WO2017211201A1 - 数据的传输方法、数据发送端、数据接收端及系统 - Google Patents

数据的传输方法、数据发送端、数据接收端及系统 Download PDF

Info

Publication number
WO2017211201A1
WO2017211201A1 PCT/CN2017/086067 CN2017086067W WO2017211201A1 WO 2017211201 A1 WO2017211201 A1 WO 2017211201A1 CN 2017086067 W CN2017086067 W CN 2017086067W WO 2017211201 A1 WO2017211201 A1 WO 2017211201A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
preset
sound wave
data
security information
Prior art date
Application number
PCT/CN2017/086067
Other languages
English (en)
French (fr)
Inventor
刘杨辉
王磊
陈戈
沈凌楠
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to KR1020197000506A priority Critical patent/KR102476044B1/ko
Priority to EP17809640.0A priority patent/EP3468135B1/en
Priority to JP2018564268A priority patent/JP6929883B2/ja
Priority to SG11201810903TA priority patent/SG11201810903TA/en
Priority to MYPI2018002363A priority patent/MY191042A/en
Publication of WO2017211201A1 publication Critical patent/WO2017211201A1/zh
Priority to US16/193,201 priority patent/US11109227B2/en
Priority to PH12018502582A priority patent/PH12018502582A1/en
Priority to US16/721,591 priority patent/US11070977B2/en
Priority to US17/379,451 priority patent/US11290883B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/206Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3226Use of secure elements separate from M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/02Non-electrical signal transmission systems, e.g. optical systems using infrasonic, sonic or ultrasonic waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B11/00Transmission systems employing sonic, ultrasonic or infrasonic waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to the field of information technology, and in particular, to a data transmission method, a data transmitting end, a data receiving end, and a system.
  • the receiving device scans the data to be sent by the transmitting device by scanning the information pattern of the two-dimensional code or barcode displayed by the transmitting device to implement data between the data.
  • the data transmission mode allows the receiving device and the transmitting device to execute without the network connection, and can also implement data transmission and transmission.
  • the implementation of the foregoing data transmission is simple and easy to operate.
  • the information pattern such as the two-dimensional code or the barcode in the transmitting device is obtained by a malicious user through photographing, the data information of the user of the transmitting device is leaked, and the threat is transmitted.
  • the security of the device data even when the information pattern to be sent by the transmitting device includes asset payment information, the malicious user can perform asset payment through the stolen information pattern, thereby bringing unnecessary economic loss to the user of the transmitting device.
  • the embodiments of the present invention provide a data transmission method, a data sending end, a data receiving end, and a system, and the main purpose thereof is to prevent pattern information leakage in the transmitting end device, thereby ensuring data security of the transmitting end user.
  • the present invention provides the following technical solutions:
  • the present invention provides a data transmission method, including:
  • the data sending end monitors the sound wave information including the preset safety information within the preset distance range
  • the output displays the pattern information so that the data receiving end acquires the pattern information.
  • a data transmission method provided by the present invention includes:
  • the data receiving end generates sound wave information including preset security information, and broadcasts the sound wave information
  • the pattern information includes preset security information and data information to be detected;
  • a data sending end provided by the present invention includes:
  • a monitoring unit that monitors sound wave information including preset safety information within a preset distance range
  • a parsing unit when the monitoring unit detects the acoustic wave information including the preset safety information within the preset distance range, parsing the sound wave information;
  • An acquiring unit in the process of parsing the sound wave information by the parsing unit, acquiring the preset security information in the sound wave information;
  • a generating unit generating pattern information according to the preset security information acquired by the acquiring unit and data information to be sent;
  • a data receiving end provided by the present invention includes:
  • a broadcast unit that broadcasts the sound wave information generated by the generating unit
  • a first acquiring unit configured to acquire pattern information displayed in a data sending end, where the pattern information includes preset security information and data information to be detected;
  • An authentication unit that authenticates the preset security information to be detected acquired by the first acquiring unit
  • a second acquiring unit when the authentication unit determines that the preset security information to be detected is successfully authenticated, acquiring the data information in the pattern information.
  • the present invention provides a data transmission system, where the system includes: data transmission as described above The sending end and the data receiving end as described above.
  • the technical solution provided by the embodiment of the present invention has at least the following advantages:
  • the data transmission method, the data transmitting end, the data receiving end and the system provided by the invention before the data transmitting end transmits the data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset safety information within the preset distance range. And parsing the detected sound wave information, and acquiring preset security information in the sound wave information; secondly, the data sending end generates pattern information according to the acquired preset security information and the data information to be sent; finally, after generating the pattern information, The output is displayed so that the data receiving end authenticates the preset security information in the pattern information.
  • the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
  • FIG. 1 is a flowchart of a first data transmission method according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of monitoring data of sound waves within a preset distance range by a data transmitting end according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a second method for transmitting data according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a third data transmission method according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a mobile phone displaying an Alipay client homepage according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing a display interface of a two-dimensional code during electronic payment according to an embodiment of the present invention.
  • FIG. 7 is a block diagram showing the composition of a data sending end according to an embodiment of the present invention.
  • FIG. 8 is a block diagram showing another composition of a data transmitting end according to an embodiment of the present invention.
  • FIG. 9 is a block diagram showing the composition of a data receiving end according to an embodiment of the present invention.
  • FIG. 10 is a block diagram showing another composition of a data receiving end according to an embodiment of the present invention.
  • FIG. 11 is a block diagram showing the structure of a data transmission system according to an embodiment of the present invention.
  • An embodiment of the present invention provides a data transmission method, where the method is applied to a data sending end, as shown in FIG. 1 , the method includes:
  • the data sending end monitors the sound wave information including the preset safety information within a preset distance range.
  • the data transmitting end When the data transmitting end and the data receiving end perform short-distance data transmission, in order to ensure the security of the transmitted data, the data transmitting end usually adds preset security information for verifying its security identity during the data transmission process, that is, preset security information. As the data receiving end and the data sending end establish a "trusted" data transmission voucher; the data receiving end will verify the validity and security of the preset security information before receiving the data sent by the data sending end to ensure the data transmitting end Send data information safely.
  • the preset security information may include, but is not limited to, the following content, such as: dynamic password information, time information, random code information, and the like. Specifically, the embodiment of the present invention does not limit this.
  • the data transmitting end when the data transmitting end performs short-distance data transmission with the data receiving end, the data receiving end serves as a sound source body, and the preset security information is loaded into the sound wave information, and the sound wave information is made of air as a medium.
  • the data is transmitted in all directions for the data transmitting end to acquire the preset security information in the sound wave information.
  • the data transmitting end since the sound wave is attenuated during the transmission process, the data transmitting end can monitor and receive the sound wave information only within the preset distance range of the sound wave broadcast.
  • the data transmitting end scans whether there is sound wave information around it, there is also a scanning preset distance range, that is, the data transmitting end can only scan the sound wave information within the preset distance range.
  • the data transmitting end can monitor the acoustic wave information only when the following two necessary conditions are met at the same time, first, within the preset distance range of the sound wave broadcast at the data receiving end; second, the preset distance of the self-scanning sound wave information Within the scope.
  • the data sending end is a smart phone
  • the data receiving end is a personal computer
  • the preset distance range of the personal computer broadcasting sound wave information broadcasting is 1 meter
  • the preset of the smart phone scanning sound wave information is preset.
  • the distance range is 3 meters.
  • the preset range of the sound wave information that the smart phone can monitor is less than or equal to 1 meter, although the preset distance of the smart phone scanning sound wave information is 3 meters, but the sound is Source body
  • the preset distance range of the broadcast sound wave information broadcast is 1 meter.
  • the actual distance between the personal computers so that the data sender obtains the sound wave information containing the preset security information is for convenience of description, and the data receiving end is a personal computer, and the data sending end is a smart phone as an example. However, it should be clarified that the description manner is not intended to limit the data receiving end according to the embodiment of the present invention.
  • the data sender is only a personal computer or a smartphone.
  • the maximum power of the sound wave information transmitted by the data receiving end controls the preset distance range of the sound wave information broadcast, and the maximum power of the broadcast sound wave information may be different at different data receiving ends; the maximum power of the sound source body The larger the distance, the larger the preset distance range of the sound wave broadcast it controls; the smaller the maximum power of the sound source body, the smaller the preset distance range of the sound wave broadcast it controls.
  • the preset distance range of the data transmitting end scanning the sound wave information is determined by the scanning hardware of the carrier installed by the data transmitting end; or, if the data transmitting end itself has the scanning function, the preset distance range of the scanning sound wave information is determined by the data transmitting end itself.
  • the scanning device is determined.
  • the preset distance range of the sound wave information broadcast at the data receiving end and the specific distance of the preset distance range of the sound wave information scanned by the data transmitting end are not limited.
  • the function of displaying the pattern information is selected in the data transmitting end.
  • the data transmitting end starts monitoring the sound wave including the preset safety information within the preset distance range. The information is monitored by real-time scanning of the sound wave information including the preset safety information until the sound wave information is detected, and the data transmitting end stops scanning.
  • the data sending end includes but is not limited to a mobile terminal device, such as a smart phone, a tablet computer, a personal computer, a portable computer, etc.; or, may be a preset installed in the mobile terminal device.
  • a mobile terminal device such as a smart phone, a tablet computer, a personal computer, a portable computer, etc.
  • the application, the preset client, and the like may be a preset installed in the mobile terminal device.
  • the application, the preset client, and the like may be a preset installed in the mobile terminal device.
  • the specific type of the data sending end is not limited in the embodiment of the present invention.
  • the data sending end parses the sound wave information, and acquires the preset security information in the sound wave information.
  • the preset security information is used as a credit certificate for data transmission between the data transmitting end and the data receiving end, and the data transmission is continued only after the data receiving end authenticates the preset security information successfully.
  • the data transmitting end parses the sound wave information according to the sound wave information monitored in step 101 to obtain preset security information.
  • the sound wave information is an analog signal
  • the data transmitting end wants to obtain the preset safety information in the sound wave information, and needs to convert the sound wave information from the analog signal into a digital signal, and convert the sound wave information into a digital signal.
  • a preset decoding rule of the preset security information is obtained, and the sound wave information is compared according to the preset decoding rule.
  • the parsing is performed to obtain preset security information carried in the acoustic wave information, and the preset security information is a plain text display mode.
  • the preset decoding rule is a decoding rule added to the sound wave information by the data receiving end in the process of generating the sound wave information according to the preset security information, so that the data sending end that obtains the sound wave information acquires the data according to the preset decoding rule.
  • Preset security information Preset security information.
  • the sound wave information is acquired at the data transmitting end, and the sound wave information is converted into a digital signal by the analog signal, and the preset security information in the form of a digital signal is directly obtained.
  • the information is an undecoded ciphertext display mode.
  • Step 103 generates pattern information based on preset security information in the form of the digital signal, and the data receiving end decodes the preset security information based on the preset decoding rule, and verifies the preset security information. Effectiveness.
  • the preset security information is loaded into the sound wave information by the data receiving end, and then the data receiving end decodes the preset security information in the pattern information, and the process does not cause resources to the data receiving end. waste.
  • the process of decoding the sound wave information by using the preset decoding rule and obtaining the preset security information is not limited.
  • the data sending end generates pattern information according to the preset security information and the data information to be sent.
  • the data sending end After acquiring the preset security information, the data sending end encodes the preset security information and the data information to be sent to generate pattern information.
  • the pattern information includes: a two-dimensional code, a barcode, a variable barcode, and the like.
  • the data information transmitted by the data sending end through the pattern information may include, but is not limited to, the following contents, such as: privacy account information, privacy file information, video information, a web address, and the like.
  • the data information to be sent included in the pattern information may be determined according to different application scenarios.
  • the generated pattern information may include preset security information and video information; when the application scenario is electronic payment
  • the generated pattern information includes at least preset security information, privacy account information, key information of the account, and the like. This embodiment does not limit its use scenario.
  • the encoding algorithm used needs to be adapted according to different development environments and programming languages.
  • the development environment and programming language of the data sending end are not specifically limited.
  • the data sending end output displays the pattern information.
  • the data sending end outputs the pattern information for display, so that the data receiving end acquires the pattern information, and authenticates the preset security information in the pattern information to implement data transmission.
  • the data transmitting end before the data transmitting end transmits data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset security information within the preset distance range, and performs the monitored sound wave information. Parsing and obtaining preset security information in the sound wave information; secondly, the data sending end is based on the acquired preset The security information and the data information to be transmitted generate pattern information; finally, after the pattern information is generated, the output information is displayed, so that the data receiving end authenticates the preset security information in the pattern information.
  • the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
  • the data sending end is usually a mobile terminal device
  • the preset microphone in the mobile terminal device is an essential function of the mobile terminal device; therefore, the preset security information is included in the range of performing the monitoring preset distance.
  • the data transmitting end calls its own preset microphone to monitor the sound wave information including the preset safety information within the preset distance range, that is, before the data transmitting end transmits the data information to the data receiving end, the data transmission is activated.
  • the microphone in the terminal and based on the microphone, monitors and receives sound wave information within a preset distance range.
  • setting a preset time threshold for acquiring the preset security information before the data sending end obtains the preset security information, setting a preset time threshold for acquiring the preset security information, if the preset time threshold is not successfully obtained within the preset time threshold Presetting the security information, canceling the data transmission between the data sending end and the data receiving end; if the preset security information is successfully obtained within the preset time threshold, continuing to execute between the data sending end and the data receiving end Data transfer.
  • the preset time threshold is set to 60s, and the data sending end starts to acquire the preset security information at 14:30:2, and at 14:31:2, the preset is still not successfully acquired. Security information, at this time, cancel or interrupt the transmission of data to the data receiver.
  • the above is only an exemplary example, and the specific setting of the preset time threshold is not limited in the embodiment of the present invention.
  • the data sending end acquires the data information to be sent, and generates the preset security information and the data information to be sent according to the preset encoding algorithm.
  • Pattern information may be an encoding algorithm executed in the background of the data sending end; or the preset encoding algorithm may also generate an application for the third-party QR code called by the data sending end, by the first
  • the three-party two-dimensional code generation application generates a two-dimensional code by presetting the security information and the data information to be transmitted. It should be clarified that the above example takes the case where the pattern information is a two-dimensional code as an example, and the description is not intended to limit the pattern information to only a two-dimensional code.
  • the embodiment of the present invention further provides another data transmission method, where the method is applied to a data receiving end, as shown in FIG. 3, the method includes:
  • the data receiving end generates sound wave information including preset security information, and broadcasts the sound wave information.
  • the data receiving end transmits the preset security information to the data transmitting end by transmitting the sound wave information, and the preset security information is carried in the sound wave information, and the data transmitting end is in the broadcasting process of the sound wave information.
  • the data transmitting end may parse the sound wave information to obtain preset security information, and use the preset security information as a certificate for the data receiving end to establish a “trusted” data transmission with the data sending end.
  • the preset security information is encoded into the sound wave information by using a preset encoding rule.
  • the data receiving end configures the preset decoding rule corresponding to the preset encoding rule in the sound wave information, so that the data transmitting end converts the sound wave information from the analog signal.
  • the preset decoding rule is obtained, and the preset security information in the sound wave information is parsed by using the preset decoding rule, and the data transmitting end generates the pattern information by using the decoded preset security information for data receiving.
  • the terminal verifies the validity of the preset security information, and the data receiving end does not need to decode the preset security information to determine the validity and legality of the preset security information.
  • the data receiving end before receiving the sound wave information, does not configure the preset decoding rule corresponding to the preset encoding rule in the sound wave information, and when the data transmitting end receives the sound wave information, Obtaining the undecoded preset security information, and using the undecoded preset security information pattern information, the data receiving end obtains the preset security information in the data sending end pattern information, and determines that the preset security information is undecoded. For security, the data receiving end first decodes the acquired preset security information according to the preset decoding rule corresponding to the preset security information, and then verifies the legality of the preset security information.
  • the data receiving end generates sound wave information including time information and broadcasts it, and sets the broadcast period of the sound wave information to 5 minutes before the broadcast; or sets the broadcast period of the sound wave information to 10 minutes, etc.
  • the time information carried in the sound wave information is the current time information of the data receiving end. If the data receiving end performs the first broadcast sound wave information at 08:00, the preset safety information in the sound wave information is 08/00, if the data is received The first broadcast sound wave information is performed at 08:10, and the preset security information in the sound wave information is 08/10.
  • the foregoing embodiment of the present invention uses the current time information of the data receiving end as the preset security information, but it should be clarified that the description mode is not intended to limit the preset security information described in the embodiment of the present invention. Can be the current time information of the data receiving end.
  • the data receiving end acquires the pattern information displayed in the data sending end.
  • the pattern information includes preset security information and data information to be detected.
  • the method may be used, but is not limited to, for example, acquiring the pattern information displayed in the data sending end by using a preset data acquiring instruction; wherein the preset data is
  • the acquisition instruction modes include: scanning mode, shaking data sending end mode, key triggering mode, voice triggering mode, and track sliding mode.
  • the preset data acquisition instruction mode in the embodiment of the present invention in addition to the scanning mode, other preset data acquisition instruction modes need to be set before data transmission, for example, setting the shaking data sending end mode to: the same single direction Two shaking, two shaking left and right, three shaking up and down, etc.;
  • the triggering mode of the button includes: the data receiving end monitors the trigger state of the preset button, and the preset button can be a physical button or a virtual button.
  • the data receiving end can obtain the pattern information displayed in the data sending end; for the data sending end is the touch screen type data transmitting end, when the data receiving end presets the track sliding mode After that, the sliding state of the touch screen in the data sending end is monitored, and when the user of the data sending end triggers the sliding operation on the screen, the pattern information is acquired.
  • the above is a description of the preset data acquisition instruction.
  • the embodiment of the present invention does not limit the type of the preset data acquisition instruction in the actual application.
  • the data receiving end authenticates the preset security information to be detected in the pattern information.
  • the process of authenticating the preset security information to be detected by the data receiving end is the basis and basis for establishing the trusted data transmission between the data receiving end and the data sending end. If the preset security information to be detected is successfully authenticated, step 304 is performed; If the preset security information to be detected fails to be authenticated, the pattern information including the data information is ignored.
  • step 301 Based on the example in step 301, it is assumed that the data receiving end broadcasts the preset security information at the time of 2016/2/12, 15:20, and the preset transmission period is set to 10 minutes, at 2016/2/12, At 15:25, the data transmitting end displays the pattern information, and the preset security information in the pattern information is 15/20. After the data receiving end acquires the pattern information, the pattern information is parsed to obtain the preset security information. /20, indicating that the preset security information received by the data sending end is the preset security information broadcasted by the data receiving end, the preset security information is successfully authenticated, and after the preset security information is successfully authenticated, the data in the pattern information is continued.
  • the information is authenticated; if the pattern information is displayed on the data transmitting end at 2016/2/12, 15:23, and the preset security information in the pattern information is 15/18, and the data receiving end broadcasts the latest of the preset security information.
  • the time is 2016/2/12, 15:20, indicating that the preset security information 15/18 in the pattern information does not meet the requirements, and the pattern information may be in danger of being stolen by a malicious user, and therefore, the non-compliant pattern information is suddenly .
  • the above is only an exemplary example, and the type and specific content of the preset security information are not limited in the embodiment of the present invention.
  • the data receiving end acquires the data information in the pattern information.
  • the data transmitting end monitors the sound wave information including the preset security information within the preset distance range, and the detected sound wave.
  • the information is parsed, and the preset security information in the sound wave information is acquired;
  • the data sending end generates the pattern information according to the obtained preset security information and the data information to be sent;
  • the output is displayed, so that The data receiving end authenticates the preset security information in the pattern information.
  • the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
  • the data receiving end generates the sound wave information including the preset safety information, and the method is not limited to the following, the preset sound wave generator is called, and the sound wave information is generated according to the preset sound wave generator.
  • the data receiving end itself has a preset sound wave generating module, it calls its own preset sound wave generator, and generates sound wave information based on the preset sound wave generating module, wherein the preset sound wave generating module includes a preset sound wave generating Device.
  • the data receiving end calls a third-party sound wave generator, and generates sound wave information based on the third-party sound wave generator.
  • the preset security information carried in the sound wave information needs to be broadcasted, so that the data transmitting end acquires the preset security information.
  • the data receiving end broadcasts the preset security information carried in the sound wave information, encodes the preset security information into the sound wave information through the preset modulation mode, and presets the preset security information carried in the sound wave information according to the preset transmission period. Broadcast on air.
  • the function of presetting the preset security mode encoding of the preset security information is to put the preset security information into the sound wave information for convenient transmission or processing.
  • the data receiving end only receives the data sent by the data sending end after the authentication of the preset security information to be detected in the pattern information is successful, if the pattern information is to be detected. If the preset security information authentication is unsuccessful, the data information in the data sending end may be leaked or stolen, and the data information sent by the data sending end is not received; therefore, the preset security information to be detected is authenticated. Is the basis for ensuring data security at the data sender.
  • the authentication of the preset security information to be detected by the data receiving end includes: acquiring the preset security information after the preset sound wave generating module or the third-party sound wave generator sends the preset security information; parsing the pattern information, and acquiring the pattern information
  • the preset security information to be detected; the preset security information is compared with the preset security information to be detected; if the preset security information is consistent with the preset security information to be detected, the preset security information to be detected is authenticated. If the preset security information is inconsistent with the preset security information to be detected, the preset security information to be detected fails to be authenticated, and the pattern containing the data information is ignored.
  • the data information in the pattern information needs to be verified.
  • the data information is the private file information
  • the hardware device attribute of the data sending end of the private file information such as the device model name corresponding to the data sending end, needs to be verified; if the data information is the funds transfer information, the data receiving end needs Send a notification message to the server corresponding to the data sending end, so that the server authenticates the data sending end.
  • the data information included in the pattern information can be directly obtained.
  • the security of the pattern information when performing short-distance data transmission between the data transmitting end and the data receiving end, the security of the pattern information must be confirmed by the preset security information in the sound wave information, and the pattern information may be After the reliability authentication is passed, the data transmission is continued. Since the preset security information in the pattern information is dynamically changed, the pattern information displayed in the data transmitting end is dynamically changed, and the data transmitting end can also be considered in the actual application. The pattern information displayed in the game changes in real time, and even if the pattern information is stolen by a malicious user, it does not hinder the user's interests.
  • the data transmission end and the data receiving end are in the process of performing the data transmission process.
  • the embodiment of the present invention further provides a data transmission method.
  • an application scenario in which an electronic payment is paid by using a two-dimensional code is mainly taken as an example.
  • the data transmitting end is an Alipay client installed in the user A mobile phone
  • the data receiving end is a supermarket cash register device.
  • the description manner is not intended to limit the data transmitting end and the data receiving end of the embodiment of the present invention to only the Alipay client and the supermarket cash register device installed in the mobile phone.
  • the main process methods involved in this scenario include:
  • the supermarket cash register device generates sound wave information including preset safety information, and broadcasts the sound wave information.
  • the supermarket cash register device calls its own sound wave generating module, and generates sound wave information according to the sound wave generating module, and each sound wave information contains preset safety information.
  • the preset safety information is used to generate sound wave information for the supermarket cash register device.
  • the broadcast period of the sound wave information of the supermarket cash register device is 3 minutes, assuming that the supermarket cash register device sends the sound wave last time.
  • the time of the information is 11:05, and the preset security information in the sound wave information is 11/05.
  • the Alipay client monitors the sound wave information including the preset security information within a preset distance range.
  • user A When user A makes an electronic payment for the purchased item through the Alipay client, first, user A triggers the start of the Alipay client command to start the Alipay client, as shown in FIG. 5, at the current time 11:06, user A Click the payment function in the Alipay client home page.
  • the microphone in the mobile phone is called, and based on the microphone, the sound wave information including the preset safety information is monitored within the preset distance range. It should be noted that In this application scenario, it is necessary to determine that the Alipay client installs the carrier mobile phone for online networking.
  • the Alipay client parses the sound wave information, acquires the preset security information in the sound wave information, and generates a two-dimensional code according to the preset security information and the data information to be sent.
  • the Alipay client parses the sound wave information monitored in step 402, determines that the preset security information included in the sound wave information is 11/05, and generates a two-dimensional code according to the preset security information, the account information of Alipay, and the key information.
  • the Alipay client output displays the two-dimensional code.
  • FIG. 6 is a schematic diagram of a display interface of a two-dimensional code for electronic payment according to an embodiment of the present invention.
  • the representation form of the pattern information in the Alipay client is not limited.
  • the supermarket cash register device obtains the two-dimensional code displayed in the Alipay client.
  • the supermarket cash register device scans and recognizes the pattern information displayed in the Alipay client based on its own scanning identification gun, and acquires preset security information in the two-dimensional code.
  • the supermarket cash register device authenticates the preset security information to be detected in the two-dimensional code.
  • step 407 If the preset security information to be detected is successfully authenticated, step 407 is performed; if the preset security information to be detected fails to be authenticated, step 408 is performed.
  • the supermarket cash register device obtains the preset security information in the latest broadcast sound wave information from its database as 11/05, and if the preset security information contained in the two-dimensional code is also 11/05, it is determined that the data transmission is safe. . If the preset security information contained in the QR code is not 11/05, it is determined that the data transmission may pose a threat to the security of the user's data information.
  • the supermarket cash register device acquires the data information in the two-dimensional code.
  • the data transmission is the user information and the user's private data
  • the user needs to request the Alipay client before the data information is transmitted to the supermarket cash register device.
  • the server corresponding to the end sends a short message verification code to the mobile phone bound by Alipay, and after the verification of the short message verification code is successful, the short-distance data transmission is completed.
  • the supermarket cash register device ignores the pattern information including the data information.
  • another embodiment of the present invention further provides a data sending end.
  • the device embodiment corresponds to the foregoing method embodiment.
  • the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can implement the foregoing method. All the contents of the example.
  • An embodiment of the present invention provides a data sending end, as shown in FIG. 7, including:
  • the monitoring unit 71 monitors sound wave information including preset safety information within a preset distance range
  • the parsing unit 72 when the monitoring unit 71 detects the sound wave information including the preset safety information within the preset distance range, parsing the sound wave information;
  • the obtaining unit 73 is configured to acquire the preset security information in the sound wave information during the parsing of the sound wave information by the parsing unit 72;
  • the generating unit 74 generates pattern information according to the preset security information acquired by the obtaining unit 73 and the data information to be sent;
  • the output display unit 75 outputs the display of the pattern information generated by the generating unit 74, so that the data receiving end acquires the pattern information.
  • the monitoring unit 71 calls the preset microphone to monitor the sound wave information including the preset safety information within a preset distance range.
  • the generating unit 74 includes:
  • the obtaining module 741 is configured to obtain the data information to be sent
  • the generating module 742 generates the pattern information by using the preset security information and the data information to be sent acquired by the acquiring module 331 according to a preset encoding algorithm.
  • the embodiment of the present invention provides a data receiving end, as shown in FIG. 9, including:
  • the generating unit 91 generates sound wave information including preset security information
  • the broadcast unit 92 broadcasts the sound wave information generated by the generating unit generated by the generating unit 91;
  • the first obtaining unit 93 is configured to acquire the pattern information displayed in the data sending end, where the pattern information includes preset security information and data information to be detected;
  • the authentication unit 94 authenticates the preset security information to be detected acquired by the first acquiring unit 93;
  • the second obtaining unit 95 acquires the data information in the image information when the authentication unit 94 determines that the preset security information to be detected is successfully authenticated.
  • the generating unit 91 calls a preset sound wave generator, and generates the sound wave information including the preset safety information according to the preset sound wave generator.
  • the generating unit 91 includes:
  • the first calling module 911 calls its own preset sound wave generating module; wherein the preset sound wave generating module includes the preset sound wave generator;
  • the first generation module 912 generates the sound wave information including the preset security information based on the preset sound wave generation module invoked by the first calling module 911;
  • the second calling module 913 calls a third-party sound wave generator
  • the second generation module 914 generates the sound wave information including the preset security information based on the third-party sound wave generator called by the second calling module 913.
  • the generating unit 91 encodes the preset security information into the sound wave information by using a preset modulation mode
  • the broadcast unit 92 broadcasts the sound wave information encoded by the generating unit 91 according to a preset transmission period; wherein the preset security information in the sound wave information transmitted by different preset transmission periods is different.
  • the authentication unit 94 includes:
  • the first obtaining module 941 after the preset sound wave generating module or the third-party sound wave generator sends the sound wave information including the preset safety information, acquiring the preset safety information;
  • the parsing module 942 parses the pattern information acquired by the first acquiring module 941;
  • the second obtaining module 943 is configured to acquire the preset security information to be detected in the pattern information during the parsing of the pattern information by the parsing module 942;
  • the comparison module 944 compares the preset security information acquired by the first obtaining module 941 with the preset security information to be detected acquired by the second obtaining module 943;
  • the first determining module 945 when the comparison module 944 determines that the preset security information is consistent with the preset security information to be detected, determining that the preset security information to be detected is successfully authenticated;
  • the second determining module 946 determines that the preset security information to be detected fails to be authenticated when the comparison module 944 determines that the preset security information is inconsistent with the preset security information to be detected.
  • the data receiving end further includes:
  • the ignoring unit 96 when the authentication unit 94 determines that the preset security information to be detected fails to be authenticated, ignores the pattern information including the data information.
  • the first acquiring unit 93 acquires the pattern information displayed in the data sending end by using a preset data acquiring instruction, where the preset data acquiring instruction manner includes: scanning mode, shaking data sending end Mode, button trigger mode, voice trigger mode, and track slide mode.
  • the preset data acquiring instruction manner includes: scanning mode, shaking data sending end Mode, button trigger mode, voice trigger mode, and track slide mode.
  • the embodiment of the present invention further provides a data transmission system.
  • the system includes: a data transmitting end 1101 as shown in any one of FIG. 7 or FIG. 8 and FIG. 9 or FIG.
  • the data transmitting end, the data receiving end and the data transmission system provided by the embodiment of the present invention, before the data transmitting end transmits the data to the data receiving end, first, the data transmitting end monitors the sound wave information including the preset security information within the preset distance range. And parsing the detected sound wave information, and acquiring preset security information in the sound wave information; secondly, the data sending end generates pattern information according to the acquired preset security information and the data information to be sent; finally, after generating the pattern information, The output is displayed so that the data receiving end authenticates the preset security information in the pattern information.
  • the pattern information generated by the data sending end in the embodiment of the present invention includes preset security information generated by the data receiving end, and the preset security information is generated by the data receiving end according to a preset sending period, and different The preset security information sent by the preset sending period is different, so that the information including the preset security information pattern sent by the data sending end is dynamically changed, and the data receiving end can perform the data after the preset security information in the pattern information is authenticated. Secure transmission; prevent the pattern information in the data sending end from being stolen by malicious users, thereby ensuring the security of the data information of the data sending end user.
  • the data transmitting end includes a processor and a memory, and the monitoring unit, the analyzing unit, the obtaining unit, the generating unit, and the output display unit are all stored as a program unit in a memory, and the program unit stored in the memory is executed by the processor. To achieve the corresponding function.
  • the processor contains a kernel, and the kernel removes the corresponding program unit from the memory.
  • the kernel can be set to one or more, and the kernel information can be adjusted to prevent the leakage of the pattern information in the transmitting device, thereby ensuring the security of the data information of the sender user.
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one Memory chip.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • the present application further provides a computer program product, when executed on a data processing device, adapted to perform a program code for initializing a method step of: monitoring, by the data transmitting end, sound wave information including preset security information within a preset distance range; Parsing the sound wave information, and acquiring the preset security information in the sound wave information; generating pattern information according to the preset security information and data information to be sent; outputting and displaying the pattern information, so as to The data receiving end acquires the pattern information.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Emergency Alarm Devices (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Measurement Of Velocity Or Position Using Acoustic Or Ultrasonic Waves (AREA)
  • Alarm Systems (AREA)

Abstract

本发明公开了一种数据的传输方法、数据发送端、数据接收端及系统,涉及信息技术领域,主要目的在于防止发送端设备中的图案信息泄露,从而确保了发送端用户的数据信息安全。技术方案主要包括:数据发送端监测预置距离范围内包括预置安全信息的声波信息;对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息;根据所述预置安全信息及待发送的数据信息生成图案信息;输出显示所述图案信息,以便所述数据接收端获取所述图案信息。本发明应用于设备间近距离电子支付应用场景中。

Description

数据的传输方法、数据发送端、数据接收端及系统
本申请要求2016年06月07日递交的申请号为201610398687.8、发明名称为“数据的传输方法、数据发送端、数据接收端及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息技术领域,尤其涉及一种数据的传输方法、数据发送端、数据接收端及系统。
背景技术
随着手机、平板电脑等智能移动设备的快速发展及广泛应用,越来越多的用户更加倾向于使用智能移动设备进行日常工作、生活及学习,伴随着智能移动设备在日常工作、生活、学习中的使用,通过设备之间近距离数据传输的方式也越来越多,例如:手机支付、电子券核销、交换名片、跨设备网页跳转等等。
目前,应用最广泛的设备间近距离数据传输的方式为:接收端设备通过扫描发送端设备展示的二维码或条形码等信息图案,获取发送端设备待发送的数据,以实现数据之间的传递;且该种数据传输方式允许接收端设备、发送端设备在未进行网络连接的前提下执行,也能够实现数据的传递传输。
上述数据传输的实现方式简单、易操作,但是,若发送端设备中的二维码或条形码等信息图案被恶意用户通过拍照等方式获取,则会泄露发送端设备用户的数据信息,威胁发送端设备数据的安全;甚至,当发送端设备待发送的信息图案包含资产支付信息时,恶意用户可通过盗用的信息图案进行资产支付,给发送端设备用户带去不必要的经济损失。
发明内容
有鉴于此,本发明实施例提供一种数据的传输方法、数据发送端、数据接收端及系统,主要目的在于防止发送端设备中的图案信息泄露,从而确保了发送端用户的数据信息安全。
为达到上述目的,本发明提供如下技术方案:
第一方面,本发明提供一种数据的传输方法,包括:
数据发送端监测预置距离范围内包括预置安全信息的声波信息;
对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息;
根据所述预置安全信息及待发送的数据信息生成图案信息;
输出显示所述图案信息,以便数据接收端获取所述图案信息。
第二方面,本发明提供的一种数据的传输方法,包括:
数据接收端生成包括预置安全信息的声波信息,并将所述声波信息进行广播;
获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;
对所述图案信息中的所述待检测的预置安全信息进行认证;
若确定所述待检测的预置安全信息认证成功,则获取所述图案信息中的所述数据信息。
第三方面,本发明提供的一种数据发送端,包括:
监测单元,监测预置距离范围内包括预置安全信息的声波信息;
解析单元,当所述监测单元监测到所述预置距离范围内包括所述预置安全信息的声波信息时,对所述声波信息进行解析;
获取单元,在所述解析单元对所述声波信息进行解析过程中,获取所述声波信息中的所述预置安全信息;
生成单元,根据所述获取单元获取的所述预置安全信息及待发送的数据信息生成图案信息;
输出显示单元,输出显示所述生成单元生成的所述图案信息,以便数据接收端获取所述图案信息。
第四方面,本发明提供的一种数据接收端,包括:
生成单元,生成包括预置安全信息的声波信息;
广播单元,将所述生成单元生成的所述声波信息进行广播;
第一获取单元,获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;
认证单元,对所述第一获取单元获取的所述待检测的预置安全信息进行认证;
第二获取单元,当所述认证单元确定所述待检测的预置安全信息认证成功时,获取所述图案信息中的所述数据信息。
第五方面,本发明提供的一种数据的传输系统,所述系统包括:如上所述的数据发 送端及如上所述的数据接收端。
借由上述技术方案,本发明实施例提供的技术方案至少具有下列优点:
本发明提供的数据的传输方法、数据发送端、数据接收端及系统,数据发送端在向数据接收端传输数据之前,首先,数据发送端监测预置距离范围内包括预置安全信息的声波信息,对监测到的声波信息进行解析,并获取声波信息中的预置安全信息;其次,数据发送端根据获取的预置安全信息与待发送的数据信息生成图案信息;最后,生成图案信息之后,将其输出显示,以便数据接收端对图案信息中的预置安全信息进行认证。与现有技术相比,本发明实施例中数据发送端生成的图案信息中包含数据接收端生成的预置安全信息,该预置安全信息为数据接收端按照预置发送周期生成的,不同的预置发送周期发送的预置安全信息不同,使得数据发送端发送的包含预置安全信息图案信息是动态变化的,数据接收端对图案信息中的预置安全信息进行认证后,可执行数据的安全传输;防止数据发送端中的图案信息被恶意用户盗取,进而确保了数据发送端用户的数据信息安全。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了本发明实施例提供的第一种数据的传输方法的流程图;
图2示出了本发明实施例提供的数据发送端监测预置距离范围内声波信息的示意图;
图3示出了本发明实施例提供的第二种数据的传输方法的流程图;
图4示出了本发明实施例提供的第三种数据的传输方法的流程图;
图5示出了本发明实施例提供的手机显示支付宝客户端首页的示意图;
图6示出了本发明实施例提供的电子支付时二维码的显示界面的示意图;
图7示出了本发明实施例提供的一种数据发送端的组成框图;
图8示出了本发明实施例提供的另一种数据发送端的组成框图;
图9示出了本发明实施例提供的一种数据接收端的组成框图;
图10示出了本发明实施例提供的另一种数据接收端的组成框图;
图11示出了本发明实施例提供的一种数据的传输系统的组成框图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
本发明实施例提供一种数据的传输方法,该方法应用于数据发送端,如图1所示,该方法包括:
101、数据发送端监测预置距离范围内包括预置安全信息的声波信息。
数据发送端与数据接收端进行近距离数据传输时,为了确保传输数据的安全性,数据发送端通常会在数据传输过程中添加用于验证其安全身份的预置安全信息,即预置安全信息作为数据接收端与数据发送端建立“可信任”数据传输的凭证;数据接收端在接收到数据发送端发送的数据之前,会验证预置安全信息的有效性、安全性,以确保数据发送端发送数据信息的安全。所述预置安全信息可以包含但不局限于以下内容,例如:动态口令信息、时间信息、随机码信息等等,具体的,本发明实施例对此不作限定。
本发明实施例中,数据发送端在与数据接收端执行近距离数据传输时,数据接收端作为声源体,将预置安全信息搭载到声波信息中,并将该声波信息以空气为介质向四面八方进行传播,以供数据发送端获取该声波信息中的预置安全信息。在实际应用中,由于声波在传输过程中具有衰减性,因此,数据发送端只有在声波广播的预置距离范围内才能监测、接收到声波信息。此外,数据发送端在扫描其周围是否存在声波信息时,也存在一个扫描预置距离范围,即数据发送端只能扫描该预置距离范围内的声波信息。因此,数据发送端只有在同时满足以下两个必要条件时,才能监测到声波信息,第一、在数据接收端声波广播的预置距离范围内;第二、其自身扫描声波信息的预置距离范围内。
示例性的,假设,如图2所示,数据发送端为智能手机,数据接收端为个人电脑,个人电脑广播声波信息广播的预置距离范围的为1米,智能手机扫描声波信息的预置距离范围为3米,在本发明实施例中,智能手机能够监测到声波信息的预置距离范围为小于或者等于1米,虽然智能手机扫描声波信息的预置距离范围为3米,但是,声源体(个 人电脑)广播声波信息广播的预置距离范围的为1米,当声源体(个人电脑)与智能手机之间的实际距离大于1米,智能手机不会监测到声波信息,需要不断缩小与个人电脑之间的实际距离,以使得数据发送端获取包含预置安全信息的声波信息。以上示例为便于表述,以数据接收端为个人电脑、数据发送端为智能手机为例进行说明,但应当明确的是,该种说明方式并非意在限定本发明实施例所述的数据接收端、数据发送端仅为个人电脑或智能手机。
其中,数据接收端(声源体)发送声波信息的最大功率控制声波信息广播的预置距离范围,而不同的数据接收端,其广播声波信息的最大功率可能存在差异;声源体的最大功率越大,其控制的声波广播的预置距离范围越大;声源体的最大功率越小,其控制的声波广播的预置距离范围越小。数据发送端扫描声波信息的预置距离范围由数据发送端所安装载体的扫描硬件确定;或者,若数据发送端本身自带扫描功能,则扫描声波信息的预置距离范围由数据发送端本身的扫描设备确定。本发明实施例对数据接收端声波信息广播的预置距离范围,以及数据发送端扫描声波信息的预置距离范围的具体距离不作限定。
当数据发送端的用户希望进行近距离进行数据传输时,在数据发送端中选择展示图案信息的功能,在用户选择该功能后,数据发送端开始监测预置距离范围内包括预置安全信息的声波信息,采用实时扫描的方式对包含预置安全信息的声波信息进行监测,直到监测到声波信息时,数据发送端停止扫描。
本发明实施例中,所述数据发送端包括但不局限于移动终端设备,例如:智能手机、平板电脑、个人电脑、便携式电脑等等;或者,也可以为安装于移动终端设备中的预置应用程序、预置客户端等等,具体的,本发明实施例对数据发送端的具体类型不进行限定。
102、数据发送端对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息。
预置安全信息作为数据发送端与数据接收端进行数据传输的授信凭证,只有当数据接收端认证该预置安全信息成功之后,才会继续执行数据传输。数据发送端根据步骤101监测到的声波信息,对该声波信息进行解析,获取预置安全信息。
数据接收端在接收到声波信息后,该声波信息为模拟信号,数据发送端欲获取声波信息中预置安全信息,需将声波信息由模拟信号转换为数字信号,在将声波信息转换为数字信号之后,获取预置安全信息的预置解码规则,并根据该预置解码规则对声波信息 进行解析,获取声波信息中携带的预置安全信息,该预置安全信息为明文显示方式。其中,该预置解码规则为数据接收端在根据预置安全信息生成声波信息过程中,所添加到声波信息中的解码规则,以便获取到该声波信息的数据发送端基于该预置解码规则获取预置安全信息。
在实际应用中,为了节省数据发送端的有限资源,在数据发送端获取到声波信息,并将声波信息由模拟信号转换为数字信号之后,直接获取数字信号形式的预置安全信息,该预置安全信息为未解码的密文显示方式,步骤103基于该数字信号形式的预置安全信息生成图案信息,由数据接收端基于预置解码规则对预置安全信息进行解码,并验证预置安全信息的有效性。需要说明的是,预置安全信息搭载到声波信息是由数据接收端执行的,再由数据接收端对图案信息中的预置安全信息进行解码,该过程并不会给数据接收端造成资源的浪费。具体的,本发明实施例对数据发送端是否通过预置解码规则对声波信息进行解码,并获取预置安全信息的过程不作限定。
103、数据发送端根据所述预置安全信息及待发送的数据信息生成图案信息。
数据发送端在获取预置安全信息之后,将该预置安全信息及待发送的数据信息进行编码,生成图案信息;所述图案信息包括:二维码、条形码、可变条码等等。
在实际应用中,数据发送端通过图案信息传输的数据信息可以包含但不局限于以下内容,例如:隐私账号信息、隐私文件信息、视频信息、网址等等。其中,图案信息中包含的待发送的数据信息可视不同的应用场景而定,当应用场景为面对面传输视频时,生成的图案信息可包含预置安全信息、视频信息;当应用场景为电子支付时,生成的图案信息中至少包含预置安全信息、隐私账号信息、账号的密钥信息等。本实施例对其使用场景不作限制。
需要说明的是,由于数据发送端的开发环境、编程语言存在差异,在生成图案信息时,所使用的编码算法需要根据不同的开发环境、编程语言进行适配。具体的,对数据发送端的开发环境、编程语言不进行具体限定。
104、数据发送端输出显示所述图案信息。
数据发送端将所述图案信息输出显示,以便数据接收端获取该图案信息,并对该图案信息中的预置安全信息进行认证,以实现数据的传输。
本发明实施例提供的数据的传输方法,数据发送端在向数据接收端传输数据之前,首先,数据发送端监测预置距离范围内包括预置安全信息的声波信息,对监测到的声波信息进行解析,并获取声波信息中的预置安全信息;其次,数据发送端根据获取的预置 安全信息与待发送的数据信息生成图案信息;最后,生成图案信息之后,将其输出显示,以便数据接收端对图案信息中的预置安全信息进行认证。与现有技术相比,本发明实施例中数据发送端生成的图案信息中包含数据接收端生成的预置安全信息,该预置安全信息为数据接收端按照预置发送周期生成的,不同的预置发送周期发送的预置安全信息不同,使得数据发送端发送的包含预置安全信息图案信息是动态变化的,数据接收端对图案信息中的预置安全信息进行认证后,可执行数据的安全传输;防止数据发送端中的图案信息被恶意用户盗取,进而确保了数据发送端用户的数据信息安全。
进一步的,在具体实施时,数据发送端通常为移动终端设备,而移动终端设备中的预置话筒为移动终端设备的必备功能;因此,在执行监测预置距离范围内包含预置安全信息的声波信息时,数据发送端调用其自身的预置话筒对预置距离范围内的包含预置安全信息的声波信息进行监测,即当数据发送端向数据接收端传输数据信息之前,激活数据发送端中的话筒,并基于该话筒监测、接收预置距离范围内的声波信息。
可选的,作为本发明实施例的一种实现方式,在数据发送端获取预置安全信息之前,设置获取预置安全信息的预设时间阈值,若在该预设时间阈值内未成功获取到预置安全信息,则取消本次数据发送端与数据接收端之间的数据传输;若在该预设时间阈值内成功获取到预置安全信息,则继续执行数据发送端与数据接收端之间的数据传输。示例性的,假设,设置预设时间阈值为60s,而数据发送端在14时30分2秒开始执行获取预置安全信息,而在14时31分2秒时,仍然未成功获取到预置安全信息,此时,取消或者中断向数据接收端传输数据。以上仅为示例性的举例,本发明实施例对预设时间阈值的具体设置不进行限定。
进一步的,根据所述预置安全信息及待发送的数据信息生成图案信息,具体包括:数据发送端获取待发送的数据信息,根据预置编码算法将预置安全信息及待发送的数据信息生成图案信息。在实际应用中,所述预置编码算法可以为数据发送端后台执行的编码算法;或者,所述预置编码算法也可以为数据发送端调用的第三方二维码生成应用程序,由该第三方二维码生成应用程序将预置安全信息及待发送的数据信息生成二维码。应当明确,上述示例以图案信息为二维码为例进行的说明,该种说明方式并非意在限定图案信息仅能为二维码。
进一步的,本发明实施例还提供另一种数据的传输方法,该方法应用于数据接收端,如图3所示,所述方法包括:
301、数据接收端生成包括预置安全信息的声波信息,并将所述声波信息进行广播。
本发明实施例中,数据接收端通过发送声波信息的方式,将预置安全信息传递至数据发送端,所述预置安全信息携带于声波信息中,声波信息的广播过程中,若数据发送端监测到该声波信息,则数据发送端可对该声波信息进行解析,以获取预置安全信息,并将该预置安全信息作为数据接收端与数据发送端建立“可信任”数据传输的凭证。
数据接收端将预置安全信息编码到声波信息时,采用预置编码规则将预置安全信息编码至声波信息中。作为本发明实施例的一种实现方式,数据接收端在广播声波信息之前,将预置编码规则对应的预置解码规则配置于声波信息中,以便数据发送端在将该声波信息由模拟信号转化为数字信号后,获取该预置解码规则,并使用该预置解码规则对声波信息中的预置安全信息进行解析,数据发送端使用解码后的预置安全信息生成图案信息,以供数据接收端对预置安全信息的有效性进行验证,数据接收端无需对该预置安全信息进行解码即可确定该预置安全信息的有效性、合法性。
作为本发明实施例的另一种实现方式,数据接收端在广播声波信息之前,未将预置编码规则对应的预置解码规则配置于声波信息中,当数据发送端接收到该声波信息后,获取未解码后的预置安全信息,并使用未解码后的预置安全信息图案信息,数据接收端获取数据发送端图案信息中的预置安全信息,并确定该预置安全信息为未解码后的安全性,数据接收端首先根据预置安全信息对应的预置解码规则对获取的预置安全信息进行解码,再验证预置安全信息的合法性。
为了便于说明,以下将以搭载在声波信息中时间信息作为预置安全信息为例进行说明。示例性的,数据接收端生成包含时间信息的声波信息,并将其进行广播,在广播之前,设置声波信息的广播周期为5分钟;或者,设置声波信息的广播周期为10分钟等等,而搭载在声波信息中的时间信息为数据接收端的当前时间信息,若数据接收端在08:00进行了第一次广播声波信息,则声波信息中的预置安全信息为08/00,若数据接收端在08:10进行了第一次广播声波信息,则声波信息中的预置安全信息为08/10。为便于表述,本发明上述实施例以数据接收端的当前时间信息作为预置安全信息进行说明,但应当明确的是,该种说明方式并非意在限定本发明实施例所述的预置安全信息仅能为数据接收端的当前时间信息。
302、数据接收端获取数据发送端中显示的图案信息。
其中,所述图案信息中包含待检测的预置安全信息和数据信息。
在获取数据发送端中显示的图案信息时,可以采用但不局限于以下方式,例如:通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据 获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
本发明实施例中的预设数据获取指令方式中除扫描方式外,其他的预设数据获取指令方式均需进行在数据传输之前进行设置,例如,设置摇动数据发送端方式为:向同一单一方向两次晃动、左右晃动两次、上下晃动三次等;所述按键触发方式包括:数据接收端对预设按键的触发状态进行监听,该预设按键可以为物理按键,也可以为虚拟按键,当数据发送端触发该预设按键时,数据接收端即可获取数据发送端中显示的图案信息;对于数据发送端为触屏式数据发送端而言,当数据接收端对轨迹滑动方式进行预设之后,对数据发送端中的触控屏的滑动状态进行监听,当数据发送端用户在屏幕上触发滑动操作时,获取图案信息。以上是对预设数据获取指令的说明,本发明实施例对实际应用中预设数据获取指令的类型不进行限定。
303、数据接收端对所述图案信息中的所述待检测的预置安全信息进行认证。
数据接收端对待检测的预置安全信息进行认证的过程,是数据接收端与数据发送端建立可信任数据传输的基础、依据,若待检测的预置安全信息认证成功,则执行步骤304;若待检测的预置安全信息认证失败,则将包含数据信息的所述图案信息忽略。
承由步骤301中的示例,假设,数据接收端在2016/2/12,15:20时刻进行预置安全信息的广播,且设置的预置发送周期为10分钟,在2016/2/12,15:25时刻数据发送端显示图案信息,且该图案信息中的预置安全信息为15/20,数据接收端在获取该图案信息后,对该图案信息进行解析,获取预置安全信息为15/20,说明数据发送端接收到的预置安全信息为数据接收端最新广播的预置安全信息,则预置安全信息认证成功,在预置安全信息认证成功之后,继续对图案信息中的数据信息进行认证;若在在2016/2/12,15:23时刻数据发送端显示图案信息,且该图案信息中的预置安全信息为15/18,而数据接收端广播预置安全信息的最新时间为2016/2/12,15:20,说明图案信息中的预置安全信息15/18不符合规定,该图案信息可能存在被恶意用户盗用的危险,因此,将该不符合规定的图案信息忽略。需要说明的是,以上仅为示例性的举例,本发明实施例对预置安全信息的类型、具体内容不进行限定。
304、若确定所述待检测的预置安全信息认证成功,则数据接收端获取所述图案信息中的所述数据信息。
本发明实施例提供的数据的传输方法,数据发送端在向数据接收端传输数据之前,首先,数据发送端监测预置距离范围内包括预置安全信息的声波信息,对监测到的声波 信息进行解析,并获取声波信息中的预置安全信息;其次,数据发送端根据获取的预置安全信息与待发送的数据信息生成图案信息;最后,生成图案信息之后,将其输出显示,以便数据接收端对图案信息中的预置安全信息进行认证。与现有技术相比,本发明实施例中数据发送端生成的图案信息中包含数据接收端生成的预置安全信息,该预置安全信息为数据接收端按照预置发送周期生成的,不同的预置发送周期发送的预置安全信息不同,使得数据发送端发送的包含预置安全信息图案信息是动态变化的,数据接收端对图案信息中的预置安全信息进行认证后,可执行数据的安全传输;防止数据发送端中的图案信息被恶意用户盗取,进而确保了数据发送端用户的数据信息安全。
进一步的,数据接收端生成包括预置安全信息的声波信息可以采用但不局限于以下方式,调用预设声波发生器,并根据预设声波发生器生成声波信息。当数据接收端其自身拥有预置声波发生模块时,调用其自身的预置声波发生器,并基于该预设声波发生模块生成声波信息,其中,该预置声波发生模块中包含预设声波发生器。当数据接收端其自身不包含预置声波发生模块时,数据接收端调用第三方声波发生器,并基于第三方声波发生器生成声波信息。
进一步的,在生成声波信息之后,需要将携带于声波信息的预置安全信息进行广播,以便数据发送端获取预置安全信息。数据接收端将携带于声波信息的预置安全信息进行广播,将预置安全信息通过预置调制方式编码至声波信息中,按照预置发送周期将编码后的携带于声波信息的预置安全信息以空气为介质进行广播。对预置安全信息进行预置调制方式编码的作用在于,把预置安全信息置入声波信息中,便于传输或处理。
进一步的,为了确保数据发送端的数据信息安全,数据接收端只有在对图案信息中的待检测的预置安全信息认证成功后,才会接收数据发送端发送的数据,若图案信息中的待检测的预置安全信息认证不成功,则说明数据发送端中的数据信息可能存在被泄露、盗取的可能,不会接收数据发送端发送的数据信息;因此,对待检测的预置安全信息进行认证,是确保数据发送端数据安全的依据。数据接收端对待检测的预置安全信息进行认证包括:在预置声波发生模块或第三方声波发生器发送预置安全信息之后,获取预置安全信息;对图案信息进行解析,并获取图案信息中的待检测的预置安全信息;将预置安全信息与待检测的预置安全信息进行比对;若预置安全信息与待检测的预置安全信息一致,则待检测的预置安全信息认证成功;若预置安全信息与待检测的预置安全信息不一致,则待检测的预置安全信息认证失败,将包含数据信息的图案忽略。
在实际应用中,在数据传输过程中对数据安全性要求较高时,当数据接收端对数据 发送端中的预置安全信息认证通过后,还需要对图案信息中的数据信息进行验证。示例性的,若数据信息为隐私文件信息,则需要验证隐私文件信息的数据发送端的硬件设备属性,如数据发送端对应的设备型号名称;若数据信息为资金转出信息,则数据接收端需向数据发送端对应的服务器发送通知消息,以便服务器对数据发送端进行身份验证。在数据传输过程中,对于数据安全等级要求较低的数据传输,在数据接收端对数据发送端中的预置安全信息认证成功后,直接获取图案信息中包含的数据信息即可。
需要说明的是,本发明实施例在数据发送端与数据接收端之间执行近距离数据传输时,必须要通过声波信息中的预置安全信息确认图案信息的安全性,对该图案信息的可信度认证通过后,继续执行数据传输,由于图案信息中的预置安全信息是动态变化的,随之动态变化的是数据发送端中显示的图案信息,在实际应用中也可以认为数据发送端中显示的图案信息是实时变化的,即便图案信息被恶意用户盗取,也不会妨害用户的利益。
以上已详细说明了数据发送端与数据接收端在数据传输过程的执行过程,本发明实施例还提供一种数据的传输方法。本方法中,主要以使用二维码进行电子支付当面付的应用场景为例进行说明,为了便于表达,以数据发送端为用户A手机中安装的支付宝客户端,数据接收端为超市收银设备为例进行说明,但应当明确的是,该种说明方式并非意在限定本发明实施例的数据发送端及数据接收端仅为手机中安装的支付宝客户端、超市收银设备。如图4所示,该场景涉及的主要流程方法包括:
401、超市收银设备生成包括预置安全信息的声波信息,并将声波信息进行广播。
超市收银设备调用其自身的声波发生模块,根据该声波发生模块生成声波信息,每个声波信息中均包含有预置安全信息,本应用场景中以预置安全信息为超市收银设备生成声波信息的当前时间,且超市收银设备发送声波信息的最大功率所控制声波信息广播的预置距离范围为80cm,该超市收银设备的声波信息的广播周期为3分钟,假设,该超市收银设备最近一次发送声波信息的时间为11:05分,该声波信息中的预置安全信息为11/05。
402、支付宝客户端监测预置距离范围内包括预置安全信息的声波信息。
当用户A对购买的物品通过支付宝客户端进行电子支付时,首先,用户A触发启动支付宝客户端指令,启动该支付宝客户端,如图5所示,在当前时间11:06时刻时,用户A点击支付宝客户端首页中的付款功能,当用户A触发付款功能时,调用手机中的话筒,基于该话筒监测预置距离范围内包括预置安全信息的声波信息。需要说明的是,在 该应用场景下,必须要确定支付宝客户端安装载体手机为在线联网状态。
403、支付宝客户端对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息,根据所述预置安全信息及待发送的数据信息生成二维码。
支付宝客户端解析步骤402中监测到的声波信息,确定声波信息中包含的预置安全信息为11/05,并根据该预置安全信息、支付宝的账号信息、密钥信息生成二维码。
404、支付宝客户端输出显示所述二维码。
当支付宝客户端生成图案信息时,本应用场景中以图案信息为二维码,将该二维码在手机中进行显示,以便超市收银设备扫描识别该二维码中包含的信息。如图6所示,图6示出了本发明实施例提供的电子支付时二维码的显示界面的示意图,具体的,对支付宝客户端中图案信息的表现形式不进行限定。
405、超市收银设备获取支付宝客户端中显示的二维码。
超市收银设备基于其自带的扫描识别枪对支付宝客户端中显示的图案信息进行扫描识别,获取该二维码中的预置安全信息。
406、超市收银设备对所述二维码中的所述待检测的预置安全信息进行认证。
若所述待检测的预置安全信息认证成功,则执行步骤407;若所述待检测的预置安全信息认证失败,则执行步骤408。
超市收银设备从其数据库中获取最近一次广播声波信息中的预置安全信息为11/05,若二维码中包含的预置安全信息也为11/05,则确定本次数据传输为安全的。若二维码中包含的预置安全信息不为11/05,则确定本次数据传输可能对用户的数据信息的安全造成威胁。
407、超市收银设备获取所述二维码中的所述数据信息。
本实施例中,由于数据传输的是数据信息为用户资金,涉及用户的隐私数据信息,因此,为确保用户A隐私信息的安全,在数据信息传输到超市收银设备之前过程中,需要请求支付宝客户端对应的服务器向支付宝绑定的手机发送短信验证码,待短信验证码验证成功后,完成近距离数据传输。
408、超市收银设备将包含所述数据信息的图案信息忽略。
进一步的,作为对上述图1所示方法的实现,本发明另一实施例还提供了一种数据发送端。该装置实施例与前述方法实施例对应,为便于阅读,本装置实施例不再对前述方法实施例中的细节内容进行逐一赘述,但应当明确,本实施例中的装置能够对应实现前述方法实施例中的全部内容。
本发明实施例提供一种数据发送端,如图7所示,包括:
监测单元71,监测预置距离范围内包括预置安全信息的声波信息;
解析单元72,当所述监测单元71监测到所述预置距离范围内包括所述预置安全信息的声波信息时,对所述声波信息进行解析;
获取单元73,在所述解析单元72对所述声波信息进行解析过程中,获取所述声波信息中的所述预置安全信息;
生成单元74,根据所述获取单元73获取的所述预置安全信息及待发送的数据信息生成图案信息;
输出显示单元75,输出显示所述生成单元74生成的所述图案信息,以便所述数据接收端获取所述图案信息。
进一步的,所述监测单元71,调用预置话筒监测预置距离范围内包括所述预置安全信息的声波信息。
进一步的,如图8所示,所述生成单元74包括:
获取模块741,获取所述待发送的数据信息;
生成模块742,根据预置编码算法将所述预置安全信息及所述获取模块331获取的所述待发送的数据信息生成所述图案信息。
进一步的,本发明实施例提供一种数据接收端,如图9所示,包括:
生成单元91,生成包括预置安全信息的声波信息;
广播单元92,将所述生成单元91生成的将所述生成单元生成的所述声波信息进行广播;
第一获取单元93,获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;
认证单元94,对所述第一获取单元93获取的所述待检测的预置安全信息进行认证;
第二获取单元95,当所述认证单元94确定所述待检测的预置安全信息认证成功时,获取图像信息中的所述数据信息。
进一步的,所述生成单元91,调用预设声波发生器,并根据所述预设声波发生器生成包括所述预置安全信息的所述声波信息。
进一步的,如图10所示,所述生成单元91包括:
第一调用模块911,调用其自身的预置声波发生模块;其中,所述预置声波发生模块中包含所述预设声波发生器;
第一生成模块912,基于所述第一调用模块911调用的所述预置声波发生模块生成包含所述预置安全信息的所述声波信息;
第二调用模块913,调用第三方声波发生器;
第二生成模块914,基于所述第二调用模块913调用的所述第三方声波发生器生成包含所述预置安全信息的所述声波信息。
进一步的,如图10所示,所述生成单元91,将所述预置安全信息通过预置调制方式编码至所述声波信息中;
所述广播单元92,按照预置发送周期,将所述生成单元91编码后的声波信息进行广播;其中,不同预置发送周期发送的声波信息中的所述预置安全信息不同。
进一步的,如图10所示,所述认证单元94包括:
第一获取模块941,在所述预置声波发生模块或所述第三方声波发生器发送包含所述预置安全信息的所述声波信息之后,获取所述预置安全信息;
解析模块942,对所述第一获取模块941获取的所述图案信息进行解析;
第二获取模块943,在所述解析模块942对所述图案信息进行解析过程中,获取所述图案信息中的所述待检测的预置安全信息;
比对模块944,将所述第一获取模块941获取的所述预置安全信息与所述第二获取模块943获取的所述待检测的预置安全信息进行比对;
第一确定模块945,当所述比对模块944确定所述预置安全信息与所述待检测的预置安全信息一致时,确定所述待检测的预置安全信息认证成功;
第二确定模块946,当所述比对模块944确定所述预置安全信息与所述待检测的预置安全信息不一致时,确定所述待检测的预置安全信息认证失败。
进一步的,如图10所示,所述数据接收端还包括:
忽略单元96,当所述认证单元94确定所述待检测的预置安全信息认证失败时,将包含所述数据信息的图案信息忽略。
进一步的,所述第一获取单元93,通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
进一步的,本发明实施例还提供一种数据的传输系统,如图11所示,所述系统包括:如图7或图8中任一幅所示的数据发送端1101及如图9或图10中任一幅所示的数据接收端1102。
本发明实施例提供的数据发送端、数据接收端及数据的传输系统,数据发送端在向数据接收端传输数据之前,首先,数据发送端监测预置距离范围内包括预置安全信息的声波信息,对监测到的声波信息进行解析,并获取声波信息中的预置安全信息;其次,数据发送端根据获取的预置安全信息与待发送的数据信息生成图案信息;最后,生成图案信息之后,将其输出显示,以便数据接收端对图案信息中的预置安全信息进行认证。与现有技术相比,本发明实施例中数据发送端生成的图案信息中包含数据接收端生成的预置安全信息,该预置安全信息为数据接收端按照预置发送周期生成的,不同的预置发送周期发送的预置安全信息不同,使得数据发送端发送的包含预置安全信息图案信息是动态变化的,数据接收端对图案信息中的预置安全信息进行认证后,可执行数据的安全传输;防止数据发送端中的图案信息被恶意用户盗取,进而确保了数据发送端用户的数据信息安全。
所述数据发送端包括处理器和存储器,上述监测单元、解析单元、获取单元、生成单元、及输出显示单元等均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。
处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核参数来防止发送端设备中的图案信息的泄露,从而确保了发送端用户的数据信息安全。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。
本申请还提供了一种计算机程序产品,当在数据处理设备上执行时,适于执行初始化有如下方法步骤的程序代码:数据发送端监测预置距离范围内包括预置安全信息的声波信息;对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息;根据所述预置安全信息及待发送的数据信息生成图案信息;输出显示所述图案信息,以便所述数据接收端获取所述图案信息。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的图表中图形的显示方法、装置、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。存储器是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
以上仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说, 本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (21)

  1. 一种数据的传输方法,其特征在于,包括:
    数据发送端监测预置距离范围内包括预置安全信息的声波信息;
    对所述声波信息进行解析,并获取所述声波信息中的所述预置安全信息;
    根据所述预置安全信息及待发送的数据信息生成图案信息;
    输出显示所述图案信息,以便数据接收端获取所述图案信息。
  2. 根据权利要求1所述的方法,其特征在于,数据发送端监测预置距离范围内包含预置安全信息的声波信息包括:
    调用预置话筒监测预置距离范围内包括所述预置安全信息的声波信息。
  3. 根据权利要求2所述的方法,其特征在于,根据所述预置安全信息及待发送的数据信息生成图案信息,包括:
    获取所述待发送的数据信息;
    根据预置编码算法将所述预置安全信息及所述待发送的数据信息生成所述图案信息。
  4. 一种数据的传输方法,其特征在于,包括:
    数据接收端生成包括预置安全信息的声波信息,并将所述声波信息进行广播;
    获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;
    对所述图案信息中的所述待检测的预置安全信息进行认证;
    若确定所述待检测的预置安全信息认证成功,则获取所述图案信息中的所述数据信息。
  5. 根据权利要求4所述的方法,其特征在于,数据接收端生成包括预置安全信息的声波信息包括:
    调用预设声波发生器,并根据所述预设声波发生器生成包括所述预置安全信息的所述声波信息。
  6. 根据权利要求5所述的方法,其特征在于,调用预设声波发生器,并根据所述预设声波发生器生成所述预置安全信息包括:
    调用其自身的预置声波发生模块,并基于所述预置声波发生模块生成包含所述预置安全信息的所述声波信息;其中,所述预置声波发生模块中包含所述预设声波发生器;
    或者,调用第三方声波发生器,并基于所述第三方声波发生器生成包含所述预置安 全信息的所述声波信息。
  7. 根据权利要求4所述的方法,其特征在于,数据接收端生成包括预置安全信息的声波信息包括:
    将所述预置安全信息通过预置调制方式编码至所述声波信息中;
    将所述声波信息进行广播包括:
    按照预置发送周期,将编码后的声波信息进行广播;其中,不同预置发送周期发送的声波信息中的所述预置安全信息不同。
  8. 根据权利要求6所述的方法,其特征在于,对所述待检测的预置安全信息进行认证包括:
    在所述预置声波发生模块或所述第三方声波发生器发送包含所述预置安全信息的声波信息之后,获取所述预置安全信息;
    对所述图案信息进行解析,并获取所述图案信息中的所述待检测的预置安全信息;
    将所述预置安全信息与所述待检测的预置安全信息进行比对;
    若所述预置安全信息与所述待检测的预置安全信息一致,则确定所述待检测的预置安全信息认证成功;
    若所述预置安全信息与所述待检测的预置安全信息不一致,则确定所述待检测的预置安全信息认证失败。
  9. 根据权利要求4-8中任一项所述的方法,其特征在于,所述方法还包括:
    若确定所述待检测的预置安全信息认证失败,则将包含所述数据信息的图案信息忽略。
  10. 根据权利要求9所述的方法,其特征在于,获取数据发送端中显示的图案信息包括:
    通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
  11. 一种数据发送端,其特征在于,包括:
    监测单元,监测预置距离范围内包括预置安全信息的声波信息;
    解析单元,当所述监测单元监测到所述预置距离范围内包括所述预置安全信息的声波信息时,对所述声波信息进行解析;
    获取单元,在所述解析单元对所述声波信息进行解析过程中,获取所述声波信息中 的所述预置安全信息;
    生成单元,根据所述获取单元获取的所述预置安全信息及待发送的数据信息生成图案信息;
    输出显示单元,输出显示所述生成单元生成的所述图案信息,以便数据接收端获取所述图案信息。
  12. 根据权利要求11所述的数据发送端,其特征在于,所述监测单元,调用预置话筒监测预置距离范围内包括所述预置安全信息的声波信息。
  13. 根据权利要求12所述的数据发送端,其特征在于,所述生成单元包括:
    获取模块,获取所述待发送的数据信息;
    生成模块,根据预置编码算法将所述预置安全信息及所述获取模块获取的所述待发送的数据信息生成所述图案信息。
  14. 一种数据接收端,其特征在于,包括:
    生成单元,生成包括预置安全信息的声波信息;
    广播单元,将所述生成单元生成的所述声波信息进行广播;
    第一获取单元,获取数据发送端中显示的图案信息;其中,所述图案信息中包含待检测的预置安全信息和数据信息;
    认证单元,对所述第一获取单元获取的所述待检测的预置安全信息进行认证;
    第二获取单元,当所述认证单元确定所述待检测的预置安全信息认证成功时,获取所述图案信息中的所述数据信息。
  15. 根据权利要求14所述的数据接收端,其特征在于,所述生成单元,调用预设声波发生器,并根据所述预设声波发生器生成包括所述预置安全信息的所述声波信息。
  16. 根据权利要求15所述的数据接收端,其特征在于,所述生成单元包括:
    第一调用模块,调用其自身的预置声波发生模块;其中,所述预置声波发生模块中包含所述预设声波发生器;
    第一生成模块,基于所述第一调用模块调用的所述预置声波发生模块生成包含所述预置安全信息的所述声波信息;
    第二调用模块,调用第三方声波发生器;
    第二生成模块,基于所述第二调用模块调用的所述第三方声波发生器生成包括所述预置安全信息的所述声波信息。
  17. 根据权利要求14所述的数据接收端,其特征在于,所述生成单元,将所述预置 安全信息通过预置调制方式编码至所述声波信息中;
    所述广播单元,按照预置发送周期,将所述生成单元编码后的声波信息进行广播;其中,不同预置发送周期发送的声波信息中的所述预置安全信息不同。
  18. 根据权利要求16所述的数据接收端,其特征在于,所述认证单元包括:
    第一获取模块,在所述预置声波发生模块或所述第三方声波发生器发送包含所述预置安全信息的所述声波信息之后,获取所述预置安全信息;
    解析模块,对所述第一获取模块获取的所述图案信息进行解析;
    第二获取模块,在所述解析模块对所述图案信息进行解析过程中,获取所述图案信息中的所述待检测的预置安全信息;
    比对模块,将所述第一获取模块获取的所述预置安全信息与所述第二获取模块获取的所述待检测的预置安全信息进行比对;
    第一确定模块,当所述比对模块确定所述预置安全信息与所述待检测的预置安全信息一致时,确定所述待检测的预置安全信息认证成功;
    第二确定模块,当所述比对模块确定所述预置安全信息与所述待检测的预置安全信息不一致时,确定所述待检测的预置安全信息认证。
  19. 根据权利要求14-18中任一项所述的数据接收端,其特征在于,所述数据接收端还包括:
    忽略单元,当所述认证单元确定所述待检测的预置安全信息认证失败时,将包含所述数据信息的图案信息忽略。
  20. 根据权利要求19所述的数据接收端,其特征在于,所述第一获取单元,通过预设数据获取指令获取所述数据发送端中显示的所述图案信息;其中,所述预设数据获取指令方式包括:扫描方式、摇动数据发送端方式、按键触发方式、语音触发的方式、及轨迹滑动方式。
  21. 一种数据的传输系统,其特征在于,所述系统包括:如权利要求11-13中任一项所述的数据发送端及如权利要求14-20中任一项所述的数据接收端。
PCT/CN2017/086067 2016-06-07 2017-05-26 数据的传输方法、数据发送端、数据接收端及系统 WO2017211201A1 (zh)

Priority Applications (9)

Application Number Priority Date Filing Date Title
KR1020197000506A KR102476044B1 (ko) 2016-06-07 2017-05-26 데이터 송신 방법, 데이터 송신기, 데이터 수신기, 및 시스템
EP17809640.0A EP3468135B1 (en) 2016-06-07 2017-05-26 Data transmission method, data transmitter, data receiver, and system
JP2018564268A JP6929883B2 (ja) 2016-06-07 2017-05-26 データ伝送方法、データ送信機、データ受信機、及びシステム
SG11201810903TA SG11201810903TA (en) 2016-06-07 2017-05-26 Data transmission method, data transmitter, data receiver, and system
MYPI2018002363A MY191042A (en) 2016-06-07 2017-05-26 Data transmission method, data transmitter, data receiver, and system
US16/193,201 US11109227B2 (en) 2016-06-07 2018-11-16 Data transmission method, data transmitter, data receiver, and system
PH12018502582A PH12018502582A1 (en) 2016-06-07 2018-12-06 Data transmission method, data transmitter, data receiver, and system
US16/721,591 US11070977B2 (en) 2016-06-07 2019-12-19 Data transmission method, data transmitter, data receiver, and system
US17/379,451 US11290883B2 (en) 2016-06-07 2021-07-19 Data transmission method, data transmitter, data receiver, and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610398687.8 2016-06-07
CN201610398687.8A CN106911658B (zh) 2016-06-07 2016-06-07 数据的传输方法、数据发送端、数据接收端及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/193,201 Continuation US11109227B2 (en) 2016-06-07 2018-11-16 Data transmission method, data transmitter, data receiver, and system

Publications (1)

Publication Number Publication Date
WO2017211201A1 true WO2017211201A1 (zh) 2017-12-14

Family

ID=59206730

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/086067 WO2017211201A1 (zh) 2016-06-07 2017-05-26 数据的传输方法、数据发送端、数据接收端及系统

Country Status (10)

Country Link
US (3) US11109227B2 (zh)
EP (1) EP3468135B1 (zh)
JP (1) JP6929883B2 (zh)
KR (1) KR102476044B1 (zh)
CN (1) CN106911658B (zh)
MY (1) MY191042A (zh)
PH (1) PH12018502582A1 (zh)
SG (1) SG11201810903TA (zh)
TW (1) TW201743255A (zh)
WO (1) WO2017211201A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020038659A (ja) * 2018-09-03 2020-03-12 優票股▲ふん▼有限公司 電子チケット入場検証偽造防止システムと方法
EP3828744B1 (en) * 2018-10-26 2024-02-21 Muzlive Inc. Contactless user authentication method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911658B (zh) 2016-06-07 2021-08-06 创新先进技术有限公司 数据的传输方法、数据发送端、数据接收端及系统
CN107038570A (zh) 2016-12-09 2017-08-11 阿里巴巴集团控股有限公司 一种支付页面显示方法、客户端及电子设备
US10839369B1 (en) 2019-07-22 2020-11-17 Capital One Services, Llc Dynamic electronic communication with variable messages using encrypted quick response codes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065480A (zh) * 2013-03-21 2014-09-24 国民技术股份有限公司 终端和认证端的安全处理方法及装置、安全处理系统
CN104410603A (zh) * 2014-10-20 2015-03-11 北京数字天域科技股份有限公司 一种验证终端身份的方法、装置及系统
CN104599112A (zh) * 2013-10-30 2015-05-06 腾讯科技(深圳)有限公司 一种信息传输方法、装置和系统
US20150269559A1 (en) * 2014-03-24 2015-09-24 Cellum Innovacios es Szolgaltato Zrt. Systems and methods for a quick card
CN105205664A (zh) * 2015-09-25 2015-12-30 中城智慧科技有限公司 一种新型的离线支付方法

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9367841B2 (en) * 2011-07-18 2016-06-14 Tiger T G Zhou Facilitating mobile device payments using product code scanning
EP1634237A4 (en) * 2003-06-19 2009-09-09 Qualcomm Inc DEVICE AND METHOD FOR A MULTI-FUNCTION AUTHENTICATION DEVICE
US8261071B2 (en) * 2006-01-31 2012-09-04 Microsoft Corporation Stateless human detection for real-time messaging systems
US8301500B2 (en) * 2008-04-02 2012-10-30 Global 1 Enterprises Ghosting payment account data in a mobile telephone payment transaction system
RU2398356C2 (ru) * 2008-10-31 2010-08-27 Cамсунг Электроникс Ко., Лтд Способ установления беспроводной линии связи и система для установления беспроводной связи
US9400978B2 (en) * 2010-04-09 2016-07-26 Paypal, Inc. Methods and systems for selecting accounts and offers in payment transactions
CN102299747A (zh) 2010-06-22 2011-12-28 上海云途信息技术有限公司 基于声波的安全数据通讯的装置系统与方法
JP5685877B2 (ja) * 2010-09-29 2015-03-18 大日本印刷株式会社 サーバ装置、チケット情報表示プログラム、及び電子チケット提供方法等
GB2546026B (en) * 2010-10-01 2017-08-23 Asio Ltd Data communication system
TWI588761B (zh) 2010-12-28 2017-06-21 li-he Yao Wireless secure transaction payment system and its method
US10089606B2 (en) * 2011-02-11 2018-10-02 Bytemark, Inc. System and method for trusted mobile device payment
US8810368B2 (en) * 2011-03-29 2014-08-19 Nokia Corporation Method and apparatus for providing biometric authentication using distributed computations
US9098865B2 (en) 2011-04-07 2015-08-04 Facebook, Inc. Ultrasonic near-field communication
US20150012421A1 (en) 2011-05-17 2015-01-08 Valentin Andreevich Alexeev Electronic transactions with mobile communications devices via encoded acoustic signals
US20130024308A1 (en) 2011-07-18 2013-01-24 Tata Consultancy Services Limited Self check out using a portable device
US8819444B2 (en) * 2011-12-27 2014-08-26 Majid Shahbazi Methods for single signon (SSO) using decentralized password and credential management
US9356924B1 (en) * 2011-12-27 2016-05-31 Majid Shahbazi Systems, methods, and computer readable media for single sign-on (SSO) using optical codes
US20130185214A1 (en) * 2012-01-12 2013-07-18 Firethorn Mobile Inc. System and Method For Secure Offline Payment Transactions Using A Portable Computing Device
WO2013142209A1 (en) * 2012-03-23 2013-09-26 Mackinnon Wendy Keith System and method for facilitating secure self payment transactions of retail goods
EP2693383A1 (en) * 2012-06-27 2014-02-05 Moneris Solutions Corporation Secure payment system
US9898719B2 (en) * 2012-06-29 2018-02-20 Paypal, Inc. Systems, methods, and computer program products providing push payments
JP5965774B2 (ja) * 2012-08-07 2016-08-10 三井住友カード株式会社 携帯決済端末装置、決済処理方法、及びプログラム
KR20150092111A (ko) * 2012-10-16 2015-08-12 리아베라 코포레이션 사운드 기반 코드들을 이용하는 모바일 이미지 지불 시스템
JP2014092885A (ja) * 2012-11-01 2014-05-19 Yamaha Corp 認証システム、認証装置、アクセスキー供給装置、端末装置、及びプログラム
KR101296137B1 (ko) * 2012-11-30 2013-08-13 주식회사 한국심트라 큐알코드이용 모바일아이디데이터 보안 방법 및 시스템
EP2926305A4 (en) * 2012-11-30 2016-07-06 Mobeam Inc TRANSLATION OF MULTI-DIMENSIONAL CODE
US10504111B2 (en) * 2012-12-21 2019-12-10 Intermec Ip Corp. Secure mobile device transactions
US8893964B2 (en) * 2013-03-15 2014-11-25 Dell Products L.P. Secure point of sale presentation of a barcode at an information handling system display
CN104424566A (zh) 2013-09-11 2015-03-18 北京同方微电子有限公司 一种用于网上银行的电子动态口令装置及其交易方法
US9100392B2 (en) * 2013-09-20 2015-08-04 Verizon Patent And Licensing Inc. Method and apparatus for providing user authentication and identification based on a one-time password
US9953311B2 (en) 2013-09-25 2018-04-24 Visa International Service Association Systems and methods for incorporating QR codes
US20150120428A1 (en) * 2013-10-28 2015-04-30 U.S. Bank, National Association Mobile-enabled commerce service aggregation
US10977650B2 (en) 2013-10-30 2021-04-13 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
CN103793261A (zh) * 2013-11-15 2014-05-14 深圳光启创新技术有限公司 指令信息的发送和接收方法及其装置
CN104660408A (zh) * 2013-11-25 2015-05-27 国民技术股份有限公司 一种安全认证方法及装置
WO2015119339A1 (ko) * 2014-02-05 2015-08-13 모비두 주식회사 전자 스탬프
CN103903368B (zh) 2014-04-10 2016-02-03 福建联迪商用设备有限公司 Pos终端设备、声波支付系统及方法
CN103903142A (zh) * 2014-04-10 2014-07-02 福建联迪商用设备有限公司 一种声波安全支付方法及系统
US20150365384A1 (en) 2014-06-16 2015-12-17 Wul4 System and Methods for Transmitting Information Using Inaudible Acoustic Signals
JP2016015102A (ja) * 2014-06-30 2016-01-28 株式会社Skiyaki 超音波を利用したイベントチケット管理システム
US10078830B2 (en) * 2014-08-28 2018-09-18 Retailmenot, Inc. Modulating mobile-device displays based on ambient signals to reduce the likelihood of fraud
JP6294203B2 (ja) * 2014-09-29 2018-03-14 株式会社日立製作所 認証システム
CN104753681A (zh) 2015-03-31 2015-07-01 恒宝股份有限公司 一种动态口令认证方法及系统
WO2016164648A1 (en) * 2015-04-07 2016-10-13 NeuPay, Inc. Methods and systems for using a mobile device to effect a secure electronic transaction
CN104967997B (zh) * 2015-05-28 2019-02-01 Oppo广东移动通信有限公司 一种无线网路接入方法、Wi-Fi设备、终端设备及系统
US9471698B1 (en) * 2015-12-02 2016-10-18 International Business Machines Corporation Embedding, transmitting and receiving data in an audio file
CN106911658B (zh) 2016-06-07 2021-08-06 创新先进技术有限公司 数据的传输方法、数据发送端、数据接收端及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065480A (zh) * 2013-03-21 2014-09-24 国民技术股份有限公司 终端和认证端的安全处理方法及装置、安全处理系统
CN104599112A (zh) * 2013-10-30 2015-05-06 腾讯科技(深圳)有限公司 一种信息传输方法、装置和系统
US20150269559A1 (en) * 2014-03-24 2015-09-24 Cellum Innovacios es Szolgaltato Zrt. Systems and methods for a quick card
CN104410603A (zh) * 2014-10-20 2015-03-11 北京数字天域科技股份有限公司 一种验证终端身份的方法、装置及系统
CN105205664A (zh) * 2015-09-25 2015-12-30 中城智慧科技有限公司 一种新型的离线支付方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3468135A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020038659A (ja) * 2018-09-03 2020-03-12 優票股▲ふん▼有限公司 電子チケット入場検証偽造防止システムと方法
EP3828744B1 (en) * 2018-10-26 2024-02-21 Muzlive Inc. Contactless user authentication method

Also Published As

Publication number Publication date
EP3468135A1 (en) 2019-04-10
JP6929883B2 (ja) 2021-09-01
JP2019526183A (ja) 2019-09-12
US20200128408A1 (en) 2020-04-23
CN106911658A (zh) 2017-06-30
US11109227B2 (en) 2021-08-31
US20190104410A1 (en) 2019-04-04
CN106911658B (zh) 2021-08-06
TW201743255A (zh) 2017-12-16
EP3468135B1 (en) 2021-09-01
SG11201810903TA (en) 2019-01-30
KR102476044B1 (ko) 2022-12-08
US11070977B2 (en) 2021-07-20
US20210352475A1 (en) 2021-11-11
KR20190016084A (ko) 2019-02-15
PH12018502582A1 (en) 2019-09-30
EP3468135A4 (en) 2019-06-12
MY191042A (en) 2022-05-30
US11290883B2 (en) 2022-03-29

Similar Documents

Publication Publication Date Title
US11663578B2 (en) Login using QR code
WO2017211201A1 (zh) 数据的传输方法、数据发送端、数据接收端及系统
WO2016061769A1 (zh) 一种验证信息的传输方法及终端
CN105282088A (zh) 验证服务器控制方法及系统,验证控制方法及系统
TW201545526A (zh) 安全校驗方法、裝置、伺服器及終端
CN103617531A (zh) 基于可信二维码的安全支付方法和装置
TW201640423A (zh) 離線身份認證方法、智慧終端機及系統
WO2024012301A1 (zh) 二维码生成方法、扫描方法、装置及电子设备
TW201933208A (zh) 資料處理方法、終端設備和資料處理系統
CN111249740A (zh) 一种资源数据的访问方法及系统
CN111555884A (zh) 用于位置感知双因素认证的系统和方法
CN105530094A (zh) 一种身份认证方法、装置、系统以及密码器
WO2019161600A1 (zh) 一种向社区添加成员的方法、装置、服务器及介质
CN114528533A (zh) 一种认证方法、终端、手写笔及系统
CN114978742B (zh) 一种验证信息生成方法、验证方法及装置
KR101595099B1 (ko) 보안코드 서비스 제공 방법
CN105323287B (zh) 第三方应用程序的登录方法及系统
US11936671B1 (en) Zero trust architecture with browser-supported security posture data collection
Latvala Evaluation of out-of-band authentication channels
CN115348261A (zh) 基于5g的云端可信数据处理方法、装置、终端及存储介质
CN114090996A (zh) 多方系统互信认证方法及装置
JP2022548805A (ja) Nfcおよび非接触スマートカードを使用した安全なパスワードの生成および管理
CN116094703A (zh) Vpn的认证方法及装置
TW201322722A (zh) 多通道主動式網路身分驗證系統及相關的電腦程式產品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17809640

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018564268

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20197000506

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017809640

Country of ref document: EP

Effective date: 20190107