Method and system for security verification of data among non-contact equipments

A safety verification and non-contact technology, applied in the field of safety verification, can solve problems such as technical content that does not include safety enhancement, and achieve the effect of improving safety

Inactive Publication Date: 2008-06-18
LENOVO (BEIJING) CO LTD
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, their white papers, standards, and patents curr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for security verification of data among non-contact equipments
  • Method and system for security verification of data among non-contact equipments
  • Method and system for security verification of data among non-contact equipments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the drawings, the same reference numerals are used to designate the same or similar components, although shown in different drawings. For clarity and conciseness, detailed descriptions of known functions and constructions incorporated herein will be omitted since they would otherwise obscure the subject matter of the present invention.

[0040] figure 1 It is a schematic diagram of the structure of the data security verification system used to illustrate the embodiment of the present invention.

[0041] Such as figure 1 The shown non-contact inter-device data security verification system includes a first mobile device 10 , a second mobile device 20 , a wide area wireless communication network 30 , a verification server 40 and a data server 50 .

[0042] After the first mobile device 10 generates the data credential, it transmits it t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for carrying through security authentication on data among non-contact devices. The invention includes the steps of transmitting a data voucher form a first movable device to a second movable device by a short distance communicating mode; launching an authentication request of the data voucher to a third party from the second movable device through a safe data transmission channel; the third party carries through authentication on the data voucher by utilizing the key information shared by the first movable device based on the authentication request; transmitting a data access description to the second movable device through the safe data transmission channel under the situation that the authentication result of the data voucher carried out by the third party is positive; and the second movable device acquires safe data corresponding to the data voucher through the data access description. By utilizing the invention, the security for carrying through data transmission among the non-contact devices can be improved.

Description

technical field [0001] The invention relates to safety verification in data exchange, in particular to a method and system for performing safety verification on data between non-contact devices, which can safely realize data migration between non-contact devices. Background technique [0002] At present, high-end mobile devices generally have multiple short-range radio frequency communication methods such as WiFi, Bluetooth, and Irda. These short-distance connection methods can carry out information exchange and function sharing between devices. For example, users can realize functions such as file transfer and address book backup between mobile devices through these interfaces. In consideration of power consumption, these interfaces are closed by default, and users must configure them before using them. The setting process generally requires the user to have certain experience in use, which limits the use of this part of the function of the mobile device. [0003] With th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 于辰涛
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products