A point-to-point data transmission method based on nfc

A data transmission method and point-to-point technology, which is applied in the field of point-to-point data transmission, can solve problems such as weak security and serious plaintext transmission, and achieve the effects of good security, improved security, and elimination of eavesdropping

Inactive Publication Date: 2017-09-15
TIANJIN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the third important working mode, the point-to-point mode has a serious security risk of plaintext transmission in its transmission process.
Compared with the other two methods, the security of short-distance direct data transfer between mobile devices (such as exchanging business cards, inter-personal transfer of funds, mobile phones transmitting important printing data to NFC printers, etc.) is particularly weak. It is also an urgent problem that needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A point-to-point data transmission method based on nfc
  • A point-to-point data transmission method based on nfc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose of the present invention, implementation scheme and advantages clearer, the specific implementation of the present invention will be described in further detail below, and the specific illustrations of the present invention can be found in figure 1 and figure 2 shown.

[0020] (1) When two NFC devices are used to directly sense each other to transmit data, the relevant eavesdropping devices are used to intercept and capture midway. The analysis and test results show that the captured data is either from the handshake response phase or the actual transmission after the connection is established. clear text. the following figure 1 It is a schematic diagram for analyzing the working principle of NFC point-to-point transmission mode and discovering test loopholes. Therefore, it is necessary to add an additional NFC encryption method on top of the current NFC protocol stack to protect data transmitted in point-to-point mode.

[0021] (2) In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an NFC (near field communication)-based point-to-point data transmission method. The method includes that 1, an NFC device A and an NFC device B to be performed the point-to-point transmission all employ the RSA (Rivest, Shamir, Adleman) encryption algorithm to acquire a public key set and a private key set respectively; 2, two ends of each of the NFC device A and the NFC device B generate random numbers Ra and Rb respectively to be bound with each of device identifiers to form ordered pairs, each of the NFC devices uses the public key of the other NFC device to encrypt its own ordered pairs, exchanges ciphertexts of two encrypted pairs and uses the own private key to decrypt the received ciphertexts so as to acquire the random number and the device identifier of the other device; 3, each of the NFC device combines two pairs and then uses the Hash algorithm to generate a session key R; 4, during the data transmission, the session key R is subjected to encrypting the data to be transmitted and splitting the ciphertexts in a mixed manner. In this way, reliability, effectiveness and safety of the NFC-based point-to-point data transmission are guaranteed.

Description

technical field [0001] The invention relates to a point-to-point data transmission method. Background technique [0002] With the continuous development of wireless communication technology, NFC technology has been applied to various industries with its advantages of high transmission bandwidth and low energy consumption since its appearance. It can be said that as an extension of RFID technology, NFC breaks through the limitation that RFID can only realize information reading and judgment, emphasizing that both parties can exchange information at close range. The most important application in the NFC industry chain is the payment industry. Therefore, its security issues have gradually become a hot spot of concern. [0003] At this stage, the security encryption technology of card simulation mode and card reader mode among the three working modes of NFC has become mature. At present, the industry is generally optimistic about NFC technology. The most important thing is that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
Inventor 邹佳伟金志刚
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products