CN106209348A - A kind of sound wave safe transmission method and device - Google Patents
A kind of sound wave safe transmission method and device Download PDFInfo
- Publication number
- CN106209348A CN106209348A CN201610616416.5A CN201610616416A CN106209348A CN 106209348 A CN106209348 A CN 106209348A CN 201610616416 A CN201610616416 A CN 201610616416A CN 106209348 A CN106209348 A CN 106209348A
- Authority
- CN
- China
- Prior art keywords
- client
- confidential information
- service end
- identification code
- adds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The open a kind of sound wave safe transmission method of the present invention and device, method includes step: service end generates the first key, the first identification code and the second identification code, first identification code and target information are formed first according to the first key encryption and add confidential information by service end, and service end adds confidential information by first and the first key is launched by low-frequency sound wave signal: client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted formation second and added confidential information by client, and client adds second confidential information and sends to background server;Background server adds second confidential information and sends to service end;Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.Maltilevel security mechanism, greatly improves the safety of data transmission.
Description
Technical field
The present invention relates to sonic transmissions field, in particular, relate to a kind of sound wave safe transmission method and device.
Background technology
At present, when transmitting data between mobile device, mobile device needs first to open bluetooth, NFC or WIFI etc. so that move
Dynamic equipment can mutually be searched for, finds and match, and can carry out data transmission after successful matching between mobile device.
But, in prior art, mobile device needs to arrange special antenna to realize the function such as bluetooth, NFC or WIFI,
Launching wireless signal by antenna to realize the search of mobile device, find and match, power consumption is big, and easily to mobile device
The antenna that call is relevant interferes.
Using sonic transmissions to need not antenna, it is achieved more convenient, and sonic transmissions technology is the most ripe, application the most more comes
The most, but the safety of sonic transmissions but has much room for improvement.
Summary of the invention
The technical problem to be solved is to provide a kind of safer sound wave safe transmission method.
It is an object of the invention to be achieved through the following technical solutions:
A kind of sound wave safe transmission method, including step:
Service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end
Ceasing and add confidential information according to the first key encryption formation first, service end adds confidential information by first and the first key passes through low-frequency sound wave
Signal is launched;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted shape by client
Becoming second to add confidential information, client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to taking service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
Further, described including according to first key encryption formation the first encrypted message packet passes through displacement according to the first key
The first of AES formation adds confidential information.
Will not be increased the length of data by displacement AES, the safety that i.e. improve transmission does not the most affect transmission effect
Rate.
Further, described including according to first key encryption formation the first encrypted message packet passes through TEA according to the first key
AES encryption forms first and adds confidential information.
TEA AES has the strongest resistingDifference analysisAbility.Enciphering rate is fast, and safety is fairly good, and its reliability is
Being ensured by the complexity of encryption round number rather than algorithm, TEA AES has mainly used displacement and XOR.
Further, described the first encrypted message packet formed according to the first key encryption includes and passes through according to the first key
The first of at least 32 encryption formation of TEA AES adds confidential information.
It is higher that TEA AES carries out at least 32 encryption formation the first encryption Information Securities, cracks and is more difficult to, the most also
64 times, 128 inferior number of times encryptions can be used.
Further, described client adds confidential information transmission to background server by SSL encryption by second.
The safety of transmission is improved further by SSL encryption.
Further, control information and the second identification code encryption formation the second encrypted message packet are included described by described client
Control information and the second identification code are formed second by AES256 encryption and add confidential information by client.
Control information and the second identification code are formed the second safety adding confidential information raising transmission by AES256 encryption.
Further, described background server adds confidential information transmission to service end by SSL encryption by second.
The safety of transmission is improved further by SSL encryption.
Further, described client is provided with client database, and described client is according to client database verification clothes
Business end.
The client data library storage of client has safe service end information, only finds in client database
Corresponding service end information ability and service end communication, improve safety.
Further, service end is provided with service end data base, and described service end is according to service end database check client.
The service end database purchase of service end has safe client-side information, only finds at service end lane database
Corresponding client end information ability and service end communication, improve safety.
A kind of sound wave safe transmission device, including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and mesh
Mark information adds confidential information according to the first of the first key encryption formation, and service end adds confidential information and the first key by low by first
Frequently acoustic signals is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described visitor
Family end adds confidential information according to the first secret key decryption first and obtains target information;Described client generate the second identification code/, client
Control information and the second identification code being encrypted formation second and adds confidential information, client adds second confidential information and sends to background service
Device;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
Due to the fact that first data transmission is that service end sends information to client, client by low-frequency sound wave signal
End sends information to background server again, and background server sends information to service end again, and data pass through third party transfer,
Rather than only transmit between service end and client, stranger is difficult to intercept complete transmission data, and data itself also need to encryption
Deciphering, and client needs the first identification code is generated the second identification code, and service end is in verification the second identification code, maltilevel security
Mechanism, greatly improves the safety of data transmission.
Accompanying drawing explanation
Fig. 1 is a kind of sound wave safe transmission method schematic diagram of the embodiment of the present invention;
Fig. 2 is a kind of another schematic diagram of sound wave safe transmission method of the embodiment of the present invention.
Detailed description of the invention
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
Embodiment one
As it is shown in figure 1, a kind of sound wave safe transmission method, including step:
Service end generates the first key, and target information is formed the according to the first key by displacement AES by service end
One adds confidential information, and service end adds confidential information by first and the first key is launched by low-frequency sound wave signal;
Client detects that described low-frequency sound wave signal receives and described first adds confidential information and the first key, client according to
First secret key decryption first adds confidential information and obtains target information.
Confidential information is added owing to target information is formed first according to the first key by displacement AES by service end, then will
First adds confidential information and the first key is launched to client, sonic transmissions low cost by low-frequency sound wave signal, and sound wave passes
Defeated finite data length, will not be increased the length of data, i.e. improve the safety of transmission the most not by displacement AES
Affect efficiency of transmission.
By the low-frequency sound wave transmission more convenient both sides of having only to of information, all there are loudspeaker can realize, be especially suitable for intelligence man
The auto upgrading occupied, just can complete the auto upgrading of air-conditioning as only installed panel at air-conditioning loudspeaker additional, and upgrade cost is low.
Described displacement AES is TEA AES.TEA AES has the strongest resisting differential analysis ability, encryption
Speed is fast, and safety is fairly good, and its reliability is to be ensured by the complexity of encryption round number rather than algorithm, and TEA encrypts
Algorithm has mainly used displacement and XOR.TEA (Tiny Encryption Algorithm) AES is a kind of packet
AES.
Target information is formed the first encrypted message packet according to the first key by displacement AES and includes by described service end
Carry out at least 32 encryption formation first according to the first key by TEA AES and add confidential information.TEA AES carry out to
It is higher that few 32 encryptions form the first encryption Information Security, cracks and is more difficult to, naturally it is also possible to uses 64 times, 128 inferior number of times
Encryption.
Described client is provided with client database, and described client checks service end according to client database.Client
The client data library storage of end has safe service end information, only finds the service end of correspondence in client database
Information ability and service end communication, improve safety.
Service end is provided with service end data base, and described service end is according to service end database check client.Service end
Service end database purchase has safe client-side information, only finds the client end letter of correspondence at service end lane database
Breath ability and service end communication, improve safety.
Client generates the second key, and control information is added secret letter according to the second of the second key encryption formation by client
Breath, client is added second confidential information and the second key and is sent to service end by low-frequency sound wave signal.Client controls service
End, sends to service end, safe ready also by low-frequency sound wave signal, and client and server only need to all have loudspeaker just can be complete
Become communication, produce and reequip low.
Described client is provided with client database, and described client obtains the according to the first key and client database
Two keys, control information is added confidential information according to the second of the second key encryption formation by client, and client adds secret letter by second
Breath sends to service end.Second key is calculated by the first key and client data, and service end has service end data
Storehouse, service end goes out the second key by the first cipher key calculation, then adds confidential information by the second secret key decryption second, and client is not required to
Second key sent to service end, to improve safety.
Client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.Client is passed through
Bluetooth or WIFI or mobile network or ZigBee send control information to service end, transmit not in use by low-frequency sound wave, asymmetric
Transmission means safer, immediately other people intercepted low-frequency sound wave transmission information, also cannot intercept other transmission means transmission
Information.
A kind of sound wave safe transmission device, including: service end, client,
Described service end generates the first key, and target information is encrypted, according to the first key, first formed by described service end
Adding confidential information, described service end adds confidential information by first and the first key is launched by low-frequency sound wave signal;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key, described visitor
Family end adds confidential information according to the first secret key decryption first and obtains target information.
Embodiment two
As in figure 2 it is shown, a kind of sound wave safe transmission method, including step:
Service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end
Ceasing and add confidential information according to the first key encryption formation first, service end adds confidential information by first and the first key passes through low-frequency sound wave
Signal is launched;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted shape by client
Becoming second to add confidential information, client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to taking service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
Owing to first data transmission is that service end sends information to client by low-frequency sound wave signal, client will again
Information sends to background server, and background server sends information to service end again, and data pass through third party transfer, rather than only
Having between service end and client and transmit, stranger is difficult to intercept complete transmission data, and data itself also need to encrypting and decrypting, and
And client needs the first identification code is generated the second identification code, service end is in verification the second identification code, maltilevel security mechanism, pole
Improve greatly the safety of data transmission.
Described including according to first key encryption formation the first encrypted message packet passes through displacement AES according to the first key
First formed adds confidential information.The length of data will not be increased by displacement AES, i.e. improve the safety of transmission again
Do not affect efficiency of transmission.
Described including according to first key encryption formation the first encrypted message packet is added by TEA AES according to the first key
Close formation first adds confidential information.TEA AES has the strongest resisting differential analysis ability, and enciphering rate is fast, and safety is fairly good,
Its reliability is to be ensured by the complexity of encryption round number rather than algorithm, TEA AES mainly used displacement and
XOR.TEA (Tiny Encryption Algorithm) AES is a kind of block encryption algorithm.
Described the first encrypted message packet formed according to the first key encryption includes according to the first key by TEA AES
The first of at least 32 encryption formation adds confidential information.TEA AES carries out at least 32 encryption formation first and adds confidential information peace
Full property is higher, cracks and is more difficult to, naturally it is also possible to use 64 times, 128 inferior number of times encryptions.
Described client adds second confidential information by SSL encryption and sends to background server.Further by SSL encryption
Improve the safety of transmission.
Control information and the second identification code encryption formation the second encrypted message packet are included described client by described client will
Control information and the second identification code form second by AES256 encryption and add confidential information.Control information and the second identification code are passed through
AES256 encryption forms the second safety adding confidential information raising transmission.
Described background server adds second confidential information by SSL encryption and sends to service end.Further by SSL encryption
Improve the safety of transmission.
Described client is provided with client database, and described client checks service end according to client database.Client
The client data library storage of end has safe service end information, only finds the service end of correspondence in client database
Information ability and service end communication, improve safety.
Service end is provided with service end data base, and described service end is according to service end database check client.Service end
Service end database purchase has safe client-side information, only finds the client end letter of correspondence at service end lane database
Breath ability and service end communication, improve safety.
A kind of sound wave safe transmission device, including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and mesh
Mark information adds confidential information according to the first of the first key encryption formation, and service end adds confidential information and the first key by low by first
Frequently acoustic signals is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described visitor
Family end adds confidential information according to the first secret key decryption first and obtains target information;Described client generate the second identification code/, client
Control information and the second identification code being encrypted formation second and adds confidential information, client adds second confidential information and sends to background service
Device;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
Above content is to combine concrete preferred implementation further description made for the present invention, it is impossible to assert
Being embodied as of the present invention is confined to these explanations.For general technical staff of the technical field of the invention,
On the premise of present inventive concept, it is also possible to make some simple deduction or replace, all should be considered as belonging to the present invention's
Protection domain.
Claims (10)
1. a sound wave safe transmission method, it is characterised in that include step:
Service end generates the first key, the first identification code and the second identification code, and service end is by the first identification code and target information root
Forming first according to the first key encryption and add confidential information, service end adds confidential information and the first key by low-frequency sound wave signal by first
Launch;
Client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;
Client adds confidential information according to the first secret key decryption first and obtains target information and the first identification code;
Client generates the second identification code according to the first identification code, and control information and the second identification code are encrypted formation the by client
Two add confidential information, and client adds second confidential information and sends to background server;
Background server adds second confidential information and sends to service end;
Service end verification adds, according to second, the second identification code that confidential information deciphering obtains.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption
Form the first encrypted message packet to include and first add confidential information according to the first key by what displacement AES was formed
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption
Form the first encrypted message packet to include to be formed by the encryption of TEA AES according to the first key and first add confidential information.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described according to the first key encryption
The first encrypted message packet formed includes and adds secret letter according to the first key by the first of at least 32 the encryption formation of TEA AES
Breath.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client is added by SSL
The close confidential information that adds second sends to background server.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client will control information
Include described client with second identification code encryption formation the second encrypted message packet control information and the second identification code to be passed through
AES256 encryption forms second and adds confidential information.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described background server passes through
SSL encryption adds second confidential information and sends to service end.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that described client is provided with client
Data base, described client checks service end according to client database.
A kind of sound wave safe transmission method the most according to claim 1, it is characterised in that service end is provided with service end data
Storehouse, described service end is according to service end database check client.
10. a sound wave safe transmission device, it is characterised in that including: service end, client and background server;
Described service end generates the first key, the first identification code and the second identification code, and the first identification code and target are believed by service end
Ceasing according to the first key encryption formation first and add confidential information, service end adds confidential information by first and the first key passes through all-bottom sound
Ripple signal is launched;
Described client detects that described low-frequency sound wave signal receives described first and adds confidential information and the first key;Described client
Add confidential information according to the first secret key decryption first and obtain target information;Described client generate the second identification code/, client will control
Information processed and the encryption of the second identification code form second and add confidential information, and client adds second confidential information and sends to background server;
Described background server adds second confidential information and sends to taking service end;
The verification of described service end adds, according to second, the second identification code that confidential information deciphering obtains.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610616416.5A CN106209348A (en) | 2016-07-31 | 2016-07-31 | A kind of sound wave safe transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610616416.5A CN106209348A (en) | 2016-07-31 | 2016-07-31 | A kind of sound wave safe transmission method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209348A true CN106209348A (en) | 2016-12-07 |
Family
ID=57497718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610616416.5A Pending CN106209348A (en) | 2016-07-31 | 2016-07-31 | A kind of sound wave safe transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209348A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483119A (en) * | 2017-07-04 | 2017-12-15 | 深圳市格思智能有限公司 | A kind of reading sensor and its system and Card Reader operating method using sound wave as transmission medium |
CN111316614A (en) * | 2017-11-15 | 2020-06-19 | 大力士股份有限公司 | Encrypted communication in a process production facility |
-
2016
- 2016-07-31 CN CN201610616416.5A patent/CN106209348A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483119A (en) * | 2017-07-04 | 2017-12-15 | 深圳市格思智能有限公司 | A kind of reading sensor and its system and Card Reader operating method using sound wave as transmission medium |
CN111316614A (en) * | 2017-11-15 | 2020-06-19 | 大力士股份有限公司 | Encrypted communication in a process production facility |
CN111316614B (en) * | 2017-11-15 | 2022-04-12 | 大力士股份有限公司 | Encrypted communication in a process production facility |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106656510B (en) | A kind of encryption key acquisition methods and system | |
CN106712962B (en) | Bidirectional authentication method and system for mobile RFID system | |
WO2021109756A1 (en) | Proxy anonymous communication method based on homomorphic encryption scheme | |
CN104506483A (en) | Method for encrypting and decrypting information and managing secret key as well as terminal and network server | |
CN102196375A (en) | Securing out-of-band messages | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN101707767B (en) | Data transmission method and devices | |
CN107172030B (en) | High-privacy and anti-tracing communication method | |
Saez et al. | Securing vehicle communication systems by the KLJN key exchange protocol | |
US20120166801A1 (en) | Mutual authentication system and method for mobile terminals | |
Bapat et al. | Smart-lock security re-engineered using cryptography and steganography | |
CN102882687B (en) | Intelligent household safe access method and system based on searchable cipher text | |
CN106230840A (en) | A kind of command identifying method of high security | |
CN104469757B (en) | Safe login method | |
CN106209348A (en) | A kind of sound wave safe transmission method and device | |
Asaduzzaman et al. | A security-aware near field communication architecture | |
Rahnama et al. | Securing RFID-based authentication systems using ParseKey+ | |
CN106790135A (en) | A kind of data ciphering method and system, communication equipment based on high in the clouds | |
Kavya et al. | Vulnerability analysis and security system for NFC-enabled mobile phones | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN106059767A (en) | Terminal private data protection system and method based on Internet | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
CN106230820A (en) | A kind of sound wave safe transmission method | |
CN106211146A (en) | Safety communication record adding method, information communicating method and call method and system | |
US20230070408A1 (en) | Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161207 |