Near field communication authentication method based on U/SIM card authentication response and time-limited feedback

An authentication response and near-field communication technology, which is applied in wireless communication, near-field transmission system, protocol authorization, etc., can solve the problem that the security of near-field communication cannot be guaranteed, and achieve the effect of ensuring security

Inactive Publication Date: 2015-01-28
熊文俊
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the problem that the security of near-field communication in the prior art cannot be guaranteed, the prese...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Near field communication authentication method based on U/SIM card authentication response and time-limited feedback
  • Near field communication authentication method based on U/SIM card authentication response and time-limited feedback
  • Near field communication authentication method based on U/SIM card authentication response and time-limited feedback

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This type of collection terminal is distributed to merchants after passing the inspection by banks or financial institutions. Merchants need to pass the audit to obtain the transaction port and transaction authorization code. The special collection terminal is an independent communication terminal with built-in independent clock, CPU processor and communication transceiver module, and its external communication interface has wired broadband and mobile wireless air interface. The random code and its verification code used only to verify the identity or qualification of the payment terminal are pre-solidified in the special collection terminal, as well as the encryption key, key number and encryption algorithm used in the transaction authentication link. The database corresponding to the terminal authorization code also contains random codes and verification codes, as well as encryption keys, key numbers, and encryption algorithms. A square wave generator that responds to...

Embodiment 2

[0072] When a mobile terminal is used as a collection terminal, its transaction port still needs to be provided by the payment provider after review. As mentioned above, due to the complex communication environment of the mobile phone terminal, the round-trip time with the server is uncertain, so the hacker terminal can use this point to collude with the receiving user to delay the reply time to the server synchronously to create the illusion of network delay. Its purpose is to gain valuable time for the hacker terminal to obtain the U / SIM card authentication response S from the virus terminal in the remote user. For this reason, it is necessary to add a separate independent hardware authentication module that has nothing to do with the mobile communication system, or a USB / earphone hole plug-in / plug-in on the U / SIM or SD card or card sticker of the mobile payment terminal to accurately define and protect The sending and receiving time node of authentication data. The hardwar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to near field communication technologies, and provides a near field communication authentication method based on U/SIM card authentication response and time-limited feedback so as to solve the problem that the security of near field communication in the prior art can not be guaranteed. According to the method, authentication parameters used for near field transactions are independently set and issued to a mobile terminal by a server of a system, and a mobile terminal APP calls networked U/SIM card authentication and then sends the authentication result to the server after calculation for pre-storing the authentication result. In each time of near field transaction, the server selects random codes from the pre-stored data freely, issues the selected random codes to the mobile terminal and compares an authentication response fed back by the mobile terminal with an authentication response, pre-stored in the terminal, in a database so that the legality of the transactions can be guaranteed. The invention further provides a set of guarantee procedures so as to prevent mobile phone viruses or remote attacks from a hacker and guarantee the security of the authentication response, and namely, a payment terminal can pass authentication only after carrying out feedback within the time limited by the system and making the correct authentication response. The method is suitable for the near field transactions.

Description

technical field [0001] The invention relates to near-field communication technology, in particular to a near-field communication authentication method based on U / SIM card authentication response and time-limited feedback. Background technique [0002] With the popularity of mobile smart terminals around the world, mobile Internet applications have sprung up, and near-field transactions are widely favored by users due to their convenience; Normal development of trading business. [0003] Therefore, it is necessary for this application to propose a highly secure near-field communication authentication method to ensure the security of near-field transactions. Contents of the invention [0004] In order to overcome the problem that the security of near-field communication in the prior art cannot be guaranteed, the present invention proposes a near-field communication authentication method based on U / SIM card authentication response and time-limited feedback. [0005] The tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06G06Q20/40G06Q20/16H04B5/00
CPCG06Q20/16G06Q20/4014H04B5/0031H04W12/06
Inventor 熊文俊杨盛麟
Owner 熊文俊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products