570B2 (en) | Method for authenticating an RFID tag | |
CN108734828A (en) | Yunmen prohibits Information Authentication method, terminal and server | |
CN109741067A (en) | A kind of data processing method and device based on IC card unlocking | |
CN108171830A (en) | A kind of hardware encryption method unlocked based on contactless card, system and intelligent cloud lock | |
CN110610564A (en) | Key management device, key management method, key management system, and readable storage medium | |
CN105225105A (en) | The method for security protection that NFC pays and system | |
CN101964952B (en) | Transmission method of electronic ticket | |
KR101226645B1 (en) | Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus | |
CN205722048U (en) | A kind of novel intelligent door lock | |
CN109218312B (en) | A kind of safety certifying method, device, system and Intelligent input device | |
CN107346383A (en) | A kind of authorization method and system | |
CN102314585A (en) | Method suitable for testing secure communication of radio frequency identification tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |