[go: up one dir, main page]

WO2015186072A1 - Encryption and decryption of data between a communications device and smart card with near field communication function - Google Patents

Encryption and decryption of data between a communications device and smart card with near field communication function Download PDF

Info

Publication number
WO2015186072A1
WO2015186072A1 PCT/IB2015/054191 IB2015054191W WO2015186072A1 WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1 IB 2015054191 W IB2015054191 W IB 2015054191W WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1
Authority
WO
WIPO (PCT)
Prior art keywords
communications device
smart card
data
encrypted
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2015/054191
Other languages
French (fr)
Other versions
WO2015186072A9 (en
Inventor
Sun GUOHUA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jing King Tech Holdings Pte Ltd
Original Assignee
Jing King Tech Holdings Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jing King Tech Holdings Pte Ltd filed Critical Jing King Tech Holdings Pte Ltd
Priority to SG11201610205SA priority Critical patent/SG11201610205SA/en
Publication of WO2015186072A1 publication Critical patent/WO2015186072A1/en
Publication of WO2015186072A9 publication Critical patent/WO2015186072A9/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • This invention relates to encryption and decryption of digital information based on Near Field Communication (NFC) technology, such as but is not limited to the encryption and decryption of mobile messages such as SMS and MMS, encryption and decryption of digital information in various internet environments for mobile devices such as mobile phones, encryption and decryption of computer data in various internet environments as well as the encryption and decryption technology of digital information for various digital devices with telecommunication functions (such as WIFI, Bluetooth, infrared sensor etc.) in various internet environments.
  • NFC Near Field Communication
  • the encryption and decryption of digital information in an internet environment is extremely important - any device connected to the internet carrying out information transmission faces such issues.
  • the SSL transmission is commonly adopted for information encryption and decryption where the security requirement is not high.
  • the secret key of this encryption and decryption is stored locally on the communication or computing device and is prone to attack and security compromise. Where the security requirement is high or more customized, additional hardware encryption and decryption methods are often adopted.
  • the present invention attempts to overcome at least in part some of the aforementioned disadvantages.
  • a method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising:- reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to achieve NFC communication; verifying legitimacy of the communications device and /or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting it to a specified algorithm together with a specified secret key to conduct the encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
  • NFC Near Field Communication
  • the data may take the form of digital information.
  • the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
  • the binding relation is verified via a unique identifier preset in the communications device and the smart card.
  • the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
  • PIN personal identification
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • MAC Media Access Control
  • markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
  • the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
  • a communications device installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
  • a smart card installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
  • NFC Near Field Communication
  • the data may take the form of digital information.
  • the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
  • the binding relation is verified via a unique identifier preset in the communications device and the smart card.
  • the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
  • PIN personal identification
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • MAC Media Access Control
  • markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
  • the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
  • FIG. 1 is a flow diagram of an embodiment of the invention. PREFERRED EMBODIMENT OF THE INVENTION
  • a method for encrypting and decrypting data between a communications device which has NFC capabilities and a smart card The communications device may be a mobile computing device such as a mobile phone, tablet, laptop, personal digital assistant etc..
  • the smart card may be an IC card which has NFC capabilities and computing capability (CPU).
  • the IC card chip provides symmetric or asymmetric algorithm; this algorithm can also be achieved by software in the chip storage space.
  • the data to be encrypted or decrypted may be digital information such as short messaging system (SMS) messages, multi-media messages (MMS) or any digital information received or stored in the phone, including audio, video and images, text, drawings, graphs, photographs or combinations of one or more of the above.
  • SMS short messaging system
  • MMS multi-media messages
  • the legitimacy verification can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
  • the verification of IC card PIN means that a user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone and communication between the phone and IC card is initiated (by the communication method between the NFC mobile phone and IC card), the PIN code of the phone is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
  • PIN code personal identification code
  • the verification of the binding relation between the phone and the IC card can further involve the user presetting a unique identifier such as an International Mobile Equipment Identity (IMEI) of phone and/or an International Mobile Subscriber Identity (IMSI) of a phone card in the IC card and before commencing the encryption and decryption of the digital information); an application on the phone such as a mobile app then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two sets of IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • the legitimacy verification 130 can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
  • the verification of IC card PIN means that the user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing the encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone (by the communication method between the NFC mobile phone and IC card), the PIN code is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
  • PIN code personal identification code
  • the verification of the binding relation between the phone and the IC card means that the user presets an IMEI of the phone and/or an IMSI of the phone card in the IC card before commencing the encryption and decryption of the digital information; the mobile App then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
  • the aforementioned "prescribed format" refers to the digital information encrypted and decrypted, which, depending on the various requirements of individual encryption and decryption content, can be the entire information of a complete document manifested as several character fields of equal length; the partial abstract of a complete document, such as: the beginning and/or the conclusion of the text, some numbers or diagrams in the document, and some image information of a video document, text, drawings, graphs, photographs or combinations of one or more of the above.
  • the secret key and algorithm of encryption and decryption is stored in the IC card, which both ensures the security of the secret key storage and achieves the portability of information encryption and decryption.
  • the mobile phone is now one of the primary device for data interchange due to its versatility; as such, the encryption and decryption of digital information based on mobile phone and smart card would be the most convenient method in solving the problem of hardware encryption and decryption of mobile data such as SMS and MMS employing the most prevalent digital encryption and decryption device.
  • the communications device may take the form of a desktop or laptop computer and the unique identifier is a Media Access Control (MAC) address of the said device.
  • MAC Media Access Control
  • the digital information may take the form of may take the form of Short Messaging System (SMS) messages, Multimedia Messaging System (MMS) messages or other like messaging protocol.
  • SMS Short Messaging System
  • MMS Multimedia Messaging System

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A system and method for encrypting and decrypting data between a communications device and an smart card each with Near Field Communication (NFC) function comprising reserving storage space on the communications device; placing the smart card near or in contact with the communications device to enable NFC communication; verifying legitimacy of the communications device and/or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.

Description

ENCRYPTION AND DECRYPTION OF DATA BETWEEN A COMMUNICATIONS DEVICE AND SMART CARD WITH NEAR FIELD COMMUNICATION FUNCTION
FIELD OF THE INVENTION
This invention relates to encryption and decryption of digital information based on Near Field Communication (NFC) technology, such as but is not limited to the encryption and decryption of mobile messages such as SMS and MMS, encryption and decryption of digital information in various internet environments for mobile devices such as mobile phones, encryption and decryption of computer data in various internet environments as well as the encryption and decryption technology of digital information for various digital devices with telecommunication functions (such as WIFI, Bluetooth, infrared sensor etc.) in various internet environments.
BACKGROUND ART
The following discussion of the background of the invention is intended to facilitate an understanding of the present invention. However, it should be appreciated that the discussion is not an acknowledgement or admission that any of the material referred to was published, known or part of the common general knowledge of the person skilled in the art in any jurisdiction as at the date of the application.
The encryption and decryption of digital information in an internet environment is extremely important - any device connected to the internet carrying out information transmission faces such issues. The SSL transmission is commonly adopted for information encryption and decryption where the security requirement is not high. The secret key of this encryption and decryption is stored locally on the communication or computing device and is prone to attack and security compromise. Where the security requirement is high or more customized, additional hardware encryption and decryption methods are often adopted. Currently, some common hardware encryption and decryption methods include hardware encryption engine and hardware encryption terminal (such as USB Key), but these devices often require cable connection; or are expensive specialized devices and are non-portable; or they can only run on devices with general interface and device software such as computers (laptops) and may have compatibility issues between the hardware encryption terminal and the computer as well as poor portability. In a world where internet communication has become a critical part of social life, and where mobile payment, mobile business, mobile office, mobile social communication etc. all heavily demand data encryption and decryption, the core objective of this invention is to achieve portable, convenient and safe encryption and decryption of digital information, especially on the currently most prevalent device - mobile phones.
The present invention attempts to overcome at least in part some of the aforementioned disadvantages.
SUMMARY OF THE INVENTION
Throughout this document, unless otherwise indicated to the contrary, the terms "comprising", "consisting of", and the like, are to be construed as non- exhaustive, or in other words, as meaning "including, but not limited to".
In accordance with a first aspect of the invention, there is a method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising:- reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to achieve NFC communication; verifying legitimacy of the communications device and /or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting it to a specified algorithm together with a specified secret key to conduct the encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
Preferably, the data may take the form of digital information.
Preferably, the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
Preferably, the binding relation is verified via a unique identifier preset in the communications device and the smart card.
Preferably, the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
Preferably, markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
Preferably, the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
Preferably, the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
In accordance with a second aspect of the invention there is a communications device installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
In accordance with a third aspect of the invention there is a smart card installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
In accordance with a fourth aspect of the invention there is a system for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function; where the communications device is operable to reserve storage space for storing the data to be encrypted or decrypted; NFC communication is enabled between the communications device and smart card when placed near or in contact with each other to verify the legitimacy of the communications device and/or the smart card; the communications device is further operable to send data to be encrypted or decrypted to the smart card in a prescribed format; and on receipt of the data, the smart card is operable to submit said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, the smart card is further operable to send the encrypted or decrypted data to the communications device in the prescribed format.
Preferably the data may take the form of digital information.
Preferably the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
Preferably the binding relation is verified via a unique identifier preset in the communications device and the smart card.
Preferably the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
Preferably markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
Preferably the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
Preferably, the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be better understood in the light of the following description, made with reference to the drawings, wherein:
Figure 1 is a flow diagram of an embodiment of the invention. PREFERRED EMBODIMENT OF THE INVENTION
Particular embodiments of the present invention will now be described with reference to the accompanying drawing. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present invention. Additionally, unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art to which this invention belongs.
In accordance with a first embodiment of the invention, there is a method for encrypting and decrypting data between a communications device which has NFC capabilities and a smart card. The communications device may be a mobile computing device such as a mobile phone, tablet, laptop, personal digital assistant etc.. The smart card may be an IC card which has NFC capabilities and computing capability (CPU). The IC card chip provides symmetric or asymmetric algorithm; this algorithm can also be achieved by software in the chip storage space. With reference to Figure 1 , the implementing process of this invention will now be described with reference to a mobile phone and IC card as follows:-
Mobile phone:
1 . Set storage space in the phone for reserving the data to be encrypted or decrypted 1 10. The data to be encrypted or decrypted may be digital information such as short messaging system (SMS) messages, multi-media messages (MMS) or any digital information received or stored in the phone, including audio, video and images, text, drawings, graphs, photographs or combinations of one or more of the above.
2. Place the IC card near or in contact with the phone to enable NFC communication between the phone and IC card 120. A user could be prompted to do so according to prompts by the phone such as a message on the screen of the phone.
3. Verify legitimacy of the phone and/or IC card as the encryption and decryption devices 130. The legitimacy verification can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card. The verification of IC card PIN means that a user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone and communication between the phone and IC card is initiated (by the communication method between the NFC mobile phone and IC card), the PIN code of the phone is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified. The verification of the binding relation between the phone and the IC card can further involve the user presetting a unique identifier such as an International Mobile Equipment Identity (IMEI) of phone and/or an International Mobile Subscriber Identity (IMSI) of a phone card in the IC card and before commencing the encryption and decryption of the digital information); an application on the phone such as a mobile app then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two sets of IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
4. Send in batches to the IC card the digital information to be encrypted and decrypted 140 in the prescribed format. Meanwhile, receiving in batches the digital information to be encrypted and decrypted 1 70 from the IC card and store the information in the space set aside in the phone in the prescribed format. Markers can also be added by the mobile application to the head or tail of each batch of the digital information being transmitted to avoid restarting transmission of the digital information in case the NFC communication is interrupted by abnormal occurrences and ensure the remaining information transmission can resume later. This step is of great importance as communication anomalies are common in NFC communication.
5. The operation is completed when the phone sends and receives the end mark of digital information and the phone screen will prompt that the encryption and decryption process is finished. The IC card is then moved away from the phone. IC card:
1 . Place the IC card near or in contact with the phone to enable NFC communication between the phone and IC card 120. A user could be prompted to do so according to prompts by the phone such as a message on the screen of the phone.
2. Conduct the legitimacy verification 130 of the phone. The legitimacy verification 130 can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card. The verification of IC card PIN means that the user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing the encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone (by the communication method between the NFC mobile phone and IC card), the PIN code is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified. The verification of the binding relation between the phone and the IC card means that the user presets an IMEI of the phone and/or an IMSI of the phone card in the IC card before commencing the encryption and decryption of the digital information; the mobile App then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
3. Receive in batches the digital information to be encrypted and decrypted by the IC card 150 from the phone and submit it to the specified algorithm together with specified secret key to conduct encryption or decryption operation; then sending the encrypted or decrypted digital information to the phone 160 in the prescribed format; 4. Stop sending the digital information when prompted by the phone such as when a completion prompt pops up on the phone screen.
In the above implementation illustration, the aforementioned "prescribed format" refers to the digital information encrypted and decrypted, which, depending on the various requirements of individual encryption and decryption content, can be the entire information of a complete document manifested as several character fields of equal length; the partial abstract of a complete document, such as: the beginning and/or the conclusion of the text, some numbers or diagrams in the document, and some image information of a video document, text, drawings, graphs, photographs or combinations of one or more of the above.
The beneficial effects of the invention are as follows:
1 . The secret key and algorithm of encryption and decryption is stored in the IC card, which both ensures the security of the secret key storage and achieves the portability of information encryption and decryption.
2. The data interchange in the encryption and decryption between the mobile phone and the smart card is achieved through NFC communication without the need for drivers or any other support program or the risk of compatibility issues.
3. The mobile phone is now one of the primary device for data interchange due to its versatility; as such, the encryption and decryption of digital information based on mobile phone and smart card would be the most convenient method in solving the problem of hardware encryption and decryption of mobile data such as SMS and MMS employing the most prevalent digital encryption and decryption device. It should be appreciated by the person skilled in the art that the above invention is not limited to the embodiment described. In particular, the following modifications and improvements may be made without departing from the scope of the present invention:
The communications device may take the form of a desktop or laptop computer and the unique identifier is a Media Access Control (MAC) address of the said device.
The digital information may take the form of may take the form of Short Messaging System (SMS) messages, Multimedia Messaging System (MMS) messages or other like messaging protocol.
It is to be understood that the above embodiments have been provided only by way of exemplification of this invention, and that further modifications and improvements thereto, as would be apparent to persons skilled in the relevant art, are deemed to fall within the broad scope and ambit of the present invention described herein. It is further to be understood that features from one or more of the described embodiments may be combined to form further embodiments.

Claims

WE CLAIM
1 . A method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising: reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to enable NFC communication; verifying legitimacy of the communications device and/or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
2. The method according to claim 1 wherein the data may take the form of digital information.
3. The method according to claim 1 or 2 wherein the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
4. The method according to claim 3 wherein the binding relation is verified via a unique identifier preset in the communications device and the smart card.
5. The method according to claim 4 wherein the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
6. The method according to any one of the preceding claims wherein markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
7. The method according to any one of the preceding claims wherein the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
8. The method according to any one of the preceding claims wherein the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
9. A communications device installed with software thereon, the software executable to perform the method as claimed in any one of the preceding claims.
10. A smart card installed with software thereon, the software executable to perform the method as claimed in any one of claims 1 to 8.
1 1 . A system for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function; where the communications device is operable to reserve storage space for storing the data to be encrypted or decrypted; NFC communication is enabled between the communications device and smart card when placed near or in contact with each other to verify the legitimacy of the communications device and/or the smart card; the communications device is further operable to send data to be encrypted or decrypted to the smart card in a prescribed format; and on receipt of the data, the smart card is operable to submit said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, the smart card is further operable to send the encrypted or decrypted data to the communications device in the prescribed format.
12. The system according to claim 1 1 wherein the data may take the form of digital information. .
13. The system according to claim 1 1 or 12 wherein the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
14. The system according to claim 13 wherein the binding relation is verified via a unique identifier preset in the communications device and the smart card.
15. The system according to claim 14 wherein the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
16. The system according to any one of claims 1 1 to 15 wherein markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
17. The system according to any one of claims 1 1 to 16 wherein the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
18. The system according to any one of claims 1 1 to 17 wherein the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
PCT/IB2015/054191 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function Ceased WO2015186072A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
SG11201610205SA SG11201610205SA (en) 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410243848.7 2014-06-04
CN201410243848.7A CN103985042A (en) 2014-06-04 2014-06-04 Digital information encryption and decryption method based on NFC mobile phone and IC card

Publications (2)

Publication Number Publication Date
WO2015186072A1 true WO2015186072A1 (en) 2015-12-10
WO2015186072A9 WO2015186072A9 (en) 2016-02-25

Family

ID=51277001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2015/054191 Ceased WO2015186072A1 (en) 2014-06-04 2015-06-03 Encryption and decryption of data between a communications device and smart card with near field communication function

Country Status (3)

Country Link
CN (1) CN103985042A (en)
SG (1) SG11201610205SA (en)
WO (1) WO2015186072A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103985042A (en) * 2014-06-04 2014-08-13 孙国华 Digital information encryption and decryption method based on NFC mobile phone and IC card
CN104318436A (en) * 2014-10-21 2015-01-28 上海鹏逸电子商务有限公司 Safety payment method and system based on mobile terminal and mobile terminal
CN104778579A (en) * 2015-04-30 2015-07-15 北京奇虎科技有限公司 Induction payment method and device based on electronic identity recognition carrier
CN106557708B (en) * 2016-11-21 2020-03-17 武汉斗鱼网络科技有限公司 Safety protection method and system
CN113840271B (en) * 2021-09-27 2024-04-19 北京字节跳动网络技术有限公司 NFC data transmission method and device, electronic equipment and storage medium
CN114595488A (en) * 2022-03-18 2022-06-07 京东方科技集团股份有限公司 Data exchange management method, electronic device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140189359A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN103985042A (en) * 2014-06-04 2014-08-13 孙国华 Digital information encryption and decryption method based on NFC mobile phone and IC card
US20150134536A1 (en) * 2012-06-08 2015-05-14 Zte Corporation Mobile terminal and method and system for inquiring information of intelligent card

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001253034A1 (en) * 2000-03-29 2001-10-08 Vadium Technology, Inc. One-time-pad encryption with central key service and keyable characters
CN100353787C (en) * 2004-06-23 2007-12-05 华为技术有限公司 A security guarantee method for data information stored in a mobile terminal
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN103457724B (en) * 2012-06-05 2017-02-08 中兴通讯股份有限公司 Method and system for point-to-point data safe transmission
CN103279692A (en) * 2013-05-03 2013-09-04 广东欧珀移动通信有限公司 File encryption and decryption method and device based on mobile phone
CN103577220A (en) * 2013-08-31 2014-02-12 成都西可科技有限公司 System and method for opening private application or private data through NFC (near field communication) label
CN103580870A (en) * 2013-11-07 2014-02-12 李宾 Mobile phone identity authentication terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150134536A1 (en) * 2012-06-08 2015-05-14 Zte Corporation Mobile terminal and method and system for inquiring information of intelligent card
US20140189359A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN103985042A (en) * 2014-06-04 2014-08-13 孙国华 Digital information encryption and decryption method based on NFC mobile phone and IC card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHEN, W.D. ET AL.: "NFC mobile payment with Citizen Digital Certificate", THE 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION INFORMATION TECHNOLOGY (ICNIT, 21 June 2011 (2011-06-21), pages 120 - 126, XP031907545 *
MANTORO, T. ET AL.: "Smart card authentication for Internet applications using NFC enabled phone", 2010 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M, 13 December 2010 (2010-12-13), pages D13 - D18., XP032007097 *

Also Published As

Publication number Publication date
SG11201610205SA (en) 2017-01-27
CN103985042A (en) 2014-08-13
WO2015186072A9 (en) 2016-02-25

Similar Documents

Publication Publication Date Title
JP7512499B2 (en) First factor contactless card authentication system and method
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
US7891557B2 (en) System and method for managing multiple smart card sessions
CN104079581B (en) Identity identifying method and equipment
CN106034028B (en) A terminal equipment authentication method, device and system
US20090298468A1 (en) System and method for deleting data in a communication device
CN108183972B (en) File processing method and terminal
US20080011827A1 (en) Automatic management of security information for a security token access device with multiple connections
WO2015186072A1 (en) Encryption and decryption of data between a communications device and smart card with near field communication function
KR20160083128A (en) Method and system for encrypted communications
EP2881863A1 (en) Method for implementing encryption in storage card, and decryption method and device
US20140090016A1 (en) Shared secret identification for secure communication
CN114450990A (en) Multi-factor authentication for providing credentials for secure messages via contactless cards
CN109451495A (en) The acquisition methods and device of verification information
CN105376059A (en) Method and system for performing application signature based on electronic key
US11006464B2 (en) Method, apparatus, storage medium, and terminal for establishing a Wi-Fi connection
CN104378375A (en) Remote access method for mobile phone, terminal device, server and system
US9654455B2 (en) Communication system, communication device, key management apparatus, and communication method
US11838755B2 (en) Techniques for secure authentication of the controlled devices
CN105634884B (en) A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus
JP2017538223A (en) Authentication method
CN104732166A (en) Data storing and reading method and device and equipment
CN104270342B (en) The access method and system of virtual desktop
TW201717596A (en) Method and device for pairing bluetooth devices
CN107277935B (en) Bluetooth communication method, device and application system and equipment thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15803928

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15803928

Country of ref document: EP

Kind code of ref document: A1