Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for secure peer-to-peer data transmission

A data security, point-to-point technology, applied in transmission systems, near-field transmission systems, public keys for secure communications, etc., can solve problems such as obtaining data transmission content, deception, and data transmission process deception, so as to solve potential safety hazards and improve The effect of accuracy

Active Publication Date: 2017-02-08
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the point-to-point communication mode of NFC communicates between NFC devices wirelessly, there are network security risks such as being monitored and cheated. Therefore, it is necessary to provide a secure data transmission method for NFC point-to-point communication. It is hoped that this secure data transmission method In addition, it is hoped that this secure data transmission method can prevent attackers from deceiving the data transmission process, and in the case of interference or errors in the communication channel, in the overhead Recover erroneous data with as few cases as possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for secure peer-to-peer data transmission
  • A method and system for secure peer-to-peer data transmission
  • A method and system for secure peer-to-peer data transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Below, refer to the attached Figure 2~6 The method and system for secure point-to-point data transmission in NFC devices of the present invention are described in detail.

[0045] figure 2 It is an NFC point-to-point communication protocol structure according to an embodiment of the present invention. Such as figure 2 As shown, the RF layer 200 is the lowest layer conforming to the International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) 18092 and 14443 Class A, B standards and the contactless smart card technology (Felica) protocol stack specification. The RF layer 200 corresponds to the physical layer of the ISO / OSI reference model, and is responsible for data modulation / demodulation and wireless transmission. The protocol of the NFC link layer 210 is called the NFC-IP protocol layer, which is responsible for encoding, setting the transmission rate, defining the frame format of the RF layer interface, initialization sc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for point-to-point data safe transmission. A safe layer is arranged on an application layer of NFC to serve as a sub-layer of the application layer, and the safe layer is responsible for establishing safe connection between nodes of equal communication and conducting encryption data transmission and correctness verification. The method for point-to-point data safe transmission comprises the steps that a random secret key is generated after safe connection of a starting terminal and a target terminal is established; the safe layer of the starting terminal obtains a public key of a target terminal application program from a public key server; the safe layer of the starting terminal utilizes the public key of the target terminal application program to encrypt the random secret key and obtain a ciphertext; the safe layer of the starting terminal sends the ciphertext to a safe layer of the target terminal; the safe layer of the target terminal utilizes a private key of the application program to decode the ciphertext and obtain a random secret key; the safe layer of the target terminal sends a confirmation message of receiving the secret key to the safe layer of the starting terminal; after the safe layer of the starting terminal confirms that the safe layer of the target terminal already receives the secret key, the safe layer of the starting terminal sends a starting connection confirmation message to the starting terminal. The method for point-to-point data safe transmission is a safer NFC point-to-point communication method and can remove the potential safety hazards of an existing network.

Description

technical field [0001] The present invention relates to the technical field of near field communication (Near Field Communication, NFC), in particular to a method and system for securely transmitting point-to-point data in an NFC device. Background technique [0002] At present, NFC technology is evolved from the fusion of non-contact radio frequency identification (Radio Frequency Identification, RFID) technology and point-to-point communication technology. s transmission rate for data transmission, and can automatically switch between different transmission rates. NFC technology complies with ISO18092, ISO21481, ECMA (340, 352 and 356) and ETSITS102 standards, and is also compatible with the inductive smart card infrastructure based on ISO14441A. [0003] NFC defines three usage modes: Card Emulation Mode, Peer-to-Peer Communication, and Reader / Write Mode. Among them, the point-to-point communication mode is used to realize data exchange between NFC terminals, link multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04B5/00
Inventor 郭帅钟冬伍燕孔劼蔡燕燕张博
Owner ZTE CORP