Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of NFC key update method, terminal and system

A key update and terminal technology, applied in the NFC field, can solve the problems of identity information leakage, cumbersome operation process, key leakage and so on

Active Publication Date: 2022-05-13
SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, due to the fact that smart lock terminals are connected to the Internet, there are relatively serious security issues such as identity information leakage, password leakage, and password theft. NFC smart locks / doors / NFC identity authentication systems bring us convenience, but also give attackers Convenient, as long as the NFC card with the key is lost, there is a risk of key leakage, and when the key is leaked, due to the long time-consuming key update and cumbersome operation process, the attacker can even make infinite copies
[0008] Therefore, how to solve the above-mentioned risks caused by key disclosure has become an urgent technical problem for those skilled in the art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of NFC key update method, terminal and system
  • A kind of NFC key update method, terminal and system
  • A kind of NFC key update method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment 1: The update key is stored in the external NFC card; at this time, there are two ways to trigger the update of the authentication key.

[0050] 1. Reference figure 2 and image 3 After the NFC read-write device is connected to the NFC terminal, it communicates with the NFC terminal through an external NFC card with an update key. Since the NFC card in the NFC terminal stores an update key, it triggers an authentication key update (only with an update key key external NFC card can only trigger the update of the authentication key but cannot open the NFC terminal, the NFC terminal can be a smart door lock in this embodiment), the key generation module generates a new authentication key, and then stores the key in the data storage module The new authentication key is encrypted by SHA256 and stored, and then the encrypted new authentication key is transmitted to the server by HMAC through the data transmission module for storage (covering the original authenti...

Embodiment 2

[0052] Embodiment 2: The update key is not stored in the external NFC card;

[0053] At this time, the update of the authentication key cannot be triggered by the external NFC card with the authentication key. Therefore, the update operation of the authentication key can only be triggered after logging in to the NFC key software service platform through the smart terminal to communicate with the server. After the authentication key is updated, the subsequent work of the NFC communication system includes the whole process of processing the new authentication key after the authentication key is updated in the first embodiment. But, because the NFC card in the NFC terminal is stored as the authentication key at this moment, when the key generating module generates a new authentication key, the authentication key of the NFC card (that is, the information acquisition verification module) in the NFC terminal is also covered as The new authentication key can be written into the exter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an NFC key update method, terminal and system. After obtaining the information that the authentication key needs to be updated, it is checked whether the update key is legal, and if a legal update key is obtained, a new authentication key is generated, and The new authentication key is stored and sent to NFC-related devices, which solves the technical problems in the prior art that the NFC key update takes a long time, the operation process is cumbersome, and the key leak cannot be updated in time.

Description

technical field [0001] The present invention relates to the field of NFC technology, in particular to an NFC key update method, terminal and system. Background technique [0002] NFC: Near Field Communication, near field communication; [0003] SHA256: One of SHA (Secure Hash Algorithm, secure hash algorithm) algorithm, the hash value length of the algorithm is 256 bits; [0004] HMAC: Hash-based Message Authentication Code, key-related hash operation message authentication code, HMAC operation uses a hash algorithm, takes a key and a message as input, and generates a message digest as output; [0005] HCE: Host-based Card Emulation, host card mode. [0006] With the development of network technology, locks, identity authentication and security are no longer simply using the traditional single unlocking or verification method, but a variety of verification methods have been derived, such as NFC smart lock / door / NFC identity authentication System, etc., can use NFC door car...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W4/80
CPCH04L9/0891H04W4/80
Inventor 吴宇杰余小龙贾超晨李新国张迪徐林玉
Owner SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products