CN115002770A - Near field communication system based on quantum key - Google Patents

Near field communication system based on quantum key Download PDF

Info

Publication number
CN115002770A
CN115002770A CN202210566853.6A CN202210566853A CN115002770A CN 115002770 A CN115002770 A CN 115002770A CN 202210566853 A CN202210566853 A CN 202210566853A CN 115002770 A CN115002770 A CN 115002770A
Authority
CN
China
Prior art keywords
identity
quantum key
sending
receiving end
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210566853.6A
Other languages
Chinese (zh)
Inventor
赵呈洋
傅波海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Matrix Time Digital Technology Co Ltd
Original Assignee
Matrix Time Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matrix Time Digital Technology Co Ltd filed Critical Matrix Time Digital Technology Co Ltd
Priority to CN202210566853.6A priority Critical patent/CN115002770A/en
Publication of CN115002770A publication Critical patent/CN115002770A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a near field communication system based on a quantum key, which relates to the technical field of information security and comprises a sending end and a receiving end which are connected in near field communication, wherein the sending end sends an instruction to the receiving end, the sending end and the receiving end perform identity mutual check simultaneously, and the receiving end executes the instruction after the identity mutual check succeeds. The identity mutual check comprises the following steps: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out; and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful. The system solves the information security risk existing in identity verification realized by adopting near field communication in the current information security technology. The system can ensure the information security in the identity checking process through identity mutual check.

Description

Near field communication system based on quantum key
Technical Field
The invention relates to the technical field of information security, in particular to a near field communication system based on a quantum key.
Background
Information security is security protection provided for a data processing system, computer hardware, software and data are protected from being damaged, changed and leaked due to accidental and malicious reasons, and near field communication is a common information security technology.
Near field communication is a short-range high-frequency radio technology, and is evolved by combining a non-contact radio frequency identification technology and a point-to-point communication technology. Near field communication technology can enable users to exchange information, access content and services simply and intuitively. The near field communication technology has more and more carried application platforms, application methods and modes are continuously expanded, and compared with the traditional short-distance communication, the near field communication technology has good safety and rapidity in connection establishment. The near field communication technology can realize life, social and financial activities such as identification, card punching, entrance guard, safe login, logistics, payment, membership, bill, coupon acquisition and the like.
The near field communication technology is convenient to use, but has certain safety problem in the practical application process, and because the password is not set or the fixed password is set, and the near field communication technology is completely exposed in a wireless environment, the near field communication technology can face malicious attacks such as clone attack, man-in-the-middle attack, packet loss attack and the like, information safety risk exists in the application process of the near field communication technology, and the near field communication technology is easy to crack and forge.
Disclosure of Invention
The purpose of the invention is as follows: the invention aims to provide a near field communication system based on a quantum key, which solves the information security risk existing in identity verification realized by adopting near field communication in the current information security technology. The system can ensure the information security in the identity checking process through identity mutual check.
The technical scheme is as follows: a near field communication system based on a quantum key comprises a sending end and a receiving end, wherein the sending end is connected with the receiving end in a near field communication mode, the sending end sends an instruction to the receiving end, meanwhile, the sending end and the receiving end perform identity mutual verification, and the receiving end executes the instruction after the identity mutual verification succeeds.
Further, the identity mutual check comprises the following procedures:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out;
and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful.
Furthermore, the number of the sending terminals is n, the identities are C1 and C2 … … Cn in sequence, the identity of the receiving terminal is D, the identity of the receiving terminal is stored in each sending terminal, the identity of each sending terminal is stored in the receiving terminal, the receiving terminal is provided with quantum key pools the number of which is the same as that of the sending terminals, the quantum key pools in the receiving terminal correspond to the quantum key pools of the sending terminals one to one, the identities are C11 and C21 … … Cn1 in sequence, and the quantum key pools of the sending terminals are consistent with the corresponding quantum key pools in the receiving terminal.
Further, the sending end extracts a quantum key segment at any position in the quantum key pool to encrypt the identity of the sending end, the check information A is identification information of the quantum key extracted by the sending end and an encrypted file obtained by encrypting the identity of the sending end, the receiving end extracts a quantum key segment at any position in the quantum key pool to encrypt the identity of the receiving end, and the check information B is identification information of the quantum key extracted by the receiving end and an encrypted file obtained by encrypting the identity of the receiving end.
Further, the identification information of the quantum key in the verification information a includes the identity of the quantum key pool to which the quantum key belongs, the head position of the quantum key, and the length of the quantum key, and the identification information of the quantum key in the verification information B includes the head position and the length of the quantum key.
Further, the receiving end extracts a corresponding quantum key according to the quantum key identification information in the verification information a, the quantum key decrypts the encrypted file obtained by encrypting the identity of the sending end, the identity of the sending end obtained by decryption is compared with the identity of the receiving end, and if the identity of the sending end exists in the receiving end, the identity of the sending end is successfully verified by the receiving end.
Further, the receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information a to encrypt the identity of the receiving end, and the head end position of the quantum key required by the identity encryption of the sending end is different from the head end position of the quantum key required by the identity encryption of the receiving end.
Further, the sending end extracts a corresponding quantum key according to the quantum key identification information in the verification information B, the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, the identity of the receiving end obtained by decryption is compared with the identity of the sending end, and if the identity of the receiving end exists in the sending end, the identity verification of the sending end to the receiving end is successful.
Further, after the identity of the receiving end to the sending end is successfully verified, the quantum key used by the sending end for identity encryption and the quantum key used by the receiving end for identity decryption are deleted.
Further, after the identity of the sending end to the receiving end is successfully verified, both the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are deleted.
The invention has the beneficial effects that:
1. the system can ensure the information security of the identity checking process under the condition of near field communication through the identity mutual check of the sending end and the receiving end;
2. in the identity mutual verification process of the sending end and the receiving end, the system adopts the quantum key to realize encryption and decryption, so that the information security is improved;
3. the identity verification process of the system is carried out in a one-time pad mode, and the quantum key is deleted after the identity verification, so that the information security is improved again;
4. the system identity mutual check does not need a complex key algorithm, and has high operation efficiency.
Drawings
FIG. 1 is a diagram of a quantum key based near field communication system according to the present invention;
FIG. 2 is a schematic diagram of identity cross-check.
Detailed Description
The invention is further described below with reference to the following figures and examples:
as shown in fig. 1, a near field communication system based on quantum key includes a sending end and a receiving end, where the sending end may be some handheld terminal devices, for example: the receiving end can be equipment such as desktop, and the user identity is confirmed to technologies such as sending end accessible fingerprint identification, face identification.
The sending end is connected with the receiving end through near field communication, the near field communication is a short-distance high-frequency radio technology and is formed by fusing and evolving a non-contact radio frequency identification technology and a point-to-point communication technology.
The sending end sends an instruction to the receiving end, meanwhile, the sending end and the receiving end perform identity mutual check, and if the identity mutual check is successful, the receiving end executes the instruction; otherwise, the receiving end does not execute the instruction.
As shown in fig. 2, the identity mutual check includes the following processes:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, if the verification is successful, the next step is carried out, otherwise, the identity mutual verification fails;
and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, if the verification is successful, the identity mutual verification is successful, otherwise, the identity mutual verification fails.
As shown in fig. 1, n sending terminals have identities C1 and C2 … … Cn in sequence, and a receiving terminal has identity D, each sending terminal has an identity of the receiving terminal, and the receiving terminal has an identity of each sending terminal. Each sender has its own identity and a receiver identity D, and the receiver has its own identity D and sender identities C1, C2 … … Cn.
The receiving end is provided with quantum key pools the number of which is the same as that of the transmitting end, the quantum key pools in the receiving end correspond to the quantum key pools of the transmitting end one by one, and the identities are C11 and C21 … … Cn1 in sequence. The sender quantum key pool of identity C1 corresponds to C11, and the sender quantum key pool of identity C2 corresponds to C21, and the sender quantum key pool of … … identity Cn corresponds to Cn 1.
And the quantum key pool of the sending end is consistent with the corresponding quantum key pool in the receiving end. And respectively carrying out hash operation on the quantum key pool of the sending end and the corresponding quantum key pool in the receiving end, comparing the obtained hash values, and if the comparison is consistent, the quantum key pools are consistent. And the quantum key pool of the sending end and the corresponding quantum key pool in the receiving end respectively take a section of quantum key at the same position for comparison, and the quantum key pools are consistent if the comparison is consistent. The quantum key pool of the sending end and the corresponding quantum key pool in the receiving end can also be compared by adopting other prior art.
As shown in fig. 2, the sending end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the sending end, the verification information a is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the sending end and the identity of the sending end, the receiving end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the receiving end, and the verification information B is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the receiving end and the identity of the receiving end. And the identity of the sending end and the identity of the receiving end are encrypted to form a ciphertext.
The identification information of the quantum key in the verification information A comprises the identity of the quantum key pool to which the quantum key belongs, the head end position of the quantum key and the length of the quantum key, and the identification information of the quantum key in the verification information B comprises the head end position and the length of the quantum key.
As shown in fig. 2, the receiving end finds the corresponding quantum key pool according to the identity of the quantum key pool to which the quantum key in the verification information a belongs, and then extracts the corresponding quantum key according to the head end position and length of the quantum key in the verification information a, and the quantum key decrypts the encrypted file obtained by encrypting the identity of the sending end, and if decryption fails, the identity verification of the sending end by the receiving end will also fail. And after decryption is successful, comparing the obtained identity of the sending end with the identity of the receiving end, and if the identity of the sending end exists in the receiving end, successfully verifying the identity of the sending end by the receiving end. For example: d, C1 and C2 … … Cn exist in the receiving terminal, the identity of the sending terminal is C2, the sending terminal identity C2 obtained by the decryption of the receiving terminal exists in the receiving terminal, and the identity verification of the receiving terminal on the sending terminal is successful.
The receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information A, then the quantum key encrypts the identity of the receiving end, and the quantum key identification information in the verification information A is the identity of the quantum key pool to which the quantum key in the verification information A belongs.
The head end position of the quantum key required by the identity encryption of the sending end is different from the head end position of the quantum key required by the identity encryption of the receiving end. The positions of the quantum keys are different, and the identity encryption and decryption of the sending end and the receiving end are different in the identity mutual verification process.
As shown in fig. 2, the sending end extracts a corresponding quantum key according to the head end position and length of the quantum key in the verification information B, where the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, and if decryption fails, the sending end also fails to verify the identity of the receiving end. And after decryption is successful, comparing the obtained receiving end identity with the sending end identity, and if the receiving end identity exists in the sending end, successfully verifying the identity of the receiving end by the sending end. For example: the sending end is any one of C1 and C2 … … Cn, the sending end further comprises D, the identity of the receiving end is D, and the receiving end identity D obtained by decryption of the sending end exists in the sending end, so that the identity verification of the sending end on the receiving end is successful.
After the identity of the receiving end to the sending end is successfully verified, the quantum key used by the sending end for identity encryption and the quantum key used by the receiving end for identity decryption are deleted. After the identity of the sending end to the receiving end is successfully verified, the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are both deleted. The identity mutual verification process is carried out in a one-time pad mode, and the quantum key is deleted after the identity is verified, so that the information security is improved.

Claims (10)

1. The near field communication system based on the quantum key comprises a sending end and a receiving end, wherein the sending end is connected with the receiving end in a near field communication mode.
2. A quantum key based near field communication system according to claim 1, wherein the mutual identity verification comprises the following procedures:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out;
and (2) a process: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful.
3. The near field communication system according to claim 2, wherein the number of the sending terminals is n, and the identities are C1 and C2 … … Cn, in order, the identity of the receiving terminal is D, each sending terminal stores a receiving terminal identity, each receiving terminal stores a sending terminal identity, the receiving terminal has the same number of quantum key pools as the sending terminals, the quantum key pools in the receiving terminals correspond to the quantum key pools of the sending terminals one to one, and the identities are C11 and C21 … … Cn1, in order, the quantum key pools of the sending terminals are consistent with the corresponding quantum key pools in the receiving terminals.
4. The near field communication system according to claim 3, wherein the sending end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the sending end, the check information A is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the sending end and the identity of the sending end, the receiving end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the receiving end, and the check information B is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the receiving end and the identity of the receiving end.
5. The near field communication system according to claim 4, wherein the identification information of the quantum key in the verification information A includes an identity of a quantum key pool to which the quantum key belongs, a head position of the quantum key, and a length of the quantum key, and the identification information of the quantum key in the verification information B includes the head position and the length of the quantum key.
6. The near field communication system according to claim 5, wherein the receiving end extracts the corresponding quantum key according to the quantum key identification information in the verification information a, the quantum key decrypts the encrypted file obtained by encrypting the identity of the transmitting end, the identity of the transmitting end obtained by decryption is compared with the identity of the receiving end, and if the identity of the transmitting end exists in the receiving end, the identity of the transmitting end is successfully verified by the receiving end.
7. The near field communication system according to claim 5, wherein the receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information a to encrypt the receiving end identity, and a head end position of the quantum key required for encrypting the transmitting end identity is different from a head end position of the quantum key required for encrypting the receiving end identity.
8. The near field communication system based on the quantum key as claimed in claim 5, wherein the sending end extracts the corresponding quantum key according to the quantum key identification information in the verification information B, the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, the identity of the receiving end obtained by decryption is compared with the identity of the sending end, and if the identity of the receiving end exists in the sending end, the sending end successfully verifies the identity of the receiving end.
9. The near field communication system based on the quantum key as claimed in claim 6, wherein the quantum key used by the sending end for the identity encryption and the quantum key used by the receiving end for the identity decryption are both deleted after the receiving end successfully verifies the identity of the sending end.
10. The near field communication system according to claim 8, wherein after the identity of the sending end is successfully verified, both the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are deleted.
CN202210566853.6A 2022-05-24 2022-05-24 Near field communication system based on quantum key Pending CN115002770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210566853.6A CN115002770A (en) 2022-05-24 2022-05-24 Near field communication system based on quantum key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210566853.6A CN115002770A (en) 2022-05-24 2022-05-24 Near field communication system based on quantum key

Publications (1)

Publication Number Publication Date
CN115002770A true CN115002770A (en) 2022-09-02

Family

ID=83027342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210566853.6A Pending CN115002770A (en) 2022-05-24 2022-05-24 Near field communication system based on quantum key

Country Status (1)

Country Link
CN (1) CN115002770A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105515780A (en) * 2016-01-12 2016-04-20 浙江神州量子网络科技有限公司 System and method for authenticating identity based on quantum key
CN105763563A (en) * 2016-04-19 2016-07-13 浙江神州量子网络科技有限公司 Identity authentication method during quantum secret key application process
US20160359626A1 (en) * 2015-06-08 2016-12-08 Alibaba Group Holding Limited System, method, and apparatus for quantum key output, storage, and consistency verification
CN106533673A (en) * 2016-12-08 2017-03-22 浙江神州量子网络科技有限公司 Privacy amplification method suitable for multi-party quantum communication
WO2018127118A1 (en) * 2017-01-06 2018-07-12 中国移动通信有限公司研究院 Identity authentication method and device
CN108282329A (en) * 2017-01-06 2018-07-13 中国移动通信有限公司研究院 A kind of Bidirectional identity authentication method and device
CN109618334A (en) * 2018-11-21 2019-04-12 北京华大智宝电子系统有限公司 Control method and relevant device
CN112073182A (en) * 2020-07-31 2020-12-11 成都信息工程大学 Quantum key management method and system based on block chain
CN112351000A (en) * 2020-10-16 2021-02-09 深圳Tcl新技术有限公司 Bidirectional identity authentication method, system, device and storage medium
CN113411187A (en) * 2020-03-17 2021-09-17 阿里巴巴集团控股有限公司 Identity authentication method and system, storage medium and processor
CN114329541A (en) * 2021-12-23 2022-04-12 中国科学技术大学先进技术研究院 Data encryption method, device, equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160359626A1 (en) * 2015-06-08 2016-12-08 Alibaba Group Holding Limited System, method, and apparatus for quantum key output, storage, and consistency verification
CN105515780A (en) * 2016-01-12 2016-04-20 浙江神州量子网络科技有限公司 System and method for authenticating identity based on quantum key
CN105763563A (en) * 2016-04-19 2016-07-13 浙江神州量子网络科技有限公司 Identity authentication method during quantum secret key application process
CN106533673A (en) * 2016-12-08 2017-03-22 浙江神州量子网络科技有限公司 Privacy amplification method suitable for multi-party quantum communication
WO2018127118A1 (en) * 2017-01-06 2018-07-12 中国移动通信有限公司研究院 Identity authentication method and device
CN108282329A (en) * 2017-01-06 2018-07-13 中国移动通信有限公司研究院 A kind of Bidirectional identity authentication method and device
CN109618334A (en) * 2018-11-21 2019-04-12 北京华大智宝电子系统有限公司 Control method and relevant device
CN113411187A (en) * 2020-03-17 2021-09-17 阿里巴巴集团控股有限公司 Identity authentication method and system, storage medium and processor
CN112073182A (en) * 2020-07-31 2020-12-11 成都信息工程大学 Quantum key management method and system based on block chain
CN112351000A (en) * 2020-10-16 2021-02-09 深圳Tcl新技术有限公司 Bidirectional identity authentication method, system, device and storage medium
CN114329541A (en) * 2021-12-23 2022-04-12 中国科学技术大学先进技术研究院 Data encryption method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101366299B (en) Bootstrapping authentication using distinguished random challenges
CN106656510B (en) A kind of encryption key acquisition methods and system
CN100559393C (en) RFID label and reader thereof, reading system and safety certifying method
Chen et al. Using 3G network components to enable NFC mobile transactions and authentication
CN107784499B (en) Secure payment system and method of near field communication mobile terminal
CN104704769A (en) A wireless communication system
CN101262349A (en) SMS-based identity authentication method and device
CN105227537A (en) Method for authenticating user identity, terminal and service end
CN103888938A (en) PKI private key protection method of dynamically generated key based on parameters
CN110020524A (en) A kind of mutual authentication method based on smart card
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN107612949B (en) Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
WO2014015759A1 (en) Terminal identity verification and service authentication method, system, and terminal
CN106789024A (en) A kind of remote de-locking method, device and system
CN102684872B (en) Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
CN108401494B (en) Method and system for transmitting data
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
KR20130037607A (en) Authentication process using of one time password
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN107786978B (en) NFC authentication system based on quantum encryption
Xiao et al. Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
CN112311794A (en) Bidirectional identity authentication method based on MFA algorithm
CN106790135A (en) A kind of data ciphering method and system, communication equipment based on high in the clouds
CN111031535A (en) Secure communication method and system for smart card system
CN115002770A (en) Near field communication system based on quantum key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination