Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method based on NFC chip security authentication

A data encryption and data technology, applied in the usage of multiple keys/algorithms, transmission systems, electrical components, etc., can solve the problems of ciphertext data restoration, inability to decipher ciphertext data, etc., to achieve the effect of ensuring absolute security

Active Publication Date: 2017-01-25
北京小样科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the traditional encryption methods use reversible encryption methods for data transmission. No matter how complicated the reversible encrypted data is in the transmission method or the encryption method, it is theoretically a reversible encryption method after all. The encryptor can transfer the data Perform a series of algorithm encryption with the secret key. In principle, as long as the secret key used in the encryption process is deciphered, there is a great possibility to decipher the ciphertext data. Therefore, in terms of probability, the possibility of deciphering exists, and it is very likely. high
However, if an irreversible encryption algorithm is used for data encryption transmission, deciphering this cannot decipher the ciphertext data, but the same encryption can not restore the ciphertext data to plaintext data, so it is impossible to use irreversible encryption data for data transmission. taken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method based on NFC chip security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with specific embodiments, and the advantages and characteristics of the present invention will become clearer along with the description. However, these embodiments are only exemplary and do not constitute any limitation to the scope of the present invention. Those skilled in the art should understand that the details and forms of the technical solutions of the present invention can be modified or replaced without departing from the spirit and scope of the present invention, but these modifications and replacements all fall within the protection scope of the present invention.

[0026] The invention relates to a data encryption method based on NFC chip anti-counterfeiting authentication, comprising the following steps:

[0027] Step 1: The user enters the correct user name and password through the mobile terminal to verify the login;

[0028] Step 2: After verifying that the user has successfully log...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data encryption method based on NFC chip security authentication. The method comprises the following steps: 1. The correct user name and password are entered by the user through the mobile terminal to verify the login; 2. After the login of the user is confirmed to be successful, a secret key in character string format is generated through the irreversible encryption of the user name, password and timestamp. To prevent the interactive data between the APP mobile terminal (NFC mobile phone) and the server (cloud server) is maliciously tampered with, cross-use of the 'reversible encryption' and the 'irreversible encryption' algorithms is adopted to ensure that interactive data between the mobile and the server terminals is absolutely safe.

Description

technical field [0001] The invention relates to a data encryption method based on NFC chip anti-counterfeiting authentication. Background technique [0002] Most of the traditional encryption methods use reversible encryption methods for data transmission. No matter how complicated the reversible encrypted data is in the transmission method or the encryption method, it is theoretically a reversible encryption method after all. The encryptor can transfer the data Perform a series of algorithm encryption with the secret key. In principle, as long as the secret key used in the encryption process is deciphered, there is a great possibility to decipher the ciphertext data. Therefore, in terms of probability, the possibility of deciphering exists, and it is very likely. high. However, if an irreversible encryption algorithm is used for data encryption transmission, deciphering this cannot decipher the ciphertext data, but the same encryption can not restore the ciphertext data to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L29/06
CPCH04L9/14H04L63/0478H04L63/123
Inventor 马冠宇王启祥易志中刘峰
Owner 北京小样科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products