NFC (near field communication)-based point-to-point trusted authentication method

An authentication method and point-to-point technology, applied in user identity/authority verification and key distribution, can solve the problems of limited functional diversity and weak security in the access process, and achieve the effect of immediacy and controllability of access

Inactive Publication Date: 2014-12-17
TIANJIN UNIV
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the other two methods, the security of the scene where mobile devices are directly authenticated at close range to obtain permissions for other related operations (such as unlocking, access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NFC (near field communication)-based point-to-point trusted authentication method
  • NFC (near field communication)-based point-to-point trusted authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose of the present invention, implementation scheme and advantages clearer, the specific implementation of the present invention will be described in further detail below, and the specific illustrations of the present invention can be found in figure 1 with figure 2 shown.

[0023] (1) When using two NFC devices to directly sense each other to authenticate the identity, because the authentication method only through the ID is too simple and the security cannot be guaranteed, a digital certificate issued by a trusted third-party authority CA is used instead of the ID for authentication. After the trusted authentication is established, access can be flexibly controlled by setting the relevant fields in the certificate to achieve multiple functional requirements. Down figure 1 It is a schematic diagram of the digital certificate structure issued by the CA center to the client device, listing the main parameters in the certificate.

[0024] (2) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an NFC (near field communication)-based point-to-point trusted authentication method. The method includes that a client NFC device generates an own key pair and sends an own public key, device information and personal identity information to a CA (certificate authority); after verifies the identity, the CA issues a certificate to the device, to be specific, the certificate is used for achieving identity authentication with an NFC server and accompanied with digital signing message of a publisher in a CA center; an access is provided for the digital certificate into the client NFC device, thus the device can perform the relative access through the certificate of its own; in case that the access to the NFC server for the identity authentication is required, the client NFC device transmits the own certificate to the NFC server through an established secret passage. According to the arrangement, the safe, reliable, flexible, convenient, resource-saving and multi-functional authentication is achieved during the NPC point-to-point transmission.

Description

technical field [0001] The invention relates to a trusted authentication method in a point-to-point mode. Background technique [0002] With the continuous development of wireless communication technology, NFC technology has been applied to various industries with its advantages of high transmission bandwidth and low energy consumption since its appearance. It can be said that as an extension of RFID technology, NFC breaks through the limitation that RFID can only realize information reading and judgment, emphasizing that both parties can exchange information at close range. The application in the NFC industry chain is mainly the payment industry and data transmission. Therefore, its security issues have gradually become a hot spot of concern. [0003] At present, the industry is generally optimistic about NFC technology. The most important thing is that the security of the card simulation mode and card reader mode of this technology has become mature, so it has gradually ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 邹佳伟金志刚
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products