CN104270244B - NFC communication encryption method and system - Google Patents
NFC communication encryption method and system Download PDFInfo
- Publication number
- CN104270244B CN104270244B CN201410466506.1A CN201410466506A CN104270244B CN 104270244 B CN104270244 B CN 104270244B CN 201410466506 A CN201410466506 A CN 201410466506A CN 104270244 B CN104270244 B CN 104270244B
- Authority
- CN
- China
- Prior art keywords
- field communication
- communication equipment
- identification information
- key
- encrypted code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention provides a kind of NFC communication encryption method, comprises the following steps:First identification information of other party near-field communication equipment is sent to server;The key that the reception server determines to return after pair relationhip by first identification information;The key is decrypted by the encrypted code that one's own side's near-field communication equipment stores, obtains initial key;The data sent by the other party near-field communication equipment received using the initial key to one's own side's near-field communication equipment are decrypted, or the data sent using the initial key to one's own side's near-field communication equipment are encrypted.The present invention utilizes the identification information of server combination NFC device, NFC communication process is carried out whole two-way encryption, effectively solves the unsafe problems of NFC communication;Increase the complexity of encryption by way of secondary encryption, make NFC communication relatively reliable.
Description
【Technical field】
The present invention relates to NFC communication technical field, more particularly to a kind of NFC communication encryption method and system.
【Background technology】
Near-field communication (Near Field Communication, NFC) is a kind of radiotechnics of short distance high frequency,
13.56MHz frequencies are run in 20 cm distances.Its transmission speed has tri- kinds of 106kbps, 212kbps and 424kbps.At present
NFC turns into the international standards of ISO/IEC IS 18092, ECMA-340 standards and the standards of ETSI TS 102 190.
NFC technology is by non-contact radio-frequency to identify (RFID) and Technology Integration differentiation of interconnecting.
Data can be exchanged under actively or passively pattern by supporting NFC equipment.In the passive mode, the equipment of NFC communication is started,
Referred to as NFC initiating equipments (main equipment), radiofrequency field (RF-field) is provided in whole communication process, it can be selected
106kbps, 212kbps or 424kbps one of which transmission speed, transmit data to another equipment.Another equipment claims
For NFC target devices (slave unit), it is not necessary to produce radiofrequency field, and use load modulation (load modulation) technology, you can
Initiating equipment back is passed data with same speed.This communication mechanism connects with non-based on ISO14443A, MIFARE and FeliCa
Touch smart card is compatible, and therefore, NFC initiating equipments in the passive mode, can be connected with identical and initialization procedure detects
Contact type intelligent card or NFC target devices, and contact is established therewith.
NFC is as a kind of short-range technologies, and when several equipment are very close, file and other content cans exist
Transmitted in these equipment shared.The scene that this functionality cooperates for needs is highly useful, such as online game, authentication etc.
Deng, but inevitably generate the problem of NFC communication is safe.
【The content of the invention】
Based on this, the present invention is solution NFC communication safety problem, there is provided a kind of NFC communication encryption method.
The content of the embodiment of the present invention is as follows:
A kind of NFC communication encryption method, comprises the following steps:
First identification information of other party near-field communication equipment is sent to server;
The key that the reception server determines to return after pair relationhip by first identification information;
The key is decrypted by the encrypted code that one's own side's near-field communication equipment stores, obtains initial key;
Sent out using what the initial key received to one's own side's near-field communication equipment by the other party near-field communication equipment
The data sent are decrypted, or using the initial key to one's own side's near-field communication equipment to other party near-field communication device
The data of transmission are encrypted.
A kind of NFC communication encryption method, comprises the following steps:
The first identification information of each near-field communication equipment is obtained, and determines that near-field communication is set according to first identification information
Standby pair relationhip;
Initial key is generated at random for the near-field communication equipment in pair relationhip;
Respectively by the encrypted code corresponding with each near-field communication equipment in pair relationhip to the initial key
It is encrypted, generates key corresponding with each near-field communication equipment in pair relationhip respectively, and the key is sent out
Deliver to the near-field communication equipment corresponding with the key.
Accordingly, the embodiment of the present invention provides a kind of NFC communication encryption system, including:
Sending module, for the first identification information of other party near-field communication equipment to be sent to server;
Receiving module, the key for determining to return after pair relationhip by first identification information for the reception server;
Module is cracked, for the key to be decrypted by the encrypted code that one's own side's near-field communication equipment stores, is obtained
Initial key;
Encrypting module, for using the initial key to one's own side's near-field communication equipment to the other party near-field communication
The data that equipment is sent are encrypted.
A kind of NFC communication encryption system, including:
Second acquisition module, for obtaining the first identification information of each near-field communication equipment, believed according to the described first identification
Breath determines the pair relationhip of near-field communication equipment;
Initial key generation module, for generating initial key at random for the near-field communication equipment in pair relationhip;
Secondary encrypting module, for passing through the encrypted code pair corresponding with each near-field communication equipment in pair relationhip
The initial key is encrypted, and generates key corresponding with each near-field communication equipment in pair relationhip respectively;
Second sending module, for the key to be sent to the near-field communication equipment corresponding with the key.
The present invention utilizes the identification information of server combination NFC device, and NFC communication process, which is carried out the two-way of whole process, to be added
It is close, effectively solve the unsafe problems of NFC communication;Increase the complexity of password by way of secondary encryption, make NFC communication more
Add reliable.
【Brief description of the drawings】
Fig. 1 is a kind of schematic flow sheet of NFC communication encryption method in the embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet for encrypting code generating method in the embodiment of the present invention;
Fig. 3 is a kind of schematic flow sheet of processing method of Cloud Server in NFC communication ciphering process;
Fig. 4 is a kind of flow signal of iterative process of NFC device and Cloud Server in NFC communication ciphering process
Figure;
Fig. 5 is a kind of structural representation of NFC communication encryption system in the embodiment of the present invention;
Fig. 6 is the structural representation of encrypted code generation module in the embodiment of the present invention.
【Embodiment】
Present disclosure is described further with reference to specific embodiment.It should be noted that it is described below
Embodiment in, server use be Cloud Server (Elastic Compute Service, ECS), Cloud Server is one
Kind of disposal ability can elastic telescopic calculating service, its way to manage is simpler than traditional physical server efficient.Cloud Server
Application that can be more stable, safe with rapid build, reduce the difficulty of exploitation O&M and overall IT costs, but can not be limited with this
The claimed scope of the claims in the present invention, it can realize that other physical servers of function of the present invention will in right of the present invention
Ask within the scope of being claimed.
Fig. 1 shows a kind of NFC communication encryption method, and the embodiment is for the angle of NFC (near-field communication) equipment
Bright.As shown in figure 1, a kind of NFC communication encryption method, comprises the following steps:
S110 sends the first identification information of other party NFC device to Cloud Server;
S120 receives the key that Cloud Server determines to return after pair relationhip by first identification information;
The key is decrypted by the encrypted code that one's own side's NFC device stores by S130, obtains initial key;
The number sent by the other party NFC device that S140 is received using the initial key to one's own side's NFC device
According to being decrypted, or the data sent using the initial key to one's own side's NFC device are encrypted.
Specifically, after two NFC device pairings, the first identification information of other side is sent to Cloud Server, cloud service
After device receives the first identification information of both sides, it may be determined that both match, and are key corresponding to the generation of the two NFC devices,
After NFC device receives key, decoding decryption is carried out to key using the encrypted code each stored, obtains initial key, then
It is encrypted to sending data using initial key, is decrypted to receiving data.
By taking the mobile phone with NFC communication function as an example (hereinafter referred to as NFC mobile phone), when mobile phone A and mobile phone B need to carry out
During NFC communication, two mobile phones can be matched after, and the first identification information of other side, first identification information are obtained after pairing
Can be NFC UID (User Identification, user identity prove) or IMEI (International Mobile
Equipment Identity, mobile device world identification code), each NFC mobile phone all has unique NFC UID, and
" the electronics string number " that IMEI is made up of 15 bit digitals, it is corresponded with every mobile phone, and the code is that the whole world is unique,
Therefore UID and IMEI can be as the identification information of NFC mobile phone.Preferably, the UID based on NFC has higher stability, this
Embodiment is using UID as the first identification information.Mobile phone A sends the UID of mobile phone B to Cloud Server, and mobile phone B is then by mobile phone A
UID send to Cloud Server, Cloud Server determines pair relationhip, and respectively mobile phone A and hand after receiving the UID of two mobile phones
Machine B distributes a key, and after mobile phone A and mobile phone B receive respective key, the encrypted code prestored using itself is to key
Decoding decryption is carried out, obtains initial key, such mobile phone A and mobile phone B just obtain an identical initial key, subsequently can profit
Carried out data transmission with the initial key.
Reference picture 2, in one embodiment, NFC device can obtain encrypted code in the following way:
The first identification information of one's own side's near-field communication equipment is obtained, and according to the first of one's own side's near-field communication equipment the identification
Information generates the first encrypted code;
The encryption is generated according to the second identification information of first encrypted code and one's own side's near-field communication equipment
Code.
Specifically, continuing so that near-field communication equipment is NFC mobile phone, the first identification information is UID as an example, NFC is obtained first
UID, then generate the first encrypted code a using UID, in order to improve the reliability of encryption, the present embodiment is using multi-enciphering
Mode, secondary encryption, generation encrypted code aa are carried out using the second identification information of the first encrypted code a and NFC device.
The second described identification information can equally use NFC UID or IMEI, but in the present embodiment, in order to carry
The complexity of high encrypted code, preferably with IMEI, i.e., after one-time pad encryption generates the first encrypted code a, recycle the first encryption
Code a and the IMEI of the NFC mobile phone carry out secondary encryption, generate final encrypted code aa.
Preferably, the encrypted code of generation and the first identification information of itself are sent to Cloud Server, cloud clothes by NFC device
Business device distribution memory cell store the first identification information corresponding to each NFC device and corresponding encrypted code, subsequently for
When NFC device in pair relationhip distributes key, an initial key can be first generated, recycles each NFC device
Corresponding encrypted code forms key to the secondary encryption of initial key progress and sent to corresponding NFC device.
In summary, key is generated for the NFC device of communicating pair using Cloud Server in the present embodiment, NFC device is led to
Acquisition initial key is decrypted in the encrypted code for crossing itself storage, is communicated using the initial key, it is complete to realize NFC communication
The two-way encryption of journey.
Below again from the NFC communication encryption method in the angle elaboration embodiment of the present invention of server.
Fig. 3 shows the handling process of the Cloud Server in NFC communication ciphering process.A kind of as shown in figure 3, NFC communication
Encryption method, comprise the following steps:
S210 obtains the first identification information of each near-field communication equipment, and determines that near field leads to according to first identification information
Believe the pair relationhip of equipment;
S220 is that the near-field communication equipment in pair relationhip generates initial key at random;
S230 is respectively by the encrypted code corresponding with each near-field communication equipment in pair relationhip to described initial
Key is encrypted, and generates key corresponding with each near-field communication equipment in pair relationhip respectively, and will be described close
Key is sent to the near-field communication equipment corresponding with the key.
By taking NFC mobile phone A and mobile phone B as an example, when carrying out NFC communication, mobile phone A sends the first identification information of mobile phone B
To Cloud Server, mobile phone B sends the first identification information of mobile phone A to Cloud Server, cloud server to the first identification letter
After breath, the pair relationhip of mobile phone A and mobile phone B is determined, an initial key KEY is then generated at random, recycles the encryption of mobile phone A
Code aa carries out secondary encryption to initial key KEY, generates key A, the key A is corresponding with mobile phone A, wherein described encryption
Code aa is the corresponding spare cryptographic data of the first identification information stored in Cloud Server and with mobile phone A, i.e., each
The corresponding encrypted code of NFC mobile phone.Cloud Server sends the key A to mobile phone A, and mobile phone A utilizes after key A is received
The encrypted code aa of itself storage carries out decoding decryption to the key A, obtains the initial key KEY.Similarly, Cloud Server utilizes
The encrypted code bb of mobile phone B carries out secondary encryption to initial key KEY, generates key B, then sends key B to mobile phone B,
For mobile phone B after key B is received, the encrypted code bb stored using itself carries out decoding decryption to key B, obtains initial key
KEY.Mobile phone A, mobile phone B carry out NFC two-way communications using initial key KEY, for example, mobile phone A sends data to mobile phone B
When, data are encrypted using initial key KEY, after mobile phone B receives the data of mobile phone A transmission, utilize initial key KEY
Decryption extraction True Data.
Above-mentioned encrypted code and the first identification information of NFC device are one-to-one, and the encrypted code can be by NFC device certainly
Body generates, the encrypted code and the first identification information that cloud server NFC device is sent.
Preferably, the first above-mentioned identification information uses NFC UID, as globally unique registration ID.The UID and NFC
Equipment is one-to-one, has higher stability, therefore can be stored in Cloud Server as identification information.
Fig. 4 shown in NFC communication ciphering process, a kind of reality of interaction process flow of NFC device and Cloud Server
Apply example.Cloud Server determines the pair relationhip of NFC device by NFC UID, and initial close for the NFC device distribution with centering
Key, then it is sent to corresponding NFC after carrying out secondary encryption (more complicated multi-enciphering can also be carried out certainly) to initial key
Equipment, this cipher mode effectively increase the complexity and reliability of password, and adding for decryption is stored in NFC device
Password, each NFC device can extract initial key using the encrypted code of itself, between each other using initial key to passing
Transmission of data is encrypted, decrypted, and effectively improves the safety and reliability of NFC communication.Therefore, based on above-mentioned good beneficial
Effect, NFC communication encryption method provided by the invention can be widely used in the numerous areas such as payment, authentication.
Accordingly, the present invention provides a kind of NFC communication encryption system, as shown in figure 5, including client 1000 and cloud service
Device 2000, certain system can also only include any one in the client 1000 and the Cloud Server 2000.Below
So that NFC communication encryption system includes client 1000 and Cloud Server 2000 as an example, the structure and function of the system is discussed in detail.
Wherein, described client 1000 includes:
Sending module 110, for the first identification information of other party near-field communication equipment to be sent to Cloud Server;
Receiving module 120, determine what is returned after pair relationhip by first identification information for receiving Cloud Server
Key;
Module 130 is cracked, for the key to be decrypted by the encrypted code that one's own side's near-field communication equipment stores, is obtained
Take initial key;
Encrypting module 140, the data for being sent using the initial key to one's own side's near-field communication equipment are carried out
Encryption.
Client 1000 is arranged in NFC device, will be right by sending module 110 after two NFC devices are matched
First identification information of side is sent to Cloud Server, after the first identification information of cloud server to both sides, it may be determined that both
Pairing, and be key corresponding to two NFC device generations, after NFC device receives key by receiving module 120, then profit
With module 130 is cracked, decoding decryption is carried out to key by the encrypted code of storage, initial key is obtained, then by encrypting mould
Block 140 is encrypted according to initial key to sending data.
In one embodiment, client 1000 can also decrypt other party by cracking module 130 using initial key
The data that NFC device is sent.
In one embodiment, client 1000 also includes encrypted code generation module 150, leads to for generating one's own side near field
The encrypted code of equipment is believed, as shown in fig. 6, described encrypted code generation module 150 includes:
Acquisition module 1501, for obtaining the first identification information of one's own side's near-field communication equipment;
First generation module 1502, for being added according to the first identification information of one's own side's near-field communication equipment generation first
Password;
Second generation module 1503, for second according to first encrypted code and one's own side's near-field communication equipment
Identification information generates the encrypted code.
Specifically, so that near-field communication equipment is NFC mobile phone, the first identification information is UID as an example, client 1000 is by obtaining
Modulus block 1501 obtains NFC UID, then generates the first encrypted code a by the first generation module 1502 using UID, utilizes the
Second identification information of one encrypted code a and NFC device carries out secondary encryption by the second generation module 1503, generates encrypted code
aa。
The second described identification information can equally use NFC UID or IMEI, but in the present embodiment, in order to carry
The complexity of high encrypted code, preferably with IMEI, i.e., after one-time pad encryption generates the first encrypted code a, recycle the first encryption
Code a and the IMEI of the NFC mobile phone carry out secondary encryption, generate final encrypted code aa.
Preferably, client 1000 is sent out encrypted code corresponding to NFC device and the first identification information by sending module 110
Deliver to Cloud Server 2000.
As shown in figure 5, described Cloud Server 2000 includes:
Second acquisition module 210, for obtaining the first identification information of each near-field communication equipment, according to the described first identification
Information determines the pair relationhip of near-field communication equipment;
Initial key generation module 220, for generation to be initial close at random for the near-field communication equipment in pair relationhip
Key;
Secondary encrypting module 230, for passing through the encryption corresponding with each near-field communication equipment in pair relationhip
The initial key is encrypted code, and generation is corresponding with each near-field communication equipment in pair relationhip close respectively
Key;
Second sending module 240, for the key to be sent to the near-field communication equipment corresponding with the key.
By taking NFC mobile phone as an example, mobile phone A and mobile phone B have been respectively mounted client 1000, when mobile phone A and mobile phone B need to carry out
During NFC communication, two mobile phones can be matched after, and the first identification information of other side, first identification information are obtained after pairing
Can be the UID (User Identification, user identity prove) or IMEI (International of NFC device
Mobile Equipment Identity, mobile device world identification code), each NFC mobile phone all has unique NFC's
UID, and " the electronics string number " that IMEI is made up of 15 bit digitals, it is corresponded with every mobile phone, and the code is the whole world
Uniquely, therefore UID and IMEI can be as the identification information of NFC mobile phone.Preferably, the stabilization higher UID based on NFC
Property, using UID as the first identification information, mobile phone A is sent the UID of mobile phone B to Cloud Server by sending module 110, and hand
The UID of mobile phone A is then sent to Cloud Server 2000, Cloud Server 2000 and receives two hands by the second acquisition module 210 by machine B
The UID of machine simultaneously determines pair relationhip, is then that mobile phone A and mobile phone B generation one are initial close by initial key generation module 220
Key KEY, secondary encrypting module 230 carry out secondary encryption to initial key KEY using the encrypted code aa of mobile phone A, generate key A,
The key A is corresponding with mobile phone A, wherein described encrypted code aa is being stored in Cloud Server 2000 and with mobile phone A
Spare cryptographic data corresponding NFC UID, the i.e. corresponding encrypted code of each NFC mobile phone.Similarly, secondary encrypting module
230 carry out secondary encryption, generation key B to initial key KEY using the encrypted code bb of mobile phone B.The second of Cloud Server 2000
Sending module 240 sends the key A to mobile phone A, and key B is sent to mobile phone B.Mobile phone A is received close by receiving module 120
Key A, then the encrypted code aa prestored by cracking module 130 using itself carry out decoding decryption to key A, obtain initial close
Key KEY.Similarly, for mobile phone B after key B is received, the encrypted code bb stored using itself carries out decoding decryption to key B, obtains
Take initial key KEY.Mobile phone A, mobile phone B carry out NFC two-way communications using initial key KEY, such as mobile phone A passes through encryption
Data are encrypted using initial key KEY for module 140, and the data after encryption then are sent into mobile phone B, and mobile phone B receives
After the data sent to mobile phone A, it can be solved according to initial key KEY by cracking the data that module 130 is sent to mobile phone A
It is close.
In a kind of embodiment, Cloud Server 2000 receives what NFC device was sent by the second acquisition module 210
Encrypted code corresponding with NFC device and the first identification information.The distribution of Cloud Server 2000 memory cell stores each NFC and set
Standby corresponding first identification information and corresponding encrypted code, subsequently distributing key for the NFC device in pair relationhip
When, an initial key can be first generated, recycles encrypted code corresponding to each NFC device to carry out secondary add to initial key
Close formation key is sent to corresponding NFC device.
The realization of above-mentioned each function can specifically use the method in above-described embodiment, herein without repeating.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (11)
1. a kind of NFC communication encryption method, it is characterised in that comprise the following steps:
First identification information of other party near-field communication equipment is sent to server;
The key that the reception server determines to return after pair relationhip by first identification information;
The key is decrypted by the encrypted code that one's own side's near-field communication equipment stores, obtains initial key;
Using the initial key one's own side's near-field communication equipment is received by the other party near-field communication equipment send
Data are decrypted, or using the initial key to one's own side's near-field communication equipment to the other party near-field communication device
The data of transmission are encrypted;
The encrypted code of one's own side's near-field communication equipment storage obtains as follows:
The first identification information of one's own side's near-field communication equipment is obtained, and according to the first identification information of one's own side's near-field communication equipment
Generate the first encrypted code;
The encrypted code is generated according to the second identification information of first encrypted code and one's own side's near-field communication equipment.
2. NFC communication encryption method according to claim 1, it is characterised in that also comprise the following steps:
One's own side's near-field communication equipment by the first identification information of the encrypted code He one's own side's near-field communication equipment send to
Server.
3. NFC communication encryption method according to claim 1, it is characterised in that first identification information is led to near field
The user identity of letter proves that second identification information is mobile device world identification code.
4. a kind of NFC communication encryption method, it is characterised in that comprise the following steps:
The first identification information that each near-field communication equipment is sent is obtained, and determines that near-field communication is set according to first identification information
Standby pair relationhip;
Initial key is generated at random for the near-field communication equipment in pair relationhip;
The initial key is carried out by the encrypted code corresponding with each near-field communication equipment in pair relationhip respectively
Encryption, key corresponding with each near-field communication equipment in pair relationhip respectively is generated, and respectively send out the key
Deliver to the near-field communication equipment corresponding with the key;The encrypted code by near-field communication equipment according to the first encrypted code and
Second identification information of the near-field communication equipment and generate, first encrypted code is then by the near-field communication equipment according to described
One identification information and generate.
5. NFC communication encryption method according to claim 4, it is characterised in that also comprise the following steps:
Receive encrypted code corresponding with the near-field communication equipment and the first identification information that near-field communication equipment is sent.
6. the NFC communication encryption method according to claim 4 or 5, it is characterised in that first identification information is near field
The user identity of communication proves.
A kind of 7. NFC communication encryption system, it is characterised in that including:
Sending module, for the first identification information of other party near-field communication equipment to be sent to server;
Receiving module, the key for determining to return after pair relationhip by first identification information for the reception server;
Module is cracked, for the key to be decrypted by the encrypted code that one's own side's near-field communication equipment stores, is obtained initial
Key;
Encrypting module, for using the initial key to one's own side's near-field communication equipment to the other party near-field communication device
The data of transmission are encrypted;
Also include encrypted code generation module, for generating the encrypted code of one's own side's near-field communication equipment, the encrypted code generation module
Including:
Acquisition module, for obtaining the first identification information of one's own side's near-field communication equipment;
First generation module, for generating the first encrypted code according to the first identification information of one's own side's near-field communication equipment;
Second generation module, for the second identification information according to first encrypted code and one's own side's near-field communication equipment
Generate the encrypted code.
8. NFC communication encryption system according to claim 7, it is characterised in that the module that cracks is additionally operable to according to institute
The data that initial key receives one's own side's near-field communication equipment are stated to be decrypted.
9. NFC communication encryption system according to claim 7, it is characterised in that the sending module is additionally operable to will be described
The encrypted code of one's own side's near-field communication equipment and the first identification information are sent to server.
A kind of 10. NFC communication encryption system, it is characterised in that including:
Second acquisition module, the first identification information sent for obtaining each near-field communication equipment, believed according to the described first identification
Breath determines the pair relationhip of near-field communication equipment;
Initial key generation module, for generating initial key at random for the near-field communication equipment in pair relationhip;
Secondary encrypting module, for by the encrypted code corresponding with each near-field communication equipment in pair relationhip to described
Initial key is encrypted, and generates key corresponding with each near-field communication equipment in pair relationhip respectively;It is described to add
Password is generated by near-field communication equipment according to the second identification information of the first encrypted code and the near-field communication equipment, and described
One encrypted code is then generated by the near-field communication equipment according to first identification information;
Second sending module, for the key to be sent to the near-field communication equipment corresponding with the key.
11. NFC communication encryption system according to claim 10, it is characterised in that second acquisition module is additionally operable to
Receive encrypted code corresponding with the near-field communication equipment and the first identification information that near-field communication equipment is sent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466506.1A CN104270244B (en) | 2014-09-12 | 2014-09-12 | NFC communication encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466506.1A CN104270244B (en) | 2014-09-12 | 2014-09-12 | NFC communication encryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104270244A CN104270244A (en) | 2015-01-07 |
CN104270244B true CN104270244B (en) | 2017-11-14 |
Family
ID=52161738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410466506.1A Active CN104270244B (en) | 2014-09-12 | 2014-09-12 | NFC communication encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104270244B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131103B (en) * | 2016-06-02 | 2017-10-31 | 广州极飞科技有限公司 | The communication means of remote control and unmanned plane, device and system |
CN106100721B (en) * | 2016-06-24 | 2019-03-01 | 广州极飞科技有限公司 | Method, server, remote controler and the system that unmanned plane and remote controler are matched |
US10621825B2 (en) * | 2017-04-07 | 2020-04-14 | Japan Cash Machine Co., Ltd. | Device, system, and method for facilitating communications between electronic gaming machines and mobile devices |
CN110876117A (en) * | 2018-08-31 | 2020-03-10 | 中兴通讯股份有限公司 | Method and device for recovering lost connection of terminal |
CN109309571A (en) * | 2018-11-13 | 2019-02-05 | 厦门云拓智维科技有限公司 | A kind of setting method of key |
CN111447613B (en) * | 2019-01-16 | 2023-07-25 | 南京快轮智能科技有限公司 | Encryption system for sharing products |
CN111711945B (en) * | 2020-06-16 | 2023-09-22 | 易兆微电子(杭州)股份有限公司 | System and method for executing secure communication based on NFC protocol |
CN113382400A (en) * | 2021-06-01 | 2021-09-10 | 广州朗国电子科技有限公司 | Method for setting screen parameter by using NFC |
CN114449505B (en) * | 2022-03-08 | 2022-07-29 | 芯电智联(北京)科技有限公司 | NFC label data transmission method, device and storage medium |
CN114845302B (en) * | 2022-03-30 | 2023-01-10 | 慧之安信息技术股份有限公司 | Near field encryption communication method and system based on Internet of things |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007101941A1 (en) * | 2006-03-07 | 2007-09-13 | Trusted Logic | Method for secure pairing of two systems prior to setting up communication between them |
CN101202621A (en) * | 2006-12-13 | 2008-06-18 | 联想(北京)有限公司 | Method and system for security verification of data among non-contact equipments |
CN103391197A (en) * | 2013-07-19 | 2013-11-13 | 武汉大学 | Web identity authentication method based on mobile token and NFC technology |
-
2014
- 2014-09-12 CN CN201410466506.1A patent/CN104270244B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007101941A1 (en) * | 2006-03-07 | 2007-09-13 | Trusted Logic | Method for secure pairing of two systems prior to setting up communication between them |
CN101202621A (en) * | 2006-12-13 | 2008-06-18 | 联想(北京)有限公司 | Method and system for security verification of data among non-contact equipments |
CN103391197A (en) * | 2013-07-19 | 2013-11-13 | 武汉大学 | Web identity authentication method based on mobile token and NFC technology |
Also Published As
Publication number | Publication date |
---|---|
CN104270244A (en) | 2015-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104270244B (en) | NFC communication encryption method and system | |
JP6092415B2 (en) | Fingerprint authentication system and fingerprint authentication method based on NFC | |
CN102823216B (en) | Use the method that near field is authenticated | |
CN108199850B (en) | Anonymous security authentication and key agreement method for NFC | |
CN104704769A (en) | A wireless communication system | |
CN106031120B (en) | Key management | |
CN107690642A (en) | Radio communication | |
CN102638343A (en) | Handheld device and method for unlocking by same | |
CN103136819A (en) | Unlocking method for door control system based on mobile terminal and mobile terminal | |
CN105722068A (en) | System For Securing An NFC Transaction | |
Thammarat et al. | A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys | |
CN107612949A (en) | A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint | |
CN101944216A (en) | Two-factor online transaction safety authentication method and system | |
CN101789068A (en) | Card reader safety certification device and method | |
CN105228087B (en) | Mobile payment encryption method based on near-field communication | |
CN110190966A (en) | A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage | |
CN103236926A (en) | Point-to-point-based data transmission system and data transmission method | |
US20120166801A1 (en) | Mutual authentication system and method for mobile terminals | |
CN105682092B (en) | Bidirectional authentication method based on short-distance wireless communication technology | |
CN204103933U (en) | A kind of dynamic password generates equipment and transmission system | |
CN106779672A (en) | The method and device that mobile terminal safety pays | |
CN106779711A (en) | Safe payment method and device based on eID | |
CN103916851A (en) | Safety certification method, device and system | |
CN108259428B (en) | System and method for realizing data transmission | |
CN203104483U (en) | Fingerprint authentication platform and NFC application terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |