Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection method for NFC (Near Field Communication) tag

A data protection and signature data technology, applied in the field of data processing, can solve problems such as data leakage, and achieve the effect of solving the risk of leakage

Active Publication Date: 2022-05-13
芯电智联(北京)科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing NFC tag implementation schemes often use plaintext storage to manage data in the user data storage area, which will undoubtedly bring a certain risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method for NFC (Near Field Communication) tag
  • Data protection method for NFC (Near Field Communication) tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] figure 1 A schematic diagram of a data protection method for an NFC tag provided in Embodiment 1 of the present invention, such as figure 1 As shown, the method mainly includes the following steps:

[0041] Step 1, preset the corresponding encryption and decryption algorithm types in the key storage area as the first and second transmission keys of the first and second algorithm types, and preset the unique corresponding to each NF...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a data protection method for an NFC (Near Field Communication) tag. The method comprises the following steps: presetting a first transmission key, a second transmission key and first signature data; identifying an instruction code of the received instruction; when the instruction code is a data key loading instruction, first date data and a first key plaintext are extracted; generating a first date type; selecting a current transmission key from the first transmission key and the second transmission key according to the first date type; dispersing the first key plaintext according to the current transmission key and the first signature data to generate a first key ciphertext and a second key ciphertext; storing the data key group; when the instruction code is a data writing instruction, extracting a first data plaintext; performing data encryption storage on the first data plaintext according to the data key group; when the instruction code is a data reading instruction, obtaining a second data ciphertext; and performing plaintext analysis on the second data ciphertext according to the data key group to generate and return a second data plaintext. Through the method, the risk of user data leakage caused by a plaintext storage mode can be avoided.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data protection method of an NFC tag. Background technique [0002] In the tobacco industry, the application of NFC tags based on the principle of Near Field Communication (NFC) to anti-counterfeit traceability of cigarette cartons can increase the difficulty of imitation of counterfeit goods. However, in existing NFC tag implementation schemes, plaintext storage is often used to manage data in the user data storage area, which will undoubtedly bring a certain risk of data leakage. Contents of the invention [0003] The purpose of the present invention is to provide a data protection method for NFC tags, electronic equipment and computer-readable storage media for the defects of the prior art, using a protection key pair based on the Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm The data in the user data storage area is protected by ciphe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06K7/10G06K19/073H04L9/06
CPCG06F21/602G06F21/62G06F21/64G06K7/10G06K7/10257G06K19/07309H04L9/0631H04L9/0618
Inventor 季有为李晓飞
Owner 芯电智联(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products