CN115002770A - Near field communication system based on quantum key - Google Patents
Near field communication system based on quantum key Download PDFInfo
- Publication number
- CN115002770A CN115002770A CN202210566853.6A CN202210566853A CN115002770A CN 115002770 A CN115002770 A CN 115002770A CN 202210566853 A CN202210566853 A CN 202210566853A CN 115002770 A CN115002770 A CN 115002770A
- Authority
- CN
- China
- Prior art keywords
- identity
- quantum key
- sending
- receiving end
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 40
- 238000012795 verification Methods 0.000 claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 14
- 239000000284 extract Substances 0.000 claims description 15
- 238000005516 engineering process Methods 0.000 abstract description 19
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a near field communication system based on a quantum key, which relates to the technical field of information security and comprises a sending end and a receiving end which are connected in near field communication, wherein the sending end sends an instruction to the receiving end, the sending end and the receiving end perform identity mutual check simultaneously, and the receiving end executes the instruction after the identity mutual check succeeds. The identity mutual check comprises the following steps: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out; and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful. The system solves the information security risk existing in identity verification realized by adopting near field communication in the current information security technology. The system can ensure the information security in the identity checking process through identity mutual check.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a near field communication system based on a quantum key.
Background
Information security is security protection provided for a data processing system, computer hardware, software and data are protected from being damaged, changed and leaked due to accidental and malicious reasons, and near field communication is a common information security technology.
Near field communication is a short-range high-frequency radio technology, and is evolved by combining a non-contact radio frequency identification technology and a point-to-point communication technology. Near field communication technology can enable users to exchange information, access content and services simply and intuitively. The near field communication technology has more and more carried application platforms, application methods and modes are continuously expanded, and compared with the traditional short-distance communication, the near field communication technology has good safety and rapidity in connection establishment. The near field communication technology can realize life, social and financial activities such as identification, card punching, entrance guard, safe login, logistics, payment, membership, bill, coupon acquisition and the like.
The near field communication technology is convenient to use, but has certain safety problem in the practical application process, and because the password is not set or the fixed password is set, and the near field communication technology is completely exposed in a wireless environment, the near field communication technology can face malicious attacks such as clone attack, man-in-the-middle attack, packet loss attack and the like, information safety risk exists in the application process of the near field communication technology, and the near field communication technology is easy to crack and forge.
Disclosure of Invention
The purpose of the invention is as follows: the invention aims to provide a near field communication system based on a quantum key, which solves the information security risk existing in identity verification realized by adopting near field communication in the current information security technology. The system can ensure the information security in the identity checking process through identity mutual check.
The technical scheme is as follows: a near field communication system based on a quantum key comprises a sending end and a receiving end, wherein the sending end is connected with the receiving end in a near field communication mode, the sending end sends an instruction to the receiving end, meanwhile, the sending end and the receiving end perform identity mutual verification, and the receiving end executes the instruction after the identity mutual verification succeeds.
Further, the identity mutual check comprises the following procedures:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out;
and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful.
Furthermore, the number of the sending terminals is n, the identities are C1 and C2 … … Cn in sequence, the identity of the receiving terminal is D, the identity of the receiving terminal is stored in each sending terminal, the identity of each sending terminal is stored in the receiving terminal, the receiving terminal is provided with quantum key pools the number of which is the same as that of the sending terminals, the quantum key pools in the receiving terminal correspond to the quantum key pools of the sending terminals one to one, the identities are C11 and C21 … … Cn1 in sequence, and the quantum key pools of the sending terminals are consistent with the corresponding quantum key pools in the receiving terminal.
Further, the sending end extracts a quantum key segment at any position in the quantum key pool to encrypt the identity of the sending end, the check information A is identification information of the quantum key extracted by the sending end and an encrypted file obtained by encrypting the identity of the sending end, the receiving end extracts a quantum key segment at any position in the quantum key pool to encrypt the identity of the receiving end, and the check information B is identification information of the quantum key extracted by the receiving end and an encrypted file obtained by encrypting the identity of the receiving end.
Further, the identification information of the quantum key in the verification information a includes the identity of the quantum key pool to which the quantum key belongs, the head position of the quantum key, and the length of the quantum key, and the identification information of the quantum key in the verification information B includes the head position and the length of the quantum key.
Further, the receiving end extracts a corresponding quantum key according to the quantum key identification information in the verification information a, the quantum key decrypts the encrypted file obtained by encrypting the identity of the sending end, the identity of the sending end obtained by decryption is compared with the identity of the receiving end, and if the identity of the sending end exists in the receiving end, the identity of the sending end is successfully verified by the receiving end.
Further, the receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information a to encrypt the identity of the receiving end, and the head end position of the quantum key required by the identity encryption of the sending end is different from the head end position of the quantum key required by the identity encryption of the receiving end.
Further, the sending end extracts a corresponding quantum key according to the quantum key identification information in the verification information B, the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, the identity of the receiving end obtained by decryption is compared with the identity of the sending end, and if the identity of the receiving end exists in the sending end, the identity verification of the sending end to the receiving end is successful.
Further, after the identity of the receiving end to the sending end is successfully verified, the quantum key used by the sending end for identity encryption and the quantum key used by the receiving end for identity decryption are deleted.
Further, after the identity of the sending end to the receiving end is successfully verified, both the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are deleted.
The invention has the beneficial effects that:
1. the system can ensure the information security of the identity checking process under the condition of near field communication through the identity mutual check of the sending end and the receiving end;
2. in the identity mutual verification process of the sending end and the receiving end, the system adopts the quantum key to realize encryption and decryption, so that the information security is improved;
3. the identity verification process of the system is carried out in a one-time pad mode, and the quantum key is deleted after the identity verification, so that the information security is improved again;
4. the system identity mutual check does not need a complex key algorithm, and has high operation efficiency.
Drawings
FIG. 1 is a diagram of a quantum key based near field communication system according to the present invention;
FIG. 2 is a schematic diagram of identity cross-check.
Detailed Description
The invention is further described below with reference to the following figures and examples:
as shown in fig. 1, a near field communication system based on quantum key includes a sending end and a receiving end, where the sending end may be some handheld terminal devices, for example: the receiving end can be equipment such as desktop, and the user identity is confirmed to technologies such as sending end accessible fingerprint identification, face identification.
The sending end is connected with the receiving end through near field communication, the near field communication is a short-distance high-frequency radio technology and is formed by fusing and evolving a non-contact radio frequency identification technology and a point-to-point communication technology.
The sending end sends an instruction to the receiving end, meanwhile, the sending end and the receiving end perform identity mutual check, and if the identity mutual check is successful, the receiving end executes the instruction; otherwise, the receiving end does not execute the instruction.
As shown in fig. 2, the identity mutual check includes the following processes:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, if the verification is successful, the next step is carried out, otherwise, the identity mutual verification fails;
and (2) a flow scheme: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, if the verification is successful, the identity mutual verification is successful, otherwise, the identity mutual verification fails.
As shown in fig. 1, n sending terminals have identities C1 and C2 … … Cn in sequence, and a receiving terminal has identity D, each sending terminal has an identity of the receiving terminal, and the receiving terminal has an identity of each sending terminal. Each sender has its own identity and a receiver identity D, and the receiver has its own identity D and sender identities C1, C2 … … Cn.
The receiving end is provided with quantum key pools the number of which is the same as that of the transmitting end, the quantum key pools in the receiving end correspond to the quantum key pools of the transmitting end one by one, and the identities are C11 and C21 … … Cn1 in sequence. The sender quantum key pool of identity C1 corresponds to C11, and the sender quantum key pool of identity C2 corresponds to C21, and the sender quantum key pool of … … identity Cn corresponds to Cn 1.
And the quantum key pool of the sending end is consistent with the corresponding quantum key pool in the receiving end. And respectively carrying out hash operation on the quantum key pool of the sending end and the corresponding quantum key pool in the receiving end, comparing the obtained hash values, and if the comparison is consistent, the quantum key pools are consistent. And the quantum key pool of the sending end and the corresponding quantum key pool in the receiving end respectively take a section of quantum key at the same position for comparison, and the quantum key pools are consistent if the comparison is consistent. The quantum key pool of the sending end and the corresponding quantum key pool in the receiving end can also be compared by adopting other prior art.
As shown in fig. 2, the sending end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the sending end, the verification information a is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the sending end and the identity of the sending end, the receiving end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the receiving end, and the verification information B is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the receiving end and the identity of the receiving end. And the identity of the sending end and the identity of the receiving end are encrypted to form a ciphertext.
The identification information of the quantum key in the verification information A comprises the identity of the quantum key pool to which the quantum key belongs, the head end position of the quantum key and the length of the quantum key, and the identification information of the quantum key in the verification information B comprises the head end position and the length of the quantum key.
As shown in fig. 2, the receiving end finds the corresponding quantum key pool according to the identity of the quantum key pool to which the quantum key in the verification information a belongs, and then extracts the corresponding quantum key according to the head end position and length of the quantum key in the verification information a, and the quantum key decrypts the encrypted file obtained by encrypting the identity of the sending end, and if decryption fails, the identity verification of the sending end by the receiving end will also fail. And after decryption is successful, comparing the obtained identity of the sending end with the identity of the receiving end, and if the identity of the sending end exists in the receiving end, successfully verifying the identity of the sending end by the receiving end. For example: d, C1 and C2 … … Cn exist in the receiving terminal, the identity of the sending terminal is C2, the sending terminal identity C2 obtained by the decryption of the receiving terminal exists in the receiving terminal, and the identity verification of the receiving terminal on the sending terminal is successful.
The receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information A, then the quantum key encrypts the identity of the receiving end, and the quantum key identification information in the verification information A is the identity of the quantum key pool to which the quantum key in the verification information A belongs.
The head end position of the quantum key required by the identity encryption of the sending end is different from the head end position of the quantum key required by the identity encryption of the receiving end. The positions of the quantum keys are different, and the identity encryption and decryption of the sending end and the receiving end are different in the identity mutual verification process.
As shown in fig. 2, the sending end extracts a corresponding quantum key according to the head end position and length of the quantum key in the verification information B, where the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, and if decryption fails, the sending end also fails to verify the identity of the receiving end. And after decryption is successful, comparing the obtained receiving end identity with the sending end identity, and if the receiving end identity exists in the sending end, successfully verifying the identity of the receiving end by the sending end. For example: the sending end is any one of C1 and C2 … … Cn, the sending end further comprises D, the identity of the receiving end is D, and the receiving end identity D obtained by decryption of the sending end exists in the sending end, so that the identity verification of the sending end on the receiving end is successful.
After the identity of the receiving end to the sending end is successfully verified, the quantum key used by the sending end for identity encryption and the quantum key used by the receiving end for identity decryption are deleted. After the identity of the sending end to the receiving end is successfully verified, the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are both deleted. The identity mutual verification process is carried out in a one-time pad mode, and the quantum key is deleted after the identity is verified, so that the information security is improved.
Claims (10)
1. The near field communication system based on the quantum key comprises a sending end and a receiving end, wherein the sending end is connected with the receiving end in a near field communication mode.
2. A quantum key based near field communication system according to claim 1, wherein the mutual identity verification comprises the following procedures:
scheme 1: the sending end sends verification information A to the receiving end, the receiving end verifies the identity of the sending end through the verification information A, and if the verification is successful, the next step is carried out;
and (2) a process: and the receiving terminal sends verification information B to the sending terminal according to the verification information A, the sending terminal verifies the identity of the receiving terminal through the verification information B, and if the verification is successful, the identity mutual verification is successful.
3. The near field communication system according to claim 2, wherein the number of the sending terminals is n, and the identities are C1 and C2 … … Cn, in order, the identity of the receiving terminal is D, each sending terminal stores a receiving terminal identity, each receiving terminal stores a sending terminal identity, the receiving terminal has the same number of quantum key pools as the sending terminals, the quantum key pools in the receiving terminals correspond to the quantum key pools of the sending terminals one to one, and the identities are C11 and C21 … … Cn1, in order, the quantum key pools of the sending terminals are consistent with the corresponding quantum key pools in the receiving terminals.
4. The near field communication system according to claim 3, wherein the sending end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the sending end, the check information A is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the sending end and the identity of the sending end, the receiving end extracts a quantum key at any position in its quantum key pool to encrypt the identity of the receiving end, and the check information B is an encrypted file obtained by encrypting the identification information of the quantum key extracted by the receiving end and the identity of the receiving end.
5. The near field communication system according to claim 4, wherein the identification information of the quantum key in the verification information A includes an identity of a quantum key pool to which the quantum key belongs, a head position of the quantum key, and a length of the quantum key, and the identification information of the quantum key in the verification information B includes the head position and the length of the quantum key.
6. The near field communication system according to claim 5, wherein the receiving end extracts the corresponding quantum key according to the quantum key identification information in the verification information a, the quantum key decrypts the encrypted file obtained by encrypting the identity of the transmitting end, the identity of the transmitting end obtained by decryption is compared with the identity of the receiving end, and if the identity of the transmitting end exists in the receiving end, the identity of the transmitting end is successfully verified by the receiving end.
7. The near field communication system according to claim 5, wherein the receiving end extracts the quantum key from the quantum key pool corresponding to the quantum key identification information in the verification information a to encrypt the receiving end identity, and a head end position of the quantum key required for encrypting the transmitting end identity is different from a head end position of the quantum key required for encrypting the receiving end identity.
8. The near field communication system based on the quantum key as claimed in claim 5, wherein the sending end extracts the corresponding quantum key according to the quantum key identification information in the verification information B, the quantum key decrypts the encrypted file obtained by encrypting the identity of the receiving end, the identity of the receiving end obtained by decryption is compared with the identity of the sending end, and if the identity of the receiving end exists in the sending end, the sending end successfully verifies the identity of the receiving end.
9. The near field communication system based on the quantum key as claimed in claim 6, wherein the quantum key used by the sending end for the identity encryption and the quantum key used by the receiving end for the identity decryption are both deleted after the receiving end successfully verifies the identity of the sending end.
10. The near field communication system according to claim 8, wherein after the identity of the sending end is successfully verified, both the quantum key used by the receiving end for receiving end identity encryption and the quantum key used by the sending end for receiving end identity decryption are deleted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210566853.6A CN115002770A (en) | 2022-05-24 | 2022-05-24 | Near field communication system based on quantum key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210566853.6A CN115002770A (en) | 2022-05-24 | 2022-05-24 | Near field communication system based on quantum key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115002770A true CN115002770A (en) | 2022-09-02 |
Family
ID=83027342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210566853.6A Pending CN115002770A (en) | 2022-05-24 | 2022-05-24 | Near field communication system based on quantum key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115002770A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105515780A (en) * | 2016-01-12 | 2016-04-20 | 浙江神州量子网络科技有限公司 | System and method for authenticating identity based on quantum key |
CN105763563A (en) * | 2016-04-19 | 2016-07-13 | 浙江神州量子网络科技有限公司 | Identity authentication method during quantum secret key application process |
US20160359626A1 (en) * | 2015-06-08 | 2016-12-08 | Alibaba Group Holding Limited | System, method, and apparatus for quantum key output, storage, and consistency verification |
CN106533673A (en) * | 2016-12-08 | 2017-03-22 | 浙江神州量子网络科技有限公司 | Privacy amplification method suitable for multi-party quantum communication |
WO2018127118A1 (en) * | 2017-01-06 | 2018-07-12 | 中国移动通信有限公司研究院 | Identity authentication method and device |
CN108282329A (en) * | 2017-01-06 | 2018-07-13 | 中国移动通信有限公司研究院 | A kind of Bidirectional identity authentication method and device |
CN109618334A (en) * | 2018-11-21 | 2019-04-12 | 北京华大智宝电子系统有限公司 | Control method and relevant device |
CN112073182A (en) * | 2020-07-31 | 2020-12-11 | 成都信息工程大学 | Quantum key management method and system based on block chain |
CN112351000A (en) * | 2020-10-16 | 2021-02-09 | 深圳Tcl新技术有限公司 | Bidirectional identity authentication method, system, device and storage medium |
CN113411187A (en) * | 2020-03-17 | 2021-09-17 | 阿里巴巴集团控股有限公司 | Identity authentication method and system, storage medium and processor |
CN114329541A (en) * | 2021-12-23 | 2022-04-12 | 中国科学技术大学先进技术研究院 | Data encryption method, device, equipment and storage medium |
-
2022
- 2022-05-24 CN CN202210566853.6A patent/CN115002770A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160359626A1 (en) * | 2015-06-08 | 2016-12-08 | Alibaba Group Holding Limited | System, method, and apparatus for quantum key output, storage, and consistency verification |
CN105515780A (en) * | 2016-01-12 | 2016-04-20 | 浙江神州量子网络科技有限公司 | System and method for authenticating identity based on quantum key |
CN105763563A (en) * | 2016-04-19 | 2016-07-13 | 浙江神州量子网络科技有限公司 | Identity authentication method during quantum secret key application process |
CN106533673A (en) * | 2016-12-08 | 2017-03-22 | 浙江神州量子网络科技有限公司 | Privacy amplification method suitable for multi-party quantum communication |
WO2018127118A1 (en) * | 2017-01-06 | 2018-07-12 | 中国移动通信有限公司研究院 | Identity authentication method and device |
CN108282329A (en) * | 2017-01-06 | 2018-07-13 | 中国移动通信有限公司研究院 | A kind of Bidirectional identity authentication method and device |
CN109618334A (en) * | 2018-11-21 | 2019-04-12 | 北京华大智宝电子系统有限公司 | Control method and relevant device |
CN113411187A (en) * | 2020-03-17 | 2021-09-17 | 阿里巴巴集团控股有限公司 | Identity authentication method and system, storage medium and processor |
CN112073182A (en) * | 2020-07-31 | 2020-12-11 | 成都信息工程大学 | Quantum key management method and system based on block chain |
CN112351000A (en) * | 2020-10-16 | 2021-02-09 | 深圳Tcl新技术有限公司 | Bidirectional identity authentication method, system, device and storage medium |
CN114329541A (en) * | 2021-12-23 | 2022-04-12 | 中国科学技术大学先进技术研究院 | Data encryption method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101366299B (en) | Bootstrapping authentication using distinguished random challenges | |
CN106656510B (en) | A kind of encryption key acquisition methods and system | |
CN100559393C (en) | RFID label and reader thereof, reading system and safety certifying method | |
Chen et al. | Using 3G network components to enable NFC mobile transactions and authentication | |
CN107784499B (en) | Secure payment system and method of near field communication mobile terminal | |
CN104704769A (en) | A wireless communication system | |
CN101262349A (en) | SMS-based identity authentication method and device | |
CN105227537A (en) | Method for authenticating user identity, terminal and service end | |
CN103888938A (en) | PKI private key protection method of dynamically generated key based on parameters | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
WO2014015759A1 (en) | Terminal identity verification and service authentication method, system, and terminal | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
CN102684872B (en) | Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption | |
CN108401494B (en) | Method and system for transmitting data | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
KR20130037607A (en) | Authentication process using of one time password | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN107786978B (en) | NFC authentication system based on quantum encryption | |
Xiao et al. | Security Protocol for RFID System Conforming to EPC-C1G2 Standard. | |
CN112311794A (en) | Bidirectional identity authentication method based on MFA algorithm | |
CN106790135A (en) | A kind of data ciphering method and system, communication equipment based on high in the clouds | |
CN111031535A (en) | Secure communication method and system for smart card system | |
CN115002770A (en) | Near field communication system based on quantum key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |