Bidirectional authentication method of near field communication technology
A two-way authentication and near-field communication technology, applied in the field of two-way authentication of near-field communication technology, can solve problems such as untraceability, achieve the effect of solving security and privacy issues, reducing computing and storage costs, and ensuring label anonymity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0017] For ease of understanding, the agreements involved in this application are first described as follows:
[0018] 1) permutation operation function (Per), which is defined as follows:
[0019] Suppose A and B are two binary numbers of length l, where
[0020] A=a 1 a 2 …a l ,a i ∈{0,1},i=1,2,...,l (1)
[0021] B=b 1 b 2 …b l ,b j ∈{0,1},j=1,2,...,l (2)
[0022] The Hamming weight wt(B) of B is m (0≤m≤l), and
[0023]
[0024]
[0025] in, To arrange A according to B, Per(A,B) is expressed as:
[0026]
[0027] 2) MixBits function, which is defined as follows
[0028] Z=Mixbits(X,Y)
[0029] ---------------------------------
[0030] Z=X;
[0031] for(i=0; i<32; i++){
[0032] Z=(Z>>1)+Z+Z+Y
[0033]}
[0034] ------------------...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com