WO2015186072A1 - Encryption and decryption of data between a communications device and smart card with near field communication function - Google Patents
Encryption and decryption of data between a communications device and smart card with near field communication function Download PDFInfo
- Publication number
- WO2015186072A1 WO2015186072A1 PCT/IB2015/054191 IB2015054191W WO2015186072A1 WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1 IB 2015054191 W IB2015054191 W IB 2015054191W WO 2015186072 A1 WO2015186072 A1 WO 2015186072A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communications device
- smart card
- data
- encrypted
- decrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- This invention relates to encryption and decryption of digital information based on Near Field Communication (NFC) technology, such as but is not limited to the encryption and decryption of mobile messages such as SMS and MMS, encryption and decryption of digital information in various internet environments for mobile devices such as mobile phones, encryption and decryption of computer data in various internet environments as well as the encryption and decryption technology of digital information for various digital devices with telecommunication functions (such as WIFI, Bluetooth, infrared sensor etc.) in various internet environments.
- NFC Near Field Communication
- the encryption and decryption of digital information in an internet environment is extremely important - any device connected to the internet carrying out information transmission faces such issues.
- the SSL transmission is commonly adopted for information encryption and decryption where the security requirement is not high.
- the secret key of this encryption and decryption is stored locally on the communication or computing device and is prone to attack and security compromise. Where the security requirement is high or more customized, additional hardware encryption and decryption methods are often adopted.
- the present invention attempts to overcome at least in part some of the aforementioned disadvantages.
- a method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising:- reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to achieve NFC communication; verifying legitimacy of the communications device and /or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting it to a specified algorithm together with a specified secret key to conduct the encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
- NFC Near Field Communication
- the data may take the form of digital information.
- the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
- the binding relation is verified via a unique identifier preset in the communications device and the smart card.
- the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
- PIN personal identification
- IMEI International Mobile Equipment Identity
- IMSI International Mobile Subscriber Identity
- MAC Media Access Control
- markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
- the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
- the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
- a communications device installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
- a smart card installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
- NFC Near Field Communication
- the data may take the form of digital information.
- the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
- the binding relation is verified via a unique identifier preset in the communications device and the smart card.
- the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
- PIN personal identification
- IMEI International Mobile Equipment Identity
- IMSI International Mobile Subscriber Identity
- MAC Media Access Control
- markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
- the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
- the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
- FIG. 1 is a flow diagram of an embodiment of the invention. PREFERRED EMBODIMENT OF THE INVENTION
- a method for encrypting and decrypting data between a communications device which has NFC capabilities and a smart card The communications device may be a mobile computing device such as a mobile phone, tablet, laptop, personal digital assistant etc..
- the smart card may be an IC card which has NFC capabilities and computing capability (CPU).
- the IC card chip provides symmetric or asymmetric algorithm; this algorithm can also be achieved by software in the chip storage space.
- the data to be encrypted or decrypted may be digital information such as short messaging system (SMS) messages, multi-media messages (MMS) or any digital information received or stored in the phone, including audio, video and images, text, drawings, graphs, photographs or combinations of one or more of the above.
- SMS short messaging system
- MMS multi-media messages
- the legitimacy verification can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
- the verification of IC card PIN means that a user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone and communication between the phone and IC card is initiated (by the communication method between the NFC mobile phone and IC card), the PIN code of the phone is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
- PIN code personal identification code
- the verification of the binding relation between the phone and the IC card can further involve the user presetting a unique identifier such as an International Mobile Equipment Identity (IMEI) of phone and/or an International Mobile Subscriber Identity (IMSI) of a phone card in the IC card and before commencing the encryption and decryption of the digital information); an application on the phone such as a mobile app then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two sets of IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
- IMEI International Mobile Equipment Identity
- IMSI International Mobile Subscriber Identity
- the legitimacy verification 130 can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card.
- the verification of IC card PIN means that the user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing the encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone (by the communication method between the NFC mobile phone and IC card), the PIN code is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified.
- PIN code personal identification code
- the verification of the binding relation between the phone and the IC card means that the user presets an IMEI of the phone and/or an IMSI of the phone card in the IC card before commencing the encryption and decryption of the digital information; the mobile App then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
- the aforementioned "prescribed format" refers to the digital information encrypted and decrypted, which, depending on the various requirements of individual encryption and decryption content, can be the entire information of a complete document manifested as several character fields of equal length; the partial abstract of a complete document, such as: the beginning and/or the conclusion of the text, some numbers or diagrams in the document, and some image information of a video document, text, drawings, graphs, photographs or combinations of one or more of the above.
- the secret key and algorithm of encryption and decryption is stored in the IC card, which both ensures the security of the secret key storage and achieves the portability of information encryption and decryption.
- the mobile phone is now one of the primary device for data interchange due to its versatility; as such, the encryption and decryption of digital information based on mobile phone and smart card would be the most convenient method in solving the problem of hardware encryption and decryption of mobile data such as SMS and MMS employing the most prevalent digital encryption and decryption device.
- the communications device may take the form of a desktop or laptop computer and the unique identifier is a Media Access Control (MAC) address of the said device.
- MAC Media Access Control
- the digital information may take the form of may take the form of Short Messaging System (SMS) messages, Multimedia Messaging System (MMS) messages or other like messaging protocol.
- SMS Short Messaging System
- MMS Multimedia Messaging System
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
A system and method for encrypting and decrypting data between a communications device and an smart card each with Near Field Communication (NFC) function comprising reserving storage space on the communications device; placing the smart card near or in contact with the communications device to enable NFC communication; verifying legitimacy of the communications device and/or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
Description
ENCRYPTION AND DECRYPTION OF DATA BETWEEN A COMMUNICATIONS DEVICE AND SMART CARD WITH NEAR FIELD COMMUNICATION FUNCTION
FIELD OF THE INVENTION
This invention relates to encryption and decryption of digital information based on Near Field Communication (NFC) technology, such as but is not limited to the encryption and decryption of mobile messages such as SMS and MMS, encryption and decryption of digital information in various internet environments for mobile devices such as mobile phones, encryption and decryption of computer data in various internet environments as well as the encryption and decryption technology of digital information for various digital devices with telecommunication functions (such as WIFI, Bluetooth, infrared sensor etc.) in various internet environments.
BACKGROUND ART
The following discussion of the background of the invention is intended to facilitate an understanding of the present invention. However, it should be appreciated that the discussion is not an acknowledgement or admission that any of the material referred to was published, known or part of the common general knowledge of the person skilled in the art in any jurisdiction as at the date of the application.
The encryption and decryption of digital information in an internet environment is extremely important - any device connected to the internet carrying out information transmission faces such issues. The SSL transmission is commonly adopted for information encryption and decryption where the security requirement is not high. The secret key of this encryption and decryption is stored locally on the communication or computing device and is prone to attack and security compromise. Where the security requirement is high or more customized, additional hardware encryption and decryption
methods are often adopted. Currently, some common hardware encryption and decryption methods include hardware encryption engine and hardware encryption terminal (such as USB Key), but these devices often require cable connection; or are expensive specialized devices and are non-portable; or they can only run on devices with general interface and device software such as computers (laptops) and may have compatibility issues between the hardware encryption terminal and the computer as well as poor portability. In a world where internet communication has become a critical part of social life, and where mobile payment, mobile business, mobile office, mobile social communication etc. all heavily demand data encryption and decryption, the core objective of this invention is to achieve portable, convenient and safe encryption and decryption of digital information, especially on the currently most prevalent device - mobile phones.
The present invention attempts to overcome at least in part some of the aforementioned disadvantages.
SUMMARY OF THE INVENTION
Throughout this document, unless otherwise indicated to the contrary, the terms "comprising", "consisting of", and the like, are to be construed as non- exhaustive, or in other words, as meaning "including, but not limited to".
In accordance with a first aspect of the invention, there is a method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising:- reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to achieve NFC communication; verifying legitimacy of the communications device and /or the smart card;
sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting it to a specified algorithm together with a specified secret key to conduct the encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
Preferably, the data may take the form of digital information.
Preferably, the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
Preferably, the binding relation is verified via a unique identifier preset in the communications device and the smart card.
Preferably, the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
Preferably, markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
Preferably, the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
Preferably, the communication device may be a mobile computing device
such as a mobile phone, tablet, laptop or personal digital assistant.
In accordance with a second aspect of the invention there is a communications device installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
In accordance with a third aspect of the invention there is a smart card installed with software thereon, the software executable to perform the method according to the first aspect of the invention.
In accordance with a fourth aspect of the invention there is a system for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function; where the communications device is operable to reserve storage space for storing the data to be encrypted or decrypted; NFC communication is enabled between the communications device and smart card when placed near or in contact with each other to verify the legitimacy of the communications device and/or the smart card; the communications device is further operable to send data to be encrypted or decrypted to the smart card in a prescribed format; and on receipt of the data, the smart card is operable to submit said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, the smart card is further operable to send the encrypted or decrypted data to the communications device in the prescribed format.
Preferably the data may take the form of digital information.
Preferably the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
Preferably the binding relation is verified via a unique identifier preset in the
communications device and the smart card.
Preferably the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
Preferably markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
Preferably the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
Preferably, the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be better understood in the light of the following description, made with reference to the drawings, wherein:
Figure 1 is a flow diagram of an embodiment of the invention. PREFERRED EMBODIMENT OF THE INVENTION
Particular embodiments of the present invention will now be described with reference to the accompanying drawing. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present invention. Additionally, unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art to which this invention
belongs.
In accordance with a first embodiment of the invention, there is a method for encrypting and decrypting data between a communications device which has NFC capabilities and a smart card. The communications device may be a mobile computing device such as a mobile phone, tablet, laptop, personal digital assistant etc.. The smart card may be an IC card which has NFC capabilities and computing capability (CPU). The IC card chip provides symmetric or asymmetric algorithm; this algorithm can also be achieved by software in the chip storage space. With reference to Figure 1 , the implementing process of this invention will now be described with reference to a mobile phone and IC card as follows:-
Mobile phone:
1 . Set storage space in the phone for reserving the data to be encrypted or decrypted 1 10. The data to be encrypted or decrypted may be digital information such as short messaging system (SMS) messages, multi-media messages (MMS) or any digital information received or stored in the phone, including audio, video and images, text, drawings, graphs, photographs or combinations of one or more of the above.
2. Place the IC card near or in contact with the phone to enable NFC communication between the phone and IC card 120. A user could be prompted to do so according to prompts by the phone such as a message on the screen of the phone.
3. Verify legitimacy of the phone and/or IC card as the encryption and decryption devices 130. The legitimacy verification can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card. The verification of IC card PIN means that a user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing encryption and decryption of the digital
information; when the IC card is placed near or in contact with the phone and communication between the phone and IC card is initiated (by the communication method between the NFC mobile phone and IC card), the PIN code of the phone is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified. The verification of the binding relation between the phone and the IC card can further involve the user presetting a unique identifier such as an International Mobile Equipment Identity (IMEI) of phone and/or an International Mobile Subscriber Identity (IMSI) of a phone card in the IC card and before commencing the encryption and decryption of the digital information); an application on the phone such as a mobile app then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two sets of IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
4. Send in batches to the IC card the digital information to be encrypted and decrypted 140 in the prescribed format. Meanwhile, receiving in batches the digital information to be encrypted and decrypted 1 70 from the IC card and store the information in the space set aside in the phone in the prescribed format. Markers can also be added by the mobile application to the head or tail of each batch of the digital information being transmitted to avoid restarting transmission of the digital information in case the NFC communication is interrupted by abnormal occurrences and ensure the remaining information transmission can resume later. This step is of great importance as communication anomalies are common in NFC communication.
5. The operation is completed when the phone sends and receives the end mark of digital information and the phone screen will prompt that the encryption and decryption process is finished. The IC card is then moved away from the phone.
IC card:
1 . Place the IC card near or in contact with the phone to enable NFC communication between the phone and IC card 120. A user could be prompted to do so according to prompts by the phone such as a message on the screen of the phone.
2. Conduct the legitimacy verification 130 of the phone. The legitimacy verification 130 can be achieved by verifying the IC card PIN or the binding relation between the phone and IC card. The verification of IC card PIN means that the user presets a PIN code (personal identification code) in the IC card and inputs the corresponding PIN code in the phone before commencing the encryption and decryption of the digital information; when the IC card is placed near or in contact with the phone (by the communication method between the NFC mobile phone and IC card), the PIN code is communicated to the IC card and compared with the PIN code preset in the IC card; if the two PIN codes are identical, the legitimacy of the phone and IC card is verified. The verification of the binding relation between the phone and the IC card means that the user presets an IMEI of the phone and/or an IMSI of the phone card in the IC card before commencing the encryption and decryption of the digital information; the mobile App then communicates the IMEI of the phone and/or the IMSI of the phone card to the IC card which is compared with the IMEI of the phone and/or IMSI of the phone card preset in the IC card; if the two IMEIs and/or IMSIs are identical, the legitimacy of the phone and IC card is verified.
3. Receive in batches the digital information to be encrypted and decrypted by the IC card 150 from the phone and submit it to the specified algorithm together with specified secret key to conduct encryption or decryption operation; then sending the encrypted or decrypted digital information to the phone 160 in the prescribed format;
4. Stop sending the digital information when prompted by the phone such as when a completion prompt pops up on the phone screen.
In the above implementation illustration, the aforementioned "prescribed format" refers to the digital information encrypted and decrypted, which, depending on the various requirements of individual encryption and decryption content, can be the entire information of a complete document manifested as several character fields of equal length; the partial abstract of a complete document, such as: the beginning and/or the conclusion of the text, some numbers or diagrams in the document, and some image information of a video document, text, drawings, graphs, photographs or combinations of one or more of the above.
The beneficial effects of the invention are as follows:
1 . The secret key and algorithm of encryption and decryption is stored in the IC card, which both ensures the security of the secret key storage and achieves the portability of information encryption and decryption.
2. The data interchange in the encryption and decryption between the mobile phone and the smart card is achieved through NFC communication without the need for drivers or any other support program or the risk of compatibility issues.
3. The mobile phone is now one of the primary device for data interchange due to its versatility; as such, the encryption and decryption of digital information based on mobile phone and smart card would be the most convenient method in solving the problem of hardware encryption and decryption of mobile data such as SMS and MMS employing the most prevalent digital encryption and decryption device.
It should be appreciated by the person skilled in the art that the above invention is not limited to the embodiment described. In particular, the following modifications and improvements may be made without departing from the scope of the present invention:
The communications device may take the form of a desktop or laptop computer and the unique identifier is a Media Access Control (MAC) address of the said device.
The digital information may take the form of may take the form of Short Messaging System (SMS) messages, Multimedia Messaging System (MMS) messages or other like messaging protocol.
It is to be understood that the above embodiments have been provided only by way of exemplification of this invention, and that further modifications and improvements thereto, as would be apparent to persons skilled in the relevant art, are deemed to fall within the broad scope and ambit of the present invention described herein. It is further to be understood that features from one or more of the described embodiments may be combined to form further embodiments.
Claims
1 . A method for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function comprising: reserving storage space on the communications device for storing the data to be encrypted or decrypted; placing the smart card near or in contact with the communications device to enable NFC communication; verifying legitimacy of the communications device and/or the smart card; sending data to be encrypted or decrypted from the communications device to the smart card in a prescribed format; receiving data to be encrypted or decrypted by the smart card and submitting said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, thereafter further sending the encrypted or decrypted data to the communications device in the prescribed format.
2. The method according to claim 1 wherein the data may take the form of digital information.
3. The method according to claim 1 or 2 wherein the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
4. The method according to claim 3 wherein the binding relation is verified via a unique identifier preset in the communications device and the smart card.
5. The method according to claim 4 wherein the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
6. The method according to any one of the preceding claims wherein markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
7. The method according to any one of the preceding claims wherein the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
8. The method according to any one of the preceding claims wherein the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
9. A communications device installed with software thereon, the software executable to perform the method as claimed in any one of the preceding claims.
10. A smart card installed with software thereon, the software executable to perform the method as claimed in any one of claims 1 to 8.
1 1 . A system for encrypting and decrypting data between a communications device and a smart card each configured with Near Field Communication (NFC) function; where the communications device is operable to reserve storage space for storing the data to be encrypted or decrypted; NFC communication is enabled
between the communications device and smart card when placed near or in contact with each other to verify the legitimacy of the communications device and/or the smart card; the communications device is further operable to send data to be encrypted or decrypted to the smart card in a prescribed format; and on receipt of the data, the smart card is operable to submit said data to a specified algorithm together with a specified secret key to conduct encryption or decryption, the smart card is further operable to send the encrypted or decrypted data to the communications device in the prescribed format.
12. The system according to claim 1 1 wherein the data may take the form of digital information. .
13. The system according to claim 1 1 or 12 wherein the legitimacy of the communications device and/or the smart card is achieved by verifying a binding relation between the communications device and the smart card.
14. The system according to claim 13 wherein the binding relation is verified via a unique identifier preset in the communications device and the smart card.
15. The system according to claim 14 wherein the unique identifier is a personal identification (PIN) code, a International Mobile Equipment Identity (IMEI) code, a International Mobile Subscriber Identity (IMSI) code, or a Media Access Control (MAC) address.
16. The system according to any one of claims 1 1 to 15 wherein markers are added to the head or tail of each batch of the data when NFC communication is interrupted.
17. The system according to any one of claims 1 1 to 16 wherein the prescribed format comprises a complete document manifested as several character fields of equal length or part thereof; the partial abstract of a
complete document, numbers or diagrams in the document, image information of a video, text, drawings, graphs, photographs or combinations of one or more of the above.
18. The system according to any one of claims 1 1 to 17 wherein the communication device may be a mobile computing device such as a mobile phone, tablet, laptop or personal digital assistant.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG11201610205SA SG11201610205SA (en) | 2014-06-04 | 2015-06-03 | Encryption and decryption of data between a communications device and smart card with near field communication function |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410243848.7 | 2014-06-04 | ||
| CN201410243848.7A CN103985042A (en) | 2014-06-04 | 2014-06-04 | Digital information encryption and decryption method based on NFC mobile phone and IC card |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2015186072A1 true WO2015186072A1 (en) | 2015-12-10 |
| WO2015186072A9 WO2015186072A9 (en) | 2016-02-25 |
Family
ID=51277001
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2015/054191 Ceased WO2015186072A1 (en) | 2014-06-04 | 2015-06-03 | Encryption and decryption of data between a communications device and smart card with near field communication function |
Country Status (3)
| Country | Link |
|---|---|
| CN (1) | CN103985042A (en) |
| SG (1) | SG11201610205SA (en) |
| WO (1) | WO2015186072A1 (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103985042A (en) * | 2014-06-04 | 2014-08-13 | 孙国华 | Digital information encryption and decryption method based on NFC mobile phone and IC card |
| CN104318436A (en) * | 2014-10-21 | 2015-01-28 | 上海鹏逸电子商务有限公司 | Safety payment method and system based on mobile terminal and mobile terminal |
| CN104778579A (en) * | 2015-04-30 | 2015-07-15 | 北京奇虎科技有限公司 | Induction payment method and device based on electronic identity recognition carrier |
| CN106557708B (en) * | 2016-11-21 | 2020-03-17 | 武汉斗鱼网络科技有限公司 | Safety protection method and system |
| CN113840271B (en) * | 2021-09-27 | 2024-04-19 | 北京字节跳动网络技术有限公司 | NFC data transmission method and device, electronic equipment and storage medium |
| CN114595488A (en) * | 2022-03-18 | 2022-06-07 | 京东方科技集团股份有限公司 | Data exchange management method, electronic device and storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140189359A1 (en) * | 2012-12-28 | 2014-07-03 | Vasco Data Security, Inc. | Remote authentication and transaction signatures |
| CN103985042A (en) * | 2014-06-04 | 2014-08-13 | 孙国华 | Digital information encryption and decryption method based on NFC mobile phone and IC card |
| US20150134536A1 (en) * | 2012-06-08 | 2015-05-14 | Zte Corporation | Mobile terminal and method and system for inquiring information of intelligent card |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU2001253034A1 (en) * | 2000-03-29 | 2001-10-08 | Vadium Technology, Inc. | One-time-pad encryption with central key service and keyable characters |
| CN100353787C (en) * | 2004-06-23 | 2007-12-05 | 华为技术有限公司 | A security guarantee method for data information stored in a mobile terminal |
| CN102609641A (en) * | 2011-12-28 | 2012-07-25 | 潘铁军 | DRM (digital rights management) system based on distributed keys |
| CN103457724B (en) * | 2012-06-05 | 2017-02-08 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
| CN103279692A (en) * | 2013-05-03 | 2013-09-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method and device based on mobile phone |
| CN103577220A (en) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | System and method for opening private application or private data through NFC (near field communication) label |
| CN103580870A (en) * | 2013-11-07 | 2014-02-12 | 李宾 | Mobile phone identity authentication terminal |
-
2014
- 2014-06-04 CN CN201410243848.7A patent/CN103985042A/en active Pending
-
2015
- 2015-06-03 WO PCT/IB2015/054191 patent/WO2015186072A1/en not_active Ceased
- 2015-06-03 SG SG11201610205SA patent/SG11201610205SA/en unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150134536A1 (en) * | 2012-06-08 | 2015-05-14 | Zte Corporation | Mobile terminal and method and system for inquiring information of intelligent card |
| US20140189359A1 (en) * | 2012-12-28 | 2014-07-03 | Vasco Data Security, Inc. | Remote authentication and transaction signatures |
| CN103985042A (en) * | 2014-06-04 | 2014-08-13 | 孙国华 | Digital information encryption and decryption method based on NFC mobile phone and IC card |
Non-Patent Citations (2)
| Title |
|---|
| CHEN, W.D. ET AL.: "NFC mobile payment with Citizen Digital Certificate", THE 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION INFORMATION TECHNOLOGY (ICNIT, 21 June 2011 (2011-06-21), pages 120 - 126, XP031907545 * |
| MANTORO, T. ET AL.: "Smart card authentication for Internet applications using NFC enabled phone", 2010 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M, 13 December 2010 (2010-12-13), pages D13 - D18., XP032007097 * |
Also Published As
| Publication number | Publication date |
|---|---|
| SG11201610205SA (en) | 2017-01-27 |
| CN103985042A (en) | 2014-08-13 |
| WO2015186072A9 (en) | 2016-02-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7512499B2 (en) | First factor contactless card authentication system and method | |
| US10361857B2 (en) | Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon | |
| US7891557B2 (en) | System and method for managing multiple smart card sessions | |
| CN104079581B (en) | Identity identifying method and equipment | |
| CN106034028B (en) | A terminal equipment authentication method, device and system | |
| US20090298468A1 (en) | System and method for deleting data in a communication device | |
| CN108183972B (en) | File processing method and terminal | |
| US20080011827A1 (en) | Automatic management of security information for a security token access device with multiple connections | |
| WO2015186072A1 (en) | Encryption and decryption of data between a communications device and smart card with near field communication function | |
| KR20160083128A (en) | Method and system for encrypted communications | |
| EP2881863A1 (en) | Method for implementing encryption in storage card, and decryption method and device | |
| US20140090016A1 (en) | Shared secret identification for secure communication | |
| CN114450990A (en) | Multi-factor authentication for providing credentials for secure messages via contactless cards | |
| CN109451495A (en) | The acquisition methods and device of verification information | |
| CN105376059A (en) | Method and system for performing application signature based on electronic key | |
| US11006464B2 (en) | Method, apparatus, storage medium, and terminal for establishing a Wi-Fi connection | |
| CN104378375A (en) | Remote access method for mobile phone, terminal device, server and system | |
| US9654455B2 (en) | Communication system, communication device, key management apparatus, and communication method | |
| US11838755B2 (en) | Techniques for secure authentication of the controlled devices | |
| CN105634884B (en) | A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus | |
| JP2017538223A (en) | Authentication method | |
| CN104732166A (en) | Data storing and reading method and device and equipment | |
| CN104270342B (en) | The access method and system of virtual desktop | |
| TW201717596A (en) | Method and device for pairing bluetooth devices | |
| CN107277935B (en) | Bluetooth communication method, device and application system and equipment thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15803928 Country of ref document: EP Kind code of ref document: A1 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 15803928 Country of ref document: EP Kind code of ref document: A1 |