Search

CN-121997352-A - User-defined information interaction method and system for NFC ornaments

CN121997352ACN 121997352 ACN121997352 ACN 121997352ACN-121997352-A

Abstract

The invention relates to the technical field of NFC ornament interaction and discloses a user-defined information interaction method and system of NFC ornaments, wherein the method comprises the steps of collecting identity verification information, and performing signal stability verification on the identity verification information to obtain standard verification data; the method comprises the steps of obtaining standard verification data, processing the standard verification data by adopting a preset verification rule to obtain encrypted verification data, comparing the encrypted verification data with a preset encryption verification template according to the encrypted verification data to obtain a hash comparison data set, extracting personalized information content from the hash comparison data set according to the hash comparison data set, sending the personalized information content to a target equipment end to perform potential safety hazard assessment to obtain a security assessment result, and updating encryption configuration parameters of the security assessment result to obtain the security encryption data if the security assessment result meets a preset assessment threshold value. The method can improve the protection performance of equipment.

Inventors

  • ZHAO KONGJIN

Assignees

  • 嘉兴赵氏钮扣股份有限公司

Dates

Publication Date
20260508
Application Date
20251208

Claims (8)

  1. 1. The user-defined information interaction method of the NFC ornament is characterized by comprising the following steps of: acquiring identity verification information, and carrying out signal stability verification on the identity verification information by combining a preset identity format to obtain standard verification data; processing the standard verification data by adopting a preset verification rule to obtain encrypted verification data; Comparing the encrypted verification data with a preset encrypted verification template according to the encrypted verification data, and if the comparison result meets a preset comparison threshold, performing one-way hash processing on the encrypted verification data to obtain a hash comparison data set; Matching the hash ratio data set with a preset hash database, and extracting personalized information content from the hash ratio data set if the matching result meets a preset matching threshold; Transmitting the personalized information content to a target equipment end, and if the personalized information content is completely transmitted, carrying out potential safety hazard assessment to obtain a safety assessment result; And if the security evaluation result accords with a preset evaluation threshold, updating the encryption configuration parameters of the security evaluation result to obtain security encryption data.
  2. 2. The method for user-defined information interaction of NFC accessories according to claim 1, wherein the collecting the authentication information and verifying the signal stability of the authentication information in combination with a preset identity format to obtain standard authentication data comprises: Acquiring identity verification information from a user side, and sorting the identity verification information by combining a preset identity format to obtain an original input signal; Performing transmission signal stability verification on the original input signal, and if the strength of the original input signal is lower than a preset signal threshold value, correcting the original input signal to determine a preliminary verification data set; And carrying out compatibility verification on the preliminary verification data set according to a preset compatibility standard, and if the preliminary verification data set does not meet the format requirement, carrying out standardization processing to obtain the standard verification data.
  3. 3. The method for user-defined information interaction of NFC accessories according to claim 1, wherein the processing the standard verification data by using a preset verification rule to obtain encrypted verification data further comprises: extracting transmission signal strength according to the encryption verification data, and starting a standby signal transmission channel to obtain an initial transmission data set if the transmission signal strength is lower than a preset signal strength threshold; detecting according to the initial transmission data set, if data loss is detected, interpolating and filling the initial transmission data set to obtain a complete transmission data set; And carrying out logic comparison on the complete transmission data set by combining with a preset logic verification rule, judging whether the result meets the requirement, if not, rejecting the complete transmission data set, and if so, determining the encryption verification data.
  4. 4. The method for user-defined information interaction of NFC accessories according to claim 1, wherein the comparing the encrypted verification data with a preset encrypted verification template according to the encrypted verification data, and if the comparison result meets a preset comparison threshold, performing one-way hash processing on the encrypted verification data to obtain a hash comparison data set, includes: Comparing the encrypted verification data with a preset encrypted verification template according to the encrypted verification data, and if the comparison result meets a preset comparison threshold value, performing one-way hash processing on the encrypted verification data to generate a hash check value set; acquiring time stamp information, and associating and binding the time stamp information with the hash check value set to obtain a time stamp check combination; Storing and detecting the timestamp verification combination, and if abnormality is detected, extracting field content of log records to obtain a log data set; and performing association binding on the log data set and the timestamp verification combination to obtain a hash comparison data set.
  5. 5. The method for user-defined information interaction of NFC accessories according to claim 1, wherein the matching the data set with a preset hash database according to the hash ratio, if the matching result meets a preset matching threshold, extracting personalized information content from the hash ratio data set, includes: performing consistency check on the hash comparison data set and a preset hash database to obtain a comparison result; If the comparison result meets a preset matching threshold value, extracting personalized information data associated with the hash comparison data set from the preset hash database to obtain a personalized information set; comparing the interaction behaviors of the personalized information sets by combining with preset exception rules, and performing exception marking to obtain exception evaluation results; and carrying out association binding on the abnormal evaluation result and the personalized information set, and adjusting data content to obtain personalized output content.
  6. 6. The method for user-defined information interaction of NFC ornaments according to claim 1, wherein the sending the personalized information content to a target device end, if the personalized information content is completely transmitted, performing potential safety hazard assessment, and after obtaining a safety assessment result, further comprises: the state of the target equipment end is monitored in real time, and signal fluctuation data and equipment adaptation parameters are obtained; And analyzing the stability of the transmission environment according to the signal fluctuation data and the equipment adaptation parameters, and sending the personalized information content to the target equipment end.
  7. 7. The method for user-defined information interaction of NFC accessories according to claim 1, wherein if the security evaluation result meets a preset evaluation threshold, updating an encryption configuration parameter of the security evaluation result to obtain security encrypted data, includes: if the safety evaluation result is matched with a preset evaluation threshold, extracting interaction record data from an interaction log; Scanning according to the interaction record data and hidden danger indexes in the safety evaluation result, and obtaining configuration updating requirements according to the scanning result; And dynamically correcting the encryption configuration parameters of the security evaluation result according to the configuration updating requirement to obtain the security encryption data.
  8. 8. The user-defined information interaction system of NFC ornaments is characterized by comprising: The information acquisition and verification module is used for acquiring identity verification information, and carrying out signal stability verification on the identity verification information by combining a preset identity format to obtain standard verification data; The data encryption module is used for processing the standard verification data by adopting a preset verification rule to obtain encrypted verification data; The encryption comparison hash module is used for comparing the encryption verification data with a preset encryption verification template according to the encryption verification data, and if the comparison result meets a preset comparison threshold value, performing one-way hash processing on the encryption verification data to obtain a hash comparison data set; the hash matching extraction module is used for matching the data set with a preset hash database according to the hash ratio, and extracting personalized information content from the hash ratio data set if the matching result meets a preset matching threshold; the security evaluation module is used for sending the personalized information content to a target equipment end, and if the personalized information content is completely transmitted, potential safety hazard evaluation is carried out to obtain a security evaluation result; And the strategy generation module is used for updating the encryption configuration parameters of the security evaluation result if the security evaluation result accords with a preset evaluation threshold value to obtain security encryption data.

Description

User-defined information interaction method and system for NFC ornaments Technical Field The invention relates to the technical field of NFC ornament interaction, in particular to a user-defined information interaction method and system of NFC ornaments. Background At present, in the field of modern intelligent interaction, a near field communication technology becomes an important bridge for connecting people and equipment due to convenience and safety, and particularly, the near field communication technology shows irreplaceable value in identity recognition and personalized information interaction. In the prior art, the NFC interaction scheme collects basic identity information of a user according to a general near field protocol, compares the basic identity information with a pre-stored template after being sorted according to a conventional format, transmits preset standard information after verification is passed, and simultaneously performs data encryption and records basic logs such as interaction time, equipment identification and the like. However, the existing encryption method has the defect that repeated fields in the identity information can generate identifiable ciphertext rules, and an attacker can reversely deduce the data characteristics. The prior art only uses simple encryption to protect data, lacks secondary verification, abnormal recognition and other deep protection means, and has low protection tightness. In summary, the prior art has the problem of low protection tightness. Disclosure of Invention The invention provides a user-defined information interaction method and system of NFC ornaments, which are used for improving equipment protection. In order to solve the above technical problems, the present invention provides a user-defined information interaction method for NFC ornaments, including: acquiring identity verification information, and carrying out signal stability verification on the identity verification information by combining a preset identity format to obtain standard verification data; processing the standard verification data by adopting a preset verification rule to obtain encrypted verification data; Comparing the encrypted verification data with a preset encrypted verification template according to the encrypted verification data, and if the comparison result meets a preset comparison threshold, performing one-way hash processing on the encrypted verification data to obtain a hash comparison data set; Matching the hash ratio data set with a preset hash database, and extracting personalized information content from the hash ratio data set if the matching result meets a preset matching threshold; Transmitting the personalized information content to a target equipment end, and if the personalized information content is completely transmitted, carrying out potential safety hazard assessment to obtain a safety assessment result; And if the security evaluation result accords with a preset evaluation threshold, updating the encryption configuration parameters of the security evaluation result to obtain security encryption data. In an optional implementation manner, the collecting the authentication information and verifying the signal stability of the authentication information by combining with a preset identity format to obtain standard authentication data includes: Acquiring identity verification information from a user side, and sorting the identity verification information by combining a preset identity format to obtain an original input signal; Performing transmission signal stability verification on the original input signal, and if the strength of the original input signal is lower than a preset signal threshold value, correcting the original input signal to determine a preliminary verification data set; And carrying out compatibility verification on the preliminary verification data set according to a preset compatibility standard, and if the preliminary verification data set does not meet the format requirement, carrying out standardization processing to obtain the standard verification data. In an optional implementation manner, after the standard verification data is processed by using a preset verification rule to obtain encrypted verification data, the method further includes: extracting transmission signal strength according to the encryption verification data, and starting a standby signal transmission channel to obtain an initial transmission data set if the transmission signal strength is lower than a preset signal strength threshold; detecting according to the initial transmission data set, if data loss is detected, interpolating and filling the initial transmission data set to obtain a complete transmission data set; And carrying out logic comparison on the complete transmission data set by combining with a preset logic verification rule, judging whether the result meets the requirement, if not, rejecting the complete transmission data set, and if so