WO2016145820A1 - Procédé et dispositif de transmission de données de communication en champ proche et support de mémoire informatique - Google Patents

Procédé et dispositif de transmission de données de communication en champ proche et support de mémoire informatique Download PDF

Info

Publication number
WO2016145820A1
WO2016145820A1 PCT/CN2015/090616 CN2015090616W WO2016145820A1 WO 2016145820 A1 WO2016145820 A1 WO 2016145820A1 CN 2015090616 W CN2015090616 W CN 2015090616W WO 2016145820 A1 WO2016145820 A1 WO 2016145820A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
security
verification
data
near field
Prior art date
Application number
PCT/CN2015/090616
Other languages
English (en)
Chinese (zh)
Inventor
沙爽
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016145820A1 publication Critical patent/WO2016145820A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the field of communications, and in particular, to a near field communication data transmission method and apparatus, and a computer storage medium.
  • NFC Near Field Communication
  • short-range wireless communication is a short-range high-frequency wireless communication technology that allows non-contact point-to-point data transmission (within ten centimeters) between electronic devices. data.
  • NFC can be used as a short-range technology in which files and other content can be passed when several devices are very close together. This feature is useful for places that need to collaborate, such as when you need to share files or when multiple players play games.
  • an embodiment of the present invention provides a near field communication data transmission method and apparatus, and a computer storage medium, which solves the problem of poor security of data transmission by near field communication in the prior art.
  • the to-be-transmitted data is transmitted to the counterpart device.
  • the performing the security verification comprises: performing security verification on the counterpart device.
  • the performing security verification on the counterpart device includes:
  • the performing identity security verification on the counterpart device includes:
  • the performing data authority verification on the counterpart device includes: acquiring data authority corresponding to the counterpart device; determining whether data corresponding to the data authority of the counterpart device includes the to-be-sent Data; if included, data permission validation passes.
  • the acquiring the data authority corresponding to the counterpart device comprises: finding the data authority corresponding to the counterpart device according to the identity security identifier or the identity identifier of the counterpart device.
  • the performing data authority verification on the counterpart device includes: acquiring all devices having the right to send data, determining whether the device is included, and if so, verifying data rights by.
  • the acquiring, by the device having the right to send data includes: acquiring an identity security identifier or an identity identifier corresponding to all devices that have the data to be sent;
  • the counterpart device includes: determining whether the identity security identifier or the identity identifier corresponding to the counterpart device is included.
  • the performing the security verification further comprises: accepting the peer device to perform security verification on itself.
  • the receiving the peer device to perform security verification on itself includes:
  • the other device is accepted to perform identity security verification on itself, and the data authority verification is performed on itself after the verification is passed.
  • the near field communication data transmission apparatus comprises an opening module, a security module and a transmission module:
  • the opening module is configured to enable near field communication and establish a near field communication wireless channel
  • the security module is configured to perform security verification before transmitting the data to be sent to the other device;
  • the transmission module is configured to transmit the to-be-transmitted data to the counterpart device after the verification is passed.
  • the security module is further configured to perform security verification on the counterpart device.
  • the security module includes an identity security submodule or data a security submodule: the identity security submodule is configured to perform identity security verification on the counterpart device; the data security submodule is configured to perform identity security verification on the counterpart device, and perform verification on the counterpart device Data permission verification.
  • the security module is further configured to accept the peer device to perform security verification on itself.
  • the security module is further configured to accept the identity device to perform identity security verification on itself, or accept the identity device to perform identity security verification on itself, and perform data permission on itself after the verification is passed. verification.
  • the computer storage medium provided by the embodiment of the present invention stores a computer program for executing the near field communication data transmission method.
  • the near field communication data transmission method and device and the computer storage medium provided by the embodiments of the present invention enable the near field communication to establish a near field communication wireless channel; perform security verification before transmitting the data to be sent to the other device; after the verification is passed, The data to be transmitted is transmitted to the other device.
  • the data is sent to the other terminal without being close to the other terminal, and the security verification is performed. Only after the security verification is passed, the data is sent to the other terminal, and the NFC device in the current technical application is solved. There is no problem of trusted authentication between data transmission. It provides a reliable guarantee for users to use the terminal safely, and provides a meaningful supplement to the standard protocol specification.
  • FIG. 1 is a schematic flowchart of a near field communication data transmission method according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of a near field communication data transmission method according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic flowchart of a near field communication data transmission method according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic structural diagram 1 of a near field communication data transmission apparatus according to Embodiment 4 of the present invention.
  • FIG. 5 is a schematic structural diagram 2 of a near field communication data transmission apparatus according to Embodiment 4 of the present invention.
  • FIG. 6 is a schematic structural diagram 3 of a near field communication data transmission apparatus according to Embodiment 4 of the present invention.
  • FIG. 7 is a schematic structural diagram of a centralized management software system according to Embodiment 4 of the present invention.
  • P2P Peer-to-Peer
  • the Logical Link Control Protocol usually carries SNEP data
  • the Simple NFC Exchange Protocol usually carries NDEF data
  • the NDEF carries RTD data
  • RTD data is the actual application data
  • the Logical Link Control Protocol (NFCForum-TS-LLCP1.1.pdf) provides the means for transmitting upper layer information units between two NFC devices, including link activation, management, deactivation, and protocol multiplexing.
  • Connection-oriented transport Provides a serialized, error-free data transmission service
  • connectionless transmission the protocol overhead is small, using the request and response mechanism.
  • NFCForum-TS-SNEP_1.0.pdf is an application layer protocol (using request and response mode). It is applicable to P2P mode to send or receive NDEF application data between two NFC devices.
  • the client sends a request to the server, the message includes: protocol version, request method, length, and information data; the server performs the specified operation. Then respond to the packet: protocol version, status code, length, information data.
  • NFC Data Exchange Format (NFCForum-TS-NDEF_1.0.pdf)
  • NDEF is a lightweight, compact binary format with various data types defined by URL, vCard and NFC.
  • the information exchanged by NDEF consists of a series of records, each of which contains a payload, which can be a URL, MIME, or a custom data type. Each payload is described by a type, length, and an optional identifier.
  • the maximum data size of an NDEF is 4GB.
  • the near field communication data transmission method of this embodiment includes the following steps:
  • Step S101 Turn on near field communication, and establish a near field communication wireless channel
  • Step S102 Perform security verification before transmitting the to-be-transmitted data to the other device.
  • the transmitted data herein may include an address book, a file, a gallery, a music library, and the like stored in the terminal.
  • the counterpart device and the device itself may be any device or device device having an NFC function (ie, having an NFC chip communication system), and of course, other systems such as communication, display, audio, and the like.
  • the specific device may be a smart terminal, such as a mobile phone, a tablet computer, or the like. It is mainly to provide data security in its own device, to prevent some important data from being transmitted to unfamiliar devices, and to perform security verification on the other device to improve data security.
  • Step S103 After the verification is passed, the data to be sent is transmitted to the counterpart device.
  • the data to be transmitted is transmitted to the other device, which improves security. If the verification fails, you can stop the data transmission to be sent, you can Our devices do not exchange untrusted data with any device, allowing our data protection and secure communications to go a step further.
  • performing security verification may be performing security verification on the counterpart device, and performing security verification on the counterpart device specifically includes performing identity security verification on the counterpart device.
  • the specific identity security verification for the other device may be the identity security identifier sent by the receiving device, and determine whether the identity security identifier is the same as its own identity security identifier. If the identity is the same, the identity security verification is passed. It should be understood that for the device and all other counterpart devices, the identity security identifier is pre-stored so that the device can identify the identity security identifier of the peer device, and multiple identity security identifiers are stored in the device.
  • Zhang San is the sender of the local device, and in the case of Zhang San’s mobile phone, the family identity security identifier A, the colleague identity security identifier B and the classmate identity security identifier C are pre-stored, and Zhang Yi Zhang Er is the family of Zhang San, Li Si and Wang Wu are colleagues of Zhang San, Zhao Liu and Zhao Qi are Zhang San’s classmates. Then there are identity security signs A, B and C in Zhang San’s mobile phone, identity security ID A in Zhang Yi and Zhang Er’s mobile phones, and identity security ID B in Li Si and Wang Wu’s mobile phones. In the mobile phones of Zhao Liu and Zhao Qi, the identity security identifier C is stored.
  • Zhang San and Li Si conduct data transmission, then before the data transmission by Zhang San and Li Si, Li Si will identify his identity security B. For Zhang San mobile phone, Zhang San mobile phone judges that it has the same identity security identifier B, and if so, it is considered to be trustworthy. If there is no identity security identity, or the identity security identity is different from its own, it is considered to be untrusted, and the verification fails.
  • the specific identity security verification of the counterpart device may be to receive the identity identifier of the counterpart device, determine whether the identity identifier is in the preset security list, and if so, the identity security verification is passed. It should be understood that for the device and all other counterpart devices, there will be corresponding identification, such as the number of the device and the identification information of the number, so that the device can identify the opposite device, and what is preset in the device A list of identities corresponding to devices that can be trusted. Of course, the list here means that devices that can be trusted are stored, not just in the form of lists, other forms. Can also be included.
  • Zhang San mobile phone Taking the device as a mobile phone as an example, in the case of the mobile phone of Zhang San (sender), the safety list pre-stored in Zhang San mobile phone contains Zhang San’s family Zhang Yi and Zhang Er, Zhang San’s colleagues Li Si and Wang Wu Zhang San’s classmates Zhao Liu and Zhao Qi. If Zhang San and Li Si carry out data transmission, then before the data transmission of Zhang San and Li Si, Li Si will give his identity (mobile number) to Zhang San mobile phone, and Zhang San mobile phone judges that he has a safe list. Li Si’s mobile phone is considered trustworthy and verified.
  • the specific identity security verification of the counterpart device may also be to receive the identity security identifier and the identity identifier of the counterpart device, determine whether the identity security identifier is the same as its own identity security identifier, and determine whether the identity identifier is in the preset security list, if The identity security ID is the same and within the preset security list, the identity security verification is passed.
  • the identity security identifier is pre-stored so that the device can identify the identity security identifier of the peer device, and multiple identity security identifiers are stored in the device.
  • identity such as the number of the device and the identification information of the number, so that the device can identify the peer device, and in the device, which ones are pre-set can be trusted.
  • identity such as the number of the device and the identification information of the number
  • Li Si will give his identity security mark B to Zhang San mobile phone, Zhang San mobile phone judges that it has the same identity security identity B, if it is, it is considered that the trusted identity security identity B is the same as its own identity security identity B, and will also determine the identity of Li Si ( Whether the mobile number is in its own safe list, if it is, the verification is passed. Because the identity security logo only means that there is this identity security logo, it does not specifically care who it is, and it may be stolen by the stranger. If the identity verification is further strengthened, the security is improved.
  • performing security verification on the other device further includes: performing identity security verification on the other device first, and then performing data authority verification on the other device after the verification is passed. That is, the identity security verification is performed first, and after the identity security verification is passed, the data authentication of the other device is performed, and the data transmission is performed after the data authority verification is passed.
  • the data permission here refers to the data that the other device can share, for example, the family can share their own life photos, the second working files are generally not shared, the colleagues can share the working documents, but generally do not share their own life photos.
  • the specific data authority verification for the other device may be to obtain the data authority corresponding to the counterpart device; determine whether the data corresponding to the data authority of the counterpart device includes the data to be sent; if yes, the data authority verification is passed.
  • obtaining the data authority corresponding to the counterpart device includes: finding the data authority corresponding to the counterpart device according to the identity security identifier or the identity identifier of the counterpart device.
  • the data security rights are correspondingly set in advance corresponding to the data security identifiers, and the corresponding data identifiers are also correspondingly set for each identity identifier.
  • the specific data authority verification for the other device may also be to obtain all devices having the right to send data, and determine whether the device is included. If yes, the data authority is verified. Specifically, obtaining all the devices having the right to send data includes: acquiring an identity security identifier or an identity identifier corresponding to all devices that have data to be sent; determining whether the device includes the counterpart device includes: determining whether the identity security identifier or identity corresponding to the counterpart device is included Logo. Combining the above examples of Zhang San The child explains that when Zhang San and Li Si carry out data transmission, after Zhang San’s identity verification of Li Si is passed, for example, the data to be transmitted is a life photo, then the identity security identifier A corresponding to the life photo is found, or the corresponding identity is obtained.
  • setting the identity security identifier in the device and the corresponding data authority may be implemented in the form of an app on the terminal device (ie, the device), so that a designated terminal is used as a management role, and all the controlled devices can be managed.
  • Letter NFC terminal equipment including equipment information, identity security identity, and transmittable data type.
  • the NFC terminal device that needs to write the controlled data to the NFC terminal device and the management terminal can write the data such as the identity security identifier by means of the NFC tag reading and writing. It can also be implemented on a PC device. Users can use the home computer and office computer to install centralized management software as a management role to manage all trusted NFC terminal devices that need to be controlled.
  • the device information, the identity security identifier, and the transmittable data authority are connected to the controlled terminal through the USB cable to write data such as the identity security identifier.
  • hardware chip storage or software storage may be selected, wherein the hardware chip, for a system with a higher security level requirement, may save the rights data related to the trusted NFC device, including the identity security identifier and the data authority.
  • the hardware chip such as eSE, encrypted T card, access and read and write through the common chip interface, and even provide protection for encrypted storage
  • software storage for the general security level system, can save the authority data related to the trusted NFC device In the file system of the device, it can be saved in plain text or encrypted.
  • the security verification may be performed by the receiving device to perform security verification on itself, and specifically accepting the security verification by the counterpart device itself, including accepting the identity verification of the identity by the counterpart device.
  • the specific acceptance of the identity verification by the counterpart device may be to send its own identity security identifier to the counterpart device, and let the counterpart device determine whether the identity security identifier is the same as the identity security identifier of the counterpart device itself, and if the identity is the same, the identity security verification is passed.
  • the identity security identifier is pre-stored for the counterpart device itself and all other counterpart devices, so that the counterpart device can identify the identity security identifier of the local device, and multiple identity security identifiers are stored in the counterpart device.
  • Zhang San is the other party’s device, that is, the recipient, pre-stored the family identity security identity A, the colleague identity security identity B, and the classmate identity security identity C, and Zhang Yihe Zhang Er is the family of Zhang San, Li Si and Wang Wu are Zhang's colleagues, Zhao Liu and Zhao Qi are Zhang San's classmates. Then there are identity security signs A, B and C in Zhang San’s mobile phone, identity security ID A in Zhang Yi and Zhang Er’s mobile phones, and identity security ID B in Li Si and Wang Wu’s mobile phones. In the mobile phones of Zhao Liu and Zhao Qi, the identity security identifier C is stored.
  • Zhang San and Li Si conduct data transmission, then before the data transmission by Zhang San and Li Si, Li Si will identify his identity security B.
  • Zhang San mobile phone accept Zhang San mobile phone to judge that he has the same identity security identity B, if any, it is considered trust. If there is no identity security identity, or the identity security identity is different from its own, it is considered to be untrusted, and the verification fails. After the verification is passed, Zhang San Mobile will feedback to tell Li Si to pass the security verification, or if the failure message of Zhang San is not received within the preset time, Li Si believes that the security verification has passed.
  • the specific acceptance of the remote device for authenticating the identity of the identity may be to send the identity of the device, and let the other device determine whether the identity is in the preset security list of the other device, and if so, the identity security verification is passed.
  • the local device and all other devices will have corresponding identity, such as the number of the device and the identification information of the number, so that the other device can Identifying the local device, in the other device, it will store a list of identities corresponding to the devices that can be trusted.
  • the list here means that the device can be trusted, not only in the form of a list, but also in other forms. Can be included. Taking the device as an example of the mobile phone, Zhang San is the other party's device, that is, the receiving party.
  • Zhang San's mobile phone for example, Zhang San's family Zhang Yi and Zhang Er, Zhang San's colleagues, are included in the safety list pre-stored by Zhang San mobile phone. Li Si and Wang Wu, Zhang San's classmates Zhao Liu and Zhao Qi. If Zhang San and Li Si carry out data transmission, then before the data transmission of Zhang San and Li Si, Li Si will give his identity (mobile number) to Zhang San mobile phone, and Zhang San mobile phone judges that he has a safe list. Li Si’s mobile phone is considered to be trustworthy, verified, and then told Li Si, so that Li Si can transfer data to Zhang San.
  • the specific identity security verification of the counterpart device may also be to send the identity security identifier and the identity identifier to the other device, and the counterpart device determines whether the identity security identifier is the same as its own identity security identifier, and whether the identity identifier is preset. In the security list, if the identity security ID is the same and is in the preset security list, the identity security verification is passed.
  • the identity security identifier is pre-stored in the other device, so that the other device can identify the identity security identifier of the local device, that is, multiple identity security identifiers are stored in the other device. . And for the device and all other devices, there will be corresponding identification, such as the number of the device and the identification information of the number, so that the other device can identify the local device, and the pre-set devices that are trusted can be stored in the other device. A list of corresponding identities.
  • the identity security sign B of his own is given to the Li Si mobile phone.
  • the Li Si mobile phone judges that it has the same identity security identifier B. If it is, it is considered that the trusted identity security identity B is the same as its own identity security identity B.
  • the security verification of the local device by the receiving device includes: first accepting the identity verification of the local device by the other device, and after receiving the verification, accepting the data verification of the local device by the other device. That is, the peer device is first accepted for identity security verification. After the identity security verification is passed, the other device is accepted to perform data authority verification on the local device, and data transmission is performed after the data authority verification is passed.
  • the data permission here refers to which data the local device can share, that is, which data can be received by the counterpart device, and which data cannot be received. It is worth noting that the security verification method performed by the other device is the same as the security verification method performed by the local device on the other device, and the main verification is that the execution subject is different from each other, and the repeated description will not be repeated here.
  • the NFC P2P data transmission device terminal uses the identity security identifier to identify the trusted device to determine whether the data can be transmitted.
  • the example is illustrated, as shown in Figure 2, including the following steps:
  • Step S201 The transmitting end selects to send a communication business card and activates P2P transmission through the P2P data sharing operation interface system;
  • Step S202 The transmitting end is close to the receiving end, and the transmitting field is sent by the NFC antenna transmitting system, and the wireless channel is established with the receiving end;
  • the receiving end receives the NFC radio frequency field of the transmitting end.
  • Step S203 The sending end acquires the identity security identifier sent by the receiving end, that is, the receiving end reads the permission identifier from the P2P authority identifier storage system through the P2P data transmission system, and writes the NDEF data structure to the sending end;
  • the receiving end also records related information of the transmitting end.
  • Step S204 The transmitting end determines, according to the identity security identifier of the receiving end, whether the receiving end is trusted by the NFC device. If it is not a trusted device, the process terminates; if it is a trusted device, proceeds to step S205;
  • Step S205 The P2P data transmission system at the transmitting end reads the data rights that can be transmitted and received from the receiving end from the P2P rights identification storage system, and if the transmission of the address book business card is not allowed, the process is terminated; if the transmission of the business card is allowed, the process proceeds to S206;
  • Step S206 The P2P data transmission system at the transmitting end sends the selected address book business card to the NDEF data structure and sends it to the receiving end, and the process is completed.
  • the receiving end receives the business card and stores it.
  • the transmitting end in this example is the device, and the receiving end is the counterpart device.
  • the data format between devices is as follows:
  • the identity security identifier is exchanged between the P2P devices by the extended NDEF data type and whether data transmission is allowed.
  • NDEF information and standard format description: text (T) can carry information strings, can also be included in other NDEF information as its description text.
  • URI(U) which can be used to store website addresses, emails, phone numbers, and stored in an optimized binary form.
  • Smart poster (Sp) for entering URLs, text messages or phone numbers into NFC tags and how to pass them between devices. Universal control of the RTD. Sign the RTD.
  • the near field communication data transmission method of this embodiment includes the following steps:
  • Step S301 The P2P centralized management software system allocates a trusted P2P data transmission identity security standard Knowledge and restrictions can send data rights;
  • Step S302 The trusted P2P data transmission identity security identifier is stored in the P2P identity security identifier storage system; the storage system herein may be local to the device or in the related storage device;
  • Step S303 two terminal devices having an NFC chip, one of which (the transmitting end) opens a P2P data sharing operation interface system, and selects data to be transmitted, that is, data to be transmitted;
  • Step S304 The transmitting end of the P2P is close to the receiving end NFC terminal device, triggering the NFC antenna transmitting system to perform wireless communication docking;
  • Step S305 The P2P data transmission system performs data transmission, reads the permission identifier from the P2P authority identification storage system, and determines whether the communication parties belong to the same trusted group, that is, whether they have the same identity security identifier, if they do not belong to the same trusted
  • the group blocks the P2P data transmission of this time; if it belongs to the same trusted group, the sender further reads the corresponding transmission data authority from the P2P identity security identifier storage system, and determines the current P2P data sharing operation interface system. Whether the selected data is allowed to be sent, if not allowed, the P2P data transmission fails.
  • the wireless communication method in this embodiment is an NFC short-range wireless communication method.
  • This embodiment provides a method for establishing a trusted P2P data transmission device group in NFC short-range communication. Therefore, steps S301 and S302 are performed before the NFC device uses the P2P data connection, to indicate which scenarios belong to the NFC device. Before using P2P data connections, here are a few possible scenarios: (1) transferring photos between family members; (2) transferring videos between friends; and (3) transferring files between colleagues. It should be noted that steps S301 and S302 in this embodiment are performed before the NFC device uses the P2P data connection.
  • the P2P centralized management software system needs to first store the trusted P2P data transmission authority identifier in the P2P authority identification storage system, so that when the P2P data transmission system is used, , get the identity and manage device permissions. It should be understood that we can manage all controlled devices through the centralized management system before data transmission. Write an identity security ID for them. Then, before using NFC point-to-point transmission, the two terminals first perform certain information verification through data communication, such as a trusted identity security identifier, determining whether the device currently transmitting data is trusted, and then determining whether to transmit. The operation, which is supplemented by existing agreements.
  • a family trusted device group can share data of all data rights; a friend trusted device group can share data of data rights such as business cards, pictures, videos, audios, etc.; a trusted device group of colleagues can share business cards Data for document data permissions.
  • the device does not exchange untrusted data with any terminal, allowing data protection and secure communication to go further.
  • the present embodiment provides a near field communication data transmission device 400, as shown in FIG. 4, including an opening module 401, a security module 402, and a transmission module 403: the opening module 401 is configured to enable near field communication and establish a near field communication wireless channel; The security module 402 is configured to perform security verification before transmitting the to-be-transmitted data to the counterpart device; the transmission module 403 is configured to transmit the to-be-transmitted data to the counterpart device after the verification is passed.
  • the security module 402 is further configured to perform security verification on the counterpart device.
  • the embodiment further provides a near field communication data transmission device 400.
  • the security module 402 includes an identity security submodule 4021: the identity security submodule 4021 is configured to perform identity security verification on the counterpart device.
  • the embodiment further provides a near field communication data transmission device 400.
  • the security module 402 includes a data security submodule 4022: the data security submodule 4022 is configured to perform data authority verification on the counterpart device.
  • the security module 402 is further configured to accept the peer device to perform security verification on itself.
  • the security module 402 is further configured to accept the identity verification of the identity of the remote device; or accept the identity security verification of the remote device by itself; According to the authority verification.
  • a centralized management software system 700 is provided for description. As shown in FIG. 7, the P2P centralized management software module 701 and P2P permissions are included. The storage module 702 and the P2P data transmission module 703 are identified.
  • the P2P centralized management software module 701 is configured to distribute trusted device group identity security identifiers in different NFC terminal devices, such as a home trusted group, a classmate trusted group, and a colleague trusted group, and each group Different identity security identifiers are available, and only NFC terminal devices that match the rights identifier can transmit data to each other.
  • the system can also manage data rights that can be sent between the same trusted group device to prevent private data from being sent to unpredictable devices.
  • the P2P authority identifier storage module 702 is configured to save the identity security identifier and the transmittable data weight allocated by the 501 centralized management system, and the storage system can be placed in the eSE chip, the SE chip, and the terminal virtual eSE to provide storage for the 502 and 503 systems. Taking the interface, the storage system can provide an encryption mechanism to ensure that the saved data is safe and reliable.
  • the P2P data transmission module 703 is configured to transmit data between different NFC terminal devices. Before transmitting the actual data, the identity security identifier assigned by the centralized management module 701 needs to be read from the rights identifier storage module 702 to different terminals to determine whether the subsequent data transmission process can be performed.
  • each unit module in the near field communication data transmission device may be a central processing unit (CPU) in a near field communication data transmission device, or a digital signal processor (DSP), or Field-Programmable Gate Array (FPGA) implementation.
  • CPU central processing unit
  • DSP digital signal processor
  • FPGA Field-Programmable Gate Array
  • the apparatus for tracking the service signaling may also be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a separate product. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product. Stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present invention.
  • a computer device which may be a personal computer, server, or network device, etc.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • an embodiment of the present invention further provides a computer storage medium, wherein a computer program for executing a near field communication data transmission method of an embodiment of the present invention is stored.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne, selon un mode de réalisation, un procédé, un dispositif, un terminal ainsi qu'un support de mémoire. Le procédé consiste : à entrer, par l'intermédiaire d'une interface d'entrée de mot de passe prédéfinie, un mot de passe d'accès requis d'un objet devant être accédé, à déterminer si le mot de passe d'accès réussit une vérification d'identité de l'objet devant être accédé et si le mot de passe d'accès réussit la vérification d'identité de l'objet devant être accédé, alors, à aller directement à l'objet devant être accédé et attribuer une autorisation d'accès à ce dernier, tandis que si le mot de passe d'accès ne réussit pas la vérification d'identité de l'objet devant être accédé, à refuser l'accès vers l'objet devant être accédé.
PCT/CN2015/090616 2015-08-19 2015-09-24 Procédé et dispositif de transmission de données de communication en champ proche et support de mémoire informatique WO2016145820A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510511195.0 2015-08-19
CN201510511195.0A CN106470386A (zh) 2015-08-19 2015-08-19 一种近场通信数据传输方法和装置

Publications (1)

Publication Number Publication Date
WO2016145820A1 true WO2016145820A1 (fr) 2016-09-22

Family

ID=56918323

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/090616 WO2016145820A1 (fr) 2015-08-19 2015-09-24 Procédé et dispositif de transmission de données de communication en champ proche et support de mémoire informatique

Country Status (2)

Country Link
CN (1) CN106470386A (fr)
WO (1) WO2016145820A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107608713A (zh) * 2017-08-22 2018-01-19 维沃移动通信有限公司 一种应用程序转移方法及移动终端
CN115103194A (zh) * 2022-06-16 2022-09-23 慧之安信息技术股份有限公司 基于多解码模式的视频解码方法
WO2023093242A1 (fr) * 2021-11-29 2023-06-01 京东方科技集团股份有限公司 Procédé de transmission de données, extrémité de commande centrale, terminal mobile et système de transmission de données

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110913080B (zh) * 2019-11-14 2022-02-11 北京明略软件系统有限公司 一种数据传输方法及装置
CN111539855A (zh) * 2020-04-24 2020-08-14 上海好学网络科技有限公司 考试数据同步设备
CN114963548A (zh) * 2021-05-27 2022-08-30 青岛经济技术开发区海尔热水器有限公司 基于近场通信的热水器控制方法、装置及电子设备
CN114040351B (zh) * 2021-10-21 2023-04-18 郑州大学第一附属医院 一种基于近距离通信的可穿戴儿童呼吸监控系统
CN116187362A (zh) * 2021-11-29 2023-05-30 中兴通讯股份有限公司 Nfc卡片数据的读写方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202977A (zh) * 2006-12-14 2008-06-18 英华达(上海)电子有限公司 移动通信中实现信息共享的方法和终端
US20130065521A1 (en) * 2011-09-08 2013-03-14 Pantech Co., Ltd. Near field communication (nfc) terminal and method for data synchronization
CN103414831A (zh) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 利用nfc从数码相机获取照片到移动终端的方法与系统
CN104244171A (zh) * 2014-09-28 2014-12-24 上海斐讯数据通信技术有限公司 基于nfc连接的数据传输系统及方法
CN104618330A (zh) * 2014-12-26 2015-05-13 小米科技有限责任公司 业务处理方法、装置及终端
CN104754501A (zh) * 2015-04-21 2015-07-01 北京云迹科技有限公司 一种数据传输方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114901B (zh) * 2006-07-26 2010-08-25 联想(北京)有限公司 非接触式无线数据传输的安全认证系统、设备及方法
CN101197904A (zh) * 2007-12-21 2008-06-11 中国移动通信集团北京有限公司 一种图片传送的方法、系统及设备
CN101674109A (zh) * 2009-10-19 2010-03-17 宇龙计算机通信科技(深圳)有限公司 一种nfc监控装置、nfc通讯终端及监控系统
CN102932788A (zh) * 2012-10-26 2013-02-13 南宁佰睿技术开发有限公司 一种手机的身份识别和近场支付的方法
CN103905504A (zh) * 2012-12-27 2014-07-02 海尔集团公司 一种信息推送方法及系统
CN104243156A (zh) * 2013-06-20 2014-12-24 中兴通讯股份有限公司 基于近场通信的点对点通信方法及近场通信终端
CN103533543A (zh) * 2013-10-08 2014-01-22 深圳Tcl新技术有限公司 基于近场通信的终端的配对方法及装置
CN104113839A (zh) * 2014-07-14 2014-10-22 蓝盾信息安全技术有限公司 基于sdn的移动数据安全保护系统及方法
CN104363589A (zh) * 2014-12-09 2015-02-18 北京大唐智能卡技术有限公司 一种身份认证的方法、装置和终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202977A (zh) * 2006-12-14 2008-06-18 英华达(上海)电子有限公司 移动通信中实现信息共享的方法和终端
US20130065521A1 (en) * 2011-09-08 2013-03-14 Pantech Co., Ltd. Near field communication (nfc) terminal and method for data synchronization
CN103414831A (zh) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 利用nfc从数码相机获取照片到移动终端的方法与系统
CN104244171A (zh) * 2014-09-28 2014-12-24 上海斐讯数据通信技术有限公司 基于nfc连接的数据传输系统及方法
CN104618330A (zh) * 2014-12-26 2015-05-13 小米科技有限责任公司 业务处理方法、装置及终端
CN104754501A (zh) * 2015-04-21 2015-07-01 北京云迹科技有限公司 一种数据传输方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107608713A (zh) * 2017-08-22 2018-01-19 维沃移动通信有限公司 一种应用程序转移方法及移动终端
WO2023093242A1 (fr) * 2021-11-29 2023-06-01 京东方科技集团股份有限公司 Procédé de transmission de données, extrémité de commande centrale, terminal mobile et système de transmission de données
CN115103194A (zh) * 2022-06-16 2022-09-23 慧之安信息技术股份有限公司 基于多解码模式的视频解码方法

Also Published As

Publication number Publication date
CN106470386A (zh) 2017-03-01

Similar Documents

Publication Publication Date Title
WO2016145820A1 (fr) Procédé et dispositif de transmission de données de communication en champ proche et support de mémoire informatique
Lundkvist et al. Uport: A platform for self-sovereign identity
US10499205B2 (en) SMS proxying
KR101999676B1 (ko) 통신 네트워크에서의 끊김 없는 디바이스 구성
US9450921B2 (en) Systems and methods for controlling email access
KR101508360B1 (ko) 데이터 전송 장치 및 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체
US9325713B2 (en) Systems and methods for controlling email access
CN106850392B (zh) 消息处理方法及装置、消息接收方法及装置
CN104509062A (zh) 使用通过近距离通信接收的标记的信息共享
CN104982021A (zh) 向无线对接服务认证无线对接方
US20210105337A1 (en) Profile information sharing
WO2018213142A1 (fr) Partage de mot de passe sécurisé pour réseaux sans fil
US20140090034A1 (en) Smart plug or cradle
US20120131076A1 (en) File sharing method and file sharing system utilizing the same
US11038687B2 (en) Data collaboration
KR102000244B1 (ko) 형태보존 암호화가 적용된 영지식증명 기반의 블록체인 시스템 및 그의 제어 방법
WO2016095815A1 (fr) Procédé, appareil, dispositif de terminal et support de stockage de transmission d'informations de carte professionnelle
US11252145B2 (en) Cross-device access to one-time passwords
KR102559827B1 (ko) 블록체인과 해쉬 암호화 기술을 기반으로 한 영상 인증 시스템 및 그 방법
KR102154736B1 (ko) 관계 정보를 이용한 접근 제어 방법 및 그 장치
KR20210000957A (ko) 블록체인과 해쉬 암호화 기술을 기반으로 한 영상 인증 시스템 및 그 방법
EP3282639B1 (fr) Procédé d'exploitation d'un serveur et d'un client, serveur et appareil de client
CN116547959A (zh) 通过使用区块链网络共享数据的电子装置及其运行方法
KR101525489B1 (ko) 스마트폰 앱을 이용한 상호 파일 공유 시스템 및 이를 이용한 파일 공유 방법
JP2014006764A (ja) データ管理システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15885192

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15885192

Country of ref document: EP

Kind code of ref document: A1