WO2014019526A1 - 可见光的加密方法、解密方法、通信装置及通信系统 - Google Patents
可见光的加密方法、解密方法、通信装置及通信系统 Download PDFInfo
- Publication number
- WO2014019526A1 WO2014019526A1 PCT/CN2013/080579 CN2013080579W WO2014019526A1 WO 2014019526 A1 WO2014019526 A1 WO 2014019526A1 CN 2013080579 W CN2013080579 W CN 2013080579W WO 2014019526 A1 WO2014019526 A1 WO 2014019526A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- visible light
- pseudo code
- code sequence
- light signal
- Prior art date
Links
- 230000006854 communication Effects 0.000 title claims abstract description 199
- 238000004891 communication Methods 0.000 title claims abstract description 197
- 238000000034 method Methods 0.000 title claims abstract description 116
- 230000008859 change Effects 0.000 claims description 63
- 239000013078 crystal Substances 0.000 claims description 51
- 238000012545 processing Methods 0.000 claims description 21
- 230000003287 optical effect Effects 0.000 claims description 18
- 238000000354 decomposition reaction Methods 0.000 claims description 14
- 238000013178 mathematical model Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 28
- 230000008569 process Effects 0.000 description 16
- 230000001174 ascending effect Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000006249 magnetic particle Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/11—Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
- H04B10/114—Indoor or close-range type systems
- H04B10/116—Visible light communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present invention relates to the field of communications, and more particularly to an encryption method, a decryption method, a communication device, and a communication system for visible light.
- the traditional Internet of Things generally interconnects through various wireless or wired communication networks, using conventional communication technologies. Recently, an Internet of Things technology that uses visible light to transmit short-range communication in free space has emerged. This kind of Internet of Things using visible light communication technology is called photonic Internet of Things.
- the photonic IoT has the function of the traditional Internet of Things, but the communication method uses visible light for communication. Since visible light has high directivity and cannot penetrate obstacles, it has higher security than wireless communication.
- the Photonic IoT already has some visible light communication systems that synchronize encryption and decryption.
- This system uses the synchronous method to allow the visible light transmitter and the receiver to always use the same and time-changing pseudo code sequence for encryption and decryption.
- the stroboscopic signal captured and reproduced by the high-speed camera can be disabled, and can not be recognized by the receiver, thereby effectively preventing the safety hazard.
- the synchronous encryption and decryption visible light communication system utilizes handshake synchronization by separately scrambling the light guiding signal and the baseband data in the transmitter, and then synthesizing a set of signals and transmitting them by modulation.
- the pseudo-code decision is performed on the light guide signal encrypted therein, and the pseudo code sequence used for encryption is selected by traversing the query, and then the baseband data is decrypted, and finally the decrypted ID is decrypted by the ID determiner.
- the information and the ID information held by the corresponding register are judged to determine whether it is a legal signal or an illegally copied signal, thereby completing the decryption.
- the use of such a synchronous visible light communication system requires time in the visible light transmitter and the visible light receiver.
- the changes must be identical, that is, the internal clocks of the transmitter and receiver must be identical, and the time error must be very small. It is difficult to achieve complete agreement on the crystal components currently used, and the longer the time used, the two The time difference of the time system is larger, and finally the synchronization information is lost, resulting in inconsistent state changes between the transmitter and the receiver, that is, the pseudo code sequence used by the two may change when one end changes, and the other end does not reach the change.
- the embodiments of the present invention provide an encryption method, a decryption method, a communication device, and a communication system for visible light, which may cause decryption failure in encryption and decryption in visible light.
- a method for decrypting a visible light signal including: receiving a visible light signal from a transmitting end, wherein the visible light signal is encrypted by a key at the transmitting end; acquiring the key, Decrypting the visible light signal according to the key, wherein acquiring the key comprises: acquiring the key corresponding to a state of a state machine of the receiving end; or acquiring the information according to the visible light signal for obtaining The indication information of the key is obtained according to the indication information.
- the obtaining the indication information for obtaining the key according to the visible light signal comprises: converting the received visible light signal into a digital signal; Decomposing the signal into a signal including a pseudo code sequence indicator code and a pseudo code signal; querying a pseudo code sequence corresponding to the pseudo code sequence indicator code, wherein the pseudo code sequence is the key; according to the pseudo code sequence pair The pseudo code signal is decrypted.
- the digital signal is decomposed into a signal including a pseudo code sequence indicator code and a pseudo code signal
- querying the pseudo code sequence corresponding to the pseudo code sequence indicator code comprises: decomposing the digital signal into a device addressing code and a first combined signal; decomposing the first combined signal into the pseudo code sequence indicator code and the pseudo code signal; determining, according to the device addressing code, the legitimacy of the pseudo code sequence indicator code, if If it is legal, the pseudo code sequence corresponding to the pseudo code sequence indicator code is queried.
- the querying the pseudo code sequence corresponding to the pseudo code sequence indicator comprises: determining whether the code is valid according to the received pseudo code sequence indicator, and querying the pseudo code sequence corresponding to the pseudo code sequence indicator according to the law; wrong password.
- the method further includes: querying the device corresponding ID information according to the device addressing code, and comparing the ID information with the decoded ID information. If the determination is legal, the legal ID information is output.
- the method further includes: controlling the corresponding device according to the legal ID information.
- the method further comprises: demodulating the digital signal.
- the determining, according to the device addressing code, the validity of the pseudo code sequence indicator code comprises: when the pseudo code sequence indicator code is a large number from small to large, according to the device The addressing code queries the received pseudo code sequence indicator, if the pseudo code sequence indicator is less than or equal to the received pseudo code sequence indicator, the determination is invalid, otherwise the determination is legal; or, when the pseudo code
- the sequence indicator code is a large number that does not loop from large to small
- the received pseudo code sequence indicator code is queried according to the device addressing code, if the pseudo code sequence indicator code is greater than or equal to the received pseudo code. If the sequence indicator is used, the judgment is invalid, otherwise the judgment is legal.
- decrypting the pseudo code signal according to the pseudo code sequence comprises: performing logical operations on the pseudo code sequence and the pseudo code signal to decrypt the pseudo code signal.
- the indication information for obtaining the key according to the visible light signal comprises: determining, according to the visible light signal, a clock variation parameter of the transmitting end and a clock variation parameter of the receiving end; according to the clock of the transmitting end The change parameter and the clock change parameter of the receiving end determine a clock speed factor of the transmitting end; and the clock information of the transmitting end locally stored by the receiving end is updated every predetermined time according to the clock speed factor of the transmitting end, where The clock information is indication information for obtaining the key.
- the clock change parameter of the transmitting end refers to a standard time actually experienced by a unit time corresponding to the system time of the transmitting end
- the clock change parameter of the receiving end refers to the system time corresponding to the receiving end.
- the standard time actually experienced per unit time, wherein the standard time actually experienced is measured in units of the system period of the crystal oscillator of the receiving end.
- the clock speed factor of the transmitting end is a ratio of a standard time actually experienced by the unit time corresponding to the system time of the receiving end to a standard time actually experienced by the unit time corresponding to the system time of the transmitting end.
- the predetermined time is a predetermined time of the system time of the receiving end
- the error of the clock information of the transmitting end locally stored by the receiving end is the predetermined time minus the predetermined time Determining a product of a clock speed factor of the transmitting end and the predetermined time, wherein updating the clock information of the transmitting end locally stored by the receiving end comprises subtracting the error by using the locally stored clock information of the transmitting end.
- said unit time is a nominal duration of an optical pulse of said visible light signal received from said transmitting end, said nominal duration being equal to a reciprocal of a nominal baud rate of said visible light signal.
- the standard time actually experienced by the unit time corresponding to the system time of the transmitting end is obtained by measuring the duration of one light pulse of the visible light signal received from the transmitting end at the receiving end and
- the system period of the crystal oscillator of the receiving end is recorded as a unit of M ⁇ T2
- the standard time actually experienced by the unit time corresponding to the system time of the receiving end is calculated as ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ , where
- the nominal duration of a light pulse of a visible light signal, 2 »* is the nominal frequency of the crystal at the receiving end, and the system period of the crystal at the receiving end.
- measuring the duration of an optical pulse of said visible light signal received from said transmitting end at said receiving end comprises: converting said visible light signal received from said transmitting end into a digital signal; and from said digital The high level or low level of a pulse of the signal begins until the high level or low level ends, and how many are counted, the resulting number is preferably, the one to be received from the transmitting end
- Converting the visible light signal into a digital signal comprises: converting the visible light signal into an electrical pulse signal by a photodiode, outputting a high voltage level when a current value passed by the photodiode is higher than a threshold value, and when the photodiode The low voltage level is output when the passing current value is lower than the threshold value.
- the threshold value is determined according to a predetermined mathematical model by at least a distance between the receiving end and the transmitting end.
- the method further includes: repeating, after each receiving the visible light signal from the transmitting end, determining the clock variation parameter of the transmitting end and the clock variation parameter of the receiving end to update the stored location of the transmitting end The steps of the clock information.
- the corresponding pseudo code signal is selected according to the stored clock information of the transmitting end to decode the received visible light signal.
- the clock information of the transmitting end locally stored by the receiving end is initially stored and associated with the identifier of the transmitting end when the receiving end first receives the visible light signal of the transmitting end and is set equal to The clock information at the receiving end.
- acquiring the key corresponding to the state of the state machine of the receiving end and decrypting the visible light signal according to the key comprises: acquiring and using the current state of the state machine with the receiving end and the current state
- the visible light signal is decrypted by a key corresponding to at least one of the preceding and/or following states, wherein the visible light signal is encrypted with a key that varies with the state of the state machine of the transmitting end.
- decrypting the visible light signal with a key corresponding to the current state of the state machine of the receiving end and the at least one state before and/or after the current state comprises: Decrypting the visible light signal by a key corresponding to the current state of the state machine of the receiving end; and if the decryption of the visible light signal is unsuccessful by using a key corresponding to the current state of the state machine of the receiving end, The visible light signal is then decrypted with a key corresponding to the at least one state before and/or after the current state.
- the visible light signal is decrypted with a key corresponding to the at least one state before and/or after the current state: in a predetermined order before and/or after the current state Decrypting the visible light signal by a key corresponding to each of the at least one state until the visible light signal is successfully decrypted or used in the at least one state before and/or after the current state
- the key corresponding to all the states decrypts the visible light signal.
- the visible light signal comprises communication data and an identifier of the transmitting end.
- the communication data is encrypted with the key that changes with the state of the state machine of the transmitting end, and the identifier of the transmitting end is not encrypted, and the receiving end locally stores and Communication data associated with the identifier of the transmitting end.
- the communication data includes user information
- the user information includes ID information, a fingerprint, a face, an iris, an input password, or a combination of two or more
- the method further includes: if Decoding the visible light signal as the current state of the state machine of the receiving end and the decryption of the visible light signal by the key corresponding to the at least one state before and/or after the current state is not successful Illegal signal, otherwise the visible light signal is identified as a legitimate signal.
- decrypting the visible light signal with a key corresponding to the current state of the state machine of the receiving end and the at least one state before and/or after the current state comprises: using in a predetermined order Decrypting the visible light signal with a key corresponding to the current state and each of the at least one state before and/or after the current state until the visible light signal is successfully decrypted or used The visible light signal is decrypted with a key corresponding to the current state and all of the at least one state before and/or after the current state.
- said at least one state comprises a predetermined number of states prior to said current state and said predetermined number of states subsequent to said current state.
- a key that changes with the state of the state machine of the transmitting end and a key corresponding to the current state of the state machine of the receiving end and the at least one state before and/or after the current state It is a sequence that changes over time.
- said sequence of time varying is a pseudo code sequence, said method further comprising converting said visible light signal into a digital signal, wherein said decrypting comprises a logical AND, logical OR of said digital signal and a pseudo code sequence A logical exclusive OR, or a combination of two or more of the above.
- a communication apparatus including: a receiver, configured to receive a visible light signal from a transmitting end, where the visible light signal is encrypted by a key at the transmitting end; a decoder, And acquiring the key, and decrypting the visible light signal according to the key, where acquiring the key comprises: acquiring the key corresponding to a state of a state machine of a receiving end; or The indication information obtained by the visible light signal for obtaining the key is obtained, and the key is acquired according to the indication information.
- the receiver is a visible light receiver for receiving a visible light signal and outputting a digital signal
- the decoder comprises: a pseudo component for decomposing the digital signal into a pseudo code sequence indicator code and a pseudo code signal a code sequence indicator decoding unit; a pseudo code sequence query unit for querying a pseudo code sequence corresponding to the pseudo code sequence indicator, wherein the pseudo code sequence is the key; and the pseudo code sequence is used to
- the pseudo code signal performs a logical operation, and outputs a convolutional decoder of the logical operation result.
- the decoder further comprises: a device addressing code decomposing unit for decomposing the digital signal into a device addressing code and a first combining signal; the pseudo code sequence indicating code decomposition unit, Decoding the first combined signal into a pseudo code sequence indicator code and a pseudo code signal; the pseudo code sequence query unit is configured to determine, according to the device addressing code, the legality of the pseudo code sequence indicator code, if legal And querying the pseudo code sequence corresponding to the pseudo code sequence indicator code. .
- the pseudo code sequence query unit is configured to determine whether the code is normal according to the received pseudo code sequence indicator code, and if the law is to query the pseudo code code sequence corresponding to the pseudo code sequence indicator code, if the code is not legal, the password is incorrect.
- the apparatus further comprises: a query unit for querying corresponding ID information according to the device addressing code; and ID information for outputting the convolutional decoder and ID information output by the query unit For comparison, if the same decision is legal, the ID determiner of the legal ID information is output.
- the device further comprises: a device control circuit connected to the ID determiner, configured to control the corresponding device according to the received ID information.
- the apparatus further includes: a demodulator connected between the visible light receiver and the device addressing code decomposition unit for demodulating the digital signal.
- said receiver receives a visible light signal from a transmitting device, said visible light signal being encrypted at least in part by a key that varies with a state of a state machine of said transmitting device;
- the decoder decrypts the visible light signal with a key corresponding to a current state of the state machine of the communication device and at least one state before and/or after the current state.
- said decoder decrypts said visible light signal with a key corresponding to said current state of said state machine of said communication device, and if said current state corresponding to said state machine of said communication device The decryption of the visible light signal by the key is unsuccessful, and then the visible light signal is continued to be decrypted with a key corresponding to the at least one state before and/or after the current state.
- said decoder decrypts said visible light signal with a key corresponding to each of said at least one state before and/or after said current state in a predetermined order until said visible light signal The visible light signal is successfully decrypted or has been decrypted using a key corresponding to all of the at least one state before and/or after the current state.
- said decoder decrypts said visible light signal in a predetermined order with a key corresponding to said current state and each of said at least one state before and/or after said current state, The visible light signal is decrypted until the visible light signal is successfully decrypted or has been used with a key corresponding to the current state and all of the at least one state before and/or after the current state.
- the receiver is configured to receive a visible light signal from a transmitting end;
- the decoder includes: a clock change parameter determining module, configured to determine a clock change parameter of the transmitting end according to the visible light signal received from the transmitting end a clock change parameter of the communication device; a clock speed factor determining module, determining a clock speed factor of the transmitting end according to the clock change parameter of the transmitting end and the clock change parameter of the communication device; and a clock information adjusting module And updating the clock information of the transmitting end stored locally by the communication device every predetermined time according to the clock speed factor of the transmitting end.
- the clock change parameter of the transmitting end refers to a standard time actually experienced by a unit time corresponding to the system time of the transmitting end
- the clock change parameter of the communication device refers to a system time corresponding to the communication device.
- the standard time actually experienced by the unit time wherein the standard time actually experienced is measured in units of the system period of the crystal oscillator of the communication device.
- the clock speed factor determining module determines a clock speed factor of the transmitting end as a standard time actually experienced by the unit time corresponding to a system time of the communication device and the unit corresponding to a system time of the transmitting end. The ratio of the standard time actually experienced by time.
- the predetermined time is a predetermined time of a system time of the communication device
- the error of the clock information of the transmitting end stored locally by the communication device is the predetermined time minus every predetermined time
- said unit time is a nominal duration of an optical pulse of said visible light signal received from said transmitting end, said nominal duration being equal to a reciprocal of a nominal baud rate of said visible light signal.
- the standard time actually experienced by the unit time corresponding to the system time of the transmitting end is measured by the clock variation parameter module at the communication device for measuring a light pulse of the visible light signal received from the transmitting end
- the duration is obtained and recorded in units of the system period of the crystal oscillator of the communication device as a system, and the standard time actually experienced by the unit time corresponding to the system time of the communication device is calculated by the clock variation parameter For ( ⁇ « ⁇ ⁇ ** ⁇ 7 ⁇ , where ⁇ * is the nominal duration of a light pulse of the visible light signal, /2 «» is the nominal frequency of the crystal of the communication device, and ⁇ is the system period of the crystal of the communication device.
- the decoder is further configured to select a corresponding pseudo code signal to receive the visible light signal according to the stored clock information of the transmitting end when receiving the visible light signal from the transmitting end each time.
- Decode a method for encrypting a visible light signal is provided, including: encrypting a data usage key; transmitting the encrypted data as a visible light signal, wherein the key is associated with a transmitting end The state of the state machine changes, or the visible light signal carries indication information for obtaining the key.
- the visible light signal carries the indication information
- the data is encrypted by using the key
- transmitting the encrypted data as the visible light signal comprises: generating a generated pseudo code sequence and The data is encoded to obtain a pseudo code signal, where the pseudo code sequence is the key; and the pseudo code sequence indicator code corresponding to the pseudo code sequence is merged into the pseudo code signal header, and the obtained a combined signal of the pseudo code sequence indicator code and the pseudo code signal; the combined signal is transmitted in the form of visible light.
- obtaining a combined signal including the pseudo code sequence indicator code and the pseudo code signal, and transmitting the combined signal in the form of visible light comprises: merging the pseudo code sequence indicator code corresponding to the pseudo code sequence into the a pseudo-code signal header, obtaining a first combined signal; combining the device addressing code in the first combined signal header to obtain a second combined signal: transmitting the second combined signal in visible form.
- the method before the transmitting the second combined signal in the form of a visible light signal, the method further includes: modulating the second combined signal.
- the pseudo code sequence indicates that the code is a large number that does not cycle from small to large or from large to small, and varies with the number of times of transmitting signals.
- a communication device including: an encryption device, configured to encrypt a data usage key, and a transmitting unit, configured to transmit the encrypted data as a visible light signal, where The key changes according to a state change of a state machine of the transmitting end, or the visible light signal carries indication information for obtaining the key.
- the encryption device includes: a pseudo code generator for outputting a pseudo code sequence and a corresponding pseudo code sequence indicator code; a volume for performing logical operations on the pseudo code sequence and the data, and outputting a pseudo code signal a code encoder; configured to merge the pseudo code sequence indicator into the pseudo code signal header, and output a pseudo code sequence indicator combining unit including the pseudo code sequence indicator and the combined signal of the pseudo code signal;
- the pseudo code sequence is the key
- the pseudo code sequence indicator code is the indication information
- the transmitting unit is configured to send the combined signal in the form of a visible light signal.
- the pseudo code sequence indicator code combining unit is further configured to merge the pseudo code sequence indicator code into the pseudo code signal header, and output a first merge signal;
- the encryption device further includes: a first combined signal header merging device addressing code, a device addressing code combining unit that outputs a second combined signal; and a transmitting unit configured to transmit the second combined signal in the form of a visible light signal.
- said transmitting means further comprises a modulator coupled between said device addressing code processing unit and said transmitting unit for modulating said second combined signal.
- the transmitting unit is an LED lamp.
- the pseudo code sequence indicates that the code is a large number that does not cycle from small to large or from large to small, and varies with the number of times of transmitting signals.
- a communication system comprising: the above communication device.
- the invention solves the problem of the inability to decrypt in the visible light encryption and decryption, and improves the accuracy of the decryption.
- FIG. 1 is a schematic flowchart of a method for asynchronously encrypting visible light communication according to an embodiment of the present invention
- FIG. 2 is a schematic diagram showing a structure of a transmitting end of an asynchronous encrypted visible light communication system according to an embodiment of the present invention
- FIG. 4 is a schematic diagram of a structure of a transmitting signal according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a transmitting apparatus based on multi-user asynchronous encryption according to an embodiment of the present invention
- FIG. 3 is a flowchart of a method for transmitting based on multi-user asynchronous encryption according to an embodiment of the present invention
- FIG. FIG. 5 is a schematic diagram of a data structure of a second merged data provided by an embodiment of the present invention
- FIG. 5 is a schematic diagram showing a data structure of a second merged data provided by an embodiment of the present invention
- FIG. Figure c2 is a visible light diagram that can be seen in Figure cl
- FIG. c3 is a schematic diagram showing changes in state of a transmitting end and a receiving end in the visible light communication system of FIG. 1c;
- FIG. 4 is a diagram showing use in a visible light communication system A flowchart of a loose decryption method;
- FIG. c5 is a block diagram showing a communication device;
- Figure c6 is a block diagram showing a communication device;
- Figure d1 is a block diagram showing a visible light communication system in which the present invention can be implemented;
- Figure d2 is a diagram showing an encryption and decryption method usable in the visible light communication system of Figure dl
- Figure d3 is a schematic diagram showing the state of the transmitting end and the receiving end in the visible light communication system of Figure dl as a function of time;
- Figure d4 is a diagram showing the automatic adjustment of the visible light communication system according to an aspect of the present invention A flowchart of a method of clock in the middle;
- Figure d5 is a block diagram showing a communication device in accordance with an aspect of the present invention;
- Figure d6 is a block diagram showing a communication device in accordance with
- a method for decrypting a visible light signal including: receiving a visible light signal from a transmitting end, wherein the visible light signal is encrypted by a key at the transmitting end; acquiring the key, and according to the key Decrypting the visible light signal, wherein: obtaining the key comprises: acquiring the key corresponding to the state of the state machine of the receiving end; or obtaining the indication information for obtaining the key according to the visible light signal and acquiring according to the indication information The key.
- the key corresponding to the state machine state is adopted, or the indication information is used to indicate the key used by the receiving end, thereby solving the problem that the decryption has the possibility of failure in the related art.
- the obtaining the indication information for obtaining the key according to the visible light signal comprises: converting the received visible light signal into a digital signal; and decomposing the digital signal into a pseudo code a sequence indicator code and a signal of the pseudo code signal; querying the pseudo code sequence corresponding to the pseudo code sequence indicator code, wherein the pseudo code sequence is the key; and decrypting the pseudo code signal according to the pseudo code sequence.
- the digital signal is decomposed into a signal including a pseudo code sequence indicator code and a pseudo code signal
- querying the pseudo code sequence corresponding to the pseudo code sequence indicator code comprises: decomposing the digital signal into a device addressing code and a first merge Transmitting the first combined signal into the pseudo code sequence indicator code and the pseudo code signal; determining the legality of the pseudo code sequence indicator according to the device addressing code, and if so, querying the pseudo code sequence The pseudo code sequence corresponding to the indicator code.
- the following embodiment further provides a communication device, the device comprising: a receiver, configured to receive a visible light signal from a transmitting end, wherein the visible light signal is encrypted by a key at the transmitting end; and a decoder is configured to acquire the secret Decrypting the visible light signal according to the key, and acquiring the key includes: acquiring the key corresponding to the state of the state machine of the receiving end; or acquiring the key according to the visible light signal
- the indication information is obtained according to the indication information.
- a method for encrypting a visible light signal including: encrypting a data using a key; and transmitting the encrypted data as a visible light signal, wherein the key changes according to a state of the state machine of the transmitting end.
- the visible light signal carries indication information for obtaining the key.
- the encryption method uses a method in which an optical signal carries indication information or a key corresponding to a state machine state, thereby solving the problem that the decryption has a possibility of failure in the related art.
- the visible light signal carries the indication information
- the data is encrypted by using the key
- transmitting the encrypted data as the visible light signal comprises: encoding the generated pseudo code sequence and the data to obtain a pseudo code signal, wherein the pseudo code sequence is the key; and the pseudo code sequence indicator code corresponding to the pseudo code sequence is merged into the pseudo code signal header to obtain a combination including the pseudo code sequence indicator code and the pseudo code signal Signal; the combined signal is transmitted in the form of visible light.
- obtaining the combined signal including the pseudo code sequence indicator code and the pseudo code signal, and transmitting the combined signal in the form of visible light comprises: combining the pseudo code sequence indication code corresponding to the pseudo code sequence into the pseudo code signal header, Obtaining a first combined signal; combining the device addressing code in the first combined signal header to obtain a second combined signal: transmitting the second combined signal in visible form.
- a communication device including: an encryption device, configured to encrypt a data usage key; and a transmitting unit, configured to transmit the encrypted data as a visible light signal, where the key is associated with the transmitting end The state of the state machine changes, or the visible light signal carries indication information for obtaining the key.
- the encryption apparatus comprises: a pseudo code generator for outputting a pseudo code sequence and a corresponding pseudo code sequence indicator; a convolutional encoder for performing a logical operation on the pseudo code sequence and the data, and outputting the pseudo code signal And combining the pseudo code sequence indicator code into the pseudo code signal header, and outputting a pseudo code sequence indicator code combining unit including the pseudo code sequence indicator code and the combined signal of the pseudo code signal; wherein the pseudo code sequence is The key, the pseudo code sequence indicator is the indication information, and the transmitting unit is configured to send the combined signal in the form of a visible light signal.
- the pseudo code sequence indicator code combining unit is configured to merge the pseudo code sequence indicator code into the pseudo code signal header, and output a pseudo code sequence indicator code of the first combined signal.
- the apparatus further includes: The signal header merges the device addressing code, and the device addressing code combining unit outputs the second combined signal.
- the transmitting unit is configured to transmit the second combined signal in the form of a visible light signal.
- the baseband data and the pseudo code sequence generated by the pseudo code generator 101 perform logical operations in the convolutional encoder 102 to obtain data to be encrypted (for example, the data may include ID data, and the encrypted data may also be pseudo code.
- the signal is described below by taking the ID data as an example.
- the encrypted ID data is transmitted to the pseudo code sequence designating code processing unit 103, and the pseudo code sequence indicating code is added and sent to the modulator 104 for signal modulation.
- the modulated signal is sent to the LED 105, and the LED 105 transmits the modulated signal to the visible light receiver in the form of a stroboscopic visible light signal.
- the visible light receiver 201 converts the stroboscopic visible light signal into a binary digital signal for transmission to the demodulator 202 for demodulation, and the demodulator 202 transmits the demodulated signal to the pseudo code sequence designating code processing unit 203.
- the pseudo code sequence indicator processing unit 203 separates the demodulated signal into two parts, a pseudo code sequence indicator code and an encrypted ID data, and sends the pseudo code sequence indicator code to the pseudo code sequence query unit 204 to send the encrypted ID data.
- the pseudo-code sequence query unit 204 determines whether the code is based on the received pseudo-code sequence indication code. If it is legal, it queries the corresponding pseudo-code sequence, and sends the pseudo-code sequence to the convolutional decoder 205. If it is illegal, the password is incorrect.
- the encrypted ID data and the queried pseudo code sequence are XORed in the convolutional decoder 205 to obtain the decrypted ID data, and sent to the ID determiner 206.
- the ID determiner 206 compares the ID data with the set ID data, and if it is the same, it is legal, and sends the valid ID data to the device control circuit 207. Otherwise, the password is incorrect.
- the original data is a digital sequence signal, also referred to as baseband data.
- the ID data is mainly composed of ID data, and the ID data refers to each user's unique identification code.
- the receiving device control circuit is based on the decryption. The ID data determines whether there is a corresponding authority to determine whether to control the device.
- the pseudo code sequence is a sequence of binary digits generated by the pseudo code generator, and may be a digital sequence such as a PN code, a Turbo code, a 3 ⁇ 4sh code, a Barker code, or a user-defined binary number sequence.
- the pseudo code sequence indicator code is a natural number indicating the state of the corresponding unit state machine, and is used to indicate which group of pseudo code sequences used by the transmitting end and the receiving end for encryption and decryption.
- the pseudo code sequence indicator code when the pseudo code sequence indicator code is a binary number 00000100, it is represented by a decimal number as 4, which means that its unit state machine is state 4, and a pseudo code sequence corresponding thereto is 1010110110011100, when the pseudo code sequence indicator code is a binary number 00000101 When it is represented by a decimal number, it means that its unit state machine is state 5, corresponding to another pseudo code sequence 1010110110011001, and so on, different pseudo code sequence indicator codes correspond to different pseudo code sequences, and pseudo code There is a one-to-one correspondence between the sequence indicator code and the pseudo code sequence.
- the pseudo code sequence indicator code is arranged in ascending order or descending order.
- the ascending rule means that the transmitting end of the signal pseudo code sequence indicator itself is incremented by one at the transmitting end, and the descending order is arranged, that is, the transmitting end transmits the signal pseudo code sequence indicating code itself minus 1 .
- the pseudo code sequence indicator code is used to indicate that the transmitting end and the receiving end use the corresponding pseudo code sequence for encryption and decryption, and each time the transmitting end transmits the signal, the pseudo code sequence indicator code is automatically incremented by 1 (or automatically decremented by 1).
- the logical operations are logical XORs, and include, for example, logical OR, logical AND or equivalent operations.
- the visible light signal transmitted by the transmitting end and the receiving end of the asynchronous encrypted visible light communication method in this embodiment is not the original data, but the encrypted scrambling code signal, and the scrambling code is generated after performing a certain logical operation on the original data. Data, such as convolution or shift operation operations on raw data and pseudo code sequences.
- the embodiment further provides an asynchronous encrypted visible light communication system, which includes a transmitting end and a receiving end, and the transmitting end and the receiving end communicate by the asynchronous encrypted visible light communication method. Referring to FIG. 2, a schematic diagram of a structure of a transmitting end of an asynchronously encrypted visible light communication system is provided.
- the transmitting end of the embodiment includes a pseudo code generator 101 for generating a pseudo code sequence indicator code, a convolutional encoder 102 for encoding, and the like.
- the pseudo code sequence indicator processing unit 103 for processing the pseudo code sequence indicator code and the LED 105 for transmitting the visible light signal further includes a modulator 104 for signal modulation.
- the structure of the receiving end of the asynchronously encrypted visible light communication system is used in this embodiment.
- the receiving end includes a visible light receiver 201 for receiving visible light signals, and a pseudo code sequence for acquiring the pseudo code sequence indicating code and the encrypted ID data.
- the receiving end also includes a demodulator 202 for demodulating the signal. It should be understood that a password error may be prompted, without limitation, using a buzzer or a signal light.
- FIG a4 a schematic diagram of a structure of a transmitted signal in this embodiment.
- the transmitted signal data in this embodiment is mainly composed of a pseudo code sequence indicator code and an encrypted ID data.
- the ID data set by the transmitting end and the receiving end are both 16 bits.
- the binary number 0000000000000100, the pseudo code sequence indicator is an 8-bit binary number 00000010, and the corresponding pseudo code sequence is a 16-bit binary number 1010101100100010, Bay 1J:
- the S, the baseband data and the pseudo code sequence generated by the pseudo code generator 101 are XORed in the convolutional encoder 102 to obtain the encrypted ID data, and the operation result is as shown in the following table.
- the encrypted ID data is 1010101100100110, which is different from the original ID data, that is, the original data is encrypted.
- the encrypted ID data is sent to the pseudo code sequence indicator processing unit 103, the encrypted ID data is added with the pseudo code sequence indicator code 00000010 as a header, and the pseudo code sequence indicator code is added and sent to the modulator 104 for signal modulation.
- the sequence of numbers output is 000000101010101100100110.
- the modulated signal is sent to the LED 105, and the LED 105 transmits the modulated signal 000000101010101100100110 to the visible light receiver as a stroboscopic visible light signal.
- the visible light receiver 201 converts the stroboscopic visible light signal into a binary digital signal for transmission to the demodulator 202 for demodulation, and the demodulator 202 transmits the demodulated signal to the pseudo code sequence designating code processing unit 203.
- the pseudo code sequence indicator processing unit 203 separates the demodulated signal 000000101010101100100110 into a pseudo code sequence indicator code 00000010 and an encrypted ID data 1010101100100110, and sends the pseudo code sequence indicator code 00000010 to the pseudo code sequence query unit 204.
- the encrypted ID data 1010101100100110 is sent to the convolutional decoder 205.
- S5 the pseudo code sequence query unit 204 inputs the pseudo code sequence indicator code 00000010, and the pseudo code sequence query unit 204 compares the previously saved pseudo code sequence indicator code with the currently received pseudo code sequence indicator code, according to the received The pseudo code sequence indicator code determines whether it is legal.
- the pseudo code sequence indicator code adopts an ascending order (when the transmitting end sends the signal pseudo code sequence indicator code itself plus 1), if the currently received pseudo code sequence indicator code is larger than the saved The pseudo code sequence indicator code, the currently received signal is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, prompting a password error.
- the descending rule is adopted (the transmitting end of the signal pseudo code sequence indicator itself is decremented by 1), if the currently received pseudo code sequence indicator is smaller than the saved pseudo code sequence indicator, the currently received signal It is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, and the same goes to the prompt password error.
- the decrypted ID data is 0000000000000100, which is sent to the ID determiner 206.
- the ID determiner 206 compares the received decrypted ID data with the set ID data, and if it is the same, it is legal, and sends the valid ID data to the device control circuit 207. If it is different, it is illegal, and the password is incorrect. At this point, the ID judging unit 206 receives the signal 0000000000000100, and the ID data set by the receiving end is also 0000000000000100. Therefore, the received signal is a legal signal, and the receiving end successfully decrypts the encrypted signal sent by the transmitting end.
- the high-speed camera can avoid the visible light signal and copy the visible light signal.
- the encrypted ID data sent by the embodiment is captured by the high-speed camera and copied during the communication process of the transceiver, and the copied signal is the air interface signal 000000101010101100100110. Since the receiving end has saved the pseudo code sequence indicator code as 00000010 when receiving the legal signal, when it receives the copied signal again, it also obtains 00000010 by separating the pseudo code sequence indicator code therein. However, according to the encryption ascending rule, the pseudo code sequence indicator received later should be greater than 00000010 (when the descending rule is used, it should be less than 00000010), and the copied signal is equal to each other, so it can be judged that the copied signal is an illegal signal, and the password will be prompted. error.
- the visible light signal is captured by the high speed camera and the visible light signal is copied and then a new signal is forged by modification, that is, the pseudo code sequence indicator code is modified to 00000011, and the rest remains unchanged.
- the pseudo code sequence query unit 204 determines that it is a legal signal, and queries the pseudo code sequence corresponding to the pseudo code sequence indicator 00000011, the pseudo code sequence and the encrypted pseudo code. Different sequences, It is assumed that the pseudo code sequence query unit queries the corresponding pseudo code sequence to be 1010101100100011, and uses the pseudo code sequence to decrypt the ID data.
- the operation process is as follows:
- the ID data of the forged signal decryption is 0000000000000101
- the ID data set by the receiving end is 0000000000000100
- the IDs of the two are different
- the ID determiner 206 determines that the received signal is an illegal signal, prompting a password error.
- the S, the baseband data and the pseudo code sequence generated by the pseudo code generator 101 are XORed in the convolutional encoder 102 to obtain the encrypted ID data, and the operation result is as shown in the following table.
- the encrypted ID data is 1010101100100000, which is different from the original ID data, that is, the original data is encrypted.
- the encrypted ID data is sent to the pseudo code sequence indicator processing unit 103, the encrypted ID data is added with the pseudo code sequence indicator code 00000010 as a header, and the pseudo code sequence indicator code is added and sent to the modulator 104 for signal modulation.
- the sequence of numbers output is 000000101010101100100000.
- the modulated signal is sent to the LED 105, and the LED 105 transmits the modulated signal 000000101010101100100000 to the visible light receiver as a stroboscopic visible light signal.
- the visible light receiver 201 converts the stroboscopic visible light signal into a binary digital signal and sends it to the demodulator 202 for demodulation.
- the demodulator 202 transmits the demodulated signal to the pseudo code sequence indicator code processing unit 203.
- the pseudo code sequence indicator processing unit 203 separates the demodulated signal 000000101010101100100000 into a pseudo code sequence indicator code 00000010 and an encrypted ID data 1010101100100000, and sends the pseudo code sequence indicator code 00000010 to the pseudo code sequence query unit 204.
- the encrypted ID data 1010101100100000 is sent to the convolutional decoder 205.
- the pseudo code sequence query unit 204 inputs a pseudo code sequence indicator code 00000010, and the pseudo code sequence query unit 204 compares the previously stored pseudo code sequence indicator code with the currently received pseudo code sequence indicator code, according to the received The pseudo code sequence indicator code determines whether it is legal.
- the pseudo code sequence indicator code adopts an ascending order (when the transmitting end sends the signal pseudo code sequence indicator code itself plus 1), if the currently received pseudo code sequence indicator code is larger than the saved
- the pseudo code sequence indicator code the currently received signal is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, prompting a password error.
- the transmitting end of the signal pseudo code sequence indicator itself is decremented by 1
- the currently received pseudo code sequence indicator is smaller than the saved pseudo code sequence indicator
- the currently received signal It is a legal signal to send the received pseudo code sequence to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, and the same goes to the prompt password error.
- the decrypted ID data is 0000000000000010, which is sent to the ID determiner 206.
- the ID determiner 206 compares the received decrypted ID data with the set ID data, and if it is the same, it is legal, and sends the valid ID data to the device control circuit 207. If it is different, it is illegal, and the password is incorrect. At this point, the signal received by the ID determiner 206 is 00000000000000010, and the ID data set by the receiving end is also 00000000000000010. Therefore, the received signal is a legitimate signal, and the receiving end successfully decrypts the encrypted signal sent by the transmitting end.
- the pseudo-code sequence generated by the Sl, baseband data and pseudo-code generator 101 is subjected to or not calculated by the convolutional encoder 102 to obtain the ID data to be encrypted, and the operation result is as shown in the following table.
- the encrypted ID data is 1111111111011100, which is different from the original ID data, that is, the original data is encrypted.
- the encrypted ID data is sent to the pseudo code sequence indicator processing unit 103, the encrypted ID data is added with the pseudo code sequence indicator code 00000010 as a header, and the pseudo code sequence indicator code is added and sent to the modulator 104 for signal modulation.
- the sequence of numbers output is 000000101111111111011100.
- the modulated signal is sent to the LED 105, and the LED 105 transmits the modulated signal 000000101111111111011100 to the visible light receiver as a stroboscopic visible light signal.
- the visible light receiver 201 converts the stroboscopic visible light signal into a binary digital signal and sends it to the demodulator 202 for demodulation.
- the demodulator 202 sends the demodulated signal to the pseudo code sequence indicator code processing unit 203.
- the pseudo code sequence indicator processing unit 203 separates the demodulated signal 000000101111111111011100 into a pseudo code sequence indicator code 00000010 and an encrypted ID data 1111111111011100, and sends the pseudo code sequence indicator code 00000010 to the pseudo code sequence query unit 204.
- the encrypted ID data 1111111111011100 is sent to the convolutional decoder 205.
- the pseudo code sequence query unit 204 inputs the pseudo code sequence indicator code 00000010, and the pseudo code sequence query unit 204 compares the previously saved pseudo code sequence indicator code with the currently received pseudo code sequence indicator code, according to the received The pseudo code sequence indicator code determines whether it is legal.
- the pseudo code sequence indicator code adopts an ascending order (when the transmitting end sends the signal pseudo code sequence indicator code itself plus 1), if the currently received pseudo code sequence indicator code is larger than the saved The pseudo code sequence indicator code, the currently received signal is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, prompting a password error.
- the transmitting end of the signal pseudo code sequence indicator itself is decremented by 1
- the currently received pseudo code sequence indicator is smaller than the saved pseudo code sequence indicator, the currently received signal It is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, and the same goes to the prompt password error.
- the decrypted ID data is 0000000000000011, which is sent to the ID determiner 206.
- the ID determiner 206 compares the received decryption ID data with the set ID data, and if it is the same, sends the legal ID data to the device control circuit 207, and the difference is illegal, and the password is incorrect. At this point, the ID judging unit 206 receives the signal 0000000000000011, and the ID data set by the receiving end is also 0000000000000011. Therefore, the received signal is a legal signal, and the receiving end successfully decrypts the encrypted signal sent by the transmitting end.
- the pseudo-code sequence indicator code is an 8-bit binary digit 10000000
- the corresponding pseudo-code sequence is a 16-bit binary digit 0000100000000000.
- the S, the baseband data and the pseudo code sequence generated by the pseudo code generator 101 are subjected to the same or operation in the convolutional encoder 102 to obtain the ID data to be encrypted, and the operation result is as shown in the following table.
- the encrypted ID data is 1111011111101111, which is different from the original ID data, that is, the original data is encrypted.
- the encrypted ID data is sent to the pseudo code sequence indicator processing unit 103, the encrypted ID data is added with the pseudo code sequence indicator code 10000000 as a header, and the pseudo code sequence indicator code is added and sent to the modulator 104 for signal modulation.
- the sequence of numbers output is 100000001111011111101111.
- the modulated signal is sent to the LED 105, and the LED 105 transmits the modulated signal 100000001111011111101111 to the visible light receiver as a stroboscopic visible light signal.
- the visible light receiver 201 converts the stroboscopic visible light signal into a binary digital signal for transmission to the demodulator 202 for demodulation, and the demodulator 202 transmits the demodulated signal to the pseudo code sequence designating code processing unit 203.
- the pseudo code sequence indicator processing unit 203 separates the demodulated signal 100000001111011111101111 into a pseudo code sequence indicator code 10000000 and an encrypted ID data 1111011111101111, and sends the pseudo code sequence indicator code 10000000 to the pseudo code sequence query unit 204.
- the encrypted ID data 1111011111101111 is sent to the convolutional decoder 205.
- the pseudo code sequence query unit 204 inputs the pseudo code sequence indicator code 10000000, and the pseudo code sequence query unit 204 compares the previously stored pseudo code sequence indicator code with the currently received pseudo code sequence indicator code, according to the received The pseudo code sequence indicator code determines whether it is legal.
- the pseudo code sequence indicator code adopts an ascending order (when the transmitting end sends the signal pseudo code sequence indicator code itself plus 1), if the currently received pseudo code sequence indicator code is larger than the saved
- the pseudo code sequence indicator code the currently received signal is a legitimate signal, and the received pseudo code sequence is sent to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, prompting a password error.
- the transmitting end of the signal pseudo code sequence indicator itself is decremented by 1
- the currently received pseudo code sequence indicator is smaller than the saved pseudo code sequence indicator
- the currently received signal It is a legal signal to send the received pseudo code sequence to the convolutional decoder 205. Otherwise, the currently received signal is an illegal signal, and the same goes to the prompt password error.
- the decrypted ID data is 0000000000010000, which is sent to the ID determiner 206.
- the ID determiner 206 compares the received decrypted ID data with the set ID data, and if it is the same, it is legal, and sends the valid ID data to the device control circuit 207. If it is different, it is illegal, and the password is incorrect.
- the ID judging unit 206 receives the signal 0000000000010000, and the ID data set by the receiving end is also 0000000000010000. Therefore, the received signal is a legal signal, and the receiving end successfully decrypts the encrypted signal sent by the transmitting end.
- the asynchronous encrypted visible light communication method and system provided by the embodiment are simpler and more cost-effective than the synchronous encryption method, and do not require the same clock on the transmitting end and the receiving end, and can avoid high-speed camera shooting.
- the visible light signal and the visible light signal cause password leakage, which greatly improves the security performance of the photonic Internet of Things.
- This embodiment can be used in a photon lock and photon access control system.
- Embodiment 2 Please refer to FIG. bl, which is a schematic structural diagram of a transmitting apparatus based on multi-user asynchronous encryption according to an embodiment of the present invention.
- the transmitting apparatus includes a baseband data memory 100b, a pseudo code generator 101b, and a convolutional encoder 102b.
- the pseudo code sequence indicating code combining unit 103b, the device addressing code combining unit 104b, the modulator 105b, and the visible light transmitting unit 106b are configured to store ID information, and the ID information is data for indicating the identity of the user.
- the pseudo code generator 101b is configured to provide a pseudo code sequence for the convolutional encoder 102b, and a pseudo code sequence indication code for the pseudo code sequence indicator code combining unit 103b; the convolutional encoder 102b And performing a logical operation on the pseudo code sequence and the ID information of the transmitting device to output a pseudo code signal;
- the pseudo code sequence indicating code combining unit 103b is configured to add a pseudo code to the pseudo code signal output by the convolutional encoder 102b.
- FIG. 2 is a schematic structural diagram of a receiving apparatus based on multi-user asynchronous encryption according to Embodiment 2 of the present invention.
- the receiving apparatus includes a visible light receiver 201b, a demodulator 202b, a device addressing code decomposition unit 203b, and a pseudo device.
- a code sequence query unit 204b a pseudo code sequence indicator code decomposition unit 205b, a convolutional decoder 206b, a query unit 207b, an ID decider 208b, and a device control circuit 20%
- the visible light receiver 201b is configured to use the transmitting device
- the transmitted optical signal is converted into an electrical signal, and the electrical signal is converted into a digital signal
- the demodulator 202b is configured to demodulate the digital signal output by the visible light receiver 201b
- the device addressing code decomposition unit 203b Separating the device addressing code from the first combined signal from the signal output from the demodulator 202b
- the pseudo code sequence query unit 204b is configured to output a corresponding pseudo code sequence according to the device addressing code
- the pseudo code sequence indication code decomposition unit 205b is
- the query unit 207b is configured to determine, according to the device addressing code, the legality of the pseudo code sequence indicator of the current signal; the convolutional decoder 206b is configured to use the pseudo code output by the pseudo code sequence query unit 204b.
- the sequence and the pseudo code signal are logically operated to output ID information;
- the ID determiner 208b is configured to determine whether the ID information output by the convolutional decoder 206 and the query unit 207b are the same, and if they are the same, the The ID information is transmitted to the device controller;
- the device control circuit 209b is configured to control or communicate with the host device according to the signal output by the ID determiner 208b.
- the above embodiment describes a transmitting apparatus and a receiving apparatus based on multi-user asynchronous encryption, and a transmitting method and a receiving method based on multi-user asynchronous encryption are described below.
- FIG. b3 it is a flowchart of a method for transmitting a multi-user asynchronous encryption according to Embodiment 3 of the present invention.
- the transmitting method includes: performing logical operations on the ID information of the S1 K transmitting device and the generated pseudo code sequence to form a pseudo code. signal.
- S12 Combine the pseudo code sequence indication code corresponding to the pseudo code sequence into the pseudo code signal header to obtain a first combined signal.
- the pseudo code sequence indicator code is a large number that does not cycle from small to large or from large to small, and varies with the number of times of the transmitted signal. For example, the pseudo code sequence indicator code is incremented or decremented by one every time the signal is transmitted.
- S13. Combine the device addressing code in the first combined signal header to obtain a second combined signal.
- the logical operation is an exclusive OR operation; in the step S13, the device addressing code is different from the ID information, but corresponds to the ID information, and each ID information represents a user. .
- FIG. 4 is a flow chart of a receiving method based on multi-user asynchronous encryption according to Embodiment 4 of the present invention, where the transmitting method includes:
- S2K converts the received visible light signal into a digital signal. 522. Demodulate the digital signal.
- the pseudo code sequence indicator code is a large number that does not loop from small to large, the received pseudo code sequence indicator code is queried according to the device addressing code, if the pseudo code sequence indicator code is less than or equal to received. If the pseudo-code sequence indication code is obtained, the determination is invalid, otherwise the determination is legal; or, when the pseudo-code sequence indication code is a large number that does not loop from large to small, the received pseudo-code is queried according to the device addressing code.
- the sequence indicator code is invalid if the pseudo code sequence indicator code is greater than or equal to the received pseudo code sequence indicator code, otherwise the determination is legal.
- the device addressing code Query the device corresponding ID information according to the device addressing code, and compare the ID information with the decoded ID information. If the information is the same, the determination is legal, and the legal ID information is output.
- the visible light information transmitted between the transmitting device and the receiving device of the photonic IoT is not the original data, but the encrypted scrambling signal.
- the scrambling code referred to herein refers to data generated after a certain logical operation on the original data, such as convolution of the original data and the pseudo code sequence or a shift operation operation.
- a pseudocode sequence is a sequence of binary digits produced by a pseudocode generator.
- the original data is a digital sequence signal, also referred to herein as baseband data, which in this example is ID information
- ID information refers to a unique identification code of each transmitting device
- the device control circuit of the visible light receiving device is based on decryption.
- the subsequent ID information determines whether there is a corresponding right, so that it is possible to control the device to respond accordingly.
- the pseudo code sequence indicator code is a large number, from small to large (or large to small) without looping, used to indicate which corresponding pseudo code sequence is used by the transmitting device and the receiving device for encryption and decryption, and the visible light emitting device transmits a signal every time. , the pseudo code sequence indicator will be incremented by 1 (or decremented by 1).
- the device addressing code is a unique identification number of each transmitting device, which is different from the ID, but corresponding to the ID-1, the device addressing code is used by the receiving device to search for the ID information preset by the corresponding device and the last time
- the pseudo code sequence indicator received by the device As shown in Figure b5, the data structure of the second merged data is assumed to be a 16-bit binary number 0000000000000100; the pseudo-code sequence indicator is an 8-bit binary number 00000010, and the corresponding pseudo-code sequence is a 16 Bit binary number 1010101100100010;
- the device addressing code is also an 8-bit binary number 10101010.
- the ID information and the pseudo code sequence are logically operated (for example, exclusive OR operation) in the convolutional encoder 102, and the operation result is as shown in the following table -
- the convolutional coding process table is known from the table bl.
- the encrypted ID information is 1010101100100110, which is different from the original ID information, and has a certain encryption effect on the data.
- the encrypted ID information is sent to the pseudo code sequence indicator combining unit 103.
- the pseudo code generator 101 also transmits the pseudo code sequence indicator corresponding to the pseudo code sequence to the pseudo code sequence indicator.
- Unit 103 The encrypted ID information is added to the pseudo code sequence indicating code combining unit 103 by the pseudo code sequence indicating code 00000010 as a header, and then output to the device addressing code combining unit 104, and the output digital sequence is 000000101010101100100110.
- the signal output by the pseudo code sequence indicating code combining unit 103 is added to the device addressing code 10101010 as a header, and then output, and the result of the output is 10101010000000101010101100100110.
- the device addressing code combining unit 104 outputs The signal is then sent to modulator 105 for signal modulation and then output to the LED for transmission in the form of a fast-flashing visible light signal. After the visible light emitted from the LED of the transmitting device is transmitted over a short distance in the air, it is received in the visible light receiver 201 in the receiving device, converted into a digital electrical signal, and then demodulated and demodulated at the demodulator 202.
- the signal is then sent to the device addressing code decomposition unit 203.
- the device addressing code decomposing unit 203 performs device addressing terminal separation on the received demodulated signal, that is, 10101010000000101010101100100110, obtains a device addressing code 10101010, and respectively sends the device addressing code 10101010 to the pseudo code sequence.
- the pseudo code sequence indication code decomposing unit 205 performs header separation on the received data to obtain a pseudo code sequence indication code 00000010, and transmits the pseudo code sequence indication code to the pseudo code sequence inquiring unit 204.
- the remaining portion 1010101100100110 after the pseudo code sequence instruction code decomposition unit 205 separates the pseudo code sequence designation code is the encrypted ID information, and transmits the ID information to the convolutional decoder 206.
- the input signals of the pseudo code sequence query unit 204 are a device address code 10101010 and a pseudo code sequence indicator code 00000010, respectively.
- the register corresponding to the device addressing code 10101010 holds a pseudo code sequence indicator code received last time corresponding to the device.
- the pseudo code sequence inquiring unit 204 compares the previously saved pseudo code sequence indicator code with the currently received pseudo code sequence indicator code, and adopts an ascending order (the transmitting device transmits a signal pseudo code sequence indicating code itself plus 1) In case, if the currently received pseudo code sequence indicator is larger than the saved pseudo code sequence indicator, the currently received signal is a legal signal; otherwise, the current received signal is an illegal signal, and The alarm message is sent to the alarm unit (not shown) for alarm.
- the pseudo code sequence inquiring unit 204 saves the currently received pseudo code sequence indicator code, that is, updates the originally stored pseudo code sequence indicator code. Then, the pseudo code sequence query unit 204 queries the pseudo code sequence database according to the new pseudo code sequence indicator code.
- the pseudo code sequence query unit 204 can The pseudo code sequence used for the corresponding encryption is found, and this pseudo code sequence is sent to the convolutional decoder 206. Since the receiving device and the transmitting device use the same security machine, the pseudo code sequence indicating code 00000010 transmitted by the transmitting device can query the receiving device for the pseudo code sequence 1010101100100010 used for encrypting with the transmitting device.
- the input signals of the convolutional decoder 206 are the encrypted ID information 1010101100100110 and the pseudo code sequence 1010101100100010, respectively. The two data are XORed as follows: Pseudo code sequence
- the decrypted output ID information is 0000000000000100.
- an ID determiner 208 and an inquiry unit 207 are also provided in the receiving device. Since some of the forged signals may set the pseudo code sequence indicator to be relatively large, the pseudo code sequence query unit 204 may be mistaken for a legitimate signal, thereby selecting a pseudo code sequence corresponding thereto for decryption, and also obtaining an ID information. However, this data is not a real ID, and it does not correspond to the device addressing code. This will cause security problems.
- the inquiring unit 207 of the receiving device will perform a database query to obtain a real ID of 0000000000000100, and send it to the ID determiner 208.
- the ID determiner 208 After receiving the ID information outputted by the convolutional decoder 206 and the query unit 207, the ID determiner 208 compares the two values. If they are the same, the received signal is a legal signal, and then the legal ID information is sent. To the device control circuit; if they are different, indicating that the received signal is a forged signal, if it is illegal, an alarm is issued.
- the two ID informations received by the UE are 0000000000000100, which is a legal signal, that is, the receiving device successfully decrypts. It is assumed that the data exemplified by the present invention is captured by the high speed camera and copied during the communication process at the transmitting end, and the copied signal is the air interface signal 10101010000000101010101100100110.
- the receiving device Since the receiving device has saved the pseudo code sequence indicator code as 00000010 when receiving the legal signal, when it receives the copied signal again, it also obtains 00000010 by separating the pseudo code sequence indicator code therein. According to the ascending order of encryption, the pseudo code sequence indicator received later should be greater than 00000010 (when the descending rule is used, it should be less than 00000010), but the copied signal is equal, so it can be determined as the illegal signal copied. It is assumed that after copying the signal, a new signal is falsified by modification, that is, the pseudo code sequence indicator code therein is modified to 00000011, and the other parts are unchanged.
- the pseudo code sequence query unit 204 determines the signal as a valid, and queries the pseudo code sequence corresponding to the pseudo code sequence indicator 00000011, but the pseudo code sequence It is definitely not the same as the encrypted pseudo code sequence.
- the pseudo code sequence query unit 204 queries the corresponding pseudo code sequence to be 1010101100100011, and uses this pseudo code sequence to decrypt the ID information.
- the process table is as follows:
- Table b3 Forged Signal Convolution Decoding Process Table From Table b3, the ID information decrypted by the forged signal is 0000000000000101. As can be seen from the above embodiment, the ID information obtained by the query unit 207 for the device addressing code 10101010 is
- Embodiment 3 Figure cl shows a visible light communication system 100 in which the present invention may be implemented.
- the visible light communication system 100 includes a transmitting end 110 and a receiving end 120.
- the transmitting end 110 includes an encoder 111 and a pseudo code signal generator 112 coupled to the encoder 111.
- the encoder 111 receives the original communication data and encodes the original communication data using the pseudo code signal generated by the pseudo code signal generator 112 to generate a scrambled signal. Since the generated scrambling code signal is different from the original communication data, it plays the role of encryption. As used herein, the terms “encryption” and “encoding”, as well as “decryption” and “decoding” are used interchangeably.
- the raw communication data may be identity information associated with the transmitting end 110.
- the encoder 111 outputs the scrambling code signal to the light emitting unit 113, which transmits the received scramble code signal in the form of visible light.
- the light emitting unit 113 may be an LED or other element having a light emitting function.
- the transmitting end 110 can be a handheld client in the photonic IoT.
- the receiving end 120 includes a receiving unit 123 for receiving a visible light signal emitted by the transmitting end 110 and converting the visible light signal into a digital signal.
- the decoder 121 receives the digital signal output by the receiving unit 123 and adopts a pseudo The pseudo code signal generated by the code signal generator 122 decodes it to recover the original communication data. Only one transmitting end 110 is shown in the visible light communication system 100 shown in FIG. cl, but those skilled in the art will readily appreciate that there are often multiple transmitting ends 110 corresponding to one receiving end 120.
- a time-varying sequence such as a pseudo code is used in both the transmitting end 110 and the receiving end 120.
- the original communication data is encrypted and decrypted by a sequence, a pseudo-random sequence or a pseudo-random code. Therefore, as shown in FIG. 15c, the pseudo code signal generator 112 outputs a pseudo code signal that changes with time according to the state of the state machine of the transmitting end 110 with reference to the clock signal supplied from the crystal oscillator 114.
- the pseudo code signal transmitter 122 in the receiving end 120 also outputs a time-varying pseudo code signal according to the state of the state machine of the receiving end 120 with reference to the clock signal provided by the crystal oscillator 124.
- Figure c2 shows a flow chart of an encryption and decryption method used in the visible light communication system 100.
- the transmitting end 110 logically operates the original communication data with the first pseudo code signal that changes with time to obtain a scrambling code signal.
- the original communication data may be user information to be sent, such as user ID information, fingerprint, face, iris, input password, other information for assisting verification of user identity, etc., of course, may also include a combination of the above two or more, and may Is a digital sequence signal.
- the pseudo code signal may be a sequence of numbers that varies with unit time, wherein the unit time may be set as desired, for example, daily, hourly, minute, second, and the like.
- the logical operation of the original communication data and the first pseudo code signal may be a logical AND, a logical OR, a logical exclusive OR, or a combination of any two or more of the above operations.
- the original communication data is the user ID of the transmitting end, and is always 00001101.
- the first pseudo code signal may be 10101010, and the logical operation of the original communication data and the first pseudo code signal, for example, the process of "exclusive OR" is as follows The table shows:
- the transmitting end 110 transmits the scrambling code signal in the form of a visible light signal.
- the transmitting end 110 transmits the modulated signal in the form of a flash by means of an LED lamp.
- the LED lamp can generate high frequency flicker, the light can represent 1, the light can represent 0, or vice versa, thereby effectively realizing visible light communication.
- the receiving end 120 receives the visible light signal transmitted by the transmitting end 110, and converts the visible light signal into a digital signal. For example, for high frequency flicker produced by an LED lamp, light may represent 1 and no light may represent 0, or vice versa, thereby converting the received visible light signal into a digital signal.
- the receiving end 120 decodes the digital signal and the second pseudo code signal, for example, a logical operation to obtain original communication data.
- the second pseudo code signal is also 10101010, which is the same as the first pseudo code signal pattern and the starting and ending phases.
- the receiving end 120 performs a logical operation on the received signal and the second pseudo code signal, for example, the "exclusive OR" process is as shown in the following table -
- the decoded output signal is 00001101, which is the same as the original communication data, that is, the original communication data is decoded.
- the pseudo code signal generated by the pseudo code signal generator of the receiving end needs to be changed synchronously with the pseudo code signal generated by the pseudo code signal generator of the transmitting end.
- the change of the pseudo code signal is determined by the state of the state machine at both ends of the transceiver, and has different pseudo code signals corresponding to different states of the state machine.
- the state of the state machine at the transmitting end and the receiving end is synchronously changed, so that the pseudo code signals of the transmitting end and the receiving end can also change synchronously.
- the state of the state machine at both ends of the transmission and reception simultaneously jumps from the previous state N to the next state N+1, and accordingly,
- the pseudo code signals used for encryption and decryption at the transmitting end and the receiving end also change from the pseudo code signal corresponding to the state N to the pseudo code signal corresponding to the state N+1.
- the accuracy of the clock systems of the visible light transmitting end 110 and the receiving end 120 is determined by the respective crystal oscillators 114, 124.
- the state changes of the transmitting end 110 and the receiving end 120 are all based on their own clock system. Due to the error between the clock systems at the two ends of the transmitting and receiving, the state changes of the state machine of the transmitting end 110 and the receiving end 120 may be out of synchronization. . Taking the state machine at both ends of the transceiver as a standard unit time T change as an example, assuming the transmitting end 110 The clock system is slower than the standard time, and the clock system at the receiving end 120 is faster than the standard time. After a certain standard time, the system time of the transmitting end 110 and the receiving end 120 differ by one unit time T.
- Figure c3 is a diagram showing the state of the state machine of the transmitting end and the receiving end as a function of time. As shown in FIG. c3, at the standard time to time, it is assumed that the clock systems of the transmitting end and the receiving end are aligned, and both the transmitting end and the receiving end are in the state N, and after a period of time, the standard time t1 is reached.
- the present invention provides a loose decryption method in a visible light communication system.
- the received visible light signal is decrypted not only by the key corresponding to the current state of the state machine of the receiving end, but also when the decryption is unsuccessful.
- FIG. c4 shows a flow chart of a loose decryption method in a visible light communication system in accordance with an aspect of the present invention.
- a visible light signal from the transmitting end is received at the receiving end, the visible light signal being at least partially encrypted at the transmitting end with a key that changes with the state of the state machine of the transmitting end.
- the visible light signal includes communication data and an identifier of the transmitting end, wherein the communication data is encrypted with a key that changes with a state of the state machine of the transmitting end, and the identifier of the transmitting end is not encrypted.
- the communication data may be user identity (ID) information
- the identifier of the transmitter may be the device number of the transmitter.
- the device number at the transmitting end is unique to the transmitting end and can be used to uniquely identify the transmitting end.
- the communication data such as the user ID is stored in association with the identification number of the transmitting end at the receiving end.
- the visible light signal is decrypted with a key corresponding to the current state of the state machine of the receiving end and at least one state before and/or after the current state.
- the receiving end may also select a predetermined number of states before the current state, and select a reservation after the current state. A number of states, or both a predetermined number of states before the current state and a predetermined number of states after the current state are selected.
- the receiving end may select only a predetermined number of states before the current state.
- the receiving end in addition to the current state of the state machine at the receiving end, the receiving end may select only a predetermined number of states after the current state.
- the relative speed of the clock system at the receiving end and the transmitting end is uncertain, in addition to the current state of the state machine at the receiving end, the receiving end can select both the current The predetermined number of states before the state again selects a predetermined number of states after the current state.
- the predetermined number of sizes may depend on factors such as the accuracy of the crystal oscillator in the receiving end and the transmitting end, the processing capability of the receiving end and the transmitting end.
- the receiving end may first decrypt the visible light signal with a key corresponding to its current state of the state machine. If the decryption is successful, the process ends. If the decryption is unsuccessful, then decryption is continued with a key corresponding to a predetermined number of states before and/or after the current state. For example, the receiving end may sequentially decrypt the visible light signal with a key corresponding to each of a predetermined number of states before and/or after the current state until the visible light signal is successfully decrypted or has been used with the current state.
- the visible light signal is decrypted by a key corresponding to all of the predetermined number of states before and/or after.
- the receiving end may first obtain an identifier of the transmitting end from the visible light signal, and retrieve the locally stored communication data associated with the identifier. .
- the receiving end recovers the communication data by using the key corresponding to one of the selected states, the recovered communication data is compared with the communication data stored locally at the receiving end, and if the two are the same, it is considered The decryption was successful. For example, if the recovered user ID is consistent with the user ID stored locally at the receiving end, the visible light signal is considered to be a legitimate signal.
- the visible light signal continues to be decrypted with the key corresponding to the remaining state until the decryption is successful or the visible light signal has been decrypted using the key corresponding to all of the selected states. If the decryption of the visible light signal by the key corresponding to the current state and all of the predetermined number of states before and/or after is unsuccessful, the visible light signal is considered to be an illegal signal.
- the order of decryption is to first adopt a key corresponding to the current state, and then a key corresponding to a predetermined number of states before and after the current state.
- the receiving end may decrypt in a predetermined order with a key corresponding to each of the current state and at least one of the states before and/or after the current state. Until the visible light signal is successfully decrypted or the visible light signal has been decrypted using a key corresponding to all of these states.
- the above described relaxed decryption method is illustrated and described as a series of acts for simplicity of the explanation, it should be understood and appreciated that the methods are not limited by the order of the acts, as some acts may vary according to one or more embodiments. The order occurs and/or occurs concurrently with other acts from what is illustrated and described herein or that are not illustrated and described herein but that are understood by those skilled in the art.
- the process of selecting a state decryption not only in the current state may be to retrieve a state at a time.
- the decryption of the key corresponding to the state is unsuccessful, the next state is retrieved and decrypted correspondingly until the decryption succeeds or all the retrieved has been retrieved.
- the predetermined number of states may be, or may be to retrieve the current state and a predetermined number of states before and after, and then decrypt the keys corresponding to each state in turn until the decryption is successful.
- the above loose decryption method is described below with reference to the state diagram of FIG. c3.
- the receiving end receives the visible light signal emitted by the transmitting end at the standard time t1.
- the receiving end can convert the received visible light signal into a digital signal, and first obtain an unencrypted device number of the transmitting end.
- the current state of the state machine at the receiving end is N+6.
- the receiving end may also select a predetermined number (for example, two) of states N+4, N+5 before the current state, and two states N+7, N+8 after the current state.
- the receiving end may first decrypt the digital signal with a pseudo code sequence corresponding to the current state N+6. For example, a logical exclusive OR operation may be performed to obtain a user ID.
- the receiving end compares the decrypted user ID with the locally stored user ID associated with the transmitting end, and the two are not the same, so the decryption is unsuccessful. Subsequently, the receiving end performs a logical exclusive OR operation on the digital signal in a predetermined order with a pseudo code sequence corresponding to the four states before and after the current state.
- the predetermined order may be in order from the near state to the current state, for example, may be N+7, N+5, N+8, N+4.
- the receiving end decrypts with the pseudo code sequence corresponding to the state N+7. Since the decrypted user ID does not coincide with the locally stored user ID, the receiving end continues to decrypt using the pseudo code sequence corresponding to the state N+5.
- FIG. 5 is a block diagram showing a communication device 500 in accordance with an aspect of the present invention.
- the communication device 500 includes a receiver 502 that receives visible light signals from a transmitting device that is encrypted at least in part by a key that varies with the state of the state machine of the transmitting device.
- the communication device 500 also includes a decoder 504.
- the decoder 504 decrypts the visible light signal with a key corresponding to the current state of the state machine of the communication device 500 and at least one state before and/or after the current state.
- the decoder 504 may select a predetermined number of states before the current state, and select A predetermined number of states after the current state, or both a predetermined number of states before the current state and a predetermined number of states after the current state are selected.
- decoder 504 may first decrypt the visible light signal with a key corresponding to the current state of the state machine of communication device 500. If the decryption is successful, the process ends. If the decryption is unsuccessful, the decoder 504 continues to decrypt with a key corresponding to a predetermined number of states before and/or after the current state. For example, decoder 504 can sequentially decrypt the visible light signal with a key corresponding to each of a predetermined number of states before and/or after the current state until the visible light signal is successfully decrypted or has been used with the current The key corresponding to all of the predetermined number of states before and/or after the state decrypts the visible light signal.
- the pseudo code signal generator 508 can generate a key, such as a pseudo code sequence signal, that varies with the state of the state machine of the communication device 500.
- Communication device 500 can also include a memory 510.
- Memory 510 can store state information 512, such as a state machine of communication device 500.
- Communication device 500 can also include a processor 506.
- the processor 506 can be dedicated to points A processor that analyzes the information received by the receiver 502, a processor that controls one or more components of the communication device 500, and/or both analyzes the information received by the receiver 502 and controls one or more components of the communication device 500. processor.
- FIG. 6 is a block diagram showing a communication device 600 in accordance with an aspect of the present invention.
- communication device 600 is represented as including functional blocks that can represent functional blocks implemented by a processor, software, or a combination thereof (e.g., firmware).
- Communication device 600 includes a logical grouping 602 of collaborative electronic components.
- logical grouping 602 can include an electronic component for receiving a visible light signal from a transmitting end at a receiving end that is encrypted 604 at the transmitting end, at least in part, with a key that varies with the state of the state machine of the transmitting end.
- logical grouping 602 can also include an electrical component 606 for decrypting the visible light signal with a key corresponding to the current state of the state machine at the receiving end and at least one state before and/or after the current state.
- communication device 600 can include a memory 608 that holds instructions for executing functions associated with electronic components 604 and 606. Although shown external to memory 608, it should be understood that one or more of electronic components 604 and 606 may be present within memory 608.
- Embodiment 4 The clock adjustment method in this embodiment can be applied not only to the acquisition of the key at the receiving end but also to other aspects. The clock adjustment method in this embodiment can exist as a separate technical solution.
- Figure dl shows a visible light communication system 100d in which the present invention may be implemented.
- the visible light communication system 100d includes a transmitting end 110d and a receiving end 120d.
- the transmitting end l lOd includes an encoder 11 Id and a pseudo code signal generator 112d coupled to the encoder 11 Id.
- the encoder 11d receives the original communication data and encodes the original communication data using the pseudo code signal generated by the pseudo code signal generator 112 to generate a scrambled signal. Since the generated scrambling code signal is different from the original communication data, it plays the role of encryption. As used herein, the terms “encryption” and “encoding”, as well as “decryption” and “decoding” are used interchangeably.
- the original communication data may be ID information associated with the transmitting end l10d.
- the encoder 111 outputs the scramble code signal to the light emitting unit 113d, which transmits the received scramble code signal in the form of visible light.
- the light emitting unit 113d may be an LED or other element having a light emitting function.
- the transmitting end l lOd can be a handheld client in the photonic IoT.
- the receiving end 120d includes a receiving unit 123d for receiving the visible light signal emitted by the transmitting end 110d and converting the visible light signal into a digital signal.
- the decoder 121d receives the digital signal output from the receiving unit 123d and decodes it using the pseudo code signal generated by the pseudo code signal generator 122d to recover the original communication data. Only one transmitting end 110d is shown in the visible light communication system 100d shown in FIG. d1, but those skilled in the art will readily appreciate that there are often multiple transmitting ends 110d corresponding to one receiving end 120d.
- the pseudo-code changing with time is used in both the transmitting end l10d and the receiving end 120d.
- the sequence encrypts and decrypts the original communication data. Therefore, as shown in FIG. d1, the pseudo code signal generator 112d outputs a pseudo code signal which changes with time in accordance with the state of the state machine of the transmitting terminal 110d with reference to the clock signal supplied from the crystal oscillator 114d.
- the pseudo code signal transmitter 122d in the receiving end 120d also outputs a time-varying pseudo code signal based on the state of the state machine of the receiving end 120d with reference to the clock signal supplied from the crystal oscillator 124d.
- Figure d2 shows a flow chart of an encryption and decryption method used in the visible light communication system 100d.
- the transmitting end 110d performs a logical operation on the original communication data and the first pseudo code signal that changes with time to obtain a scrambling code signal.
- the original communication data may be information to be transmitted, such as user identity (ID) information, etc., and may be a digital sequence signal.
- the pseudo code signal may be a sequence of numbers that varies with unit time, wherein the unit time may be set as desired, for example, daily, hourly, minute, second, and the like.
- the logical operation of the original communication data and the first pseudo code signal may be a logical AND, a logical OR, a logical exclusive OR, or a combination of any two or more of the above operations.
- the original communication data is the user ID of the transmitting end, and is always 00001101.
- the first pseudo code signal may be 10101010, and the logical operation of the original communication data and the first pseudo code signal, for example, the process of "exclusive OR" is as follows The table shows:
- the transmitting end 110d transmits the scrambling code signal in the form of a visible light signal.
- the transmitting end 110d transmits the modulated signal in the form of a flash by means of an LED lamp.
- the LED lamp can generate high frequency flicker, the light can represent 1, the light can represent 0, or vice versa, thereby effectively realizing visible light communication.
- the receiving end 120d receives the visible light signal transmitted by the transmitting end 110d, and converts the visible light signal into a digital signal. For example, for a high frequency flicker produced by an LED lamp, light may represent 1 and no light may represent 0, or vice versa, thereby converting the received visible light signal into a digital signal.
- the process of converting an optical signal into a digital signal is as follows: First, photoelectric conversion, using an electrical signal of a photodiode and a characteristic of an optical signal to form an electrical pulse signal. However, since the positions of the transmitting end and the receiving end are different, that is, the intensity of the optical signal transmitted from each transmitting end to the receiving end is different, the electrical signal strength is also different, so the current formed by the photodiode needs to be rectified. Comparison. For example, when the current value of the diode is higher than a certain threshold, the photoelectric conversion circuit adjusts the output voltage level to a high level; when the current value through the photodiode is below a certain threshold, the photoelectric conversion The circuit adjusts the output voltage level to a low level.
- the threshold is set by a mathematical model
- the type is set according to different environments. If the distance is long, the threshold value may decrease; the distance near time threshold may be relatively increased, that is, the relationship between the threshold value and the threshold value is determined by mathematics.
- the model determines whether it can be a linear relationship or a nonlinear relationship. Through the above process, the level can be adjusted to a certain range to ensure the correct pulse shape to ensure the correct sampling, thus ensuring the correctness of the clock calculation.
- the receiving end 120d decodes the digital signal and the second pseudo code signal, for example, a logical operation to obtain original communication data.
- the second pseudo code signal is also 10101010, which is the same as the first pseudo code signal pattern and the starting and ending phases.
- the receiving end 120d performs a logical operation on the received signal and the second pseudo code signal, for example, the "exclusive OR" process is as shown in the following table -
- the decoded output signal is 00001101, which is the same as the original communication data, that is, the original communication data is decoded.
- the pseudo code signal generated by the pseudo code signal generator of the receiving end needs to be changed synchronously with the pseudo code signal generated by the pseudo code signal generator of the transmitting end.
- the change of the pseudo code signal is determined by the state of the state machine at both ends of the transmitting and receiving, and after a certain unit time (for example, 1 second, 1 minute, or other specified time period), the state of the state machine at both ends of the transmitting and receiving ends It will change from the previous state to the next state, and the pseudo-code signals used for encryption and decryption corresponding to the state machine state will also change the same.
- the accuracy of the clock systems of the visible light emitting end 110d and the receiving end 120d is determined by the respective crystal oscillators 114d, 124d.
- the time variation of the clock system at both ends of the transceiver is measured by the minimum unit time of the respective system, that is, the period of the crystal oscillator.
- the period of the crystal oscillator refers to the actual period of the crystal oscillator.
- the transmitter system time is 1 second equal to the standard time of 1 second.
- ⁇ System ⁇ 10-6 seconds, however, the receiving end 120d still records the nominal (ie 106) system as 1 second of the clock system time. At this time, the one second of the clock system at the receiving end 120d actually experiences the standard time of ⁇ ,, and the actual time of the actual experience is less than the standard time of 1 second, that is, the system time at the receiving end 120d is faster than the standard time. It can be clearly seen that the system time of the clock system at both ends of the transceiver is faster or slower than the standard time. The state changes of the transmitting end 110d and the receiving end 120d are all based on their own clock system.
- the state changes of the state machine of the transmitting end 110d and the receiving end 120d may be out of synchronization. .
- T change Taking the state machine at both ends of the transceiver as a standard unit time T change, it is assumed that the clock system of the transmitting end 110d is slower than the standard time, and the clock system of the receiving end 120d is faster than the standard time. After a certain standard time, the system time of the transmitting end 110d and the receiving end 120d differ by one unit time T.
- Figure d3 is a diagram showing the state of the state machine of the transmitting end and the receiving end as a function of time. As shown in Figure d3, at the standard time tO, it is assumed that the clock systems of the transmitting end and the receiving end are aligned, and both the transmitting end and the receiving end are in the state N, and after a period of time, the standard time t1 is reached.
- the transmitting end is still in the state N+5 because the clock system is slow, and the receiving end is already in the state N+6 because the clock system is faster. Therefore, the decrypted pseudo code signal selected by the receiving end is inconsistent with the encrypted pseudo code signal selected by the transmitting end, resulting in a decryption error.
- the system time of the clock system may be faster or slower than the standard time.
- clock change parameter may be a standard time actually experienced per unit time corresponding to the system time. It is assumed to be in units of 1 second.
- the transmitting end corresponding to the unit of l lOd system time 1 second, the actual time standard experienced ' ⁇ system.
- the actual time of the actual experience ' ⁇ may be less than or greater than 1 second standard time.
- the standard time is /2 » * T ⁇ , and the actual elapsed time may be less than or greater than 1 second standard time depending on the speed of the system clock.
- the ratio of the standard time actually experienced by the unit time corresponding to the system time of the receiving end 120d to the standard time actually experienced by the same unit time corresponding to the system time of the transmitting end l10d is referred to as the clock of the transmitting end l10d.
- the clock speed factor is equal to the ratio of the change in the system time of the transmitter at the same time to the change in the system time at the receiver.
- the change in the system time of the transmitting terminal 110d can be determined at the receiving end 120d according to the change in the system time of the receiving terminal 120d.
- the number of system cycles 7 ⁇ of the local crystal oscillator of the receiving end 120d can be used to measure the standard time actually experienced by the unit time corresponding to the system time at both ends of the transmitting and receiving.
- ⁇ nominal duration of a light pulse is emitted per unit of time enabling the end of the visible light signals emitted nod.
- Nominal. ⁇ * is determined by the nominal baud rate of the signal, specifically the reciprocal of the baud rate.
- the baud rate of visible light used for communication is generally agreed by the transmitting and receiving ends, and thus is already the receiving end.
- the standard time of the actual experience of the system time corresponding to the receiving end 120d can be calculated, specifically ( ⁇ . Nominal ⁇ 2 nominal) ⁇ ⁇ system, ie ( ⁇ . Nominal ⁇ 2 nominal) systems cycle.
- the actual time of the system time can be obtained by actually measuring the duration of one light pulse of the visible light signal from the transmitting end 110d at the receiving end 120d and recording it as M in the system period of the crystal of the receiving end 120. T2 system.
- the change in the system time of the transmitting end 110d can be calculated.
- the receiving end 120d communicates with the transmitting end 110d for the first time, for example, during the device debugging, the clock information of the transmitting end 110d is locally stored at the receiving end 120d.
- the clock information of the transmitting end 110d can be set to be the receiving end 120d.
- the clock information is consistent.
- the clock information can refer to the system time value of the clock system.
- the system time value of the clock system of the transmitting end 110d and the receiving end 120d is 0 at this time.
- the clock information of the transmitting end HOd stored locally at the receiving end 120d is consistent with the real clock information of the transmitting end 110d.
- the change of the clock information of the transmitting end 110d held at the receiving end 120d is consistent with the change of the system time of the receiving end 120d itself, and therefore, the transmission saved at the receiving end 120d as time passes after the system is established. An error occurs between the clock information of the terminal 110d and the real clock information at the transmitting end 110d.
- the predetermined time of the system time of the receiving end 120d, the amplitude of the change of the clock information of the transmitting end 110d stored locally by the receiving end 120d is also the predetermined time, but in fact, the true amplitude of the clock information of the transmitting end 110d should be changed.
- the predetermined time is multiplied by the time rate factor of the transmitting end 110d. Therefore, every other predetermined time, the error generated is equal to the predetermined time minus the product of the clock speed factor of the transmitting terminal 110d and the predetermined time. Accordingly, the error can be subtracted from the stored clock information of the transmitting terminal 110d to update it.
- the receiving end 120d eliminates the error amount on the stored clock information of the transmitting end 110d every predetermined period of time, so that the clock information of the updated transmitting end 110d coincides with the real clock information at the transmitting end 110d.
- the predetermined time is 5 minutes
- Q 4/5.
- the clock information of the transmitting end 110d stored locally by the receiving end 120d is 0:5.
- the clock information of the locally stored transmitter 110d is subtracted from the clock offset of 0 to 5 minutes, and updated to 0:4.
- the clock information of the locally stored transmitting end 110d is 0:9, which further includes the generated error for 1 minute. Therefore, the updated transmitting end 110d
- the clock information is 0:8. Since the error of the crystal oscillator at both ends of the transceiver may change with environmental conditions such as temperature, the clock speed factor of the transmitting terminal 110d may also change. Therefore, each time the visible light signal of the transmitting end 110d is received, the clock speed factor can be recalculated according to the newly received visible light.
- the receiving end 120d is stored according to the local The clock information of the transmitting end nod is used to select the pseudo code signal for decryption. Since the clock information of the locally stored transmitting end 110 is automatically adjusted every predetermined period of time, the error with the real clock information at the transmitting end l10d is not amplified. Further, it is ensured that the pseudo code signal selected according to the clock information of the transmitting end l lOd stored at the receiving end 120d can be synchronized with the pseudo code signal selected by the transmitting end l lOd according to the real transmitting end l lOd clock information.
- Figure d4 is a flow chart showing a method for automatically adjusting a clock in a visible light communication system in accordance with an aspect of the present invention.
- the method is illustrated and described as a series of acts for simplicity of the explanation, it should be understood and appreciated that the methods are not limited by the order of the acts, as some acts may occur in different orders in accordance with one or more embodiments. And/or occur concurrently with other acts from the illustrations and descriptions herein.
- the receiving end receives a visible light signal from a first one of the at least one transmitting end.
- the receiving end may be the receiving end 120d in Figure dl
- the first transmitting end may be the transmitting end 110d in Figure dl.
- the visible light signal is an optical pulse signal, such as having light for 1, no light for 0, or vice versa.
- the visible light signal generally includes user identity (ID) information of the first transmitting end, and the ID information is encrypted by using a pseudo code signal that varies with the system time of the first transmitting end.
- the visible light signal further includes an identifier for identifying the first transmitting end, such as a device number of the first transmitting end.
- the device number at the transmitting end is unique in the system, so a certain transmitter can be uniquely identified by the device number.
- the identifier is unencrypted and can be directly interpreted by the receiving end.
- a clock change parameter of the first transmitting end and a clock change parameter of the receiving end are determined according to the visible light signal received from the first transmitting end.
- the clock variation parameter of the first transmitting end is a standard time actually experienced by the unit time corresponding to the system time of the first transmitting end, wherein the actually experienced standard time can be calculated by the system period of the crystal oscillator of the receiving end. Measurement.
- the unit time is the nominal duration of a light pulse of the visible light signal from the first transmitting end, the latter being equal to the reciprocal of the nominal baud rate of the visible light signal.
- the standard time actually experienced by the unit time corresponding to the system time of the first transmitting end can be obtained by actually measuring the duration of one light pulse of the visible light signal at the receiving end and is recorded as the system period of the crystal oscillator of the receiving end as ⁇ ⁇ ⁇ 2 system.
- the receiving end can convert the visible light signal into a digital signal, and from the high level or the low level of one pulse of the digital signal until the high level or low level ends, how many ⁇ 2 have experienced The system counts and the number obtained is ⁇ .
- the clock change parameter of the receiving end may refer to a standard time actually experienced by the unit time corresponding to the system time of the receiving end, wherein the standard time actually experienced may be measured by the system period of the crystal oscillator of the receiving end. In the example where the unit time is the nominal duration ⁇ **» of a light pulse of the visible light signal from the first transmitting end, the standard time actually experienced by the unit time corresponding to the system time of the receiving end is calculated as
- the clock speed factor of the first transmitting end is determined according to the clock variation parameter of the first transmitting end and the clock variation parameter of the receiving end.
- the clock speed factor of the first transmitting end is the ratio of the standard time actually experienced by the unit time corresponding to the system time of the receiving end to the standard time actually experienced by the unit time corresponding to the system time of the first transmitting end.
- step 404 the clock information of the first transmitting end locally stored by the receiving end is updated every predetermined time according to the clock speed factor of the first transmitting end.
- the clock speed factor is equal to the ratio of the variation of the system time of the first transmitting end to the variation of the system time of the receiving end over the same time.
- the system time of the predetermined time is elapsed at the receiving end, and the true change amplitude of the system time of the first transmitting end should be the product of the clock speed factor and the predetermined time, but the system time of the first transmitting end locally stored at the receiving end is The magnitude of the change is the predetermined time, so the error of the clock information of the locally stored first transmitting end is the predetermined time minus the product. Furthermore, subtracting the error from the clock information of the locally stored first transmitting end for updating can eliminate the error. In this way, the clock information of the locally stored first transmitting end is updated every time the predetermined time elapses.
- the clock information of the first transmitting end local to the receiving end may be initially stored at the receiving end and the first transmitting end when the system is initially established (for example, first time), and may be set equal to the clock information of the receiving end. This is because the first communication between the transmitting and receiving ends in the visible light communication system is generally in the initial stage of system establishment, for example, during system establishment and debugging, at this time, the clock information of the first transmitting end is not stored at the receiving end.
- the clock information of the receiving and sending ends is basically the same at the initial stage of the system establishment. Therefore, the current clock information of the receiving end can be directly stored as the clock information of the first transmitting end in the receiving end.
- the clock information can refer to the system time of the clock system.
- the receiving end receives the visible light signal of the first transmitting end for the first time
- the identifier of the first transmitting end such as the device number
- the method may further include recalculating the clock speed factor according to the newly received visible light each time after receiving the visible light signal from the first transmitting end, thereby calculating according to the new
- the clock speed factor updates the clock information of the locally stored first transmitting terminal every predetermined time.
- FIG. d5 is a block diagram showing a communication device 500d in accordance with an aspect of the present invention.
- Receiver 502d can receive a visible light signal from a first one of the at least one transmitting device.
- the clock change parameter determining module 504d may determine a clock change parameter of the first transmitting device and a clock change parameter of the communication device 500d itself according to the visible light signal received from the first transmitting device.
- the clock change parameter may be a standard time actually experienced per unit time corresponding to the system time. In the case where the unit time is the nominal duration of one light pulse of the visible light signal from the first transmitting device, the standard time actually experienced by the unit time corresponding to the system time of the first transmitting device is determined by the clock variation parameter determining module 504d.
- the duration of one optical pulse of the visible light signal received from the first transmitting device is obtained and recorded as the M ⁇ T2 system in units of the system period of the crystal oscillator of the communication device 500d, and corresponding to the communication device 500d
- the standard time actually experienced by the unit time of the system time is calculated by the clock change parameter determining module 504d as 2 2 ), where is the nominal duration of one light pulse of the visible light signal, which is the crystal of the communication device 500d The nominal frequency, as well as the system period of the crystal of the communication device 500d.
- the clock speed factor module 506d may determine the clock speed factor of the first transmitting device according to the clock variation parameter of the first transmitting device and the clock variation parameter of the communication device 500d itself.
- the clock speed factor determining module determines the clock speed factor of the first transmitting device as the standard time actually experienced by the unit time corresponding to the system time of the communication device 500d and the system corresponding to the first transmitting device The ratio of the standard time actually experienced by the unit time of time.
- the clock information modulation module 508d updates the clock information of the first transmitting device locally stored by the communication device 500d every predetermined time according to the clock speed factor of the first transmitting device.
- the predetermined time is a predetermined time of the system time of the communication device 500d
- the error of the clock information of the first transmitting device locally stored by the communication device 500d is the predetermined time minus the first time every predetermined time
- the clock speed factor of the transmitting device is multiplied by the predetermined time, whereby the clock information adjusting module 508d subtracts the error from the clock information of the locally stored first transmitting device for updating.
- the decoder 510d may select the corresponding pseudo code signal to decode the received visible light signal according to the stored clock information of the first transmitting device.
- the communication device 500d may also include a memory 514d.
- Memory 514d can store clock information 516d, such as clock information for the first transmitting device.
- the communication device 500d also includes a processor 512d.
- the processor 512d may be a processor dedicated to analyzing information received by the receiver 502d, a processor controlling one or more components of the communication device 500d, and/or both analyzing information received by the receiver 502d and controlling the communication device.
- Figure d6 is a block diagram showing a communication device 600d in accordance with an aspect of the present invention. It should be appreciated that communication device 600d is represented as including functional blocks that can represent functional blocks implemented by a processor, software, or combination thereof (e.g., firmware).
- Communication device 600d includes a logical grouping 602d of collaborative electronic components.
- Logical grouping 602d can include an electrical component 604d for receiving a visible light signal from a first one of the at least one transmitting device.
- the logical grouping 602d can include an electronic component 606d for determining a clock variation parameter of the first transmitting device and a clock variation parameter of the receiving device based on the visible light signal received from the first transmitting device.
- the logical grouping 602d can also include an electrical component 608d for determining a clock speed factor of the first transmitting device based on the clock variation parameter of the first transmitting device and the clock variation parameter of the receiving device.
- the logical grouping 602d may further include an electronic component 610d for updating clock information of the first transmitting device locally stored by the receiving device every predetermined time according to the clock speed factor of the first transmitting device.
- communication device 600d can include a memory 612d that holds instructions for executing functions associated with electronic components 604d, 606d, 608d, and 610d. Although illustrated as being external to memory 612, it should be understood that one or more of electronic components 604d, 606d, 608d, and 610d may be present within memory 612d.
- Those skilled in the art will appreciate that information and signals may be represented using any of a variety of different technologies and techniques.
- the data, instructions, commands, information, signals, bits (bits), symbols, and chips referenced throughout the above description may be by voltage, current, electromagnetic wave, magnetic field or magnetic particle, light field or optical particle, or any thereof. Combined to represent.
- Those skilled in the art will further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps are described above generally in the form of their functionality. Whether such functionality is implemented as hardware or software depends on the particular application and design constraints imposed on the overall system.
- DSPs digital signal processors
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- Programmable logic devices discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform or perform the functions described herein.
- a general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- the processor may also be implemented as a combination of computing devices, such as a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in cooperation with a DSP core, or any other such configuration.
- the steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, in a software module executed by a processor, or in a combination of the two.
- the software modules may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD_ROM, or any other form of storage medium known in the art.
- An exemplary storage medium is coupled to the processor such that the The processor can read and write information from/to the storage medium.
- the storage medium can be integrated into the processor.
- the processor and the storage medium can reside in an ASIC.
- the ASIC can reside in the user terminal.
- the processor and the storage medium may reside as a discrete component in the user terminal.
- the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented as a computer program product in software, the functions may be stored on or transmitted as one or more instructions or code on a computer readable medium.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage medium may be any available media that can be accessed by a computer.
- such computer readable media may comprise RAM, wake up, EEPROM, CD-ROM or other optical disk storage, disk storage or other magnetic storage device, or can be used to carry or store instructions or data structures. Any other medium that is desirable for program code and that can be accessed by a computer. Any connection is also properly referred to as a computer readable medium.
- the software is transmitted from a web site, server, or other remote source using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technology such as infrared, radio, and microwave.
- coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of the medium.
- Disks and discs as used herein include compact discs (CDs), laser discs, optical discs, digital versatile discs (DVDs), floppy discs, and Blu-ray discs, in which disks are often magnetically reproduced. Data, and discs optically reproduce data with a laser. Combinations of the above should also be included within the scope of computer readable media.
- CDs compact discs
- DVDs digital versatile discs
- Blu-ray discs in which disks are often magnetically reproduced. Data, and discs optically reproduce data with a laser. Combinations of the above should also be included within the scope of computer readable media.
- the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Optical Communication System (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015524622A JP6082461B2 (ja) | 2012-07-31 | 2013-07-31 | 可視光の暗号化方法、復号化方法、通信装置及び通信システム |
EP13825464.4A EP2882117B1 (en) | 2012-07-31 | 2013-07-31 | Visible light encryption method, decryption method, communication device and communication system |
KR1020157003312A KR101670194B1 (ko) | 2012-07-31 | 2013-07-31 | 가시 광선의 암호 설정방법, 암호 해지방법, 통신장치 및 통신 시스템 |
US14/608,793 US10250384B2 (en) | 2012-07-31 | 2015-01-29 | Visible light encryption method, decryption method, communication device and communication system |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210268555.5A CN102820922B (zh) | 2012-07-31 | 2012-07-31 | 一种异步加密可见光通信方法及系统 |
CN201210268555.5 | 2012-07-31 | ||
CN201210277987.2A CN102833065B (zh) | 2012-08-07 | 2012-08-07 | 基于多用户异步加密的发射装置及方法、接收装置及方法 |
CN201210277987.2 | 2012-08-07 | ||
CN201310314157.7A CN103840891B (zh) | 2013-07-24 | 2013-07-24 | 可见光通信系统中的宽松解密方法和装置 |
CN201310314157.7 | 2013-07-24 | ||
CN201310323062.1A CN104348607B (zh) | 2013-07-29 | 2013-07-29 | 用于可见光通信系统中时钟自动调整的方法和装置 |
CN201310323062.1 | 2013-07-29 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/608,793 Continuation US10250384B2 (en) | 2012-07-31 | 2015-01-29 | Visible light encryption method, decryption method, communication device and communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014019526A1 true WO2014019526A1 (zh) | 2014-02-06 |
Family
ID=50027275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/080579 WO2014019526A1 (zh) | 2012-07-31 | 2013-07-31 | 可见光的加密方法、解密方法、通信装置及通信系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10250384B2 (zh) |
EP (1) | EP2882117B1 (zh) |
JP (1) | JP6082461B2 (zh) |
KR (1) | KR101670194B1 (zh) |
WO (1) | WO2014019526A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170056562A (ko) * | 2014-09-05 | 2017-05-23 | 쿠앙치 인텔리전트 포토닉 테크놀로지 리미티드 | 지불 시스템 |
CN113810121A (zh) * | 2021-09-02 | 2021-12-17 | 中国科学院国家授时中心 | 一种基于加密通信的光纤时间同步方法及系统 |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101738792B1 (ko) * | 2012-08-13 | 2017-05-22 | 쿠앙-치 이노베이티브 테크놀로지 리미티드 | 광신호 처리장치 및 광신호 수신 모니터링장치 디코딩 방법 |
WO2015112702A1 (en) * | 2014-01-22 | 2015-07-30 | Hamilton Christopher Chad | Portable social communication client |
US9735868B2 (en) * | 2014-07-23 | 2017-08-15 | Qualcomm Incorporated | Derivation of an identifier encoded in a visible light communication signal |
KR20160041147A (ko) * | 2014-10-06 | 2016-04-18 | 삼성전자주식회사 | 제어 방법 및 그 방법을 처리하는 전자장치 |
EP3257172A4 (en) * | 2015-02-10 | 2018-10-10 | Darabi, Amir | System and method for providing optically coded information |
CN104980217B (zh) * | 2015-06-19 | 2017-12-19 | 邹骁 | 一种可见光通信系统、方法及相关设备 |
US10084758B2 (en) | 2015-10-28 | 2018-09-25 | International Business Machines Corporation | System, method, and recording medium for communication and message comparison with encrypted light signals |
DE102015222450A1 (de) * | 2015-11-13 | 2017-05-18 | Osram Gmbh | Beleuchtungseinrichtung und Verfahren zur Bereitstellung einer Datenübertragung an ein mobiles Endgerät |
JP6985379B2 (ja) * | 2016-09-27 | 2021-12-22 | レイセオン カンパニー | 波面補正なく自由空間光信号を復調するためのシステムおよび方法 |
US9876770B1 (en) * | 2016-10-28 | 2018-01-23 | International Business Machines Corporation | Group permission based Li-Fi file transfer |
JP6986079B2 (ja) * | 2016-11-29 | 2021-12-22 | シグニファイ ホールディング ビー ヴィSignify Holding B.V. | 可視光通信の検出及び/又は復号 |
CN110832893B (zh) * | 2017-07-11 | 2023-12-01 | 昕诺飞控股有限公司 | 用于向用户设备提供对资源或数据的访问的系统及其方法 |
JP7110386B2 (ja) | 2018-04-12 | 2022-08-01 | レイセオン カンパニー | 光信号における位相変化検出 |
CN108566247B (zh) * | 2018-04-27 | 2020-12-04 | 杭州绿岛智能电子有限公司 | 一种车载互联互通的交互方法、可读存储介质和车载终端 |
US10727937B1 (en) * | 2019-03-01 | 2020-07-28 | Huawei Technologies Co., Ltd. | Multi-layer encoding of optical signals |
US20220311606A1 (en) * | 2020-06-10 | 2022-09-29 | Beijing Boe Technology Development Co., Ltd. | Optical communication apparatus, optical communication system and method |
CN117240361B (zh) * | 2023-11-13 | 2024-03-15 | 新唐信通(浙江)科技有限公司 | 一种定向加密的电视屏幕和智能手机间可见光通信方法 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1947373A (zh) * | 2004-03-05 | 2007-04-11 | 韩国电子通信研究院 | 在无线便携因特网系统中管理通讯加密密钥的方法及其协议配置方法、以及在用户台中的通讯加密密钥状态机的操作方法 |
CN101645771A (zh) * | 2008-08-04 | 2010-02-10 | 深圳华为通信技术有限公司 | 密钥同步的方法、装置和系统 |
CN102035642A (zh) * | 2010-12-20 | 2011-04-27 | 西安西电捷通无线网络通信股份有限公司 | 一种分组密码计数器运行模式中计数器的选择和同步方法 |
CN102289634A (zh) * | 2011-08-31 | 2011-12-21 | 北京航空航天大学 | 基于可见光通信的限定区域权限认证装置及文件保密方法 |
CN102378168A (zh) * | 2010-08-17 | 2012-03-14 | 中兴通讯股份有限公司 | 多系统核心网通知密钥的方法和多系统网络 |
CN102820922A (zh) * | 2012-07-31 | 2012-12-12 | 深圳光启创新技术有限公司 | 一种异步加密可见光通信方法及系统 |
CN102833065A (zh) * | 2012-08-07 | 2012-12-19 | 深圳光启创新技术有限公司 | 基于多用户异步加密的发射装置及方法、接收装置及方法 |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4811394A (en) * | 1982-07-28 | 1989-03-07 | Communications Satellite Corporation | Variable starting state scrambling circuit |
US4757536A (en) * | 1984-10-17 | 1988-07-12 | General Electric Company | Method and apparatus for transceiving cryptographically encoded digital data |
JPH01113440U (zh) * | 1988-01-22 | 1989-07-31 | ||
JP2595899B2 (ja) * | 1994-05-17 | 1997-04-02 | 日本電気株式会社 | オンライン伝文暗号化装置 |
US5809148A (en) | 1996-05-17 | 1998-09-15 | Motorola, Inc. | Decryption of retransmitted data in an encrypted communication system |
US7155016B1 (en) * | 1999-08-20 | 2006-12-26 | Paradyne Corporation | Communication device and method for using non-self-synchronizing scrambling in a communication system |
JP2001285276A (ja) * | 2000-04-03 | 2001-10-12 | Yazaki Corp | ストリーム暗号化方法、復号方法、及び暗号通信システム |
US20030149869A1 (en) | 2002-02-01 | 2003-08-07 | Paul Gleichauf | Method and system for securely storing and trasmitting data by applying a one-time pad |
CN100440775C (zh) | 2002-10-31 | 2008-12-03 | 华为技术有限公司 | 一种加密通讯方法和装置 |
JP2005151056A (ja) * | 2003-11-13 | 2005-06-09 | Oki Electric Ind Co Ltd | デスクランブル回路 |
JP2007110276A (ja) * | 2005-10-12 | 2007-04-26 | Sony Corp | 通信システム、通信装置および方法、並びにプログラム |
US20080044012A1 (en) | 2006-08-15 | 2008-02-21 | Nokia Corporation | Reducing Security Protocol Overhead In Low Data Rate Applications Over A Wireless Link |
CN101001142A (zh) | 2007-01-17 | 2007-07-18 | 张建华 | 一种基于迭代随机数产生器的加解密方法 |
JP4084832B1 (ja) * | 2007-06-26 | 2008-04-30 | 松下電器産業株式会社 | 受信装置、送信装置、乱数シード値取得方法及び無線通信システム |
US8718485B2 (en) * | 2007-07-13 | 2014-05-06 | Nec Corporation | Quantum key distribution system, optical transmitter, optical modulation control circuit, and optical modulation control method |
KR101524873B1 (ko) * | 2009-02-17 | 2015-06-02 | 삼성전자주식회사 | 가시광 통신 방법 및 시스템 |
JP2011044051A (ja) * | 2009-08-24 | 2011-03-03 | Konica Minolta Business Technologies Inc | 情報提供方法及び情報提供システム |
KR101654934B1 (ko) * | 2009-10-31 | 2016-09-23 | 삼성전자주식회사 | 가시광 통신 방법 및 장치 |
US8683555B2 (en) * | 2010-02-10 | 2014-03-25 | Raytheon Company | Systems and methods to prevent denial of service attacks |
CN101938310A (zh) | 2010-07-21 | 2011-01-05 | 中国科学院半导体研究所 | 一种可见光通信控制系统及其实现方法 |
JP5450303B2 (ja) * | 2010-07-27 | 2014-03-26 | パナソニック株式会社 | 電気錠システム |
CN102542640A (zh) * | 2011-11-16 | 2012-07-04 | 深圳光启高等理工研究院 | 门禁方法及系统、led门匙和led光控密码锁 |
CN102479398A (zh) | 2011-11-16 | 2012-05-30 | 深圳光启高等理工研究院 | 一种门锁控制方法及门锁 |
CN102610013A (zh) | 2012-02-29 | 2012-07-25 | 深圳光启创新技术有限公司 | 可见光通信方法和基于可见光通信的数据存储系统 |
CN102780695B (zh) | 2012-06-20 | 2014-12-24 | 深圳光启创新技术有限公司 | 基于可见光通信的握手同步方法和系统 |
CN102932142B (zh) | 2012-10-08 | 2015-10-21 | 中国科学院西安光学精密机械研究所 | 光纤通信系统中光数据信号加解密方法 |
-
2013
- 2013-07-31 JP JP2015524622A patent/JP6082461B2/ja not_active Expired - Fee Related
- 2013-07-31 KR KR1020157003312A patent/KR101670194B1/ko active IP Right Grant
- 2013-07-31 WO PCT/CN2013/080579 patent/WO2014019526A1/zh active Application Filing
- 2013-07-31 EP EP13825464.4A patent/EP2882117B1/en not_active Not-in-force
-
2015
- 2015-01-29 US US14/608,793 patent/US10250384B2/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1947373A (zh) * | 2004-03-05 | 2007-04-11 | 韩国电子通信研究院 | 在无线便携因特网系统中管理通讯加密密钥的方法及其协议配置方法、以及在用户台中的通讯加密密钥状态机的操作方法 |
CN101645771A (zh) * | 2008-08-04 | 2010-02-10 | 深圳华为通信技术有限公司 | 密钥同步的方法、装置和系统 |
CN102378168A (zh) * | 2010-08-17 | 2012-03-14 | 中兴通讯股份有限公司 | 多系统核心网通知密钥的方法和多系统网络 |
CN102035642A (zh) * | 2010-12-20 | 2011-04-27 | 西安西电捷通无线网络通信股份有限公司 | 一种分组密码计数器运行模式中计数器的选择和同步方法 |
CN102289634A (zh) * | 2011-08-31 | 2011-12-21 | 北京航空航天大学 | 基于可见光通信的限定区域权限认证装置及文件保密方法 |
CN102820922A (zh) * | 2012-07-31 | 2012-12-12 | 深圳光启创新技术有限公司 | 一种异步加密可见光通信方法及系统 |
CN102833065A (zh) * | 2012-08-07 | 2012-12-19 | 深圳光启创新技术有限公司 | 基于多用户异步加密的发射装置及方法、接收装置及方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170056562A (ko) * | 2014-09-05 | 2017-05-23 | 쿠앙치 인텔리전트 포토닉 테크놀로지 리미티드 | 지불 시스템 |
KR101897593B1 (ko) * | 2014-09-05 | 2018-09-12 | 쿠앙치 인텔리전트 포토닉 테크놀로지 리미티드 | 지불 시스템 |
CN113810121A (zh) * | 2021-09-02 | 2021-12-17 | 中国科学院国家授时中心 | 一种基于加密通信的光纤时间同步方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP2882117B1 (en) | 2017-07-05 |
EP2882117A4 (en) | 2016-04-20 |
JP2015532030A (ja) | 2015-11-05 |
JP6082461B2 (ja) | 2017-02-15 |
KR101670194B1 (ko) | 2016-10-27 |
KR20150038018A (ko) | 2015-04-08 |
EP2882117A1 (en) | 2015-06-10 |
US20150146871A1 (en) | 2015-05-28 |
US10250384B2 (en) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014019526A1 (zh) | 可见光的加密方法、解密方法、通信装置及通信系统 | |
US9098691B2 (en) | Method and apparatus for encoding and decoding data transmitted to an authentication token | |
US20230118320A1 (en) | Methods for secure data storage | |
US9768958B2 (en) | Visible-light communication-based encryption, decryption and encryption/decryption method and system | |
US9184915B2 (en) | Strong authentication token with acoustic data input over multiple carrier frequencies | |
US9800335B2 (en) | Visible light signal transmitting and receiving processing method, transmitting terminal, receiving terminal, and system | |
US9717001B2 (en) | Authentication system and authentication method | |
WO2015153559A1 (en) | System and method for biometric key management | |
US9780874B2 (en) | Light signal-based information processing method and device | |
CN102957513B (zh) | 基于可见光通信的纠错方法和装置 | |
US10911247B2 (en) | Photon-based CA authentication method and system | |
CN106780911B (zh) | 一种门禁语音编码、解码系统及方法 | |
TWI633762B (zh) | Decryption method for visible light communication system and communication device thereof | |
CN103840891B (zh) | 可见光通信系统中的宽松解密方法和装置 | |
CN102983976A (zh) | 基于光信号的授权方法和装置 | |
CN109840776B (zh) | 利用超声波验证码的交易凭证认证方法与交易验证方法 | |
US11622271B2 (en) | Methods and systems for access control | |
JP5351079B2 (ja) | 受信装置 | |
JP2007020159A (ja) | データ送信装置、及びデータ受信装置 | |
JP2000059342A (ja) | 光送信装置及び光受信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13825464 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2013825464 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013825464 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2015524622 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20157003312 Country of ref document: KR Kind code of ref document: A |