A method and system for secure peer-to-peer data transmission
A data security, point-to-point technology, applied in transmission systems, near-field transmission systems, public keys for secure communications, etc., can solve problems such as obtaining data transmission content, deception, and data transmission process deception, so as to solve potential safety hazards and improve The effect of accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] Below, refer to the attached Figure 2~6 The method and system for secure point-to-point data transmission in NFC devices of the present invention are described in detail.
[0045] figure 2 It is an NFC point-to-point communication protocol structure according to an embodiment of the present invention. Such as figure 2 As shown, the RF layer 200 is the lowest layer conforming to the International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) 18092 and 14443 Class A, B standards and the contactless smart card technology (Felica) protocol stack specification. The RF layer 200 corresponds to the physical layer of the ISO / OSI reference model, and is responsible for data modulation / demodulation and wireless transmission. The protocol of the NFC link layer 210 is called the NFC-IP protocol layer, which is responsible for encoding, setting the transmission rate, defining the frame format of the RF layer interface, initialization sc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


