CN108322902A - A kind of data transmission method and data transmission system - Google Patents
A kind of data transmission method and data transmission system Download PDFInfo
- Publication number
- CN108322902A CN108322902A CN201810107632.6A CN201810107632A CN108322902A CN 108322902 A CN108322902 A CN 108322902A CN 201810107632 A CN201810107632 A CN 201810107632A CN 108322902 A CN108322902 A CN 108322902A
- Authority
- CN
- China
- Prior art keywords
- read
- write equipment
- user terminal
- data transmission
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/28—Pre-payment schemes, e.g. "pay before"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/349—Rechargeable cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/77—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
A kind of data transmission method of offer of the embodiment of the present invention and data transmission system, wherein data transmission method include:User terminal scans the identity module of the read-write equipment, obtains the identity information of the read-write equipment;Whether the user terminal verifies the identity information consistent with the original identity information of the read-write equipment;If the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment;The user terminal carries out legitimacy inspection to the read-write equipment;If read-write equipment is legal, the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.The embodiment of the present invention scans the identity module of read-write equipment by user terminal and read-write equipment establishes communication connection, and carries out data transmission after being examined to read-write equipment legitimacy, to realize the unique and safe and reliable data transmission of connecting object.
Description
Technical field
The invention belongs to the communications field, more particularly to a kind of data transmission method and data transmission system.
Background technology
Bluetooth is the home control network communication protocol of a standard, the transponder chip based on devices with low cost, and transmission range is close, low
Power consumption.The short-range data that can be achieved between fixed equipment, mobile device and building personal area network exchanges.Because of his low work(
The features such as consuming, is free, the application field in life is very wide, very common, is the first choice of short-range communication, such as:Between mobile device
Card reader etc. is supplemented with money using Bluetooth transmission file, Baffle Box of Bluetooth, bluetooth headset, personal bluetooth, the use environment of these bluetooths
That all compares is simple, and majority is aspectant exchange or looks at specification, determines the equipment that equipment is safe, the company of active
Connect, etc. the confirmation of another party.
There are following technical problems for the bluetooth equipment of market at present:
1. connection mode problem.Connection mode is that one end actively connects, and waits for the confirmation of the other end to match, this connection side
The drawbacks of formula is:Both sides will have the equipment of screen just can be with.
2. matching method problem.Matching method is to automatically confirm that pairing, such case are:First, on security level it is low very
It is more, it is not known which platform of the equipment of connection is easy to after connection by the virus infection of criminal's equipment;Secondly at present on the market
Many bluetooth equipments cannot be matched directly, and system equipment cannot be matched directly, for the bluetooth equipment of the other end, such as
Fruit does not have screen just can not click the operation of pairing again, and significant limitation is just received in the use of application.
3. connecting object problem.The prior art generally use bluetooth connection or NFC connections, existing bluetooth BLE using
Broadcast mode realizes connection and is connected that the search between bluetooth could be connected using pairing check.Specifically, existing
The bluetooth module built in equipment is supplemented in public transport with money, and the Bluetooth signal for needing searching handset end to send out simultaneously manually selects pairing, if N platforms
Bluetooth and N platforms in mobile phone are supplemented with money in the case that the bluetooth in equipment nearby works at the same time, and can there are problems that following three:The
One, as shown in Figure 1, when the bluetooth that the bluetooth supplemented with money in equipment when one corresponds in more mobile phones simultaneously scans for, easy to produce not
Know that the Bluetooth Priority of which platform mobile phone is connected to the problem of supplementing equipment bluetooth with money;Second, as shown in Fig. 2, supplementing equipment with money when more
In bluetooth correspond to the bluetooth in a mobile phone when simultaneously scanning for, the bluetooth for easy ting produce mobile phone does not know which, which is connected to, supplements with money
The problem of equipment bluetooth;Third, as shown in figure 3, when the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones simultaneously
When search, easy tos produce and do not know which platform mobile phone is connected to the problem of which supplements equipment bluetooth with money.
Therefore, there is an urgent need to find a kind of stability and uniqueness that can either ensure multiple equipment connection, and can safety
Reliable data transfer mode.
Invention content
The purpose of the present invention is ensure the uniqueness and certainty of multiple equipment connection;The connection of bluetooth read-write equipment is provided
Security level, it is ensured that the specified equipment safety of Bluetooth communication connection is reliable, and connection equipment is avoided security risk occur.Therefore this hair
It is bright to provide a kind of data transmission method and data transmission system.
To solve the above problems, the first aspect of the present invention provides a kind of data transmission method, including:User terminal is swept
The identity module for retouching the read-write equipment obtains the identity information of the read-write equipment;Described in the user terminal verification
Whether identity information is consistent with the original identity information of the read-write equipment;If the two is consistent, the user terminal with it is described
Read-write equipment establishes one-to-one communication connection;The user terminal carries out legitimacy inspection to the read-write equipment;If read-write
Equipment is legal, and the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.
Further, before the identity module that user terminal scans the read-write equipment, further include:Read-write equipment
It generates the original identity information of the read-write equipment and is sent to the identity module of the read-write equipment.
Further, the identity module includes the identification code of the identity information, and being set as can be by the use
Family terminal is read.
Further, the identity information includes:The ID of the read-write equipment and MAC corresponding with the read-write equipment ID
Address.
Further, the original identity information includes:The ID of the read-write equipment and the read-write equipment ID are corresponding
Original MAC address.
Further, wherein the read-write equipment verifies the step of identity information and includes:The user terminal is by institute
The ID for stating read-write equipment is sent to server;The server is index with the ID of the read-write equipment, in the server
Original MAC address corresponding with the read-write equipment ID is searched in memory module;The MAC read described in the server judgement
Whether address is consistent with the original MAC address;If the MAC Address read is consistent with the original MAC address, institute
It states server and verifies consistent message to user terminal transmission identity information.
Further, wherein the step of user terminal establishes one-to-one communication connection with the read-write equipment is wrapped
It includes:User terminal opens user terminal communication module, and the broadcast for sending search read-write equipment corresponding with the MAC Address is asked
It asks;The user terminal searches read-write equipment corresponding with the MAC Address;The user terminal communication module and the reading
Write device communication module automatic matching connects.
Further, wherein the user terminal to the read-write equipment carry out legitimacy inspection the step of include:It is described
User terminal sends legitimacy to the read-write equipment and examines request;The read-write equipment generates random number, and will be described random
Number and the MAC Address are sent to the user terminal;The random number and the MAC Address are sent to by the user terminal
The server;The server encrypts the random number and the MAC Address, generates the first ciphertext;The server will
First ciphertext is sent to the user terminal, and first ciphertext is sent to the read-write equipment by the user terminal;
The read-write equipment encrypts the random number and the MAC Address, generates the second ciphertext;The read-write equipment is by described first
Ciphertext and the second ciphertext are compared;If first ciphertext is consistent with second ciphertext, the read-write equipment releases data
Transmission controls and carries out data transmission with the user terminal.
According to another aspect of the present invention, a kind of data transmission system is provided, which includes:User
Terminal, the server and read-write equipment being connect with the user terminal.
Further, user terminal includes:Read module, the identity information for reading the read-write equipment;Identity is believed
Checking request module is ceased, is separately connected with the read module and the server, is tested for sending identity information to server
Card request, and after the server receives the identity information checking request identity information is sent to the server;
User terminal communication module, the identity information of the read-write equipment for being read based on the read module and described and read-write
Equipment establishes communication connection;Legitimacy examines request module, and request is examined for sending legitimacy to the read-write equipment.
Further, read-write equipment includes:Read-write equipment communication module, for realizing the read-write equipment and the user
The communications and data of terminal transmits;Identity module, it includes the identity information of the read-write equipment, being set as can be by institute
State user terminal reading;The identity information includes:The ID of the read-write equipment and MAC corresponding with the read-write equipment ID
Location;Read-write equipment random number generation module, it is raw after examining request in the legitimacy for receiving the subscriber terminal equipment transmission
It is sent to the user terminal and the read-write equipment encrypting module at random number and by the random number and the MAC Address;
Read-write equipment encrypting module generates the second ciphertext for being encrypted to the random number and the MAC Address;Data Transmission Controlling
Module, for first ciphertext and the second ciphertext to be compared;If consistent, release Data Transmission Controlling and with the user
Terminal carries out data transmission.
Further, server includes:Server authentication module, the identity for being sent based on the user terminal
Whether identity information described in Information Authentication is consistent with the original identity information of the read-write equipment;Server for encrypting module, is used for
The random number and the MAC Address are encrypted, the first ciphertext is generated;Memory module, the identity information for storing user.
The identity module that the embodiment of the present invention scans read-write equipment by user terminal is communicated with read-write equipment foundation
Connection, and carried out data transmission by legitimacy inspection, to realize the unique and safe and reliable data transmission of connecting object.
The above-mentioned technical proposal of the present invention has following beneficial technique effect:
1. the uniqueness and certainty of multiple equipment connection can be determined;
2. improving the security level that read-write equipment is connect with user terminal communication, it is ensured that communicate to connect specified equipment safety
Reliably.
Description of the drawings
Fig. 1 is the structural schematic diagram that a bluetooth supplemented with money in equipment corresponds to the bluetooth in more mobile phones in the prior art;
Fig. 2 is the structural schematic diagram for the bluetooth that the more bluetooths supplemented with money in equipment correspond in a mobile phone;
Fig. 3 is the structural schematic diagram that the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones;
Fig. 4 is a kind of flow diagram of data transmission method provided by the invention;
Fig. 5 is the flow diagram that identity information step is verified in a kind of data transmission method provided by the invention;
Fig. 6 is that user terminal establishes communication connection step with read-write equipment in a kind of data transmission method provided by the invention
Flow diagram;
Fig. 7 is that user terminal carries out legitimacy inspection step to read-write equipment in a kind of data transmission method provided by the invention
Rapid flow diagram;
Fig. 8 is a kind of structural schematic diagram of data transmission system provided by the invention.
Specific implementation mode
In order to make the objectives, technical solutions and advantages of the present invention clearer, With reference to embodiment and join
According to attached drawing, the present invention is described in more detail.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this hair
Bright range.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid this is unnecessarily obscured
The concept of invention.
Stored value card in the prior art supplements equipment with money, and generally using bluetooth connection or NFC, (near radio is logical with user terminal
News technology) connection.Existing bluetooth BLE (bluetooth low energy consumption technologies) is realized connection using broadcast mode and is connected, blue
Search between tooth could be connected using pairing check.It illustrates specifically, when user terminal is generally mobile phone, existing Stored Value
Card supplements the bluetooth built in equipment with money, and the Bluetooth signal for needing searching handset end to send out simultaneously manually selects pairing, if in N platform mobile phones
Bluetooth and N platforms supplement with money in the case that the bluetooth in equipment nearby works at the same time, can there are problems that following three.
Referring to Fig. 1, Fig. 1 is the knot that a bluetooth supplemented with money in equipment corresponds to the bluetooth in more mobile phones in the prior art
Structure schematic diagram.
As shown in Figure 1, when the bluetooth that the bluetooth supplemented with money in equipment when one corresponds in more mobile phones simultaneously scans for, it is easy production
Life does not know that the Bluetooth Priority of which platform mobile phone is connected to the problem of supplementing equipment bluetooth with money.
Referring to Fig. 2, Fig. 2 is the structural schematic diagram for the bluetooth that the more bluetooths supplemented with money in equipment correspond in a mobile phone.
As shown in Fig. 2, when the bluetooth in the more bluetooths supplemented with money in equipment one mobile phone of correspondence simultaneously scans for, it is easy production
The bluetooth of green hand's machine, which is not known, is connected to the problem of which supplements equipment bluetooth with money.
Referring to Fig. 3, Fig. 3 is the structural schematic diagram that the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones.
As shown in figure 3, when the bluetooth that the bluetooth supplemented with money in equipment when more corresponds in more mobile phones simultaneously scans for, it is easy production
Life does not know which platform mobile phone is connected to the problem of which supplements equipment bluetooth with money.
To solve the above problems, the present invention provides a kind of data transmission method and data transmission system, the present invention is implemented
Example scans the identity module of read-write equipment by user terminal and read-write equipment establishes communication connection, and is examined by legitimacy
It tests and carries out data transmission, to realize the unique and safe and reliable data transmission of connecting object.
Referring to Fig. 4, Fig. 4 is a kind of flow diagram of data transmission method provided by the invention.
As shown in figure 4, the data transmission method includes:
S100, user terminal scan the identity module of the read-write equipment, obtain the identity letter of the read-write equipment
Breath.
As a preferred embodiment, user terminal can be mobile phone, tablet computer etc..
Wherein, the identity module includes the identification code of the identity information, and being set as can be by user end
It reads at end.
As a preferred embodiment, user terminal is mobile phone, identification code is Quick Response Code, and Quick Response Code is set to read-write
On the shell of equipment.User uses mobile phone, opens in mobile phone and supplements the application programs such as APP or small routine with money, unlatching scans the two-dimensional code
Function, the Quick Response Code of read-write equipment is scanned, the identity information of read-write equipment is obtained.
The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
Specifically, user terminal is to read-write equipment two-dimensional code scanning and after obtaining identity information, to the identity information
It is parsed, is obtained after parsing:The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID.
As a preferred embodiment, the MAC Address is string number, indicated using hexadecimal number, totally six
A byte (48).MAC Address is corresponded with ID number, each read-write equipment has unique ID number and corresponding MAC
Address.
S101, the user terminal verify the identity information whether the original identity information one with the read-write equipment
It causes.
Wherein, the original identity information includes:The ID of the read-write equipment and the read-write equipment ID are corresponding original
MAC Address.
Wherein, before the identity module that user terminal scans the read-write equipment, further include:
S001, read-write equipment generate the original identity information of the read-write equipment and are sent to the identity mark of the read-write equipment
Know module.
Specifically, in manufacture, read-write equipment can generate corresponding with ID original read-write equipment according to the ID of read-write equipment
MAC Address, read-write equipment can be stored in read-write equipment ID is corresponding with original MAC address in the memory module of server,
Original identity information as read-write equipment.
After storage, the original identity information is sent to the identity module of read-write equipment by read-write equipment again.
As a preferred embodiment, referring to Fig. 5, Fig. 5 is in a kind of data transmission method provided by the invention
The flow diagram for verifying identity information step, in step S101 user terminal verify the identity information whether with the read-write
The original identity information of equipment it is consistent the specific steps are:
The ID of the read-write equipment is sent to server by S200, the user terminal.
Specifically, can be user terminal here to read-write equipment two-dimensional code scanning and after obtaining identity information, to institute
It states identity information to be parsed, be obtained after parsing:The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID are used
The ID of read-write equipment is sent to server by family terminal again.
As another embodiment, user terminal, can to read-write equipment two-dimensional code scanning and after obtaining identity information
Not parse, identity information is directly sent to server, server parses the identity information, obtained after parsing
The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID.
S201, the server are index with the ID of the read-write equipment, are searched in the memory module of the server
Original MAC address corresponding with the read-write equipment ID.
Wherein, according to step S001 it is found that read-write equipment has original identity in server storage in advance in manufacture
Information, original identity information include the ID of read-write equipment and corresponding original MAC address.In S201 steps, Ke Yitong
ID is crossed to find.
S202, the server judge described in the MAC Address that reads and the original MAC address it is whether consistent.
Specifically, by the original MAC found in MAC Address and server that user terminal in step S100 is read
Location is compared.
S203, if the MAC Address read is consistent with the original MAC address, the server is to the use
Family terminal sends identity information and verifies consistent message.
Specifically, if the two is consistent, illustrate that the MAC Address that user terminal is read is true, server is sent out to user terminal
Identity information is sent to verify consistent message.
Opposite, if the two is inconsistent, illustrate that the MAC Address that user terminal is read is false, server is whole to user
End sends identity information and verifies inconsistent message, and subsequent user terminal and read-write equipment is prevented to establish communication connection.This says
The identity module on bright very possible user terminal surface, i.e. Quick Response Code are that criminal oneself forges, user when manufacture
The true Quick Response Code of terminal end surface probably " has been stolen the beams and changed the pillars " by criminal.
It is to parse Quick Response Code above, is to index in whois lookup original MAC address, and will read with read-write equipment ID
To the embodiment that compares of MAC Address and original MAC address.It in another embodiment, can also by original MAC
Location is written with Quick Response Code rule in application APP or the small routine of user terminal in advance, and read-write equipment is read in user terminal
Quick Response Code and after parsing MAC Address, the APP or small routine of user terminal automatically extract original MAC address and compare with it,
Which offers a saving the steps interacted with server.
S102, if the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment.
Wherein, referring to Fig. 6, Fig. 6 is user terminal and read-write equipment in a kind of data transmission method provided by the invention
The flow diagram of communication connection step is established, S102 is specifically included:
S300, user terminal open user terminal communication module, send and search for read-write equipment corresponding with the MAC Address
Broadcast request.
Specifically, user terminal communication module can be bluetooth module, when above-mentioned steps user terminal verifies the identity letter
After breath is consistent with original identity information, the bluetooth module of user terminal is opened, and is in broadcast mode, and send search for it is described
The broadcast request of the corresponding read-write equipment of MAC Address.
S301, the user terminal search read-write equipment corresponding with the MAC Address.
Specifically, if in user terminal bluetooth discovery range of signal, read-write corresponding with the MAC Address sets
Standby and read-write equipment also opens bluetooth module, then user terminal can search.
S302, the user terminal communication module are connect with the read-write equipment communication module automatic matching.
Specifically, user terminal bluetooth module and read-write equipment bluetooth module establish one-to-one connection, but at this time two
Person only establishes preliminary communication connection, can not carry out data transmission and data interaction, i.e., user terminal and read-write equipment it
Between communication be actually locked out, need further legitimacy checking procedure to carry out communication lock releasing.
S103, the user terminal carry out legitimacy inspection to the read-write equipment.
Wherein, referring to Fig. 7, Fig. 7 be in a kind of data transmission method provided by the invention user terminal to read-write equipment
The flow diagram of legitimacy checking procedure is carried out, S103 is specifically included:
S400, the user terminal send legitimacy to the read-write equipment and examine request.
Specifically, user terminal can send out request by application APP or small routine.
S401, the read-write equipment generates random number, and the random number and the MAC Address are sent to the user
Terminal.
Wherein, MAC Address here is the legal MAC Address that had verified that in above-mentioned steps, is unique MAC
Location is the MAC Address with original MAC address.
The random number and the MAC Address are sent to the server by S402, the user terminal.
S403, the server encrypt the random number and the MAC Address, generate the first ciphertext.
First ciphertext is sent to the user terminal by S404, the server, and the user terminal is by described
One ciphertext is sent to the read-write equipment.
Wherein, user terminal plays the role of transmitting the first ciphertext here, and server and read-write equipment are together in series.
S405, the read-write equipment encrypt the random number and the MAC Address, generate the second ciphertext.
Wherein, for random number here with the random number in S401, MAC Address is unique, and the same.
First ciphertext and the second ciphertext are compared for S406, the read-write equipment.
As another embodiment, the second ciphertext can be sent to the user terminal by read-write equipment, and user terminal again will
Second ciphertext is sent to server, and process is compared in the first ciphertext and the second ciphertext by server.
S407, if first ciphertext is consistent with second ciphertext, the read-write equipment releases Data Transmission Controlling simultaneously
Carry out data transmission with the user terminal.
Algorithm and server constant in random number and MAC Address if read-write equipment is legal, that read-write equipment uses
Algorithm it is consistent under the premise of, read-write equipment generate ciphertext should with server generate ciphertext it is consistent, i.e. the first ciphertext with
Second ciphertext is consistent.
If read-write equipment is illegal, the inevitable algorithm with server for encrypting of the encrypted algorithm of illegal read-write equipment
It is inconsistent, then the second ciphertext generated will not be consistent with the first ciphertext.
S104, if user terminal is legal, the read-write equipment releases Data Transmission Controlling and is carried out with the user terminal
Data transmission.
At this point, read-write equipment all have passed through with MAC Address (or can be described as the Quick Response Code on read-write equipment surface) it is legal
Property verification, user terminal can carry out normal data transmission with read-write equipment.
As an implementation, read-write equipment legitimacy, which is examined, can not also use above-mentioned cipher mode, but adopt
With public, private key encrypting and decrypting, specifically:Read-write equipment generates the first random number, and read-write equipment uses the first random number of public key pair
It is encrypted with MAC Address, server is decrypted using private key;Server generates second random number again, and server makes
It is encrypted with the second random number of public key pair and MAC Address, read-write equipment is decrypted using private key.
Referring to Fig. 8, Fig. 8 is a kind of structural schematic diagram of data transmission system provided by the invention.
As shown in figure 8, the present invention also provides a kind of data transmission systems, including:User terminal 50 and the user are whole
Hold the server 60 and read-write equipment 70 of connection.
Wherein, user terminal 50 includes:
Read module 501, the identity information for reading the read-write equipment.
Identity information checking request module 502, is separately connected with the read module and the server, is used for service
Device sends identity information checking request, and is sent out to the server after the server receives the identity information checking request
Send the identity information.
User terminal communication module 503, the identity information of the read-write equipment for being read based on the read module
It is communicated to connect with described established with read-write equipment.
Legitimacy examines request module 504, and request is examined for sending legitimacy to the read-write equipment.
Wherein, read-write equipment 70 includes:
Read-write equipment communication module 701 passes for realizing the communications and data of the read-write equipment and the user terminal
It is defeated.
Identity module 702, it includes the identity information of the read-write equipment, being set as can be by the user terminal
It reads.The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
Read-write equipment random number generation module 703, for being examined in the legitimacy for receiving the subscriber terminal equipment transmission
After request, generates random number and the random number and the MAC Address are sent to the user terminal and the read-write equipment
Encrypting module.
Read-write equipment encrypting module 704 generates the second ciphertext for being encrypted to the random number and the MAC Address.
Data transmission control module 705, for first ciphertext and the second ciphertext to be compared;If consistent, release
Data Transmission Controlling simultaneously carries out data transmission with the user terminal.
Wherein, the server 60 includes:
Server authentication module 601, the identity information for being sent based on the user terminal verify the identity
Whether information is consistent with the original identity information of the read-write equipment.
Server for encrypting module 602 generates the first ciphertext for encrypting the random number and the MAC Address.
Memory module 603, the identity information for storing user.
The identity module that the embodiment of the present invention scans read-write equipment by user terminal is communicated with read-write equipment foundation
Connection, and carrying out data transmission after being examined to read-write equipment legitimacy, to realize that connecting object is unique and safe and reliable
Data transmission.
It should be understood that the above-mentioned specific implementation mode of the present invention is used only for exemplary illustration or explains the present invention's
Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any
Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention
Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing
Change example.
Claims (11)
1. a kind of data transmission method, which is characterized in that including:
User terminal scans the identity module of the read-write equipment, obtains the identity information of the read-write equipment;
Whether the user terminal verifies the identity information consistent with the original identity information of the read-write equipment;
If the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment;
The user terminal carries out legitimacy inspection to the read-write equipment;
If read-write equipment is legal, the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.
2. according to claim 1, wherein before the identity module that user terminal scans the read-write equipment,
Further include:
Read-write equipment generates the original identity information of the read-write equipment and is sent to the identity module of the read-write equipment.
3. data transmission method according to claim 2, wherein the identity module includes the identity information
Identification code is set as to be read by the user terminal.
4. data transmission method according to claim 3, wherein the identity information includes:
The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
5. data transmission method according to claim 2, wherein the original identity information includes:
The ID of the read-write equipment and the corresponding original MAC address of the read-write equipment ID.
6. according to claim 1-5 any one of them data transmission methods, wherein the user terminal verifies the identity letter
Whether the step consistent with the original identity information of the read-write equipment includes breath:
The ID of the read-write equipment is sent to server by the user terminal;
The server is index with the ID of the read-write equipment, is searched and the read-write in the memory module of the server
The corresponding original MAC address of device id;
Whether the MAC Address and the original MAC address read described in the server judgement be consistent;
If the MAC Address read is consistent with the original MAC address, the server is sent to the user terminal
Identity information verifies consistent message.
7. data transmission method according to claim 6, wherein the user terminal is established a pair of with the read-write equipment
The step of one communication connection includes:
User terminal opens user terminal communication module, and the broadcast for sending search read-write equipment corresponding with the MAC Address is asked
It asks;
The user terminal searches read-write equipment corresponding with the MAC Address;
The user terminal communication module is connect with the read-write equipment communication module automatic matching.
8. data transmission method according to claim 7, wherein it is legal that the user terminal carries out the read-write equipment
Property examine the step of include:
The user terminal sends legitimacy to the read-write equipment and examines request;
The read-write equipment generates random number, and the random number and the MAC Address are sent to the user terminal;
The random number and the MAC Address are sent to the server by the user terminal;
The server encrypts the random number and the MAC Address, generates the first ciphertext;
First ciphertext is sent to the user terminal by the server, and the user terminal sends first ciphertext
To the read-write equipment;
The read-write equipment encrypts the random number and the MAC Address, generates the second ciphertext;
First ciphertext and the second ciphertext are compared the read-write equipment;
If first ciphertext is consistent with second ciphertext, the read-write equipment release Data Transmission Controlling and with the user
Terminal carries out data transmission.
9. a kind of data transmission system, which is characterized in that including:It user terminal (50), the service that is connect with the user terminal
Device (60) and read-write equipment (70), wherein user terminal (50) includes:
Read module (501), the identity information for reading the read-write equipment;
Identity information checking request module (502), is separately connected with the read module and the server, is used for server
Identity information checking request is sent, and is sent to the server after the server receives the identity information checking request
The identity information;
User terminal communication module (503), the identity information of the read-write equipment for being read based on the read module with
Described established with read-write equipment communicates to connect;
Legitimacy examines request module (504), and request is examined for sending legitimacy to the read-write equipment.
10. data transmission system according to claim 9, wherein the read-write equipment (70) includes:
Read-write equipment communication module (701) is transmitted for realizing the communications and data of the read-write equipment and the user terminal;
Identity module (702) is set as to be read by the user terminal it includes the identity information of the read-write equipment
It takes;The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID;
Read-write equipment random number generation module (703), for being asked in the legitimacy inspection for receiving the subscriber terminal equipment transmission
After asking, generates random number and the random number and the MAC Address are sent to the user terminal and the read-write equipment adds
Close module;
Read-write equipment encrypting module (704) generates the second ciphertext for being encrypted to the random number and the MAC Address;
Data transmission control module (705), for first ciphertext and the second ciphertext to be compared;If consistent, divisor is solved
It controls according to transmission and carries out data transmission with the user terminal.
11. data transmission system according to claim 10, wherein the server (60) includes:
Server authentication module (601), the identity information for being sent based on the user terminal verify the identity letter
Whether breath is consistent with the original identity information of the read-write equipment;
Server for encrypting module (602) generates the first ciphertext for encrypting the random number and the MAC Address;
Memory module (603), the identity information for storing user.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810045493 | 2018-01-17 | ||
CN2018100454939 | 2018-01-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108322902A true CN108322902A (en) | 2018-07-24 |
Family
ID=62864175
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810108168.2A Pending CN108305068A (en) | 2018-01-17 | 2018-02-02 | A kind of recharge method and system of stored value card |
CN201810108165.9A Pending CN108322560A (en) | 2018-01-17 | 2018-02-02 | A kind of method and system of read-write equipment initialization |
CN201810107662.7A Pending CN108320152A (en) | 2018-01-17 | 2018-02-02 | A kind of recharge method and system of stored value card |
CN201810107632.6A Pending CN108322902A (en) | 2018-01-17 | 2018-02-02 | A kind of data transmission method and data transmission system |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810108168.2A Pending CN108305068A (en) | 2018-01-17 | 2018-02-02 | A kind of recharge method and system of stored value card |
CN201810108165.9A Pending CN108322560A (en) | 2018-01-17 | 2018-02-02 | A kind of method and system of read-write equipment initialization |
CN201810107662.7A Pending CN108320152A (en) | 2018-01-17 | 2018-02-02 | A kind of recharge method and system of stored value card |
Country Status (1)
Country | Link |
---|---|
CN (4) | CN108305068A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109497627A (en) * | 2018-12-26 | 2019-03-22 | 南昌与德软件技术有限公司 | Electronic cigarette device, cigarette control blue-tooth device and electronic cigarette dating system |
CN113907715A (en) * | 2021-10-11 | 2022-01-11 | 创启科技(广州)有限公司 | One-to-one communication method for body fat scale |
CN115134330A (en) * | 2021-03-24 | 2022-09-30 | 佳能株式会社 | Image/information processing apparatus, system, method, server apparatus, and medium |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110858359A (en) * | 2018-08-22 | 2020-03-03 | 深圳市文鼎创数据科技有限公司 | Transaction method based on Bluetooth device, server, electronic device and storage medium |
CN110941968A (en) * | 2018-09-25 | 2020-03-31 | 西安中兴新软件有限责任公司 | Processing method, device and system for integrated circuit card |
CN109754505B (en) * | 2018-12-19 | 2022-07-12 | 广州羊城通有限公司 | Unlocking method and device based on IC card |
CN109741492B (en) * | 2018-12-19 | 2021-01-05 | 广州羊城通有限公司 | IC card unlocking-based duration method and device |
CN109858295B (en) * | 2019-01-15 | 2022-02-01 | 重庆乔松信息技术有限公司 | Network payment method for directly reading and writing IC card by mobile phone |
CN109816379B (en) * | 2019-01-15 | 2022-02-22 | 重庆乔松信息技术有限公司 | Network payment system for directly reading and writing IC card by mobile phone |
CN110177001A (en) * | 2019-05-21 | 2019-08-27 | 广东联合电子服务股份有限公司 | A kind of NFC circle deposit method, system and storage medium based on soft certificate |
CN112131893B (en) * | 2019-06-24 | 2025-03-25 | 高新兴科技集团股份有限公司 | A method for switching card reading and writing modes by automatic identification |
CN111063098B (en) * | 2019-11-26 | 2023-03-28 | 广州羊城通有限公司 | Method and system for realizing Bluetooth recharging |
CN110910131A (en) * | 2019-11-26 | 2020-03-24 | 广州羊城通有限公司 | Interactive control method and system for Bluetooth recharging |
CN111080282B (en) * | 2019-11-26 | 2023-11-28 | 广州羊城通有限公司 | Bluetooth recharging reminding method and mobile terminal |
CN110992049B (en) * | 2019-12-02 | 2021-02-26 | 北京市燃气集团有限责任公司 | Intelligent card writing method and device |
CN111954196B (en) * | 2020-08-18 | 2021-02-26 | 龙杰科技(深圳)有限公司 | Smart card recharging method and system based on Bluetooth, terminal equipment and storage medium |
CN112001195B (en) * | 2020-08-19 | 2023-07-28 | 珠海优特电力科技股份有限公司 | Card reading and writing method, card reading and writing system, electronic device and storage medium |
CN114757673A (en) * | 2022-05-10 | 2022-07-15 | 中国工商银行股份有限公司 | Electronic wallet loading method, device, loading chip card and loading system |
JP7402294B1 (en) * | 2022-11-02 | 2023-12-20 | 楽天グループ株式会社 | Information processing system, information processing method, and information processing program |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040176032A1 (en) * | 2002-03-26 | 2004-09-09 | Sakari Kotola | Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality |
CN102983890A (en) * | 2012-11-14 | 2013-03-20 | 北京小米科技有限责任公司 | Method and device of pairing connection of equipment |
CN103701613A (en) * | 2014-01-06 | 2014-04-02 | 立德高科(北京)数码科技有限责任公司 | Bidirectional authentication method between authentication terminal and host and device |
CN104320412A (en) * | 2014-11-11 | 2015-01-28 | 福建联迪商用设备有限公司 | Bluetooth POS and safe Bluetooth POS connecting method and device |
CN104363250A (en) * | 2014-12-03 | 2015-02-18 | 北京深思数盾科技有限公司 | Method and system for equipment connection |
CN104378145A (en) * | 2014-11-27 | 2015-02-25 | 北京深思数盾科技有限公司 | Pairing method and system of Bluetooth device |
CN106327189A (en) * | 2016-09-20 | 2017-01-11 | 四川海力智能科技股份有限公司 | IC card topping-up system |
CN107454558A (en) * | 2017-08-02 | 2017-12-08 | 神州融安科技(北京)有限公司 | A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4752677A (en) * | 1985-09-25 | 1988-06-21 | Casio Computer Co., Ltd. | Customer service system for use in IC card system |
US6567377B1 (en) * | 1999-03-18 | 2003-05-20 | 3Com Corporation | High performance load balancing of outbound internet protocol traffic over multiple network interface cards |
CN101098221A (en) * | 2006-06-26 | 2008-01-02 | 华为技术有限公司 | Network layer safety authentication method in wireless cellular network |
CN101217728B (en) * | 2007-12-29 | 2013-01-30 | 北京握奇数据系统有限公司 | A blank card for wireless card writing, wireless card writing server and wireless card writing method |
CN103581356B (en) * | 2012-08-10 | 2017-07-28 | 海尔集团公司 | A kind of MAC Address distribution method |
CN104079686B (en) * | 2014-07-17 | 2017-11-21 | 福州瑞芯微电子股份有限公司 | The method to set up and distribution method of terminal device MAC Address |
CN104182875A (en) * | 2014-08-22 | 2014-12-03 | 齐亚斌 | Payment method and payment system |
CN105184563A (en) * | 2015-09-17 | 2015-12-23 | 广东欧珀移动通信有限公司 | A security processing method and device for an NFC chip |
CN105469129A (en) * | 2015-12-23 | 2016-04-06 | 深圳市智水小荷技术有限公司 | Water purchasing method and system based on IC card water meter |
CN105554908A (en) * | 2015-12-31 | 2016-05-04 | 福建联迪商用设备有限公司 | Method, master device, slave device and system for achieving code scanning automatic bluetooth connection |
CN105897721B (en) * | 2016-05-03 | 2019-01-25 | 广州广电运通金融电子股份有限公司 | Verify the method and device of fiscard user identity reliability |
CN106027691B (en) * | 2016-05-13 | 2019-06-14 | 深圳市同泰怡信息技术有限公司 | A kind of inspection modification method of MAC Address of Network Card |
CN106469370A (en) * | 2016-09-19 | 2017-03-01 | 天地融科技股份有限公司 | A kind of method of commerce, system and electronic signature equipment |
CN106657033A (en) * | 2016-12-02 | 2017-05-10 | 美的智慧家居科技有限公司 | Method for verifying validity of device and generating authorization information, and communication device |
CN206258975U (en) * | 2016-12-15 | 2017-06-16 | 郑州安然测控技术股份有限公司 | A kind of utilization bluetooth communication realizes the card reader/writer that IC-card is supplemented with money |
CN106790756B (en) * | 2016-12-29 | 2020-04-24 | 国网智能科技股份有限公司 | Automatic generation method and system for MAC address of power distribution terminal |
CN107038824A (en) * | 2017-04-21 | 2017-08-11 | 深圳国微技术有限公司 | A kind of POS terminal processing method and POS |
CN107241412B (en) * | 2017-06-09 | 2020-11-27 | 台州市吉吉知识产权运营有限公司 | Method and system for storing MAC address of wireless access equipment |
CN107453873B (en) * | 2017-07-21 | 2020-10-20 | 金邦达有限公司 | Intelligent IC card data verification method and system |
-
2018
- 2018-02-02 CN CN201810108168.2A patent/CN108305068A/en active Pending
- 2018-02-02 CN CN201810108165.9A patent/CN108322560A/en active Pending
- 2018-02-02 CN CN201810107662.7A patent/CN108320152A/en active Pending
- 2018-02-02 CN CN201810107632.6A patent/CN108322902A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040176032A1 (en) * | 2002-03-26 | 2004-09-09 | Sakari Kotola | Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality |
CN102983890A (en) * | 2012-11-14 | 2013-03-20 | 北京小米科技有限责任公司 | Method and device of pairing connection of equipment |
CN103701613A (en) * | 2014-01-06 | 2014-04-02 | 立德高科(北京)数码科技有限责任公司 | Bidirectional authentication method between authentication terminal and host and device |
CN104320412A (en) * | 2014-11-11 | 2015-01-28 | 福建联迪商用设备有限公司 | Bluetooth POS and safe Bluetooth POS connecting method and device |
CN104378145A (en) * | 2014-11-27 | 2015-02-25 | 北京深思数盾科技有限公司 | Pairing method and system of Bluetooth device |
CN104363250A (en) * | 2014-12-03 | 2015-02-18 | 北京深思数盾科技有限公司 | Method and system for equipment connection |
CN106327189A (en) * | 2016-09-20 | 2017-01-11 | 四川海力智能科技股份有限公司 | IC card topping-up system |
CN107454558A (en) * | 2017-08-02 | 2017-12-08 | 神州融安科技(北京)有限公司 | A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109497627A (en) * | 2018-12-26 | 2019-03-22 | 南昌与德软件技术有限公司 | Electronic cigarette device, cigarette control blue-tooth device and electronic cigarette dating system |
CN115134330A (en) * | 2021-03-24 | 2022-09-30 | 佳能株式会社 | Image/information processing apparatus, system, method, server apparatus, and medium |
CN113907715A (en) * | 2021-10-11 | 2022-01-11 | 创启科技(广州)有限公司 | One-to-one communication method for body fat scale |
Also Published As
Publication number | Publication date |
---|---|
CN108322560A (en) | 2018-07-24 |
CN108305068A (en) | 2018-07-20 |
CN108320152A (en) | 2018-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108322902A (en) | A kind of data transmission method and data transmission system | |
US7403794B2 (en) | Client terminal having a temporary connection establishing unit | |
CN101208981B (en) | Security parameters for negotiation protecting management frames in wireless networks | |
US7721325B2 (en) | Method and apparatus for managing communication security in wireless network | |
WO2017041675A1 (en) | Method for sending and acquiring wifi networking information and corresponding apparatus | |
US20050266798A1 (en) | Linking security association to entries in a contact directory of a wireless device | |
CN108259164B (en) | Identity authentication method and equipment of Internet of things equipment | |
CN107005927A (en) | Cut-in method, equipment and the system of user equipment (UE) | |
US20130070744A1 (en) | Apparatus and method for providing security of a network connection | |
JP4405309B2 (en) | Access point, wireless LAN connection method, medium recording wireless LAN connection program, and wireless LAN system | |
KR20160143333A (en) | Method for Double Certification by using Double Channel | |
CN100571460C (en) | The method and apparatus of secure roaming | |
CN103312677B (en) | Terminal, server and the method for building up of communication connection | |
JP2004207965A (en) | High speed authentication system and method for wireless lan | |
CN104796891A (en) | Security certification system by means of service provider's network and corresponding method | |
US20040255121A1 (en) | Method and communication terminal device for secure establishment of a communication connection | |
EP1398934B1 (en) | Secure access to a subscription module | |
US9648495B2 (en) | Method and device for transmitting a verification request to an identification module | |
WO2010124569A1 (en) | Method and system for user access control | |
CN103763697A (en) | Wireless access point multi-secret key support system and method | |
CN106792482A (en) | A kind of method and system for being used between two devices set up near-field communication | |
CN107454557B (en) | Router connection method and system | |
KR20120089388A (en) | Method for Requesting Caller Authentication of Voice Network using Data Network, Caller Device and Program | |
JP3851781B2 (en) | Wireless communication apparatus, wireless communication system, and connection authentication method | |
CN109743716A (en) | An NFC-based wireless local area network authentication system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180724 |