CN106209348A - A kind of sound wave safe transmission method and device - Google Patents

A kind of sound wave safe transmission method and device Download PDF

Info

Publication number
CN106209348A
CN106209348A CN201610616416.5A CN201610616416A CN106209348A CN 106209348 A CN106209348 A CN 106209348A CN 201610616416 A CN201610616416 A CN 201610616416A CN 106209348 A CN106209348 A CN 106209348A
Authority
CN
China
Prior art keywords
client
confidential information
service end
identification code
adds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610616416.5A
Other languages
Chinese (zh)
Inventor
许琴琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610616416.5A priority Critical patent/CN106209348A/en
Publication of CN106209348A publication Critical patent/CN106209348A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B11/00Transmission systems employing sonic, ultrasonic or infrasonic waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The open a kind of sound wave safe transmission method of the present invention and device, method includes step: service end generates the first key, the first identification code and the second identification code, first identification code and target information are formed first according to the first key encryption and add confidential information by service end, and service end adds confidential information by first and the first key is launched by low-frequency sound wave signal: client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted formation second and added confidential information by client, and client adds second confidential information and sends to background server;Background server adds second confidential information and sends to service end;Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.Maltilevel security mechanism, greatly improves the safety of data transmission.

Description

A kind of sound wave safe transmission method and device
Technical field
The present invention relates to sonic transmissions field, in particular, relate to a kind of sound wave safe transmission method and device.
Background technology
At present, when transmitting data between mobile device, mobile device needs first to open bluetooth, NFC or WIFI etc. so that move Dynamic equipment can mutually be searched for, finds and match, and can carry out data transmission after successful matching between mobile device.
But, in prior art, mobile device needs to arrange special antenna to realize the function such as bluetooth, NFC or WIFI, Launching wireless signal by antenna to realize the search of mobile device, find and match, power consumption is big, and easily to mobile device The antenna that call is relevant interferes.
Using sonic transmissions to need not antenna, it is achieved more convenient, and sonic transmissions technology is the most ripe, application the most more comes The most, but the safety of sonic transmissions but has much room for improvement.
Summary of the invention
The technical problem to be solved is to provide a kind of safer sound wave safe transmission method.
It is an object of the invention to be achieved through the following technical solutions:
A kind of sound wave safe transmission method, including step:
Service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end Ceasing and add confidential information according to the first key encryption formation first, service end adds confidential information by first and the first key passes through low-frequency sound wave Signal is launched;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted shape by client Becoming second to add confidential information, client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to taking service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
Further, described including according to first key encryption formation the first encrypted message packet passes through displacement according to the first key The first of AES formation adds confidential information.
Will not be increased the length of data by displacement AES, the safety that i.e. improve transmission does not the most affect transmission effect Rate.
Further, described including according to first key encryption formation the first encrypted message packet passes through TEA according to the first key AES encryption forms first and adds confidential information.
TEA AES has the strongest resistingDifference analysisAbility.Enciphering rate is fast, and safety is fairly good, and its reliability is Being ensured by the complexity of encryption round number rather than algorithm, TEA AES has mainly used displacement and XOR.
Further, described the first encrypted message packet formed according to the first key encryption includes and passes through according to the first key The first of at least 32 encryption formation of TEA AES adds confidential information.
It is higher that TEA AES carries out at least 32 encryption formation the first encryption Information Securities, cracks and is more difficult to, the most also 64 times, 128 inferior number of times encryptions can be used.
Further, described client adds confidential information transmission to background server by SSL encryption by second.
The safety of transmission is improved further by SSL encryption.
Further, control information and the second identification code encryption formation the second encrypted message packet are included described by described client Control information and the second identification code are formed second by AES256 encryption and add confidential information by client.
Control information and the second identification code are formed the second safety adding confidential information raising transmission by AES256 encryption.
Further, described background server adds confidential information transmission to service end by SSL encryption by second.
The safety of transmission is improved further by SSL encryption.
Further, described client is provided with client database, and described client is according to client database verification clothes Business end.
The client data library storage of client has safe service end information, only finds in client database Corresponding service end information ability and service end communication, improve safety.
Further, service end is provided with service end data base, and described service end is according to service end database check client.
The service end database purchase of service end has safe client-side information, only finds at service end lane database Corresponding client end information ability and service end communication, improve safety.
A kind of sound wave safe transmission device, including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and mesh Mark information adds confidential information according to the first of the first key encryption formation, and service end adds confidential information and the first key by low by first Frequently acoustic signals is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described visitor Family end adds confidential information according to the first secret key decryption first and obtains target information;Described client generate the second identification code/, client Control information and the second identification code being encrypted formation second and adds confidential information, client adds second confidential information and sends to background service Device;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
Due to the fact that first data transmission is that service end sends information to client, client by low-frequency sound wave signal End sends information to background server again, and background server sends information to service end again, and data pass through third party transfer, Rather than only transmit between service end and client, stranger is difficult to intercept complete transmission data, and data itself also need to encryption Deciphering, and client needs the first identification code is generated the second identification code, and service end is in verification the second identification code, maltilevel security Mechanism, greatly improves the safety of data transmission.
Accompanying drawing explanation
Fig. 1 is a kind of sound wave safe transmission method schematic diagram of the embodiment of the present invention;
Fig. 2 is a kind of another schematic diagram of sound wave safe transmission method of the embodiment of the present invention.
Detailed description of the invention
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
Embodiment one
As it is shown in figure 1, a kind of sound wave safe transmission method, including step:
Service end generates the first key, and target information is formed the according to the first key by displacement AES by service end One adds confidential information, and service end adds confidential information by first and the first key is launched by low-frequency sound wave signal;
Client detects that described low-frequency sound wave signal receives and described first adds confidential information and the first key, client according to First secret key decryption first adds confidential information and obtains target information.
Confidential information is added owing to target information is formed first according to the first key by displacement AES by service end, then will First adds confidential information and the first key is launched to client, sonic transmissions low cost by low-frequency sound wave signal, and sound wave passes Defeated finite data length, will not be increased the length of data, i.e. improve the safety of transmission the most not by displacement AES Affect efficiency of transmission.
By the low-frequency sound wave transmission more convenient both sides of having only to of information, all there are loudspeaker can realize, be especially suitable for intelligence man The auto upgrading occupied, just can complete the auto upgrading of air-conditioning as only installed panel at air-conditioning loudspeaker additional, and upgrade cost is low.
Described displacement AES is TEA AES.TEA AES has the strongest resisting differential analysis ability, encryption Speed is fast, and safety is fairly good, and its reliability is to be ensured by the complexity of encryption round number rather than algorithm, and TEA encrypts Algorithm has mainly used displacement and XOR.TEA (Tiny Encryption Algorithm) AES is a kind of packet AES.
Target information is formed the first encrypted message packet according to the first key by displacement AES and includes by described service end Carry out at least 32 encryption formation first according to the first key by TEA AES and add confidential information.TEA AES carry out to It is higher that few 32 encryptions form the first encryption Information Security, cracks and is more difficult to, naturally it is also possible to uses 64 times, 128 inferior number of times Encryption.
Described client is provided with client database, and described client checks service end according to client database.Client The client data library storage of end has safe service end information, only finds the service end of correspondence in client database Information ability and service end communication, improve safety.
Service end is provided with service end data base, and described service end is according to service end database check client.Service end Service end database purchase has safe client-side information, only finds the client end letter of correspondence at service end lane database Breath ability and service end communication, improve safety.
Client generates the second key, and control information is added secret letter according to the second of the second key encryption formation by client Breath, client is added second confidential information and the second key and is sent to service end by low-frequency sound wave signal.Client controls service End, sends to service end, safe ready also by low-frequency sound wave signal, and client and server only need to all have loudspeaker just can be complete Become communication, produce and reequip low.
Described client is provided with client database, and described client obtains the according to the first key and client database Two keys, control information is added confidential information according to the second of the second key encryption formation by client, and client adds secret letter by second Breath sends to service end.Second key is calculated by the first key and client data, and service end has service end data Storehouse, service end goes out the second key by the first cipher key calculation, then adds confidential information by the second secret key decryption second, and client is not required to Second key sent to service end, to improve safety.
Client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.Client is passed through Bluetooth or WIFI or mobile network or ZigBee send control information to service end, transmit not in use by low-frequency sound wave, asymmetric Transmission means safer, immediately other people intercepted low-frequency sound wave transmission information, also cannot intercept other transmission means transmission Information.
A kind of sound wave safe transmission device, including: service end, client,
Described service end generates the first key, and target information is encrypted, according to the first key, first formed by described service end Adding confidential information, described service end adds confidential information by first and the first key is launched by low-frequency sound wave signal;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key, described visitor Family end adds confidential information according to the first secret key decryption first and obtains target information.
Embodiment two
As in figure 2 it is shown, a kind of sound wave safe transmission method, including step:
Service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end Ceasing and add confidential information according to the first key encryption formation first, service end adds confidential information by first and the first key passes through low-frequency sound wave Signal is launched;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted shape by client Becoming second to add confidential information, client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to taking service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
Owing to first data transmission is that service end sends information to client by low-frequency sound wave signal, client will again Information sends to background server, and background server sends information to service end again, and data pass through third party transfer, rather than only Having between service end and client and transmit, stranger is difficult to intercept complete transmission data, and data itself also need to encrypting and decrypting, and And client needs the first identification code is generated the second identification code, service end is in verification the second identification code, maltilevel security mechanism, pole Improve greatly the safety of data transmission.
Described including according to first key encryption formation the first encrypted message packet passes through displacement AES according to the first key First formed adds confidential information.The length of data will not be increased by displacement AES, i.e. improve the safety of transmission again Do not affect efficiency of transmission.
Described including according to first key encryption formation the first encrypted message packet is added by TEA AES according to the first key Close formation first adds confidential information.TEA AES has the strongest resisting differential analysis ability, and enciphering rate is fast, and safety is fairly good, Its reliability is to be ensured by the complexity of encryption round number rather than algorithm, TEA AES mainly used displacement and XOR.TEA (Tiny Encryption Algorithm) AES is a kind of block encryption algorithm.
Described the first encrypted message packet formed according to the first key encryption includes according to the first key by TEA AES The first of at least 32 encryption formation adds confidential information.TEA AES carries out at least 32 encryption formation first and adds confidential information peace Full property is higher, cracks and is more difficult to, naturally it is also possible to use 64 times, 128 inferior number of times encryptions.
Described client adds second confidential information by SSL encryption and sends to background server.Further by SSL encryption Improve the safety of transmission.
Control information and the second identification code encryption formation the second encrypted message packet are included described client by described client will Control information and the second identification code form second by AES256 encryption and add confidential information.Control information and the second identification code are passed through AES256 encryption forms the second safety adding confidential information raising transmission.
Described background server adds second confidential information by SSL encryption and sends to service end.Further by SSL encryption Improve the safety of transmission.
Described client is provided with client database, and described client checks service end according to client database.Client The client data library storage of end has safe service end information, only finds the service end of correspondence in client database Information ability and service end communication, improve safety.
Service end is provided with service end data base, and described service end is according to service end database check client.Service end Service end database purchase has safe client-side information, only finds the client end letter of correspondence at service end lane database Breath ability and service end communication, improve safety.
A kind of sound wave safe transmission device, including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and mesh Mark information adds confidential information according to the first of the first key encryption formation, and service end adds confidential information and the first key by low by first Frequently acoustic signals is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described visitor Family end adds confidential information according to the first secret key decryption first and obtains target information;Described client generate the second identification code/, client Control information and the second identification code being encrypted formation second and adds confidential information, client adds second confidential information and sends to background service Device;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
Above content is to combine concrete preferred implementation further description made for the present invention, it is impossible to assert Being embodied as of the present invention is confined to these explanations.For general technical staff of the technical field of the invention, On the premise of present inventive concept, it is also possible to make some simple deduction or replace, all should be considered as belonging to the present invention's Protection domain.

Claims (10)

1. a sound wave safe transmission method, it is characterised in that include step:
Service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and target information root Forming first according to the first key encryption and add confidential information, service end adds confidential information and the first key by low-frequency sound wave signal by first Launch;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted formation the by client Two add confidential information, and client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption Form the first encrypted message packet to include and first add confidential information according to the first key by what displacement AES was formed
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption Form the first encrypted message packet to include to be formed by the encryption of TEA AES according to the first key and first add confidential information.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption The first encrypted message packet formed includes and adds secret letter according to the first key by the first of at least 32 the encryption formation of TEA AES Breath.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client is added by SSL The close confidential information that adds second sends to background server.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client will control information Include described client with second identification code encryption formation the second encrypted message packet control information and the second identification code to be passed through AES256 encryption forms second and adds confidential information.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described background server passes through SSL encryption adds second confidential information and sends to service end.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client is provided with client Data base, described client checks service end according to client database.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that service end is provided with service end data Storehouse, described service end is according to service end database check client.
10. a sound wave safe transmission device, it is characterised in that including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end Ceasing according to the first key encryption formation first and add confidential information, service end adds confidential information by first and the first key passes through all-bottom sound Ripple signal is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described client Add confidential information according to the first secret key decryption first and obtain target information;Described client generate the second identification code/, client will control Information processed and the encryption of the second identification code form second and add confidential information, and client adds second confidential information and sends to background server;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
CN201610616416.5A 2016-07-31 2016-07-31 A kind of sound wave safe transmission method and device Pending CN106209348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610616416.5A CN106209348A (en) 2016-07-31 2016-07-31 A kind of sound wave safe transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610616416.5A CN106209348A (en) 2016-07-31 2016-07-31 A kind of sound wave safe transmission method and device

Publications (1)

Publication Number Publication Date
CN106209348A true CN106209348A (en) 2016-12-07

Family

ID=57497718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610616416.5A Pending CN106209348A (en) 2016-07-31 2016-07-31 A kind of sound wave safe transmission method and device

Country Status (1)

Country Link
CN (1) CN106209348A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483119A (en) * 2017-07-04 2017-12-15 深圳市格思智能有限公司 A kind of reading sensor and its system and Card Reader operating method using sound wave as transmission medium
CN111316614A (en) * 2017-11-15 2020-06-19 大力士股份有限公司 Encrypted communication in a process production facility

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483119A (en) * 2017-07-04 2017-12-15 深圳市格思智能有限公司 A kind of reading sensor and its system and Card Reader operating method using sound wave as transmission medium
CN111316614A (en) * 2017-11-15 2020-06-19 大力士股份有限公司 Encrypted communication in a process production facility
CN111316614B (en) * 2017-11-15 2022-04-12 大力士股份有限公司 Encrypted communication in a process production facility

Similar Documents

Publication Publication Date Title
CN106656510B (en) A kind of encryption key acquisition methods and system
CN106712962B (en) Bidirectional authentication method and system for mobile RFID system
WO2021109756A1 (en) Proxy anonymous communication method based on homomorphic encryption scheme
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN102196375A (en) Securing out-of-band messages
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN101707767B (en) Data transmission method and devices
CN107172030B (en) High-privacy and anti-tracing communication method
Saez et al. Securing vehicle communication systems by the KLJN key exchange protocol
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
Bapat et al. Smart-lock security re-engineered using cryptography and steganography
CN102882687B (en) Intelligent household safe access method and system based on searchable cipher text
CN106230840A (en) A kind of command identifying method of high security
CN104469757B (en) Safe login method
CN106209348A (en) A kind of sound wave safe transmission method and device
Asaduzzaman et al. A security-aware near field communication architecture
Rahnama et al. Securing RFID-based authentication systems using ParseKey+
CN106790135A (en) A kind of data ciphering method and system, communication equipment based on high in the clouds
Kavya et al. Vulnerability analysis and security system for NFC-enabled mobile phones
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN106059767A (en) Terminal private data protection system and method based on Internet
CN105827601A (en) Data encryption application method and system of mobile device
CN106230820A (en) A kind of sound wave safe transmission method
CN106211146A (en) Safety communication record adding method, information communicating method and call method and system
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161207