+

CN119893515A - Method and system for safely transmitting data between DH and NFCC - Google Patents

Method and system for safely transmitting data between DH and NFCC Download PDF

Info

Publication number
CN119893515A
CN119893515A CN202411852600.0A CN202411852600A CN119893515A CN 119893515 A CN119893515 A CN 119893515A CN 202411852600 A CN202411852600 A CN 202411852600A CN 119893515 A CN119893515 A CN 119893515A
Authority
CN
China
Prior art keywords
random number
nfcc
verification instruction
session
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411852600.0A
Other languages
Chinese (zh)
Inventor
杨传银
朱述波
朱恒毅
潘朝阳
王涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Rongka Technology Co ltd
Original Assignee
Wuxi Rongka Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Rongka Technology Co ltd filed Critical Wuxi Rongka Technology Co ltd
Priority to CN202411852600.0A priority Critical patent/CN119893515A/en
Publication of CN119893515A publication Critical patent/CN119893515A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种在DH和NFCC之间安全传输数据的方法及系统,方法包括:在DH和NFCC之间进行数据传输之前,NFCC初始化时,生成非对称密钥对;当NFC卡进场时,NFCC发送第一消息至DH;DH根据第一消息生成验证指令,并将其发送至NFCC;NFCC采用私钥解密验证指令,得到交互数据。本发明实施例可以确保密钥等交互数据在传输过程中的安全性和完整性。此外,在NFC卡交互完成后会删除会话密钥,确保不会被恶意获取或恢复。即,本发明实施例还提供了密钥销毁机制,可有效防止密钥被长期暴露或滥用。

The embodiment of the present invention discloses a method and system for securely transmitting data between DH and NFCC, the method comprising: before data is transmitted between DH and NFCC, when NFCC is initialized, an asymmetric key pair is generated; when an NFC card enters the field, NFCC sends a first message to DH; DH generates a verification instruction according to the first message and sends it to NFCC; NFCC uses a private key to decrypt the verification instruction to obtain interactive data. The embodiment of the present invention can ensure the security and integrity of interactive data such as keys during transmission. In addition, the session key will be deleted after the NFC card interaction is completed to ensure that it will not be maliciously acquired or restored. That is, the embodiment of the present invention also provides a key destruction mechanism, which can effectively prevent the key from being exposed or abused for a long time.

Description

Method and system for safely transmitting data between DH and NFCC
Technical Field
The invention relates to the technical field of data interaction, in particular to a method and a system for safely transmitting data between DH and NFCC.
Background
At present, more and more smart phones on the market are configured with NFC chips, and equipment capable of reading and writing NFC labels is commonly used in scenes such as entrance guard, payment and the like. NFC card is widely applied to various scenes requiring identity recognition and access control due to convenience, high efficiency, reliability and versatility. Therefore, it is very common to read and write NFC cards using mobile phones.
The flow of data interaction between DH and NFCC is shown in FIG. 1. Because the DH adopts an Android system, the DH is an open environment and is easy to attack by malicious software, data is transmitted in a plaintext form, and if the data is illegally acquired, the safety of the system is threatened.
Disclosure of Invention
The embodiment of the invention aims to provide a method and a system for safely transmitting data between DH and NFCC, which ensure the safety and the integrity of interactive data such as secret keys in the transmission process by adopting an encryption safety mechanism.
To achieve the above object, in a first aspect, an embodiment of the present invention provides a method for securely transmitting data between a DH and an NFCC, including:
Before data transmission is carried out between DH and NFCC, generating an asymmetric key pair when the NFCC is initialized, wherein the asymmetric key pair comprises a public key and a private key;
when the NFC card enters the field, the NFCC sends a first message to the DH;
The DH generates a verification instruction according to the first message and sends the verification instruction to the NFCC, wherein the verification instruction comprises encrypted interaction data;
and the NFCC decrypts the verification instruction by adopting a private key to obtain interaction data.
As a specific implementation of the present application, DH is provided with eSE;
upon initialization of the NFCC, the NFCC specifies that the eSE generate an asymmetric key pair and returns the public key of the asymmetric key pair.
As a specific implementation mode of the application, the first message comprises a notification message, a public key and a random number Rand1, and the DH generates a verification instruction according to the first message, specifically:
the DH receives the notification message and generates a random number Session according to the notification message;
DH adopts the said public key to encrypt the said random number Session;
DH adopts symmetric encryption algorithm and said random number Session to encrypt random number Rand1 and MIFARE card key;
And generating a verification instruction according to the encrypted random number Session, the random number Rand1 and the interaction data.
As a specific implementation manner of the present application, the NFCC decrypts the verification instruction by using a private key to obtain the interaction data, which specifically includes:
The NFCC directly uses or designates eSE to decrypt the verification instruction by using the private key to obtain random number Session;
Decrypting the verification instruction by adopting a random number Session to obtain a random number Rand2;
judging whether the random number Rand2 is the same as the random number Rand 1;
If the verification instruction is the same, decrypting the verification instruction by using a random number Session to obtain interaction data;
if not, an error is returned.
As a preferred implementation manner of the present application, after obtaining the interaction data, the method further includes:
When the NFC card interaction flow is completed or interrupted, the DH and the NFCC destroy the random number Session.
In a second aspect, the embodiment of the application further provides a system for securely transmitting data, which comprises DH and NFCC, wherein the NFCC is used for:
Before data transmission is carried out between DH and NFCC, generating an asymmetric key pair when the NFCC is initialized, wherein the asymmetric key pair comprises a public key and a private key;
When the NFC card enters the field, the NFCC sends a first message to the DH;
the DH adopts an android system for:
Generating a verification instruction according to the first message, and sending the verification instruction to the NFCC, wherein the verification instruction comprises encrypted interaction data;
The NFCC is also for:
and decrypting the verification instruction by adopting a private key to obtain interactive data.
As a specific implementation manner of the application, the first message comprises a notification message, a public key and a random number Rand1, and the DH is specifically used for:
Receiving the notification message, and generating a random number Session according to the notification message;
Encrypting the random number Session by adopting the public key;
Encrypting the random number Rand1 and interaction data by adopting an SM4 algorithm and the random number Session;
And generating a verification instruction according to the encrypted random number Session, the random number Rand1 and the interaction data.
As a specific implementation of the present application, the NFCC is specifically configured to:
decrypting the verification instruction by using the private key by using or designating eSE to obtain a random number Session;
Decrypting the verification instruction by adopting a random number Session to obtain a random number Rand2;
judging whether the random number Rand2 is the same as the random number Rand 1;
If the verification instruction is the same, decrypting the verification instruction by using a random number Session to obtain interaction data;
if not, an error is returned.
By implementing the embodiment of the invention, a pair of asymmetric keys is generated during the initialization of the NFCC, and a secure channel is established between the DH and the NFCC to generate a session key. When the interactive data is transmitted, the session key is used for encrypting the information. Therefore, even if the data are intercepted, the original data cannot be directly analyzed, and the safety and the integrity of the interactive data such as the secret key in the transmission process can be ensured.
In addition, the session key is deleted after the NFC card interaction is completed, so that malicious acquisition or recovery is avoided. Namely, the embodiment of the invention also provides a key destruction mechanism which can effectively prevent the key from being exposed or abused for a long time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a flow chart of data interaction between DH and NFCC in the prior art;
fig. 2 is a main flow chart of a method for securely transmitting data between a DH and an NFCC according to an embodiment of the present invention;
FIG. 3 is a first sub-flowchart of the main flowchart shown in FIG. 2;
Fig. 4 is a second sub-flowchart of the main flowchart shown in fig. 2.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The technical terms related to the embodiment of the application are described as follows:
NFC (NEAR FIELD Communication), near field Communication technology
NFCC (NEAR FIELD Communication Controller), short-range wireless communication controller, e.g.
NFC chip
DH (Device host), host, e.g. mobile phone terminal
ESE (embedded Secure Element), embedded security element
Referring to fig. 1, a main flow chart of a method for securely transmitting data between DH and NFCC according to an embodiment of the present invention mainly includes the following steps:
s1, before data transmission is carried out between DH and NFCC, generating an asymmetric key pair when the NFCC is initialized.
S2, when the NFC card enters the field, the NFCC sends a first message to the DH.
S3, the DH generates a verification instruction according to the first message and sends the verification instruction to the NFCC.
The verification instruction comprises encrypted interaction data, the first message comprises a notification message, a public key and a random number Rand1, and the DH generates the verification instruction according to the first message and specifically comprises the following steps:
the DH receives the notification message and generates a random number Session according to the notification message;
DH adopts the said public key to encrypt the said random number Session;
DH adopts SM4 algorithm and said random number Session to encrypt random number Rand1 and interactive data;
And generating a verification instruction according to the encrypted random number Session, the random number Rand1 and the interaction data.
S4, the NFCC decrypts the verification instruction by adopting a private key to obtain interaction data.
In specific implementation, step S4 includes:
The NFCC uses or appoints eSE to decrypt the verification instruction by using the private key to obtain a random number Session;
Decrypting the verification instruction by adopting a random number Session to obtain a random number Rand2;
judging whether the random number Rand2 is the same as the random number Rand 1;
If the verification instruction is the same, decrypting the verification instruction by using a random number Session to obtain interaction data;
if not, an error is returned.
S5, the NFCC and the NFC card interact.
And S6, when the NFC card interaction flow is completed or interrupted, the DH and the NFCC destroy the random number Session.
Two specific implementations are included in the main flow diagram, the first for a common DH and the second for a DH with an eSE. The following will describe each.
A first implementation is shown in fig. 3, comprising the steps of:
(1) The NFCC generates an asymmetric key pair upon initialization, the asymmetric key pair comprising a public key and a private key.
(2) When the NFC card enters the field, the NFCC sends the notification information to the DH along with the public KEY of the KEY and a random number Rand.
(3) The DH receives the notification, generates a random number Session, encrypts the Session using the public key and an asymmetric encryption algorithm, encrypts the MIFARE key and Rand using a symmetric encryption algorithm (e.g., SM4 algorithm) with the Session. And sending a verification instruction of the combination of the encrypted Session, rand and the interactive data key to the NFCC.
It should be noted that, since encryption and decryption efficiency of the symmetric algorithm is far higher than that of the asymmetric algorithm, in general, in terms of selection of the algorithm, people are used to preferentially select the symmetric algorithm DES, AES, SM, SM7, etc., and the signature/verification algorithm selects the asymmetric algorithm RSA, ECC, SM, SM9, etc., but may also be flexibly selected according to needs in some special practical application scenarios. In this embodiment, the DH end is considered to be an open unsafe environment, so an asymmetric algorithm is selected when encrypting Session, and the NFCC needs to generate an asymmetric key first.
(4) The NFCC uses the KEY private KEY to decrypt to obtain Session, then uses Session to decrypt to obtain Rand, judges whether the decrypted Rand is the same as the DH, uses Session to decrypt to obtain interactive data, and returns an error if the decrypted Rand is different from the Rand value transmitted to the DH.
(5) And finishing or interrupting the NFC card interaction flow, and destroying Session by DH and NFCC.
The second implementation is shown in fig. 4, and includes the following steps:
(1) Upon initialization of the NFCC, the designated eSE generates an asymmetric KEY pair KEY, which returns the public KEY.
(2) When the NFC card enters the field, the NFCC sends the notification information to the DH along with the public KEY of the KEY and a random number Rand.
(3) The DH receives the notice, generates a random number Session, encrypts the Session by using the public key and an asymmetric encryption algorithm, encrypts the interactive data and Rand by using a symmetric encryption algorithm (e.g., SM4 algorithm). And sending a verification instruction of the combination of the encrypted Session, rand and the interactive data to the NFCC.
(4) The NFCC appoints that the eSE uses the private KEY of the KEY to decrypt to obtain the Session, then uses the Session to decrypt to obtain the Rand, judges whether the decrypted Rand is the same as the DH, otherwise returns an error. And finally, decrypting by using Session to obtain interactive data.
(5) And finishing or interrupting the NFC card interaction flow, and destroying Session by DH and NFCC.
In the second implementation, the security may be further improved by performing the asymmetric key pair operation using the eSE.
By implementing the embodiment of the invention, a pair of asymmetric keys is generated during the initialization of the NFCC, and a secure channel is established between the DH and the NFCC to generate a session key. When the interactive data is transmitted, the session key is used for encrypting the information. Therefore, even if the data are intercepted, the original data cannot be directly analyzed, and the safety and the integrity of the interactive data such as the secret key in the transmission process can be ensured.
In addition, the session key is deleted after the NFC card interaction is completed, so that malicious acquisition or recovery is avoided. Namely, the embodiment of the invention also provides a key destruction mechanism which can effectively prevent the key from being exposed or abused for a long time.
Based on the same inventive concept, the embodiment of the invention also provides a system for safely transmitting data, which comprises DH and NFCC, wherein the NFCC is used for:
Before data transmission is carried out between DH and NFCC, generating an asymmetric key pair when the NFCC is initialized, wherein the asymmetric key pair comprises a public key and a private key;
When the NFC card enters the field, the NFCC sends a first message to the DH;
the DH adopts an android system for:
Generating a verification instruction according to the first message, and sending the verification instruction to the NFCC, wherein the verification instruction comprises encrypted interaction data;
The NFCC is also for:
and decrypting the verification instruction by adopting a private key to obtain interactive data.
Further, the first message includes a notification message, a public key, and a random number Rand1, where the DH is specifically configured to:
Receiving the notification message, and generating a random number Session according to the notification message;
Encrypting the random number Session by adopting the public key;
Encrypting the random number Rand1 and interaction data by adopting an SM4 algorithm and the random number Session;
And generating a verification instruction according to the encrypted random number Session, the random number Rand1 and the interaction data.
Further, the NFCC is specifically configured to:
decrypting the verification instruction by using the private key by using or designating eSE to obtain a random number Session;
Decrypting the verification instruction by adopting a random number Session to obtain a random number Rand2;
judging whether the random number Rand2 is the same as the random number Rand 1;
If the verification instruction is the same, decrypting the verification instruction by using a random number Session to obtain interaction data;
if not, an error is returned.
It should be noted that, please refer to the foregoing method embodiment, and the detailed description is omitted herein.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1.一种在DH和NFCC之间安全传输数据的方法,其特征在于,包括:1. A method for securely transmitting data between a DH and an NFCC, comprising: 在DH和NFCC之间进行数据传输之前,NFCC初始化时,生成非对称密钥对;所述非对称密钥对包括公钥和私钥;Before data is transmitted between DH and NFCC, an asymmetric key pair is generated when NFCC is initialized; the asymmetric key pair includes a public key and a private key; 当NFC卡进场时,NFCC发送第一消息至DH;该DH采用安卓系统;When the NFC card enters the venue, the NFCC sends a first message to the DH; the DH uses the Android system; DH根据所述第一消息生成验证指令,并将所述验证指令发送至NFCC;所述验证指令包括加密后的交互数据;The DH generates a verification instruction according to the first message, and sends the verification instruction to the NFCC; the verification instruction includes the encrypted interaction data; NFCC采用私钥对所述验证指令进行解密,得到交互数据。The NFCC uses a private key to decrypt the verification instruction to obtain the interaction data. 2.如权利要求1所述的安全传输数据的方法,其特征在于,DH具备eSE;2. The method for securely transmitting data according to claim 1, wherein the DH has an eSE; NFCC初始化时,NFCC指定eSE生成非对称密钥对,并将所述非对称密钥对的公钥返回。When the NFCC is initialized, the NFCC specifies the eSE to generate an asymmetric key pair and returns the public key of the asymmetric key pair. 3.如权利要求1或2所述的安全传输数据的方法,其特征在于,所述第一消息包括通知消息、公钥及随机数Rand1;DH根据所述第一消息生成验证指令,具体为:3. The method for securely transmitting data according to claim 1 or 2, wherein the first message includes a notification message, a public key and a random number Rand1; and DH generates a verification instruction according to the first message, specifically: DH收到所述通知消息,根据所述通知消息生成随机数Session;DH receives the notification message and generates a random number Session according to the notification message; DH采用所述公钥加密所述随机数Session;DH uses the public key to encrypt the random number Session; DH采用对称加密算法和所述随机数Session加密随机数Rand1和交互数据;DH uses a symmetric encryption algorithm and the random number Session to encrypt the random number Rand1 and the interaction data; 根据加密后的所述随机数Session、随机数Rand1和交互数据生成验证指令。A verification instruction is generated according to the encrypted random number Session, random number Rand1 and interaction data. 4.如权利要求3所述的安全传输数据的方法,其特征在于,NFCC采用私钥对所述验证指令进行解密,得到交互数据,具体为:4. The method for securely transmitting data according to claim 3, wherein the NFCC uses a private key to decrypt the verification instruction to obtain the interaction data, specifically: NFCC使用所述私钥对所述验证指令进行解密,得到随机数Session;The NFCC uses the private key to decrypt the verification instruction to obtain a random number Session; 采用随机数Session对所述验证指令进行解密,得到随机数Rand2;Decrypt the verification instruction using the random number Session to obtain a random number Rand2; 判断随机数Rand2与随机数Rand1是否相同;Determine whether the random number Rand2 is the same as the random number Rand1; 若相同,则使用随机数Session对所述验证指令进行解密,得到交互数据;If they are the same, the verification instruction is decrypted using the random number Session to obtain the interaction data; 若不同,则返回错误。If different, an error is returned. 5.如权利要求3所述的安全传输数据的方法,其特征在于,NFCC采用私钥对所述验证指令进行解密,得到交互数据,具体为:5. The method for securely transmitting data according to claim 3, wherein the NFCC uses a private key to decrypt the verification instruction to obtain the interaction data, specifically: NFCC指定eSE使用所述私钥对所述验证指令进行解密,得到随机数Session;The NFCC specifies the eSE to use the private key to decrypt the verification instruction to obtain a random number Session; 采用随机数Session对所述验证指令进行解密,得到随机数Rand2;Decrypt the verification instruction using the random number Session to obtain a random number Rand2; 判断随机数Rand2与随机数Rand1是否相同;Determine whether the random number Rand2 is the same as the random number Rand1; 若相同,则使用随机数Session对所述验证指令进行解密,得到交互数据;If they are the same, the verification instruction is decrypted using the random number Session to obtain the interaction data; 若不同,则返回错误。If different, an error is returned. 6.如权利要求3所述的安全传输数据的方法,其特征在于,得到交互数据之后,所述方法还包括:6. The method for securely transmitting data according to claim 3, characterized in that after obtaining the interactive data, the method further comprises: 当NFC卡交互流程完成或中断,DH和NFCC销毁随机数Session。When the NFC card interaction process is completed or interrupted, DH and NFCC destroy the random number Session. 7.一种安全传输数据的系统,包括DH和NFCC,其特征在于,NFCC用于:7. A system for securely transmitting data, comprising DH and NFCC, wherein the NFCC is used to: 在DH和NFCC之间进行数据传输之前,NFCC初始化时,生成非对称密钥对;所述非对称密钥对包括公钥和私钥;Before data is transmitted between DH and NFCC, an asymmetric key pair is generated when NFCC is initialized; the asymmetric key pair includes a public key and a private key; 当NFC卡进场时,NFCC发送第一消息至DH;When the NFC card enters the venue, the NFCC sends the first message to the DH; 该DH采用安卓系统,用于:The DH uses the Android system and is used for: 根据所述第一消息生成验证指令,并将所述验证指令发送至NFCC;所述验证指令包括加密后的交互数据;generating a verification instruction according to the first message, and sending the verification instruction to the NFCC; the verification instruction includes the encrypted interaction data; 该NFCC还用于:The NFCC is also used to: 采用私钥对所述验证指令进行解密,得到交互数据。The verification instruction is decrypted using a private key to obtain interactive data. 8.如权利要求7所述的安全传输数据的系统,其特征在于,所述第一消息包括通知消息、公钥及随机数Rand1;该DH具体用于:8. The system for securely transmitting data according to claim 7, wherein the first message includes a notification message, a public key and a random number Rand1; and the DH is specifically used for: 收到所述通知消息,根据所述通知消息生成随机数Session;Upon receiving the notification message, a random number Session is generated according to the notification message; 采用所述公钥加密所述随机数Session;Encrypt the random number Session using the public key; 采用对称加密算法和所述随机数Session加密随机数Rand1和交互数据;The random number Rand1 and the interaction data are encrypted using a symmetric encryption algorithm and the random number Session; 根据加密后的所述随机数Session、随机数Rand1和交互数据生成验证指令。A verification instruction is generated according to the encrypted random number Session, random number Rand1 and interaction data. 9.如权利要求7或8所述的安全传输数据的系统,其特征在于,该NFCC具体用于:9. The system for securely transmitting data according to claim 7 or 8, wherein the NFCC is specifically used for: 使用或指定eSE使用所述私钥对所述验证指令进行解密,得到随机数Session;Use or designate eSE to use the private key to decrypt the verification instruction to obtain a random number Session; 采用随机数Session对所述验证指令进行解密,得到随机数Rand2;Decrypt the verification instruction using the random number Session to obtain a random number Rand2; 判断随机数Rand2与随机数Rand1是否相同;Determine whether the random number Rand2 is the same as the random number Rand1; 若相同,则使用随机数Session对所述验证指令进行解密,得到交互数据;If they are the same, the verification instruction is decrypted using the random number Session to obtain the interaction data; 若不同,则返回错误。If different, an error is returned. 10.如权利要求7所述的安全传输数据的系统,其特征在于,当流程完成或中断,DH和NFCC销毁随机数Session。10. The system for securely transmitting data as claimed in claim 7, wherein when the process is completed or interrupted, DH and NFCC destroy the random number Session.
CN202411852600.0A 2024-12-16 2024-12-16 Method and system for safely transmitting data between DH and NFCC Pending CN119893515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411852600.0A CN119893515A (en) 2024-12-16 2024-12-16 Method and system for safely transmitting data between DH and NFCC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411852600.0A CN119893515A (en) 2024-12-16 2024-12-16 Method and system for safely transmitting data between DH and NFCC

Publications (1)

Publication Number Publication Date
CN119893515A true CN119893515A (en) 2025-04-25

Family

ID=95435625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411852600.0A Pending CN119893515A (en) 2024-12-16 2024-12-16 Method and system for safely transmitting data between DH and NFCC

Country Status (1)

Country Link
CN (1) CN119893515A (en)

Similar Documents

Publication Publication Date Title
US10595201B2 (en) Secure short message service (SMS) communications
US10909531B2 (en) Security for mobile applications
CN110868291B (en) Data encryption transmission method, device, system and storage medium
US7353393B2 (en) Authentication receipt
JP2007013433A (en) Method and information processing system for transmitting / receiving encrypted data
US8667282B2 (en) Information processing device, computer program, and information processing system
US12205103B2 (en) Contactless card with multiple rotating security keys
CN111401901A (en) Authentication method and device of biological payment device, computer device and storage medium
JP2022502881A (en) Systems and methods for notifying potential attacks on non-contact cards
US20250053979A1 (en) Systems and methods for enhanced security to log in to a mobile application
CN111709747B (en) Intelligent terminal authentication method and system
US9876774B2 (en) Communication security system and method
JP2007288254A (en) Communication system, communication apparatus and method, and program
US10218500B2 (en) Authentication of a card by contactless reading
WO2024186977A2 (en) Systems and methods for secure authentication of contactless card
CN119893515A (en) Method and system for safely transmitting data between DH and NFCC
CN115361140A (en) Method and device for verifying security chip key
CN115280313A (en) System and method for white-box device binding
JP2004320229A (en) Mutual authentication method
CN116994364B (en) Entrance guard card-free data loading interaction method
TWI828558B (en) Message transmitting system, user device and hardware security module for use therein
JP4289552B2 (en) How to prevent leakage of confidential data
JP2010141639A (en) Communication system and communication method
TW465213B (en) Method for performing encryption and decryption via computer and IC card
HK40055820A (en) Contactless card with multiple rotating security keys

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载