Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile transaction privacy protection method based on bidirectional identity authentication of near field communication

A two-way identity authentication and near-field communication technology, applied in the field of two-way identity authentication, to reduce the burden, ensure security, and achieve the effects of anonymity

Active Publication Date: 2018-02-09
GUANGDONG UNIV OF TECH
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention proposes a mobile transaction privacy protection method based on near-field communication two-way identity authentication. Security of Key Generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile transaction privacy protection method based on bidirectional identity authentication of near field communication
  • Mobile transaction privacy protection method based on bidirectional identity authentication of near field communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Initialization phase:

[0040] (1) Introduce a trusted third-party authentication agency AS, which is responsible for generating the session key K(a,b) between the NFC mobile phone and the POS terminal during the communication process, the authentication message AuthP of the AS to the POS terminal, and the AS to the NFC device The authentication message AuthN. AS generates system public-private key pair PK AS ||SK AS , contains a security application that allows verification of digital signatures, stores a list of trusted certificates and the hash function H needed to use in the communication process, etc. The AS discloses its public key and keeps its private key secret.

[0041] (2) The user's NFC mobile phone requests registration by sending its own ID to the AS. The user performs a hash algorithm on the ID, and the generated H(ID) is used as the public key, and then sends the public key to the AS to generate the private key of the NFC mobile phone. , so as to obt...

Embodiment 2

[0043] Two-way identity authentication process between NFC mobile phone device and POS terminal:

[0044] (1) POS→NFC: The POS terminal sends a request message to the NFC mobile phone, including the current unique transaction timestamp T generated by the POS terminal, and the identity authentication request R of the POS terminal to the NFC mobile phone N , trusted security certificate CE for POS terminals P , Acquiring bank trusted security certificate CE B , and the signature SIG of the POS terminal P . SIG P is to use the private key SK of the POS terminal P For messages POS, TD and R N The hash value signature obtained, SIG P =Sig(SK P ,H(POS||T||R N )). Message packet Data P1 including SIG P 、CE P and CE B , Data P1 =SIG P ||CE P ||CE B . POS terminal will Data P1 Send to NFC mobile phone device. SIG P 、CE P and CE P Allows authentication of POS terminals, guaranteeing T and R N The integrity of the message is transmitted, and it can ensure that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile transaction privacy protection method based on bidirectional identity authentication of near field communication (NFC). The method includes a first step and a second step. The first step is an initial registration stage in which an NFC mobile phone and a POS terminal request for registration by sending the identity information thereof to an authentication server AS, so as to get a public and private key pair and a related trusted certificate. The second step is bidirectional identity authentication between the NFC mobile phone device and the POS terminal. Identity authentication between the NFC mobile phone device and the POS terminal is carried out using a shared key generated by AS. Payment transaction can be conducted only after the two parties of communication are authenticated, and the legitimacy of the identity of the two parties is ensured. The method greatly guarantees the privacy of communication data between the two parties.

Description

technical field [0001] The invention relates to the technical field of near-field communication, in particular to a method for realizing bidirectional identity authentication between an NFC mobile phone device and a POS terminal through a third-party authentication center. Background technique [0002] NFC (Near Field Communication) is near-field communication, which is a non-contact short-range wireless communication technology. The working frequency is 13.56MHz and the working range is within 20cm. With the development of near-field communication technology, the application of NFC mobile payment has brought many business opportunities. The mobile phone with NFC function can be used in many occasions such as public transportation, subway, mobile payment, access control, etc., which provides great convenience for people's life and has broad prospects. At the same time, there are more and more security threats to NFC, mainly including system security threats, communication s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/20G06Q20/38G06Q20/40H04L9/32
CPCG06Q20/20G06Q20/38215G06Q20/4014H04L9/3249H04L9/3273H04L9/3297H04L2209/805
Inventor 凌捷赵文罗玉谢锐柳毅龚怡
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products