WO2017211201A1 - 数据的传输方法、数据发送端、数据接收端及系统 - Google Patents
数据的传输方法、数据发送端、数据接收端及系统 Download PDFInfo
- Publication number
- WO2017211201A1 WO2017211201A1 PCT/CN2017/086067 CN2017086067W WO2017211201A1 WO 2017211201 A1 WO2017211201 A1 WO 2017211201A1 CN 2017086067 W CN2017086067 W CN 2017086067W WO 2017211201 A1 WO2017211201 A1 WO 2017211201A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- preset
- sound wave
- data
- security information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3226—Use of secure elements separate from M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C23/00—Non-electrical signal transmission systems, e.g. optical systems
- G08C23/02—Non-electrical signal transmission systems, e.g. optical systems using infrasonic, sonic or ultrasonic waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to the field of information technology, and in particular, to a data transmission method, a data transmitting end, a data receiving end, and a system.
- the receiving device scans the data to be sent by the transmitting device by scanning the information pattern of the two-dimensional code or barcode displayed by the transmitting device to implement data between the data.
- the data transmission mode allows the receiving device and the transmitting device to execute without the network connection, and can also implement data transmission and transmission.
- the implementation of the foregoing data transmission is simple and easy to operate.
- the information pattern such as the two-dimensional code or the barcode in the transmitting device is obtained by a malicious user through photographing, the data information of the user of the transmitting device is leaked, and the threat is transmitted.
- the security of the device data even when the information pattern to be sent by the transmitting device includes asset payment information, the malicious user can perform asset payment through the stolen information pattern, thereby bringing unnecessary economic loss to the user of the transmitting device.
- the embodiments of the present invention provide a data transmission method, a data sending end, a data receiving end, and a system, and the main purpose thereof is to prevent pattern information leakage in the transmitting end device, thereby ensuring data security of the transmitting end user.
- the present invention provides the following technical solutions:
- the present invention provides a data transmission method, including:
- the data sending end monitors the sound wave information including the preset safety information within the preset distance range
- the output displays the pattern information so that the data receiving end acquires the pattern information.
- a data transmission method provided by the present invention includes:
- the data receiving end generates sound wave information including preset security information, and broadcasts the sound wave information
- the pattern information includes preset security information and data information to be detected;
- a data sending end provided by the present invention includes:
- a monitoring unit that monitors sound wave information including preset safety information within a preset distance range
- a parsing unit when the monitoring unit detects the acoustic wave information including the preset safety information within the preset distance range, parsing the sound wave information;
- An acquiring unit in the process of parsing the sound wave information by the parsing unit, acquiring the preset security information in the sound wave information;
- a generating unit generating pattern information according to the preset security information acquired by the acquiring unit and data information to be sent;
- a data receiving end provided by the present invention includes:
- a broadcast unit that broadcasts the sound wave information generated by the generating unit
- a first acquiring unit configured to acquire pattern information displayed in a data sending end, where the pattern information includes preset security information and data information to be detected;
- An authentication unit that authenticates the preset security information to be detected acquired by the first acquiring unit
- a second acquiring unit when the authentication unit determines that the preset security information to be detected is successfully authenticated, acquiring the data information in the pattern information.
- the present invention provides a data transmission system, where the system includes: data transmission as described above The sending end and the data receiving end as described above.
- the technical solution provided by the embodiment of the present invention has at least the following advantages:
- the data transmission method, the data transmitting end, the data receiving end and the system provided by the invention before the data transmitting end transmits the data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset safety information within the preset distance range. And parsing the detected sound wave information, and acquiring preset security information in the sound wave information; secondly, the data sending end generates pattern information according to the acquired preset security information and the data information to be sent; finally, after generating the pattern information, The output is displayed so that the data receiving end authenticates the preset security information in the pattern information.
- the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
- FIG. 1 is a flowchart of a first data transmission method according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of monitoring data of sound waves within a preset distance range by a data transmitting end according to an embodiment of the present invention
- FIG. 3 is a flowchart of a second method for transmitting data according to an embodiment of the present invention.
- FIG. 4 is a flowchart of a third data transmission method according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of a mobile phone displaying an Alipay client homepage according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram showing a display interface of a two-dimensional code during electronic payment according to an embodiment of the present invention.
- FIG. 7 is a block diagram showing the composition of a data sending end according to an embodiment of the present invention.
- FIG. 8 is a block diagram showing another composition of a data transmitting end according to an embodiment of the present invention.
- FIG. 9 is a block diagram showing the composition of a data receiving end according to an embodiment of the present invention.
- FIG. 10 is a block diagram showing another composition of a data receiving end according to an embodiment of the present invention.
- FIG. 11 is a block diagram showing the structure of a data transmission system according to an embodiment of the present invention.
- An embodiment of the present invention provides a data transmission method, where the method is applied to a data sending end, as shown in FIG. 1 , the method includes:
- the data sending end monitors the sound wave information including the preset safety information within a preset distance range.
- the data transmitting end When the data transmitting end and the data receiving end perform short-distance data transmission, in order to ensure the security of the transmitted data, the data transmitting end usually adds preset security information for verifying its security identity during the data transmission process, that is, preset security information. As the data receiving end and the data sending end establish a "trusted" data transmission voucher; the data receiving end will verify the validity and security of the preset security information before receiving the data sent by the data sending end to ensure the data transmitting end Send data information safely.
- the preset security information may include, but is not limited to, the following content, such as: dynamic password information, time information, random code information, and the like. Specifically, the embodiment of the present invention does not limit this.
- the data transmitting end when the data transmitting end performs short-distance data transmission with the data receiving end, the data receiving end serves as a sound source body, and the preset security information is loaded into the sound wave information, and the sound wave information is made of air as a medium.
- the data is transmitted in all directions for the data transmitting end to acquire the preset security information in the sound wave information.
- the data transmitting end since the sound wave is attenuated during the transmission process, the data transmitting end can monitor and receive the sound wave information only within the preset distance range of the sound wave broadcast.
- the data transmitting end scans whether there is sound wave information around it, there is also a scanning preset distance range, that is, the data transmitting end can only scan the sound wave information within the preset distance range.
- the data transmitting end can monitor the acoustic wave information only when the following two necessary conditions are met at the same time, first, within the preset distance range of the sound wave broadcast at the data receiving end; second, the preset distance of the self-scanning sound wave information Within the scope.
- the data sending end is a smart phone
- the data receiving end is a personal computer
- the preset distance range of the personal computer broadcasting sound wave information broadcasting is 1 meter
- the preset of the smart phone scanning sound wave information is preset.
- the distance range is 3 meters.
- the preset range of the sound wave information that the smart phone can monitor is less than or equal to 1 meter, although the preset distance of the smart phone scanning sound wave information is 3 meters, but the sound is Source body
- the preset distance range of the broadcast sound wave information broadcast is 1 meter.
- the actual distance between the personal computers so that the data sender obtains the sound wave information containing the preset security information is for convenience of description, and the data receiving end is a personal computer, and the data sending end is a smart phone as an example. However, it should be clarified that the description manner is not intended to limit the data receiving end according to the embodiment of the present invention.
- the data sender is only a personal computer or a smartphone.
- the maximum power of the sound wave information transmitted by the data receiving end controls the preset distance range of the sound wave information broadcast, and the maximum power of the broadcast sound wave information may be different at different data receiving ends; the maximum power of the sound source body The larger the distance, the larger the preset distance range of the sound wave broadcast it controls; the smaller the maximum power of the sound source body, the smaller the preset distance range of the sound wave broadcast it controls.
- the preset distance range of the data transmitting end scanning the sound wave information is determined by the scanning hardware of the carrier installed by the data transmitting end; or, if the data transmitting end itself has the scanning function, the preset distance range of the scanning sound wave information is determined by the data transmitting end itself.
- the scanning device is determined.
- the preset distance range of the sound wave information broadcast at the data receiving end and the specific distance of the preset distance range of the sound wave information scanned by the data transmitting end are not limited.
- the function of displaying the pattern information is selected in the data transmitting end.
- the data transmitting end starts monitoring the sound wave including the preset safety information within the preset distance range. The information is monitored by real-time scanning of the sound wave information including the preset safety information until the sound wave information is detected, and the data transmitting end stops scanning.
- the data sending end includes but is not limited to a mobile terminal device, such as a smart phone, a tablet computer, a personal computer, a portable computer, etc.; or, may be a preset installed in the mobile terminal device.
- a mobile terminal device such as a smart phone, a tablet computer, a personal computer, a portable computer, etc.
- the application, the preset client, and the like may be a preset installed in the mobile terminal device.
- the application, the preset client, and the like may be a preset installed in the mobile terminal device.
- the specific type of the data sending end is not limited in the embodiment of the present invention.
- the data sending end parses the sound wave information, and acquires the preset security information in the sound wave information.
- the preset security information is used as a credit certificate for data transmission between the data transmitting end and the data receiving end, and the data transmission is continued only after the data receiving end authenticates the preset security information successfully.
- the data transmitting end parses the sound wave information according to the sound wave information monitored in step 101 to obtain preset security information.
- the sound wave information is an analog signal
- the data transmitting end wants to obtain the preset safety information in the sound wave information, and needs to convert the sound wave information from the analog signal into a digital signal, and convert the sound wave information into a digital signal.
- a preset decoding rule of the preset security information is obtained, and the sound wave information is compared according to the preset decoding rule.
- the parsing is performed to obtain preset security information carried in the acoustic wave information, and the preset security information is a plain text display mode.
- the preset decoding rule is a decoding rule added to the sound wave information by the data receiving end in the process of generating the sound wave information according to the preset security information, so that the data sending end that obtains the sound wave information acquires the data according to the preset decoding rule.
- Preset security information Preset security information.
- the sound wave information is acquired at the data transmitting end, and the sound wave information is converted into a digital signal by the analog signal, and the preset security information in the form of a digital signal is directly obtained.
- the information is an undecoded ciphertext display mode.
- Step 103 generates pattern information based on preset security information in the form of the digital signal, and the data receiving end decodes the preset security information based on the preset decoding rule, and verifies the preset security information. Effectiveness.
- the preset security information is loaded into the sound wave information by the data receiving end, and then the data receiving end decodes the preset security information in the pattern information, and the process does not cause resources to the data receiving end. waste.
- the process of decoding the sound wave information by using the preset decoding rule and obtaining the preset security information is not limited.
- the data sending end generates pattern information according to the preset security information and the data information to be sent.
- the data sending end After acquiring the preset security information, the data sending end encodes the preset security information and the data information to be sent to generate pattern information.
- the pattern information includes: a two-dimensional code, a barcode, a variable barcode, and the like.
- the data information transmitted by the data sending end through the pattern information may include, but is not limited to, the following contents, such as: privacy account information, privacy file information, video information, a web address, and the like.
- the data information to be sent included in the pattern information may be determined according to different application scenarios.
- the generated pattern information may include preset security information and video information; when the application scenario is electronic payment
- the generated pattern information includes at least preset security information, privacy account information, key information of the account, and the like. This embodiment does not limit its use scenario.
- the encoding algorithm used needs to be adapted according to different development environments and programming languages.
- the development environment and programming language of the data sending end are not specifically limited.
- the data sending end output displays the pattern information.
- the data sending end outputs the pattern information for display, so that the data receiving end acquires the pattern information, and authenticates the preset security information in the pattern information to implement data transmission.
- the data transmitting end before the data transmitting end transmits data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset security information within the preset distance range, and performs the monitored sound wave information. Parsing and obtaining preset security information in the sound wave information; secondly, the data sending end is based on the acquired preset The security information and the data information to be transmitted generate pattern information; finally, after the pattern information is generated, the output information is displayed, so that the data receiving end authenticates the preset security information in the pattern information.
- the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
- the data sending end is usually a mobile terminal device
- the preset microphone in the mobile terminal device is an essential function of the mobile terminal device; therefore, the preset security information is included in the range of performing the monitoring preset distance.
- the data transmitting end calls its own preset microphone to monitor the sound wave information including the preset safety information within the preset distance range, that is, before the data transmitting end transmits the data information to the data receiving end, the data transmission is activated.
- the microphone in the terminal and based on the microphone, monitors and receives sound wave information within a preset distance range.
- setting a preset time threshold for acquiring the preset security information before the data sending end obtains the preset security information, setting a preset time threshold for acquiring the preset security information, if the preset time threshold is not successfully obtained within the preset time threshold Presetting the security information, canceling the data transmission between the data sending end and the data receiving end; if the preset security information is successfully obtained within the preset time threshold, continuing to execute between the data sending end and the data receiving end Data transfer.
- the preset time threshold is set to 60s, and the data sending end starts to acquire the preset security information at 14:30:2, and at 14:31:2, the preset is still not successfully acquired. Security information, at this time, cancel or interrupt the transmission of data to the data receiver.
- the above is only an exemplary example, and the specific setting of the preset time threshold is not limited in the embodiment of the present invention.
- the data sending end acquires the data information to be sent, and generates the preset security information and the data information to be sent according to the preset encoding algorithm.
- Pattern information may be an encoding algorithm executed in the background of the data sending end; or the preset encoding algorithm may also generate an application for the third-party QR code called by the data sending end, by the first
- the three-party two-dimensional code generation application generates a two-dimensional code by presetting the security information and the data information to be transmitted. It should be clarified that the above example takes the case where the pattern information is a two-dimensional code as an example, and the description is not intended to limit the pattern information to only a two-dimensional code.
- the embodiment of the present invention further provides another data transmission method, where the method is applied to a data receiving end, as shown in FIG. 3, the method includes:
- the data receiving end generates sound wave information including preset security information, and broadcasts the sound wave information.
- the data receiving end transmits the preset security information to the data transmitting end by transmitting the sound wave information, and the preset security information is carried in the sound wave information, and the data transmitting end is in the broadcasting process of the sound wave information.
- the data transmitting end may parse the sound wave information to obtain preset security information, and use the preset security information as a certificate for the data receiving end to establish a “trusted” data transmission with the data sending end.
- the preset security information is encoded into the sound wave information by using a preset encoding rule.
- the data receiving end configures the preset decoding rule corresponding to the preset encoding rule in the sound wave information, so that the data transmitting end converts the sound wave information from the analog signal.
- the preset decoding rule is obtained, and the preset security information in the sound wave information is parsed by using the preset decoding rule, and the data transmitting end generates the pattern information by using the decoded preset security information for data receiving.
- the terminal verifies the validity of the preset security information, and the data receiving end does not need to decode the preset security information to determine the validity and legality of the preset security information.
- the data receiving end before receiving the sound wave information, does not configure the preset decoding rule corresponding to the preset encoding rule in the sound wave information, and when the data transmitting end receives the sound wave information, Obtaining the undecoded preset security information, and using the undecoded preset security information pattern information, the data receiving end obtains the preset security information in the data sending end pattern information, and determines that the preset security information is undecoded. For security, the data receiving end first decodes the acquired preset security information according to the preset decoding rule corresponding to the preset security information, and then verifies the legality of the preset security information.
- the data receiving end generates sound wave information including time information and broadcasts it, and sets the broadcast period of the sound wave information to 5 minutes before the broadcast; or sets the broadcast period of the sound wave information to 10 minutes, etc.
- the time information carried in the sound wave information is the current time information of the data receiving end. If the data receiving end performs the first broadcast sound wave information at 08:00, the preset safety information in the sound wave information is 08/00, if the data is received The first broadcast sound wave information is performed at 08:10, and the preset security information in the sound wave information is 08/10.
- the foregoing embodiment of the present invention uses the current time information of the data receiving end as the preset security information, but it should be clarified that the description mode is not intended to limit the preset security information described in the embodiment of the present invention. Can be the current time information of the data receiving end.
- the data receiving end acquires the pattern information displayed in the data sending end.
- the pattern information includes preset security information and data information to be detected.
- the method may be used, but is not limited to, for example, acquiring the pattern information displayed in the data sending end by using a preset data acquiring instruction; wherein the preset data is
- the acquisition instruction modes include: scanning mode, shaking data sending end mode, key triggering mode, voice triggering mode, and track sliding mode.
- the preset data acquisition instruction mode in the embodiment of the present invention in addition to the scanning mode, other preset data acquisition instruction modes need to be set before data transmission, for example, setting the shaking data sending end mode to: the same single direction Two shaking, two shaking left and right, three shaking up and down, etc.;
- the triggering mode of the button includes: the data receiving end monitors the trigger state of the preset button, and the preset button can be a physical button or a virtual button.
- the data receiving end can obtain the pattern information displayed in the data sending end; for the data sending end is the touch screen type data transmitting end, when the data receiving end presets the track sliding mode After that, the sliding state of the touch screen in the data sending end is monitored, and when the user of the data sending end triggers the sliding operation on the screen, the pattern information is acquired.
- the above is a description of the preset data acquisition instruction.
- the embodiment of the present invention does not limit the type of the preset data acquisition instruction in the actual application.
- the data receiving end authenticates the preset security information to be detected in the pattern information.
- the process of authenticating the preset security information to be detected by the data receiving end is the basis and basis for establishing the trusted data transmission between the data receiving end and the data sending end. If the preset security information to be detected is successfully authenticated, step 304 is performed; If the preset security information to be detected fails to be authenticated, the pattern information including the data information is ignored.
- step 301 Based on the example in step 301, it is assumed that the data receiving end broadcasts the preset security information at the time of 2016/2/12, 15:20, and the preset transmission period is set to 10 minutes, at 2016/2/12, At 15:25, the data transmitting end displays the pattern information, and the preset security information in the pattern information is 15/20. After the data receiving end acquires the pattern information, the pattern information is parsed to obtain the preset security information. /20, indicating that the preset security information received by the data sending end is the preset security information broadcasted by the data receiving end, the preset security information is successfully authenticated, and after the preset security information is successfully authenticated, the data in the pattern information is continued.
- the information is authenticated; if the pattern information is displayed on the data transmitting end at 2016/2/12, 15:23, and the preset security information in the pattern information is 15/18, and the data receiving end broadcasts the latest of the preset security information.
- the time is 2016/2/12, 15:20, indicating that the preset security information 15/18 in the pattern information does not meet the requirements, and the pattern information may be in danger of being stolen by a malicious user, and therefore, the non-compliant pattern information is suddenly .
- the above is only an exemplary example, and the type and specific content of the preset security information are not limited in the embodiment of the present invention.
- the data receiving end acquires the data information in the pattern information.
- the data transmitting end monitors the sound wave information including the preset security information within the preset distance range, and the detected sound wave.
- the information is parsed, and the preset security information in the sound wave information is acquired;
- the data sending end generates the pattern information according to the obtained preset security information and the data information to be sent;
- the output is displayed, so that The data receiving end authenticates the preset security information in the pattern information.
- the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
- the data receiving end generates the sound wave information including the preset safety information, and the method is not limited to the following, the preset sound wave generator is called, and the sound wave information is generated according to the preset sound wave generator.
- the data receiving end itself has a preset sound wave generating module, it calls its own preset sound wave generator, and generates sound wave information based on the preset sound wave generating module, wherein the preset sound wave generating module includes a preset sound wave generating Device.
- the data receiving end calls a third-party sound wave generator, and generates sound wave information based on the third-party sound wave generator.
- the preset security information carried in the sound wave information needs to be broadcasted, so that the data transmitting end acquires the preset security information.
- the data receiving end broadcasts the preset security information carried in the sound wave information, encodes the preset security information into the sound wave information through the preset modulation mode, and presets the preset security information carried in the sound wave information according to the preset transmission period. Broadcast on air.
- the function of presetting the preset security mode encoding of the preset security information is to put the preset security information into the sound wave information for convenient transmission or processing.
- the data receiving end only receives the data sent by the data sending end after the authentication of the preset security information to be detected in the pattern information is successful, if the pattern information is to be detected. If the preset security information authentication is unsuccessful, the data information in the data sending end may be leaked or stolen, and the data information sent by the data sending end is not received; therefore, the preset security information to be detected is authenticated. Is the basis for ensuring data security at the data sender.
- the authentication of the preset security information to be detected by the data receiving end includes: acquiring the preset security information after the preset sound wave generating module or the third-party sound wave generator sends the preset security information; parsing the pattern information, and acquiring the pattern information
- the preset security information to be detected; the preset security information is compared with the preset security information to be detected; if the preset security information is consistent with the preset security information to be detected, the preset security information to be detected is authenticated. If the preset security information is inconsistent with the preset security information to be detected, the preset security information to be detected fails to be authenticated, and the pattern containing the data information is ignored.
- the data information in the pattern information needs to be verified.
- the data information is the private file information
- the hardware device attribute of the data sending end of the private file information such as the device model name corresponding to the data sending end, needs to be verified; if the data information is the funds transfer information, the data receiving end needs Send a notification message to the server corresponding to the data sending end, so that the server authenticates the data sending end.
- the data information included in the pattern information can be directly obtained.
- the security of the pattern information when performing short-distance data transmission between the data transmitting end and the data receiving end, the security of the pattern information must be confirmed by the preset security information in the sound wave information, and the pattern information may be After the reliability authentication is passed, the data transmission is continued. Since the preset security information in the pattern information is dynamically changed, the pattern information displayed in the data transmitting end is dynamically changed, and the data transmitting end can also be considered in the actual application. The pattern information displayed in the game changes in real time, and even if the pattern information is stolen by a malicious user, it does not hinder the user's interests.
- the data transmission end and the data receiving end are in the process of performing the data transmission process.
- the embodiment of the present invention further provides a data transmission method.
- an application scenario in which an electronic payment is paid by using a two-dimensional code is mainly taken as an example.
- the data transmitting end is an Alipay client installed in the user A mobile phone
- the data receiving end is a supermarket cash register device.
- the description manner is not intended to limit the data transmitting end and the data receiving end of the embodiment of the present invention to only the Alipay client and the supermarket cash register device installed in the mobile phone.
- the main process methods involved in this scenario include:
- the supermarket cash register device generates sound wave information including preset safety information, and broadcasts the sound wave information.
- the supermarket cash register device calls its own sound wave generating module, and generates sound wave information according to the sound wave generating module, and each sound wave information contains preset safety information.
- the preset safety information is used to generate sound wave information for the supermarket cash register device.
- the broadcast period of the sound wave information of the supermarket cash register device is 3 minutes, assuming that the supermarket cash register device sends the sound wave last time.
- the time of the information is 11:05, and the preset security information in the sound wave information is 11/05.
- the Alipay client monitors the sound wave information including the preset security information within a preset distance range.
- user A When user A makes an electronic payment for the purchased item through the Alipay client, first, user A triggers the start of the Alipay client command to start the Alipay client, as shown in FIG. 5, at the current time 11:06, user A Click the payment function in the Alipay client home page.
- the microphone in the mobile phone is called, and based on the microphone, the sound wave information including the preset safety information is monitored within the preset distance range. It should be noted that In this application scenario, it is necessary to determine that the Alipay client installs the carrier mobile phone for online networking.
- the Alipay client parses the sound wave information, acquires the preset security information in the sound wave information, and generates a two-dimensional code according to the preset security information and the data information to be sent.
- the Alipay client parses the sound wave information monitored in step 402, determines that the preset security information included in the sound wave information is 11/05, and generates a two-dimensional code according to the preset security information, the account information of Alipay, and the key information.
- the Alipay client output displays the two-dimensional code.
- FIG. 6 is a schematic diagram of a display interface of a two-dimensional code for electronic payment according to an embodiment of the present invention.
- the representation form of the pattern information in the Alipay client is not limited.
- the supermarket cash register device obtains the two-dimensional code displayed in the Alipay client.
- the supermarket cash register device scans and recognizes the pattern information displayed in the Alipay client based on its own scanning identification gun, and acquires preset security information in the two-dimensional code.
- the supermarket cash register device authenticates the preset security information to be detected in the two-dimensional code.
- step 407 If the preset security information to be detected is successfully authenticated, step 407 is performed; if the preset security information to be detected fails to be authenticated, step 408 is performed.
- the supermarket cash register device obtains the preset security information in the latest broadcast sound wave information from its database as 11/05, and if the preset security information contained in the two-dimensional code is also 11/05, it is determined that the data transmission is safe. . If the preset security information contained in the QR code is not 11/05, it is determined that the data transmission may pose a threat to the security of the user's data information.
- the supermarket cash register device acquires the data information in the two-dimensional code.
- the data transmission is the user information and the user's private data
- the user needs to request the Alipay client before the data information is transmitted to the supermarket cash register device.
- the server corresponding to the end sends a short message verification code to the mobile phone bound by Alipay, and after the verification of the short message verification code is successful, the short-distance data transmission is completed.
- the supermarket cash register device ignores the pattern information including the data information.
- another embodiment of the present invention further provides a data sending end.
- the device embodiment corresponds to the foregoing method embodiment.
- the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can implement the foregoing method. All the contents of the example.
- An embodiment of the present invention provides a data sending end, as shown in FIG. 7, including:
- the monitoring unit 71 monitors sound wave information including preset safety information within a preset distance range
- the parsing unit 72 when the monitoring unit 71 detects the sound wave information including the preset safety information within the preset distance range, parsing the sound wave information;
- the obtaining unit 73 is configured to acquire the preset security information in the sound wave information during the parsing of the sound wave information by the parsing unit 72;
- the generating unit 74 generates pattern information according to the preset security information acquired by the obtaining unit 73 and the data information to be sent;
- the output display unit 75 outputs the display of the pattern information generated by the generating unit 74, so that the data receiving end acquires the pattern information.
- the monitoring unit 71 calls the preset microphone to monitor the sound wave information including the preset safety information within a preset distance range.
- the generating unit 74 includes:
- the obtaining module 741 is configured to obtain the data information to be sent
- the generating module 742 generates the pattern information by using the preset security information and the data information to be sent acquired by the acquiring module 331 according to a preset encoding algorithm.
- the embodiment of the present invention provides a data receiving end, as shown in FIG. 9, including:
- the generating unit 91 generates sound wave information including preset security information
- the broadcast unit 92 broadcasts the sound wave information generated by the generating unit generated by the generating unit 91;
- the first obtaining unit 93 is configured to acquire the pattern information displayed in the data sending end, where the pattern information includes preset security information and data information to be detected;
- the authentication unit 94 authenticates the preset security information to be detected acquired by the first acquiring unit 93;
- the second obtaining unit 95 acquires the data information in the image information when the authentication unit 94 determines that the preset security information to be detected is successfully authenticated.
- the generating unit 91 calls a preset sound wave generator, and generates the sound wave information including the preset safety information according to the preset sound wave generator.
- the generating unit 91 includes:
- the first calling module 911 calls its own preset sound wave generating module; wherein the preset sound wave generating module includes the preset sound wave generator;
- the first generation module 912 generates the sound wave information including the preset security information based on the preset sound wave generation module invoked by the first calling module 911;
- the second calling module 913 calls a third-party sound wave generator
- the second generation module 914 generates the sound wave information including the preset security information based on the third-party sound wave generator called by the second calling module 913.
- the generating unit 91 encodes the preset security information into the sound wave information by using a preset modulation mode
- the broadcast unit 92 broadcasts the sound wave information encoded by the generating unit 91 according to a preset transmission period; wherein the preset security information in the sound wave information transmitted by different preset transmission periods is different.
- the authentication unit 94 includes:
- the first obtaining module 941 after the preset sound wave generating module or the third-party sound wave generator sends the sound wave information including the preset safety information, acquiring the preset safety information;
- the parsing module 942 parses the pattern information acquired by the first acquiring module 941;
- the second obtaining module 943 is configured to acquire the preset security information to be detected in the pattern information during the parsing of the pattern information by the parsing module 942;
- the comparison module 944 compares the preset security information acquired by the first obtaining module 941 with the preset security information to be detected acquired by the second obtaining module 943;
- the first determining module 945 when the comparison module 944 determines that the preset security information is consistent with the preset security information to be detected, determining that the preset security information to be detected is successfully authenticated;
- the second determining module 946 determines that the preset security information to be detected fails to be authenticated when the comparison module 944 determines that the preset security information is inconsistent with the preset security information to be detected.
- the data receiving end further includes:
- the ignoring unit 96 when the authentication unit 94 determines that the preset security information to be detected fails to be authenticated, ignores the pattern information including the data information.
- the first acquiring unit 93 acquires the pattern information displayed in the data sending end by using a preset data acquiring instruction, where the preset data acquiring instruction manner includes: scanning mode, shaking data sending end Mode, button trigger mode, voice trigger mode, and track slide mode.
- the preset data acquiring instruction manner includes: scanning mode, shaking data sending end Mode, button trigger mode, voice trigger mode, and track slide mode.
- the embodiment of the present invention further provides a data transmission system.
- the system includes: a data transmitting end 1101 as shown in any one of FIG. 7 or FIG. 8 and FIG. 9 or FIG.
- the data transmitting end, the data receiving end and the data transmission system provided by the embodiment of the present invention, before the data transmitting end transmits the data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset security information within the preset distance range. And parsing the detected sound wave information, and acquiring preset security information in the sound wave information; secondly, the data sending end generates pattern information according to the acquired preset security information and the data information to be sent; finally, after generating the pattern information, The output is displayed so that the data receiving end authenticates the preset security information in the pattern information.
- the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
- the data transmitting end includes a processor and a memory, and the monitoring unit, the analyzing unit, the obtaining unit, the generating unit, and the output display unit are all stored as a program unit in a memory, and the program unit stored in the memory is executed by the processor. To achieve the corresponding function.
- the processor contains a kernel, and the kernel removes the corresponding program unit from the memory.
- the kernel can be set to one or more, and the kernel information can be adjusted to prevent the leakage of the pattern information in the transmitting device, thereby ensuring the security of the data information of the sender user.
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one Memory chip.
- RAM random access memory
- ROM read only memory
- flash RAM flash memory
- the present application further provides a computer program product, when executed on a data processing device, adapted to perform a program code for initializing a method step of: monitoring, by the data transmitting end, sound wave information including preset security information within a preset distance range; Parsing the sound wave information, and acquiring the preset security information in the sound wave information; generating pattern information according to the preset security information and data information to be sent; outputting and displaying the pattern information, so as to The data receiving end acquires the pattern information.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Emergency Alarm Devices (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Measurement Of Velocity Or Position Using Acoustic Or Ultrasonic Waves (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims (21)
- 一种数据的传输方法,其特征在于,包括:数据发送端监测预置距离范围内包括预置安全信息的声波信息;对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息;根据所述预置安全信息及待发送的数据信息生成图案信息;输出显示所述图案信息,以便数据接收端获取所述图案信息。
- 根据权利要求1所述的方法,其特征在于,数据发送端监测预置距离范围内包含预置安全信息的声波信息包括:调用预置话筒监测预置距离范围内包括所述预置安全信息的声波信息。
- 根据权利要求2所述的方法,其特征在于,根据所述预置安全信息及待发送的数据信息生成图案信息,包括:获取所述待发送的数据信息;根据预置编码算法将所述预置安全信息及所述待发送的数据信息生成所述图案信息。
- 一种数据的传输方法,其特征在于,包括:数据接收端生成包括预置安全信息的声波信息,并将所述声波信息进行广播;获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;对所述图案信息中的所述待检测的预置安全信息进行认证;若确定所述待检测的预置安全信息认证成功,则获取所述图案信息中的所述数据信息。
- 根据权利要求4所述的方法,其特征在于,数据接收端生成包括预置安全信息的声波信息包括:调用预设声波发生器,并根据所述预设声波发生器生成包括所述预置安全信息的所述声波信息。
- 根据权利要求5所述的方法,其特征在于,调用预设声波发生器,并根据所述预设声波发生器生成所述预置安全信息包括:调用其自身的预置声波发生模块,并基于所述预置声波发生模块生成包含所述预置安全信息的所述声波信息;其中,所述预置声波发生模块中包含所述预设声波发生器;或者,调用第三方声波发生器,并基于所述第三方声波发生器生成包含所述预置安 全信息的所述声波信息。
- 根据权利要求4所述的方法,其特征在于,数据接收端生成包括预置安全信息的声波信息包括:将所述预置安全信息通过预置调制方式编码至所述声波信息中;将所述声波信息进行广播包括:按照预置发送周期,将编码后的声波信息进行广播;其中,不同预置发送周期发送的声波信息中的所述预置安全信息不同。
- 根据权利要求6所述的方法,其特征在于,对所述待检测的预置安全信息进行认证包括:在所述预置声波发生模块或所述第三方声波发生器发送包含所述预置安全信息的声波信息之后,获取所述预置安全信息;对所述图案信息进行解析,并获取所述图案信息中的所述待检测的预置安全信息;将所述预置安全信息与所述待检测的预置安全信息进行比对;若所述预置安全信息与所述待检测的预置安全信息一致,则确定所述待检测的预置安全信息认证成功;若所述预置安全信息与所述待检测的预置安全信息不一致,则确定所述待检测的预置安全信息认证失败。
- 根据权利要求4-8中任一项所述的方法,其特征在于,所述方法还包括:若确定所述待检测的预置安全信息认证失败,则将包含所述数据信息的图案信息忽略。
- 根据权利要求9所述的方法,其特征在于,获取数据发送端中显示的图案信息包括:通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
- 一种数据发送端,其特征在于,包括:监测单元,监测预置距离范围内包括预置安全信息的声波信息;解析单元,当所述监测单元监测到所述预置距离范围内包括所述预置安全信息的声波信息时,对所述声波信息进行解析;获取单元,在所述解析单元对所述声波信息进行解析过程中,获取所述声波信息中 的所述预置安全信息;生成单元,根据所述获取单元获取的所述预置安全信息及待发送的数据信息生成图案信息;输出显示单元,输出显示所述生成单元生成的所述图案信息,以便数据接收端获取所述图案信息。
- 根据权利要求11所述的数据发送端,其特征在于,所述监测单元,调用预置话筒监测预置距离范围内包括所述预置安全信息的声波信息。
- 根据权利要求12所述的数据发送端,其特征在于,所述生成单元包括:获取模块,获取所述待发送的数据信息;生成模块,根据预置编码算法将所述预置安全信息及所述获取模块获取的所述待发送的数据信息生成所述图案信息。
- 一种数据接收端,其特征在于,包括:生成单元,生成包括预置安全信息的声波信息;广播单元,将所述生成单元生成的所述声波信息进行广播;第一获取单元,获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;认证单元,对所述第一获取单元获取的所述待检测的预置安全信息进行认证;第二获取单元,当所述认证单元确定所述待检测的预置安全信息认证成功时,获取所述图案信息中的所述数据信息。
- 根据权利要求14所述的数据接收端,其特征在于,所述生成单元,调用预设声波发生器,并根据所述预设声波发生器生成包括所述预置安全信息的所述声波信息。
- 根据权利要求15所述的数据接收端,其特征在于,所述生成单元包括:第一调用模块,调用其自身的预置声波发生模块;其中,所述预置声波发生模块中包含所述预设声波发生器;第一生成模块,基于所述第一调用模块调用的所述预置声波发生模块生成包含所述预置安全信息的所述声波信息;第二调用模块,调用第三方声波发生器;第二生成模块,基于所述第二调用模块调用的所述第三方声波发生器生成包括所述预置安全信息的所述声波信息。
- 根据权利要求14所述的数据接收端,其特征在于,所述生成单元,将所述预置 安全信息通过预置调制方式编码至所述声波信息中;所述广播单元,按照预置发送周期,将所述生成单元编码后的声波信息进行广播;其中,不同预置发送周期发送的声波信息中的所述预置安全信息不同。
- 根据权利要求16所述的数据接收端,其特征在于,所述认证单元包括:第一获取模块,在所述预置声波发生模块或所述第三方声波发生器发送包含所述预置安全信息的所述声波信息之后,获取所述预置安全信息;解析模块,对所述第一获取模块获取的所述图案信息进行解析;第二获取模块,在所述解析模块对所述图案信息进行解析过程中,获取所述图案信息中的所述待检测的预置安全信息;比对模块,将所述第一获取模块获取的所述预置安全信息与所述第二获取模块获取的所述待检测的预置安全信息进行比对;第一确定模块,当所述比对模块确定所述预置安全信息与所述待检测的预置安全信息一致时,确定所述待检测的预置安全信息认证成功;第二确定模块,当所述比对模块确定所述预置安全信息与所述待检测的预置安全信息不一致时,确定所述待检测的预置安全信息认证。
- 根据权利要求14-18中任一项所述的数据接收端,其特征在于,所述数据接收端还包括:忽略单元,当所述认证单元确定所述待检测的预置安全信息认证失败时,将包含所述数据信息的图案信息忽略。
- 根据权利要求19所述的数据接收端,其特征在于,所述第一获取单元,通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
- 一种数据的传输系统,其特征在于,所述系统包括:如权利要求11-13中任一项所述的数据发送端及如权利要求14-20中任一项所述的数据接收端。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020197000506A KR102476044B1 (ko) | 2016-06-07 | 2017-05-26 | 데이터 송신 방법, 데이터 송신기, 데이터 수신기, 및 시스템 |
EP17809640.0A EP3468135B1 (en) | 2016-06-07 | 2017-05-26 | Data transmission method, data transmitter, data receiver, and system |
JP2018564268A JP6929883B2 (ja) | 2016-06-07 | 2017-05-26 | データ伝送方法、データ送信機、データ受信機、及びシステム |
SG11201810903TA SG11201810903TA (en) | 2016-06-07 | 2017-05-26 | Data transmission method, data transmitter, data receiver, and system |
MYPI2018002363A MY191042A (en) | 2016-06-07 | 2017-05-26 | Data transmission method, data transmitter, data receiver, and system |
US16/193,201 US11109227B2 (en) | 2016-06-07 | 2018-11-16 | Data transmission method, data transmitter, data receiver, and system |
PH12018502582A PH12018502582A1 (en) | 2016-06-07 | 2018-12-06 | Data transmission method, data transmitter, data receiver, and system |
US16/721,591 US11070977B2 (en) | 2016-06-07 | 2019-12-19 | Data transmission method, data transmitter, data receiver, and system |
US17/379,451 US11290883B2 (en) | 2016-06-07 | 2021-07-19 | Data transmission method, data transmitter, data receiver, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610398687.8 | 2016-06-07 | ||
CN201610398687.8A CN106911658B (zh) | 2016-06-07 | 2016-06-07 | 数据的传输方法、数据发送端、数据接收端及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/193,201 Continuation US11109227B2 (en) | 2016-06-07 | 2018-11-16 | Data transmission method, data transmitter, data receiver, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017211201A1 true WO2017211201A1 (zh) | 2017-12-14 |
Family
ID=59206730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/086067 WO2017211201A1 (zh) | 2016-06-07 | 2017-05-26 | 数据的传输方法、数据发送端、数据接收端及系统 |
Country Status (10)
Country | Link |
---|---|
US (3) | US11109227B2 (zh) |
EP (1) | EP3468135B1 (zh) |
JP (1) | JP6929883B2 (zh) |
KR (1) | KR102476044B1 (zh) |
CN (1) | CN106911658B (zh) |
MY (1) | MY191042A (zh) |
PH (1) | PH12018502582A1 (zh) |
SG (1) | SG11201810903TA (zh) |
TW (1) | TW201743255A (zh) |
WO (1) | WO2017211201A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020038659A (ja) * | 2018-09-03 | 2020-03-12 | 優票股▲ふん▼有限公司 | 電子チケット入場検証偽造防止システムと方法 |
EP3828744B1 (en) * | 2018-10-26 | 2024-02-21 | Muzlive Inc. | Contactless user authentication method |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911658B (zh) | 2016-06-07 | 2021-08-06 | 创新先进技术有限公司 | 数据的传输方法、数据发送端、数据接收端及系统 |
CN107038570A (zh) | 2016-12-09 | 2017-08-11 | 阿里巴巴集团控股有限公司 | 一种支付页面显示方法、客户端及电子设备 |
US10839369B1 (en) | 2019-07-22 | 2020-11-17 | Capital One Services, Llc | Dynamic electronic communication with variable messages using encrypted quick response codes |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065480A (zh) * | 2013-03-21 | 2014-09-24 | 国民技术股份有限公司 | 终端和认证端的安全处理方法及装置、安全处理系统 |
CN104410603A (zh) * | 2014-10-20 | 2015-03-11 | 北京数字天域科技股份有限公司 | 一种验证终端身份的方法、装置及系统 |
CN104599112A (zh) * | 2013-10-30 | 2015-05-06 | 腾讯科技(深圳)有限公司 | 一种信息传输方法、装置和系统 |
US20150269559A1 (en) * | 2014-03-24 | 2015-09-24 | Cellum Innovacios es Szolgaltato Zrt. | Systems and methods for a quick card |
CN105205664A (zh) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | 一种新型的离线支付方法 |
Family Cites Families (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9367841B2 (en) * | 2011-07-18 | 2016-06-14 | Tiger T G Zhou | Facilitating mobile device payments using product code scanning |
EP1634237A4 (en) * | 2003-06-19 | 2009-09-09 | Qualcomm Inc | DEVICE AND METHOD FOR A MULTI-FUNCTION AUTHENTICATION DEVICE |
US8261071B2 (en) * | 2006-01-31 | 2012-09-04 | Microsoft Corporation | Stateless human detection for real-time messaging systems |
US8301500B2 (en) * | 2008-04-02 | 2012-10-30 | Global 1 Enterprises | Ghosting payment account data in a mobile telephone payment transaction system |
RU2398356C2 (ru) * | 2008-10-31 | 2010-08-27 | Cамсунг Электроникс Ко., Лтд | Способ установления беспроводной линии связи и система для установления беспроводной связи |
US9400978B2 (en) * | 2010-04-09 | 2016-07-26 | Paypal, Inc. | Methods and systems for selecting accounts and offers in payment transactions |
CN102299747A (zh) | 2010-06-22 | 2011-12-28 | 上海云途信息技术有限公司 | 基于声波的安全数据通讯的装置系统与方法 |
JP5685877B2 (ja) * | 2010-09-29 | 2015-03-18 | 大日本印刷株式会社 | サーバ装置、チケット情報表示プログラム、及び電子チケット提供方法等 |
GB2546026B (en) * | 2010-10-01 | 2017-08-23 | Asio Ltd | Data communication system |
TWI588761B (zh) | 2010-12-28 | 2017-06-21 | li-he Yao | Wireless secure transaction payment system and its method |
US10089606B2 (en) * | 2011-02-11 | 2018-10-02 | Bytemark, Inc. | System and method for trusted mobile device payment |
US8810368B2 (en) * | 2011-03-29 | 2014-08-19 | Nokia Corporation | Method and apparatus for providing biometric authentication using distributed computations |
US9098865B2 (en) | 2011-04-07 | 2015-08-04 | Facebook, Inc. | Ultrasonic near-field communication |
US20150012421A1 (en) | 2011-05-17 | 2015-01-08 | Valentin Andreevich Alexeev | Electronic transactions with mobile communications devices via encoded acoustic signals |
US20130024308A1 (en) | 2011-07-18 | 2013-01-24 | Tata Consultancy Services Limited | Self check out using a portable device |
US8819444B2 (en) * | 2011-12-27 | 2014-08-26 | Majid Shahbazi | Methods for single signon (SSO) using decentralized password and credential management |
US9356924B1 (en) * | 2011-12-27 | 2016-05-31 | Majid Shahbazi | Systems, methods, and computer readable media for single sign-on (SSO) using optical codes |
US20130185214A1 (en) * | 2012-01-12 | 2013-07-18 | Firethorn Mobile Inc. | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device |
WO2013142209A1 (en) * | 2012-03-23 | 2013-09-26 | Mackinnon Wendy Keith | System and method for facilitating secure self payment transactions of retail goods |
EP2693383A1 (en) * | 2012-06-27 | 2014-02-05 | Moneris Solutions Corporation | Secure payment system |
US9898719B2 (en) * | 2012-06-29 | 2018-02-20 | Paypal, Inc. | Systems, methods, and computer program products providing push payments |
JP5965774B2 (ja) * | 2012-08-07 | 2016-08-10 | 三井住友カード株式会社 | 携帯決済端末装置、決済処理方法、及びプログラム |
KR20150092111A (ko) * | 2012-10-16 | 2015-08-12 | 리아베라 코포레이션 | 사운드 기반 코드들을 이용하는 모바일 이미지 지불 시스템 |
JP2014092885A (ja) * | 2012-11-01 | 2014-05-19 | Yamaha Corp | 認証システム、認証装置、アクセスキー供給装置、端末装置、及びプログラム |
KR101296137B1 (ko) * | 2012-11-30 | 2013-08-13 | 주식회사 한국심트라 | 큐알코드이용 모바일아이디데이터 보안 방법 및 시스템 |
EP2926305A4 (en) * | 2012-11-30 | 2016-07-06 | Mobeam Inc | TRANSLATION OF MULTI-DIMENSIONAL CODE |
US10504111B2 (en) * | 2012-12-21 | 2019-12-10 | Intermec Ip Corp. | Secure mobile device transactions |
US8893964B2 (en) * | 2013-03-15 | 2014-11-25 | Dell Products L.P. | Secure point of sale presentation of a barcode at an information handling system display |
CN104424566A (zh) | 2013-09-11 | 2015-03-18 | 北京同方微电子有限公司 | 一种用于网上银行的电子动态口令装置及其交易方法 |
US9100392B2 (en) * | 2013-09-20 | 2015-08-04 | Verizon Patent And Licensing Inc. | Method and apparatus for providing user authentication and identification based on a one-time password |
US9953311B2 (en) | 2013-09-25 | 2018-04-24 | Visa International Service Association | Systems and methods for incorporating QR codes |
US20150120428A1 (en) * | 2013-10-28 | 2015-04-30 | U.S. Bank, National Association | Mobile-enabled commerce service aggregation |
US10977650B2 (en) | 2013-10-30 | 2021-04-13 | Tencent Technology (Shenzhen) Company Limited | Information transmission method, apparatus and system |
CN103793261A (zh) * | 2013-11-15 | 2014-05-14 | 深圳光启创新技术有限公司 | 指令信息的发送和接收方法及其装置 |
CN104660408A (zh) * | 2013-11-25 | 2015-05-27 | 国民技术股份有限公司 | 一种安全认证方法及装置 |
WO2015119339A1 (ko) * | 2014-02-05 | 2015-08-13 | 모비두 주식회사 | 전자 스탬프 |
CN103903368B (zh) | 2014-04-10 | 2016-02-03 | 福建联迪商用设备有限公司 | Pos终端设备、声波支付系统及方法 |
CN103903142A (zh) * | 2014-04-10 | 2014-07-02 | 福建联迪商用设备有限公司 | 一种声波安全支付方法及系统 |
US20150365384A1 (en) | 2014-06-16 | 2015-12-17 | Wul4 | System and Methods for Transmitting Information Using Inaudible Acoustic Signals |
JP2016015102A (ja) * | 2014-06-30 | 2016-01-28 | 株式会社Skiyaki | 超音波を利用したイベントチケット管理システム |
US10078830B2 (en) * | 2014-08-28 | 2018-09-18 | Retailmenot, Inc. | Modulating mobile-device displays based on ambient signals to reduce the likelihood of fraud |
JP6294203B2 (ja) * | 2014-09-29 | 2018-03-14 | 株式会社日立製作所 | 認証システム |
CN104753681A (zh) | 2015-03-31 | 2015-07-01 | 恒宝股份有限公司 | 一种动态口令认证方法及系统 |
WO2016164648A1 (en) * | 2015-04-07 | 2016-10-13 | NeuPay, Inc. | Methods and systems for using a mobile device to effect a secure electronic transaction |
CN104967997B (zh) * | 2015-05-28 | 2019-02-01 | Oppo广东移动通信有限公司 | 一种无线网路接入方法、Wi-Fi设备、终端设备及系统 |
US9471698B1 (en) * | 2015-12-02 | 2016-10-18 | International Business Machines Corporation | Embedding, transmitting and receiving data in an audio file |
CN106911658B (zh) | 2016-06-07 | 2021-08-06 | 创新先进技术有限公司 | 数据的传输方法、数据发送端、数据接收端及系统 |
-
2016
- 2016-06-07 CN CN201610398687.8A patent/CN106911658B/zh active Active
-
2017
- 2017-04-13 TW TW106112403A patent/TW201743255A/zh unknown
- 2017-05-26 EP EP17809640.0A patent/EP3468135B1/en active Active
- 2017-05-26 WO PCT/CN2017/086067 patent/WO2017211201A1/zh unknown
- 2017-05-26 KR KR1020197000506A patent/KR102476044B1/ko active IP Right Grant
- 2017-05-26 MY MYPI2018002363A patent/MY191042A/en unknown
- 2017-05-26 JP JP2018564268A patent/JP6929883B2/ja active Active
- 2017-05-26 SG SG11201810903TA patent/SG11201810903TA/en unknown
-
2018
- 2018-11-16 US US16/193,201 patent/US11109227B2/en active Active
- 2018-12-06 PH PH12018502582A patent/PH12018502582A1/en unknown
-
2019
- 2019-12-19 US US16/721,591 patent/US11070977B2/en active Active
-
2021
- 2021-07-19 US US17/379,451 patent/US11290883B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065480A (zh) * | 2013-03-21 | 2014-09-24 | 国民技术股份有限公司 | 终端和认证端的安全处理方法及装置、安全处理系统 |
CN104599112A (zh) * | 2013-10-30 | 2015-05-06 | 腾讯科技(深圳)有限公司 | 一种信息传输方法、装置和系统 |
US20150269559A1 (en) * | 2014-03-24 | 2015-09-24 | Cellum Innovacios es Szolgaltato Zrt. | Systems and methods for a quick card |
CN104410603A (zh) * | 2014-10-20 | 2015-03-11 | 北京数字天域科技股份有限公司 | 一种验证终端身份的方法、装置及系统 |
CN105205664A (zh) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | 一种新型的离线支付方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3468135A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020038659A (ja) * | 2018-09-03 | 2020-03-12 | 優票股▲ふん▼有限公司 | 電子チケット入場検証偽造防止システムと方法 |
EP3828744B1 (en) * | 2018-10-26 | 2024-02-21 | Muzlive Inc. | Contactless user authentication method |
Also Published As
Publication number | Publication date |
---|---|
EP3468135A1 (en) | 2019-04-10 |
JP6929883B2 (ja) | 2021-09-01 |
JP2019526183A (ja) | 2019-09-12 |
US20200128408A1 (en) | 2020-04-23 |
CN106911658A (zh) | 2017-06-30 |
US11109227B2 (en) | 2021-08-31 |
US20190104410A1 (en) | 2019-04-04 |
CN106911658B (zh) | 2021-08-06 |
TW201743255A (zh) | 2017-12-16 |
EP3468135B1 (en) | 2021-09-01 |
SG11201810903TA (en) | 2019-01-30 |
KR102476044B1 (ko) | 2022-12-08 |
US11070977B2 (en) | 2021-07-20 |
US20210352475A1 (en) | 2021-11-11 |
KR20190016084A (ko) | 2019-02-15 |
PH12018502582A1 (en) | 2019-09-30 |
EP3468135A4 (en) | 2019-06-12 |
MY191042A (en) | 2022-05-30 |
US11290883B2 (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11663578B2 (en) | Login using QR code | |
WO2017211201A1 (zh) | 数据的传输方法、数据发送端、数据接收端及系统 | |
WO2016061769A1 (zh) | 一种验证信息的传输方法及终端 | |
CN105282088A (zh) | 验证服务器控制方法及系统,验证控制方法及系统 | |
TW201545526A (zh) | 安全校驗方法、裝置、伺服器及終端 | |
CN103617531A (zh) | 基于可信二维码的安全支付方法和装置 | |
TW201640423A (zh) | 離線身份認證方法、智慧終端機及系統 | |
WO2024012301A1 (zh) | 二维码生成方法、扫描方法、装置及电子设备 | |
TW201933208A (zh) | 資料處理方法、終端設備和資料處理系統 | |
CN111249740A (zh) | 一种资源数据的访问方法及系统 | |
CN111555884A (zh) | 用于位置感知双因素认证的系统和方法 | |
CN105530094A (zh) | 一种身份认证方法、装置、系统以及密码器 | |
WO2019161600A1 (zh) | 一种向社区添加成员的方法、装置、服务器及介质 | |
CN114528533A (zh) | 一种认证方法、终端、手写笔及系统 | |
CN114978742B (zh) | 一种验证信息生成方法、验证方法及装置 | |
KR101595099B1 (ko) | 보안코드 서비스 제공 방법 | |
CN105323287B (zh) | 第三方应用程序的登录方法及系统 | |
US11936671B1 (en) | Zero trust architecture with browser-supported security posture data collection | |
Latvala | Evaluation of out-of-band authentication channels | |
CN115348261A (zh) | 基于5g的云端可信数据处理方法、装置、终端及存储介质 | |
CN114090996A (zh) | 多方系统互信认证方法及装置 | |
JP2022548805A (ja) | Nfcおよび非接触スマートカードを使用した安全なパスワードの生成および管理 | |
CN116094703A (zh) | Vpn的认证方法及装置 | |
TW201322722A (zh) | 多通道主動式網路身分驗證系統及相關的電腦程式產品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17809640 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2018564268 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197000506 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017809640 Country of ref document: EP Effective date: 20190107 |