NFC authentication system based on quantum communication network

A technology of quantum communication and authentication system, which is applied in the direction of transmission system, digital transmission system, security communication device, etc., can solve the problems of potential safety hazards, insufficient security, cumbersome operation, etc., and achieve convenient and fast verification, high security, Experience the best effect

Active Publication Date: 2020-08-11
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1. In the prior art, in the process of using dynamic tokens for identity authentication, application terminal users need to manually input dynamic tokens, which is too cumbersome to operate and has potential safety hazards
[0012] 2. In the prior art, the key of the mobile phone token is stored in the mobile phone memory and can be stolen by malicious software or malicious operations
[0013] 3. In the existing technology, the seed key of the mobile phone token is unchanged, and the security is not high enough
[0014] 4. In the prior art, the dynamic password system of each application server is independent, and the user needs to maintain multiple dynamic tokens or dynamic token software, which is inconvenient to manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NFC authentication system based on quantum communication network
  • NFC authentication system based on quantum communication network
  • NFC authentication system based on quantum communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] NFC certification process QRA_FLOW

[0063] The directly involved parties of QRA_FLOW are the mobile terminal MT (the current quantum key card is MTK, and its identification number is MTKID), the application terminal AT, and the application server AS (the current quantum key card is ASK, and its identification number is ASKID), The authentication service module QMT of the quantum communication service station corresponding to the current key of MTK (its identification number is QMTID), and the authentication service module QAS of the quantum communication service station corresponding to the current ASK key (its identification number is QASID). AT users hold MT, MT is currently paired with MTK, so AT users hold MTK.

[0064] AT users hold MTK to register with AS. The identification number assigned by AS to AT users is UID; the identification number of the quantum key card bound to it is MTKID. The AS stores the UID and its corresponding MTKID to the account database. AS c...

Embodiment 2

[0129] NFC certification simplified process QRA_SFLOW

[0130] The special case of QRA_FLOW is that when the quantum communication service station corresponding to the quantum key fob used by the application server and the mobile terminal is the same, that is, when there is only QAS and no QMT, the process is appropriately simplified. The specific process is similar to QRA_FLOW in Embodiment 1, except that several steps of QAS and QMT communication are omitted.

[0131] see image 3 , QRA_SFLOW is as follows:

[0132] 4.1MT sends user access request to AT

[0133] 4.2 AT forms NFC certification related information

[0134] 4.3 AT sends NFC authentication information to MT

[0135] 4.4MT generates NFC authentication response value

[0136] 4.5MT sends authentication response to AT

[0137] 4.6AT judges the legality of MT response

[0138] 4.6.1 Judgment of the legality of identity information

[0139] 4.6.2 Time legality judgment

[0140] 4.7AT sends authentication request to AS

[0141] 4.8AS...

Embodiment 3

[0150] Simplified NFC authentication process SQRA_FLOW

[0151] For the aforementioned QRA_FLOW and QRA_SFLOW, the UID needs to be input to the MT in the first step. If the input UID is more complicated, the operation is inconvenient. To further facilitate user operations, the following process SQRA_FLOW without UID input can be used.

[0152] The directly involved parties of SQRA_FLOW are the same as QRA_FLOW.

[0153] AT user holds MTK to register with AS, AS records MTKID in AS's account database, this situation is recorded as SQRA_FLOW_REG; or if not registered, this situation is recorded as SQRA_FLOW_UNREG. In the case of SQRA_FLOW_REG, AS can also store the user's biological characteristics corresponding to MTKID to the account database, such as fingerprint characteristics, iris characteristics, facial characteristics, vein characteristics, palmprint characteristics, etc.

[0154] see Figure 4 , SQRA_FLOW is as follows:

[0155] 5.1MT sends user access request to AT

[0156] MT ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an NFC (Near Field Communication) authentication system based on a quantum communication system. The system comprises an application server, application terminals, mobile terminals, quantum communication service stations and quantum key cards matching the mobile terminals. Corresponding quantum keys are stored between the quantum key cards and the quantum communication service stations. When NFC authentication is carried out, the quantum key cards matching the mobile terminals generate NFC authentication response values; the quantum communication service stations generate NFC authentication expected response values; and the application terminals compare the NFC authentication response values with the NFC authentication expected response values to obtain an authentication result and perform related service. According to the NFC authentication system provided by the invention, through NFC authentication of the mobile terminals, the operation of a user is rapid andconvenient, and the experience is superior to that of a dynamic password. The keys for authentication are stored in the quantum key cards and the quantum key cards are specially-made isolation hardware, so it is difficult to steal the keys by malicious software in the mobile terminals or malicious operation.

Description

Technical field [0001] The invention relates to the field of network security communication, in particular to an NFC authentication system based on a quantum communication network. Background technique [0002] During identity authentication, static passwords can be easily stolen by malicious software, or be brute-forced because they are fixed. In order to solve the security problem of static passwords, dynamic token technology has become popular. [0003] The dynamic token uses a one-time password generated based on three variables of time, event and key to replace the traditional static password. Each dynamic token card has a unique key, which is stored on the server side at the same time. During each authentication, the dynamic token card and the server are based on the same key, the same random parameters (time, event) and The same algorithm calculates the dynamic token to be authenticated, so as to ensure the consistency of the password and realize identity authentication. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L9/0897H04L63/068H04L63/0846H04L63/0853
Inventor 富尧钟一民
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products