CN104702413A - NFC (Near Field Communication)-based authentication method and system and plug and socket assembly - Google Patents

NFC (Near Field Communication)-based authentication method and system and plug and socket assembly Download PDF

Info

Publication number
CN104702413A
CN104702413A CN201510123388.9A CN201510123388A CN104702413A CN 104702413 A CN104702413 A CN 104702413A CN 201510123388 A CN201510123388 A CN 201510123388A CN 104702413 A CN104702413 A CN 104702413A
Authority
CN
China
Prior art keywords
key
information
authentication information
enciphered message
uid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510123388.9A
Other languages
Chinese (zh)
Inventor
刘紫进
童辉
徐国飞
骆涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rui Qizhishang Science And Technology Ltd Of Shenzhen
Original Assignee
Rui Qizhishang Science And Technology Ltd Of Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rui Qizhishang Science And Technology Ltd Of Shenzhen filed Critical Rui Qizhishang Science And Technology Ltd Of Shenzhen
Priority to CN201510123388.9A priority Critical patent/CN104702413A/en
Publication of CN104702413A publication Critical patent/CN104702413A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an NFC (Near Field Communication)-based authentication method, comprising the following steps: an NFC module acquires preset authentication information in an NFC label, and the authentication information comprises a first secret key, first encrypted information, first authentication information, a second secret key and second encrypted information; the NFC module encrypts the first encrypted information by means of the first secret key, thereby obtaining first decrypted information; the NFC module judges whether the first decrypted information is the same with the first authentication information; if so, the NFC module decrypts the second encrypted information by means of the second secret key, thereby obtaining second decrypted information; the NFC module judges whether the second decrypted information is the same with preset second authentication information in the NFC module; if so, the NFC module is authenticated by means of the NFC label. Meanwhile, the invention further discloses an NFC-based authentication system and a plug-socket assembly. The safety of communication between the NFC module and the NFC label is improved, and meanwhile, the safety of a socket is increased.

Description

A kind of authentication method based on NFC and system and plug and socket component
Technical field
The application relates to NFC technique field, particularly a kind of authentication method based on NFC and system and plug and socket component.
Background technology
NFC merges by RFID technique and interconnection technique a kind of the short distance wireless communication technology developing out, emerged rapidly in recent years, be widely used in wireless near field communication field, create a lot of NFC product, namely NFC module and NFC label are one of them, during the intercommunication of NFC module and NFC label.In prior art, the disposal ability of NFC module and NFC device is more powerful, or the algorithmic rule that the device of NFC label adopts height to encrypt can be write in NFC module, the result using encryption rule to calculate is stored on the nfc tag, thus the safety of safeguards system, NFC label is due to cost limitation low, low in energy consumption, NFC label only have sent single authentication information to NFC module, this single authentication information is easily decrypted, be not easy to realize complicated certification, cause the communication between NFC module and NFC label dangerous.
Summary of the invention
The application provides a kind of authentication method based on NFC and system and plug and socket component, solves in prior art, the problem that between NFC module and NFC label, communications security is low.
According to the first aspect of the application, the application provides a kind of authentication method based on NFC, comprises the following steps:
NFC module obtains authorization information preset in NFC label, and authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; NFC module uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module judges that whether the first decryption information is identical with the first authentication information;
If identical, NFC module uses the second double secret key second enciphered message to be decrypted, and obtains the second decryption information; NFC module judges that whether the second decryption information is identical with the second authentication information preset in NFC module;
If identical, NFC module is by the certification of NFC label.
According to the second aspect of the application, the application provides a kind of Verification System based on NFC, comprise NFC module and NFC label, preset authorization information in NFC label, authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; The second authentication information is preset in NFC module;
NFC module for obtaining authorization information, and uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module, when determining the first decryption information and being identical with the first authentication information, uses the second double secret key second enciphered message to be decrypted, obtains the second decryption information; NFC module when determining the second decryption information and being identical with the second authentication information, for the certification by NFC label.
According to the third aspect of the application, the application provides a kind of plug and socket component based on NFC, the plug comprising socket and be connected with external equipment, the control switch being provided with NFC module in socket and being electrically connected with NFC module, control switch is serially connected between power supply and the power output end of socket, plug is provided with the NFC label removably connected, preset authorization information in NFC label, authorization information comprises the first key, the first enciphered message, the first authentication information and the second key, the second enciphered message; The second authentication information is preset in NFC module;
NFC module for obtaining authorization information, and uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module, when determining the first decryption information and being identical with the first authentication information, for using the second double secret key second enciphered message to be decrypted, obtains the second decryption information; NFC module when determining the second decryption information and being identical with the second authentication information, for connecting control switch.
The beneficial effect of the application is, because the application obtains authorization information preset in NFC label by NFC module, authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; NFC module uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module judges that whether the first decryption information is identical with the first authentication information; If identical, NFC module uses the second double secret key second enciphered message to be decrypted, and obtains the second decryption information; NFC module judges that whether the second decryption information is identical with the second authentication information preset in NFC module; If identical, NFC module is by the certification of NFC label.Safety certifying method based on NFC and the system of the application carry out double probate to NFC label, and the authentication information of double probate is different, improves the fail safe communicated between NFC module and NFC label.
The plug and socket component based on NFC of the application, the NFC label that NFC module on socket recognizes on plug could be energized, plug without NFC label cannot usurp socket, and when not obtaining NFC module certification, socket power output also can not be charged simultaneously, adds the fail safe of socket.
Accompanying drawing explanation
Fig. 1 is the flow chart of the embodiment of the present application 1;
Fig. 2 is the circuit connection diagram of the embodiment of the present application 6;
Fig. 3 is the structural representation of the embodiment of the present application 6.
Embodiment
By reference to the accompanying drawings the present invention is described in further detail below by embodiment.
Embodiment 1:
Based on an authentication method of NFC, as shown in Figure 1, comprise the steps:
S101:NFC module obtains authorization information preset in NFC label, and authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; NFC module uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module judges that whether the first decryption information is identical with the first authentication information;
S102: if identical, NFC module uses the second double secret key second enciphered message to be decrypted, and obtains the second decryption information; NFC module judges that whether the second decryption information is identical with the second authentication information preset in NFC module;
S103: if identical, NFC module is by the certification of NFC label.
Authorization information preset in NFC label, authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message.Distance between NFC label and NFC module reaches distance of reaction, and namely NFC module obtains the authorization information in NFC label.NFC module uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information, and then NFC module judges that whether the first decryption information is identical with the first authentication information, if not identical, then verification process stops.If identical, NFC module just uses the second double secret key second enciphered message to be decrypted, obtain the second decryption information, judge that whether the second decryption information is identical with the second authentication information preset in NFC module again, if not identical, then verification process stops, if identical, NFC module is just by the certification of NFC label.
Embodiment 2:
As the improvement of embodiment 1, in the present embodiment, the first key is UID field key, and the first enciphered message is UID encrypted fields, and the first authentication information is UID authentication information, and the first decryption information is UID decryption information; Second key is Key field key, and the second authentication information is Key authentication information, and the second enciphered message is Key encrypted fields, and the second decryption information is Key decryption information.UID and user identity prove, its information is unique, the content in NFC label can be prevented to be replicated, thus can promote fail safe.But UID itself is transparent, if it is just dangerous to have cracked UID encryption rule.Thus use key again to encrypt, just add an encryption rule in addition, improve its fail safe further.
Further, Key field key is Key field random key, and UID field key is UID field random key, uses random key, adds the difficulty that key cracks, and promotes its fail safe further.
In other embodiments, the first key is Key field key, and the first authentication information is Key authentication information, and the first enciphered message is Key encrypted fields, and the first decryption information is Key decryption information; Second key is UID field key, and the second authentication information is UID authentication information, and the second enciphered message is UID encrypted fields, and the second decryption information is UID decryption information.Also the effect promoting fail safe further can be played.
Embodiment 3:
As the improvement of above-described embodiment, in the present embodiment, first key, the first enciphered message, the first certification letter, the second key and the second enciphered message lack of alignment in authorization information, and also comprise before the step using the first double secret key first enciphered message to be decrypted in NFC module: NFC module is resequenced to the first key of lack of alignment, the first enciphered message, the first authentication information, the second key and the second enciphered message.Due to the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message lack of alignment in authorization information, even if these are acquired, also cannot learn which is key, which is enciphered message, thus key pair encryption information cannot be used to be decrypted, ensure that the fail safe of information.
When applying above-described embodiment, designer can exchange the order of the first key, the first enciphered message, the first certification letter, the second key and the second enciphered message, first key, the first enciphered message, the first authentication information, the second key and the second enciphered message are returned, namely to its rearrangement in exchange according to contrary order at NFC module write code.Said sequence also only has designer to know, thus can promote its fail safe further.
Embodiment 4:
Based on a Verification System of NFC, comprise NFC module and NFC label, preset authorization information in NFC label, authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; The second authentication information is preset in NFC module.
NFC module for obtaining authorization information, and uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module, when determining the first decryption information and being identical with the first authentication information, uses the second double secret key second enciphered message to be decrypted, obtains the second decryption information; NFC module when determining the second decryption information and being identical with the second authentication information, for the certification by NFC label.
Embodiment 5:
As the improvement of embodiment 4, in the present embodiment, the first key is UID field key, and the first enciphered message is UID encrypted fields, and the first authentication information is UID authentication information, and the first decryption information is UID decryption information; Second key is Key field key, and the second authentication information is Key authentication information, and the second enciphered message is Key encrypted fields, and the second decryption information is Key decryption information.UID and user identity prove, its information is unique, the content in NFC label can be prevented to be replicated, thus can promote fail safe.But UID itself is transparent, if it is just dangerous to have cracked UID encryption rule.Thus use key again to encrypt, just add an encryption rule in addition, improve its fail safe further.
Further, Key field key is Key field random key, and UID field key is UID field random key, uses random key, adds the difficulty that key cracks, and promotes its fail safe further.
Further, the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message lack of alignment in authorization information; NFC module, before use first double secret key first enciphered message is decrypted, is resequenced for the first key to lack of alignment, the first enciphered message, the first authentication information, the second key and the second enciphered message.
In other embodiments, the first key is Key field key, and the first authentication information is Key authentication information, and the first enciphered message is Key encrypted fields, and the first decryption information is Key decryption information; Second key is UID field key, and the second authentication information is UID authentication information, and the second enciphered message is UID encrypted fields, and the second decryption information is UID decryption information.
Embodiment 6:
A kind of plug and socket component based on NFC, as shown in Figure 2, the plug 2 comprising socket 1 and be connected with external equipment, the control switch 12 being provided with NFC module 11 in socket 1 and being electrically connected with NFC module 11, control switch 12 is serially connected between the power output end 13 of power supply 3 and socket 1.
As shown in Figure 3, socket 1 comprises shell 16, is arranged on the circuit board 15 in shell 16 and the panel 14 for closure 16, and panel 14 is provided with jack 141, and circuit board 15 is provided with NFC module 11.Plug 2 is provided with the NFC label 21 removably connected, and NFC label 21 upper cover is covered with one deck barrier paper, and after tearing barrier paper, NFC label 21 is pasted on plug 2 removably.NFC label 21 has the shape matched with plug 2 end face, and it is provided with the through hole corresponding with iron plate on plug 2, thus makes NFC label 21 intactly can be pasted on plug 2 to be provided with on that end face of iron plate.
In NFC label 21, preset authorization information, authorization information comprises the first key, the first enciphered message, the first authentication information and the second key, the second enciphered message; The second authentication information is preset in NFC module 11;
NFC module 11 for obtaining authorization information, and uses the first double secret key first enciphered message to be decrypted, and obtains the first decryption information; NFC module 11, when determining the first decryption information and being identical with the first authentication information, for using the second double secret key second enciphered message to be decrypted, obtains the second decryption information; NFC module 11 is when determining the second decryption information and being identical with the second authentication information, for connecting control switch 12, now, the power output end 13 of socket 1 is by charged, thus, plug in the present embodiment without NFC label cannot usurp socket, and when not obtaining NFC module certification, socket power output also can not be charged simultaneously, adds the fail safe of socket.
Embodiment 7:
As the improvement of embodiment 6, in the present embodiment, the first key is UID field key, and the first enciphered message is UID encrypted fields, and the first authentication information is UID authentication information, and the first decryption information is UID decryption information; Second key is Key field key, and the second authentication information is Key authentication information, and the second enciphered message is Key encrypted fields, and the second decryption information is Key decryption information.UID and user identity prove, its information is unique, the content in NFC label can be prevented to be replicated, thus can promote fail safe.But UID itself is transparent, if it is just dangerous to have cracked UID encryption rule.Thus use key again to encrypt, just add an encryption rule in addition, to improve its fail safe.And Key field key is Key field random key, UID field key is UID field random key, uses random key, adds the difficulty that key cracks, and promotes its fail safe further.
In other embodiments, the first key is Key field key, and the first authentication information is Key authentication information, and the first enciphered message is Key encrypted fields, and the first decryption information is Key decryption information; Second key is UID field key, and the second authentication information is UID authentication information, and the second enciphered message is UID encrypted fields, and the second decryption information is UID decryption information.Also the effect promoting fail safe further can be played.
Above content is in conjunction with concrete execution mode further description made for the present invention, can not assert that specific embodiment of the invention is confined to these explanations.For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, some simple deduction or replace can also be made.

Claims (10)

1. based on an authentication method of NFC, it is characterized in that: comprise the following steps:
NFC module obtains authorization information preset in NFC label, and described authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; Described NFC module uses the first enciphered message described in described first double secret key to be decrypted, and obtains the first decryption information; Described NFC module judges that whether described first decryption information is identical with described first authentication information;
If identical, described NFC module uses the second enciphered message described in described second double secret key to be decrypted, and obtains the second decryption information; Described NFC module judges that whether described second decryption information is identical with the second authentication information preset in described NFC module;
If identical, described NFC module is by the certification of described NFC label.
2. method according to claim 1, is characterized in that:
Described first key is UID field key, and described first enciphered message is UID encrypted fields, and described first authentication information is UID authentication information, and described first decryption information is UID decryption information; Described second key is Key field key, and described second authentication information is Key authentication information, and described second enciphered message is Key encrypted fields, and described second decryption information is Key decryption information;
Or described first key is Key field key, and described first authentication information is Key authentication information, and described first enciphered message is Key encrypted fields, and described first decryption information is Key decryption information; Described second key is UID field key, and described second authentication information is UID authentication information, and described second enciphered message is UID encrypted fields, and described second decryption information is UID decryption information.
3. method according to claim 1 and 2, is characterized in that:
Described first key, described first enciphered message, described first authentication information, described second key and described second enciphered message lack of alignment in described authorization information;
Described NFC module also comprises before using the step that described in described first double secret key, the first enciphered message is decrypted: described NFC module is resequenced to described first key of lack of alignment, described first enciphered message, described first authentication information, described second key and described second enciphered message.
4. method according to claim 2, is characterized in that:
Described Key field key is Key field random key, and described UID field key is UID field random key.
5., based on a Verification System of NFC, comprise NFC module and NFC label, it is characterized in that:
Preset authorization information in described NFC label, described authorization information comprises the first key, the first enciphered message, the first authentication information, the second key and the second enciphered message; The second authentication information is preset in described NFC module;
Described NFC module for obtaining described authorization information, and uses the first enciphered message described in described first double secret key to be decrypted, and obtains the first decryption information; Described NFC module, when determining described first decryption information and being identical with described first authentication information, uses described second double secret key second enciphered message to be decrypted, obtains the second decryption information; Described NFC module when determining described second decryption information and being identical with described second authentication information, for the certification by described NFC label.
6. system according to claim 5, is characterized in that:
Described first key is UID field key, and described first authentication information is UID authentication information, and described first enciphered message is UID encrypted fields, and described first decryption information is UID decryption information; Described second key is Key field key, and described second authentication information is Key authentication information, and described second enciphered message is Key encrypted fields, and described second decryption information is Key decryption information;
Or described first key is Key field key, and described first authentication information is Key authentication information, and described first enciphered message is Key encrypted fields, and described first decryption information is Key decryption information; Described second key is UID field key, and described second authentication information is UID authentication information, and described second enciphered message is UID encrypted fields, and described second decryption information is UID decryption information.
7. the system according to claim 5 or 6, is characterized in that:
Described first key, described first enciphered message, described first authentication information, described second key and described second enciphered message lack of alignment in described authorization information;
Described NFC module, before described in described first double secret key of use, the first enciphered message is decrypted, is resequenced for described first key to lack of alignment, described first enciphered message, described first authentication information, described second key and described second enciphered message.
8. system according to claim 6, is characterized in that:
Described Key field key is Key field random key, and described UID field key is UID field random key.
9. the plug and socket component based on NFC, the plug comprising socket and be connected with external equipment, the control switch being provided with NFC module in described socket and being electrically connected with described NFC module, described control switch is serially connected between the power output end of power supply and described socket, described plug is provided with the NFC label removably connected, and it is characterized in that:
Preset authorization information in described NFC label, described authorization information comprises the first key, the first enciphered message, the first authentication information and the second key, the second enciphered message; The second authentication information is preset in described NFC module;
Described NFC module for obtaining described authorization information, and uses the first enciphered message described in described first double secret key to be decrypted, and obtains the first decryption information;
Described NFC module, when determining described first decryption information and being identical with described first authentication information, for using described second double secret key second enciphered message to be decrypted, obtains the second decryption information;
Described NFC module when determining described second decryption information and being identical with described second authentication information, for connecting described control switch.
10. assembly according to claim 9, is characterized in that:
Described first key is UID field random key, and described first authentication information is UID authentication information, and described first enciphered message is UID encrypted fields, and described first decryption information is UID decryption information; Described second key is Key field random key, and described second authentication information is Key authentication information, and described second enciphered message is Key encrypted fields, and described second decryption information is Key decryption information;
Or described first key is Key field random key, and described first authentication information is Key authentication information, and described first enciphered message is Key encrypted fields, and described first decryption information is Key decryption information; Described second key is UID field random key, and described second authentication information is UID authentication information, and described second enciphered message is UID encrypted fields, and described second decryption information is UID decryption information.
CN201510123388.9A 2015-03-20 2015-03-20 NFC (Near Field Communication)-based authentication method and system and plug and socket assembly Pending CN104702413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510123388.9A CN104702413A (en) 2015-03-20 2015-03-20 NFC (Near Field Communication)-based authentication method and system and plug and socket assembly

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510123388.9A CN104702413A (en) 2015-03-20 2015-03-20 NFC (Near Field Communication)-based authentication method and system and plug and socket assembly

Publications (1)

Publication Number Publication Date
CN104702413A true CN104702413A (en) 2015-06-10

Family

ID=53349207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510123388.9A Pending CN104702413A (en) 2015-03-20 2015-03-20 NFC (Near Field Communication)-based authentication method and system and plug and socket assembly

Country Status (1)

Country Link
CN (1) CN104702413A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105305179A (en) * 2015-12-04 2016-02-03 南京苗苗智能科技有限公司 Intelligent wall socket for Internet of Things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255109A (en) * 2011-04-06 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Authentication method for mobile terminal battery, and mobile terminal thereof
CN102768514A (en) * 2012-07-06 2012-11-07 南京物联传感技术有限公司 Home control system and control method thereof
CN102810191A (en) * 2012-07-24 2012-12-05 深圳市杰瑞特科技有限公司 Near field communication (NFC) system and mobile payment and charge methods thereof
CN103248403A (en) * 2012-02-13 2013-08-14 索尼公司 Converter and program
CN103716158A (en) * 2012-09-28 2014-04-09 卓望数码技术(深圳)有限公司 Service processing method, service processing device and corresponding retail terminal
CA2909028A1 (en) * 2013-04-08 2014-10-16 Geo-Line Co., Ltd. Location-based electric power mediation module, electric vehicle, mediation server, and user certification socket or connector

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255109A (en) * 2011-04-06 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Authentication method for mobile terminal battery, and mobile terminal thereof
CN103248403A (en) * 2012-02-13 2013-08-14 索尼公司 Converter and program
CN102768514A (en) * 2012-07-06 2012-11-07 南京物联传感技术有限公司 Home control system and control method thereof
CN102810191A (en) * 2012-07-24 2012-12-05 深圳市杰瑞特科技有限公司 Near field communication (NFC) system and mobile payment and charge methods thereof
CN103716158A (en) * 2012-09-28 2014-04-09 卓望数码技术(深圳)有限公司 Service processing method, service processing device and corresponding retail terminal
CA2909028A1 (en) * 2013-04-08 2014-10-16 Geo-Line Co., Ltd. Location-based electric power mediation module, electric vehicle, mediation server, and user certification socket or connector

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105305179A (en) * 2015-12-04 2016-02-03 南京苗苗智能科技有限公司 Intelligent wall socket for Internet of Things

Similar Documents

Publication Publication Date Title
KR101786177B1 (en) Method and apparatus for performing secure bluetooth communication
CN102315942B (en) Security terminal with Bluetooth and communication method thereof of security terminal and client end
CN102800141B (en) A kind of access control method based on two-way authentication and system
CN103905204B (en) The transmission method and Transmission system of data
CN103685323A (en) Method for realizing intelligent home security networking based on intelligent cloud television gateway
US9742565B2 (en) Method and system for backing up private key of electronic signature token
CN102255109B (en) Authentication method for mobile terminal battery, and mobile terminal thereof
US9712326B2 (en) Method and system for backing up private key of electronic signature token
CN102111265A (en) Method for encrypting embedded secure access module (ESAM) of power system acquisition terminal
CN109343515A (en) Car fault diagnosis method, system, equipment and computer readable storage medium
CN104579679B (en) Wireless public network data forwarding method for agriculture distribution communication equipment
CN104637117B (en) Method, intelligent lock core, lockset and key that intelligent lock core and key are realized
CN102281143B (en) Remote unlocking system of intelligent card
CN101789068B (en) Card reader safety certification device and method
CN107147631A (en) For the data safety communication system and method in Internet of Things
CN105577386A (en) Data encryption method of bilateral interaction intelligent electric energy meter
CN104410641A (en) Security-controlled online activation method and device for POS terminals
CN109309910A (en) Communication data transmission method, system, equipment and computer readable storage medium
CN102082669A (en) Security certification method and device
CN106330457B (en) RFID tag ownership transfer method based on quadratic residue
CN104579659A (en) Device for safety information interaction
US9948614B1 (en) Remote device initialization using asymmetric cryptography
CN108173926A (en) One-key start automobile method, system and user terminal and T-box terminals
CN103957521A (en) Community visitor authentication method and system based on NFC technology
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150610