WO2015109967A1 - 一种移动终端与信息安全设备通信的方法 - Google Patents

一种移动终端与信息安全设备通信的方法 Download PDF

Info

Publication number
WO2015109967A1
WO2015109967A1 PCT/CN2015/070738 CN2015070738W WO2015109967A1 WO 2015109967 A1 WO2015109967 A1 WO 2015109967A1 CN 2015070738 W CN2015070738 W CN 2015070738W WO 2015109967 A1 WO2015109967 A1 WO 2015109967A1
Authority
WO
WIPO (PCT)
Prior art keywords
coding mode
data packets
mobile terminal
security device
information
Prior art date
Application number
PCT/CN2015/070738
Other languages
English (en)
French (fr)
Inventor
李东声
Original Assignee
天地融科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201410040948.XA external-priority patent/CN103763066B/zh
Priority claimed from CN201410040340.7A external-priority patent/CN103763065A/zh
Application filed by 天地融科技股份有限公司 filed Critical 天地融科技股份有限公司
Publication of WO2015109967A1 publication Critical patent/WO2015109967A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control

Definitions

  • the present invention relates to the field of electronic technologies, and in particular, to a method for communicating a mobile terminal with an information security device.
  • a mobile terminal such as a mobile phone
  • an information security device such as a smart cipher key, an audio transfer device of a smart cipher key, etc.
  • both parties need to be able to decode the other party's data packet.
  • a mobile terminal generally supports a few encoding and decoding modes, and the encoding method supported by the information security device may not be the same as the encoding method supported by the mobile terminal.
  • the mobile terminal cannot actively select the correct or suitable encoding mode. Therefore, the encoding mode currently used by the mobile terminal may be an encoding mode that is not supported by the information security device, thereby making the information security device unable to be used.
  • the encoded data from the mobile terminal is decoded.
  • the coding mode adopted by the information security device may also be an encoding mode that is not supported by the mobile terminal. Therefore, a similar situation may occur in the uplink data transmission, thereby causing communication failure between the information security device and the mobile terminal.
  • the present invention is directed to solving the problem of communication failure between the above information security device and the mobile terminal.
  • the main object of the present invention is to provide a method for a mobile terminal to communicate with an information security device.
  • Another main object of the present invention is to propose another method of communicating with a information security device by a mobile terminal.
  • An aspect of the present invention provides a method for a mobile terminal to communicate with an information security device, the method comprising:
  • the mobile terminal encodes the detected data packets by using M different downlink coding modes to form M coded detection data packets, wherein each coded detection data packet includes tag information of a downlink coding mode used by each of the coded detection data packets.
  • M is a positive integer;
  • the information security device decodes the received encoded detection data packet to obtain X1 detection data packets, and obtains X1 downlink coding mode tag information from the X1 detection data packets, where X1 is a positive integer. , X1 ⁇ M;
  • the information security device encodes the response data packet by using N types of uplink coding manners to form N coded response data packets, wherein each coded response data packet includes tag information of each uplink coding mode used by the information security device.
  • the tag information of the X1 downlink coding mode where N is a positive integer;
  • the mobile terminal decodes the received encoded response data packet to obtain Y1 response data packets, and obtains Y1 kinds of uplink coding mode tag information and the X1 downlink coding mode from the Y1 response data packets.
  • Marking information wherein Y1 is a positive integer, Y1 ⁇ N;
  • the mobile terminal determines a target uplink coding mode and a target downlink coding mode in the Y1 uplink coding mode and the X1 downlink coding mode, and encodes the selected data packet by using the target downlink coding mode to form a coded Selecting a data packet, where the encoded selected data packet includes the marking information of the target uplink coding mode and the marking information of the target downlink coding mode;
  • the information security device decodes the received selected data packet to obtain the selected data packet, and obtains the target uplink coding mode tag information and the target downlink code from the selected data packet. Marking information of the method;
  • the information security device encodes the selected response packet by using the target uplink coding mode to form a coded selection response packet, and sends the encoded selection response packet to the mobile terminal.
  • the step of decoding, by the information security device, the received encoded detection data packet to obtain X1 detection data packets includes: the information security device decoding the received X1 encoded detection data packets to obtain X1 Detection packets.
  • the step of decoding, by the information security device, the received encoded detection data packet to obtain X1 detection data packets includes: the information security device receiving X1+i encoded detection data packets; and sequentially selecting X1+ The i coded detection data packets are decoded to obtain X1 detection data packets, where i is a positive integer and X1+i ⁇ M.
  • the step of the mobile terminal decoding the received encoded response data packet to obtain Y1 response data packets includes: the mobile terminal decoding the received Y1 encoded response data packets to obtain Y1 responses. data pack.
  • the step of the mobile terminal decoding the received encoded response data packet to obtain Y1 response data packets includes: the mobile terminal receiving Y1+j encoded response data packets; sequentially, Y1+j The encoded response packet is decoded to obtain Y1 response packets, where j is a positive integer and Y1+j ⁇ N.
  • the uplink coding mode and the downlink coding mode are FSK coding modes.
  • a S1 sampling point is used to obtain a sine wave with a period of T1 to represent a logic 1
  • a S2 sampling point is used to obtain a sine wave with a period of T2 to represent a logic 0, where S1 ⁇ S2, T1 ⁇ T2, S1 and S2 are both positive integers.
  • the information security device is a smart cipher key.
  • the information security device is an audio adapter or an audio switching device.
  • the present invention provides a method for communication between a mobile terminal and an information security device, so that the mobile terminal and the information security device can quickly determine the communication to be used by the two parties through two information interactions.
  • the codec method avoids the phenomenon that the communication cannot be decoded due to the difference in the codec mode, thereby improving the communication efficiency.
  • Another aspect of the present invention provides another method for a mobile terminal to communicate with an information security device, the method comprising:
  • the mobile terminal encodes the detected data packets by using M different types of downlink coding modes to form M coded detection data packets, where each coded detection data packet includes tag information of each downlink coding mode used and The marking information of the N types of uplink coding modes that the mobile terminal can decode, and M and N are positive integers;
  • the information security device decodes the received encoded detection data packet to obtain X detection data packets, and obtains X types of downlink coding mode tag information and the N kinds of uplink codes from the X detection data packets. Marking information of the mode, wherein X is a positive integer, X ⁇ M;
  • the information security device selects Y types of uplink coding modes supported by the information security device to encode the response data packets to form Y coded response data packets, where each coded
  • the response data packet includes the flag information of the uplink coding mode and the tag information of the X downlink coding mode, and Y is a positive integer, Y ⁇ N;
  • the mobile terminal decodes the received encoded response data packet to obtain Z response data packets, and obtains Z-type uplink coding mode tag information and the X-type downlink coding mode from the Z response data packets.
  • Marking information wherein Z is a positive integer, Z ⁇ Y;
  • the mobile terminal determines a target uplink coding mode and a target downlink coding mode in the Z uplink coding mode and the X downlink coding mode, and encodes the selected data packet by using the target downlink coding mode to form a coding.
  • a subsequent selection data packet wherein: the encoded selection data packet includes flag information of the target uplink coding mode and flag information of the target downlink coding mode;
  • the information security device decodes the received selected data packet to obtain the selected data packet, and obtains the target uplink coding mode tag information and the target downlink code from the selected data packet. Marking information of the method;
  • the information security device encodes the selected response packet by using the target uplink coding mode to form a coded selection response packet, and sends the encoded selection response packet to the mobile terminal.
  • the step of decoding, by the information security device, the received encoded detection data packet to obtain X detection data packets includes: the information security device decoding the received X encoded detection data packets to obtain X. Detection packets.
  • the step of the information security device decoding the received encoded detection data packet to obtain X detection data packets includes: the information security device receiving X+i encoded detection data packets; and sequentially selecting X+ The i coded detection data packets are decoded to obtain X detection data packets, where i is a positive integer and X+i ⁇ M.
  • the step of the mobile terminal decoding the received encoded response data packet to obtain Z response data packets includes: the mobile terminal decoding the received Z encoded response data packets to obtain Z responses. data pack.
  • the step of the mobile terminal decoding the received encoded response data packet to obtain Z response data packets includes: the mobile terminal receiving Z+j encoded response data packets; and sequentially selecting Z+j The encoded response packet is decoded to obtain Z response packets, where j is a positive integer and Z+j ⁇ Y.
  • the uplink coding mode and the downlink coding mode are FSK coding modes.
  • a S1 sampling point is used to obtain a sine wave with a period of T1 to represent a logic 1
  • a S2 sampling point is used to obtain a sine wave with a period of T2 to represent a logic 0, where S1 ⁇ S2, T1 ⁇ T2, S1 and S2 are both positive integers.
  • the information security device is a smart cipher key.
  • the information security device is an audio adapter or an audio switching device.
  • the present invention provides a method for communication between a mobile terminal and an information security device, so that the mobile terminal and the information security device can quickly determine the communication to be used by the two parties through two information interactions.
  • the coding method avoids the phenomenon that communication cannot be decoded due to different coding methods, which causes communication failure. Thereby improving the efficiency of communication.
  • FIG. 1 is a flowchart of a method for communicating between a mobile terminal and an information security device according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for communicating between a mobile terminal and an information security device according to Embodiment 2 of the present invention.
  • connection In the description of the present invention, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise explicitly defined and defined. Connected, or integrally connected; can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • Connected, or integrally connected can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or quantity or location.
  • the embodiment provides a method for the mobile terminal to communicate with the information security device. As shown in FIG. 1, the method mainly includes the following steps (S101-Step S112).
  • Step S101 The mobile terminal encodes the detected data packet by using M different downlink coding modes to form M coded detection data packets, where each coded detection data packet includes a downlink coding mode used by each of the coded detection data packets.
  • Mark information, M is a positive integer.
  • both the uplink coding mode and the downlink coding mode are relative to the mobile terminal.
  • the coding mode used by the information security device to encode the data is the uplink coding mode.
  • the coding mode used by the mobile terminal to encode the data is the downlink coding mode.
  • the uplink coding mode and the downlink coding mode are FSK coding modes.
  • S1 sampling points are used to obtain a sine wave with a period of T1 to represent a logic 1
  • S2 sampling points are used to obtain a sine wave with a period of T2 to represent a logic 0, where S1 ⁇ S2, T1 ⁇ T2, Both S1 and S2 are positive integers.
  • the sampling frequency is 44.1 kHz
  • the period T2 of the waveform is 1/5.5125 KHz, and a sine wave of which the period T2 is 1/5.5125 KHz is used to represent a logic 1.
  • the FSK encoding method is used for encoding, that is, the signal is transmitted by using the frequency difference signal, and has the advantages of high encoding rate and simple decoding.
  • the M different downlink coding modes may be all downlink coding modes supported by the mobile terminal, or the mobile terminal may select several downlink coding modes from the supported downlink coding modes.
  • the mobile terminal includes the tag information of the downlink coding mode used in the detection data packet, so that the information security device obtains the downlink coding mode adopted when receiving the detection data packet.
  • Marking information so that the information security device can know the encoding mode of the detection data packet that can be received and decoded, and can include the marking information of the downlink encoding mode in the response data packet, so that the mobile terminal can be informed that the information security device can decode What kind of coding mode, in the subsequent communication, the mobile terminal can adopt the downlink coding mode to encode and transmit data, thereby saving the information interaction cost.
  • the marking information of the uplink coding mode and the marking information of the downlink coding mode may be two sets of marking manners, and should not cause confusion.
  • the flag information of the uplink coding mode may be "1, 2, 3, "
  • the flag information of the downlink coding mode may be "A, B, C, ##.
  • the flag information of the downlink coding mode may be "1, 2, 3".
  • Step S101 can be specifically implemented by the following steps 1-3.
  • Step 1 The mobile terminal encodes the detection data packet including “1” (the flag information of the downlink coding mode 1) by using the downlink coding mode 1 to form a first coded data packet, and the first coded data packet. Includes “1".
  • Step 2 The mobile terminal encodes the detection data packet including "2" (the flag information of the downlink coding mode 2) by using the downlink coding mode 2 to form a second coded data packet, and the second coded data packet Includes “2".
  • Step 3 The mobile terminal encodes the detection data packet including “3” (the flag information of the downlink coding mode 3) by using the downlink coding mode 3 to form a third coded data packet, and the third coded data packet. Includes “3".
  • the mobile terminal and the information security device can agree in advance on the correspondence relationship of the coding information of the coding mode. It can be based on the corresponding manner of the mark information agreed upon in the industry, and can also be other corresponding ways that can be implemented.
  • Step S102 The mobile terminal sends the M encoded detection data packets to the information security device.
  • the mobile terminal may send the encoded detection data packet to the information security device through the audio interface.
  • the mobile terminal may also send the encoded detection data packet to the information security device through other interfaces, or send it by wireless transmission.
  • Step S103 The information security device decodes the received encoded detection data packet to obtain X1 detection data packets, and obtains X1 downlink coding mode tag information from X1 detection data packets, where X1 is a positive integer. X1 ⁇ M.
  • the information security device decodes the received encoded detection data packet to obtain X1 detection data packets, which have the following two possibilities.
  • the information security device decodes the received X1 encoded detection data packets to obtain X1 detection data packets. That is, due to packet loss and the like, although the mobile terminal transmits M coded detection data packets, the information security device only receives X1 coded detection data packets, and the X1 coded information is stored in the information security device.
  • the decoding method of the detection packet can decode all the received X1 encoded detection packets, and thus X1 detection packets are obtained.
  • the information security device receives the X1+i encoded detection data packets, and sequentially decodes the X1+i encoded detection data packets to obtain X1 detection data packets, where i is a positive integer and X1+ i ⁇ M. That is, the mobile terminal transmits the M coded detection data packets, but the information security device receives the X1+i coded detection data packets, depending on whether or not the packet is lost, X1+i ⁇ M.
  • the information security device sequentially decodes the X1+i encoded detection data packets. However, since only the X1 encoded detection data packets are decoded in the information security device, only the received X1 codes can be encoded. The detection packet is decoded, and the other i-coded detection packets cannot be decoded, so only X1 detection packets can be obtained.
  • Step S104 The information security device encodes the response data packet by using N types of uplink coding manners to form N coded response data packets, where each coded response data packet includes tag information of each uplink coding mode used. And X1 type of downlink coding mode flag information, N is a positive integer.
  • the uplink coding mode and the downlink coding mode supported by the information security device and the mobile terminal may not correspond. That is to say, the mobile terminal sends the downlink data encoded by the downlink coding mode to the information security device, and the information security device may not be able to decode the received downlink data. Similarly, the information security device will use some uplink coding mode to encode. The uplink data is sent to the mobile terminal, and the mobile terminal may not be able to decode the received uplink data.
  • the information security device after receiving the detection packet sent by the mobile terminal, the information security device, in order to implement communication with the mobile terminal, The information security device can communicate with the mobile terminal by using all uplink coding modes supported by the information security device, or preferably by using N types of uplink coding.
  • the response data packet fed back to the mobile terminal by the information security device includes the flag information of the uplink coding mode used by the response data and the flag information of the downlink coding mode that can be decoded, thereby making the mobile
  • the terminal can know which uplink coding mode and downlink coding mode should be used for communication, and facilitate the coding mode that the mobile terminal should negotiate with the information security device.
  • the N types of uplink coding modes may be represented by the tag information “A, B, and C”, and the determined N types of uplink coding modes are the uplink coding mode A and the uplink coding mode B, respectively.
  • uplink coding mode C is the uplink coding mode A and the uplink coding mode B, respectively.
  • Step S105 The information security device sends the N encoded response data packets to the mobile terminal.
  • the information security device can transmit the encoded detection data packet to the mobile terminal through the audio interface.
  • the information security device may also send the encoded detection data packet to the mobile terminal through other interfaces, or send it by wireless transmission.
  • Step S106 The mobile terminal decodes the received encoded response data packet to obtain Y1 response data packets, and obtains Y1 kinds of uplink coding mode tag information and X1 downlink coding mode tag information from Y1 response data packets.
  • Y1 is a positive integer and Y1 ⁇ N.
  • the mobile terminal decodes the received encoded response packet to obtain Y1 response packets, which have the following two possibilities.
  • the mobile terminal decodes the received Y1 encoded response data packets to obtain Y1 response data packets. That is, due to packet loss and the like, although the information security device transmits the Y1 encoded detection data packets, the mobile terminal only receives the Y1 encoded detection data packets, and the mobile terminal stores the Y1 encoded data packets. By detecting the decoding method of the data packet, all of the received Y1 coded detection data packets can be decoded, and thus Y1 detection data packets are obtained.
  • the mobile terminal receives the Y1+j encoded response data packets, and sequentially decodes the Y1+j encoded response data packets to obtain Y1 response data packets, where j is a positive integer and Y1+j ⁇ Y1. That is, the information security device transmits Y1 encoded detection data packets, and the mobile terminal receives Y1+j encoded detection data packets, depending on whether or not the packet is lost, Y1+j ⁇ Y1.
  • the mobile terminal sequentially decodes the Y1+j encoded detection data packets. However, since only the Y1 encoded detection data packets are decoded in the mobile terminal, only the received Y1 encoded detections can be detected. The data packet is decoded, and the other j encoded detection data packets cannot be decoded, so only Y1 detection data packets can be obtained.
  • Step S107 The mobile terminal determines Y1 uplink coding mode and X1 downlink coding mode according to the obtained Y1 type uplink coding mode flag information and X1 downlink coding mode flag information.
  • the Z type uplink coding mode and the X1 downlink coding mode may be determined according to the correspondence relationship of the coding information of the coding mode.
  • Step S108 The mobile terminal determines the target uplink coding mode and the target downlink coding mode in the Y1 uplink coding mode and the X1 downlink coding mode, and uses the target downlink coding mode to encode the selected data packet to form a coded selection data packet, and encodes The selected packet includes the tag information of the target uplink coding mode and the tag information of the target downlink coding mode.
  • the mobile terminal may consider the error rate of the coding mode, and select the uplink coding mode and the downlink coding mode with the lowest error rate from the Y uplink coding mode and the X1 downlink coding mode as the target uplink coding mode and the target downlink coding mode.
  • the mobile terminal can also select the target uplink coding mode and the target downlink coding mode based on other rules.
  • the target uplink coding mode and the target downlink coding mode can make the communication between the mobile terminal and the information security device smoother, reduce the bit error rate and the packet loss rate, and improve the communication efficiency.
  • the selected data packet may also stipulate other format information related to the communication.
  • the length information of the frame header protection and the frame tail protection may be agreed, which is not described in this application. That is, selecting a data packet can be regarded as a data packet that agrees on the communication format during communication.
  • Step S109 The mobile terminal sends the encoded selection data packet to the information security device.
  • Step S110 The information security device decodes the received encoded selected data packet to obtain a selected data packet, and obtains the marking information of the target uplink coding mode and the marking information of the target downlink coding mode from the selected data packet.
  • Step S111 The information security device determines the target uplink coding mode and the target downlink coding mode according to the mark information of the target uplink coding mode and the mark information of the target downlink coding mode.
  • the information security device has learned the uplink coding mode and the downlink coding mode that are required for communication.
  • Step S112 The information security device encodes the selected response packet by using a target uplink coding manner to form a coded selection response packet, and sends the encoded selection response packet to the mobile terminal.
  • the mobile terminal may be a notebook computer, a mobile phone, a tablet computer, a smart watch, smart glasses, etc., and an audio interface product that may appear in the future.
  • the information security device may be a smart cipher key or a smart cryptographic key audio transfer device
  • the smart cipher key may be a USB key with a signature function, an OTP with a dynamic password function, etc.
  • the audio transfer device may be an audio adapter.
  • the embodiment provides a method for communication between a mobile terminal and an information security device.
  • the mobile terminal and the information security device can quickly determine the codec method to be used for communication between the two parties through two information interactions, thereby avoiding The difference in decoding mode results in a failure to decode and thus causes communication failure, thereby improving communication efficiency.
  • the embodiment provides a method for the mobile terminal to communicate with the information security device. As shown in FIG. 2, the method mainly includes the following steps (S201-S213).
  • Step S201 The mobile terminal encodes the detected data packet by using M different downlink coding modes to form M coded detection data packets, where each coded detection data packet includes a downlink coding mode used by each of the coded detection data packets.
  • both the uplink coding mode and the downlink coding mode are relative to the mobile terminal.
  • the coding mode used by the information security device to encode the data is the uplink coding mode.
  • the coding mode used by the mobile terminal to encode the data is downlink.
  • the encoding method is.
  • the uplink coding mode and the downlink coding mode are FSK coding modes.
  • S1 sampling points are used to obtain a sine wave with a period of T1 to represent a logic 1
  • S2 sampling points are used to obtain a sine wave with a period of T2 to represent a logic 0, where S1 ⁇ S2, T1 ⁇ T2, Both S1 and S2 are positive integers.
  • the sampling frequency is 44.1 kHz
  • the period T2 of the waveform is 1/5.5125 KHz, and a sine wave of which the period T2 is 1/5.5125 KHz is used to represent a logic 1.
  • the FSK encoding method is used for encoding, that is, the signal is transmitted by using the frequency difference signal, and has the advantages of high encoding rate and simple decoding.
  • the M types of downlink coding modes that are different from each other may be all downlink coding modes supported by the mobile terminal, or the mobile terminal may select several downlink coding modes from the supported downlink coding modes; similarly, N types of uplink coding modes.
  • the method may also be an uplink coding mode supported by the mobile terminal, or may be a plurality of uplink coding modes selected by the mobile terminal from the supported uplink coding modes.
  • the mobile terminal includes the flag information of the uplink coding mode and the tag information of the downlink coding mode that are supported by the detection data packet, so that the information security device can receive the detection data packet.
  • Obtaining the marking information of the uplink coding mode and the marking information of the downlink coding mode so that the information security device can learn which uplink coding mode and downlink coding mode should be used for communication, and can perform marking information of the uplink coding mode.
  • the tag information of the downlink coding mode is included in the response data packet, and the coding mode that should be adopted is conveniently negotiated with the mobile terminal, thereby saving the information interaction cost.
  • the marking information of the uplink coding mode and the marking information of the downlink coding mode may be two sets of marking manners, and should not cause confusion.
  • uplink coding The tag information may be "1, 2, 3, "
  • the tag information of the downlink coding mode may be "A, B, C, ##.
  • the M different downlink coding modes may be the downlink coding mode 1, the downlink coding mode 2, and the downlink coding mode 3, and correspondingly, the M type is represented.
  • the marking information of the different downlink coding modes may be “1, 2, 3”;
  • the N types of uplink coding modes that the mobile terminal can decode may be the uplink coding mode A, the uplink coding mode B, and the uplink coding mode C, and correspondingly,
  • the flag information indicating the N types of uplink coding modes that the mobile terminal can decode may be "A, B, C".
  • Step S201 can be specifically implemented by the following steps 4-6.
  • Step 4 The mobile terminal adopts downlink coding mode 1 to detect the detection of "1" (the flag information of the downlink coding mode 1) and "A, B, C" (the flag information of the N types of uplink coding modes that the mobile terminal can decode)
  • the data packet is encoded to form a first encoded data packet, and the first encoded data packet includes "1" and "A, B, C".
  • Step 5 The mobile terminal uses the downlink coding mode 2 to detect the "2" (the tag information of the downlink coding mode 2) and the "A, B, C" (the tag information of the N types of uplink coding modes that the mobile terminal can decode)
  • the data packet is encoded to form a second encoded data packet, and the second encoded data packet includes "2" and "A, B, C".
  • Step 6 The mobile terminal uses the downlink coding mode 3 to detect the "3" (the tag information of the downlink coding mode 3) and the "A, B, C" (the tag information of the N types of uplink coding modes that the mobile terminal can decode)
  • the data packet is encoded to form a third encoded data packet, and the third encoded data packet includes "3" and "A, B, C".
  • Step S202 The mobile terminal sends the M encoded detection data packets to the information security device.
  • the mobile terminal may send the encoded detection data packet to the information security device through the audio interface.
  • the mobile terminal may also send the encoded detection data packet to the information security device through other interfaces, or send it by wireless transmission.
  • Step S203 The information security device decodes the received encoded detection data packet to obtain X detection data packets, and obtains X types of downlink coding mode tag information and N types of uplink coding mode tags from the X detection data packets.
  • Information where X is a positive integer and X ⁇ M.
  • the information security device decodes the received encoded detection data packet to obtain X detection data packets, which have the following two possibilities.
  • the information security device decodes the received X encoded detection packets to obtain X detection packets. That is, due to packet loss and the like, although the mobile terminal transmits M coded detection data packets, the information security device only receives X coded detection data packets, and the X security code is stored in the information security device.
  • the decoding method of the detection packet can decode all the received X-coded detection packets, and thus obtain X detection packets.
  • the information security device receives the X+i encoded detection data packets, and sequentially encodes the X+i encoded data.
  • the packet is decoded to obtain X detection packets, where i is a positive integer and X+i ⁇ M. That is, the mobile terminal transmits M coded detection data packets, but the information security device receives X+i coded detection data packets, depending on whether or not the packet is lost, X+i ⁇ M.
  • the information security device sequentially decodes the X+i encoded detection data packets, but since the information security device only has the decoding mode of the X encoded detection data packets, only the received X coding codes can be obtained.
  • the detection packet is decoded, and the other i-coded detection packets cannot be decoded, so only X detection packets can be obtained.
  • Step S204 The information security device determines N types of uplink coding modes according to the marking information of the N types of uplink coding modes.
  • the mobile terminal and the information security device may agree in advance on the correspondence relationship between the tag information of the coding mode, or according to the corresponding manner of the tag information agreed in the industry, or other corresponding manners that can be implemented. Therefore, the information security device can determine the N types of uplink coding modes according to the marking information of the N types of uplink coding modes.
  • the flag information used to indicate the N types of uplink coding modes is “A, B, and C”, and the N types of uplink coding modes determined are the uplink coding mode A, the uplink coding mode B, and the uplink coding mode. C.
  • Step S205 The information security device selects Y types of uplink coding modes supported by the information security device to encode the response data packets in the N uplink coding modes to form Y coded response data packets, where each coded response data is encoded.
  • the packet includes the tag information of the uplink coding mode and the tag information of the X downlink coding modes, and Y is a positive integer, Y ⁇ N.
  • the uplink coding mode and the downlink coding mode supported by the information security device and the mobile terminal may not correspond. That is to say, the mobile terminal sends the downlink data encoded by the downlink coding mode to the information security device, and the information security device may not be able to decode the received downlink data. Similarly, the information security device will use some uplink coding mode to encode. The uplink data is sent to the mobile terminal, and the mobile terminal may not be able to decode the received uplink data.
  • the information security device After receiving the detection packet sent by the mobile terminal, the information security device acquires N types of uplink coding modes that the mobile terminal can decode, and in order to implement communication with the mobile terminal, the information security device needs N types supported by the mobile terminal.
  • the uplink coding mode the Y types of uplink coding modes supported by the information security device are selected to communicate with the mobile terminal.
  • the response data packet fed back to the mobile terminal by the information security device also includes the flag information of the uplink coding mode used by the response data packet and the flag information of the downlink coding mode that can be decoded, thereby
  • the mobile terminal can learn which uplink coding mode and downlink coding mode should be used for communication, and facilitate the coding mode that the mobile terminal should negotiate with the information security device.
  • Step S206 the information security device sends the Y encoded response data packets to the mobile terminal.
  • the information security device can transmit the encoded detection data packet to the mobile terminal through the audio interface.
  • the information security device may also transmit the encoded detection data packet to the mobile terminal through other interfaces, or transmit by wireless transmission.
  • Step S207 The mobile terminal decodes the received encoded response data packet to obtain Z response data packets, and obtains Z-type uplink coding mode tag information and X downlink coding mode tag information from Z response data packets.
  • Z is a positive integer and Z ⁇ Y.
  • the mobile terminal decodes the received encoded response packet to obtain Z response packets, which have the following two possibilities.
  • the mobile terminal decodes the received Z coded response data packets to obtain Z response data packets. That is, due to packet loss and the like, although the information security device transmits the Y coded detection data packets, the mobile terminal only receives the Z coded detection data packets, and the Z terminals are stored in the mobile terminal. By detecting the decoding method of the data packet, all of the Z coded detection data packets that have been received can be decoded, so that Z detection data packets are obtained.
  • the mobile terminal receives Z+j encoded response data packets, and sequentially decodes Z+j encoded response data packets to obtain Z response data packets, where j is a positive integer and Z +j ⁇ Y. That is, the information security device transmits the Y encoded detection data packets, and the mobile terminal receives the Z+j encoded detection data packets, depending on whether or not the packet is lost, Z+j ⁇ Y.
  • the mobile terminal sequentially decodes the Z+j encoded detection data packets. However, since only the Z coded detection data packets are decoded in the mobile terminal, only the received Z coded detections can be detected. The data packet is decoded, and the other j encoded detection data packets cannot be decoded, so only Z detection data packets can be obtained.
  • the mobile terminal has learned the Z-type uplink coding mode tag information and the X-type downlink coding mode tag information that both the mobile terminal and the information security device can support, and can pass the tag information only to enable the information security device and the mobile device.
  • the terminal can negotiate the uplink and downlink coding modes suitable for communication at a lower cost, thereby improving the communication efficiency.
  • Step S208 The mobile terminal determines Z types of uplink coding modes and X types of downlink coding modes according to the obtained Z-type uplink coding mode tag information and X-type downlink coding mode tag information.
  • the Z type uplink coding mode and the X downlink coding mode may be determined according to the correspondence relationship of the coding information of the coding mode.
  • Step S209 The mobile terminal determines the target uplink coding mode and the target downlink coding mode in the Z uplink coding mode and the X downlink coding mode, and uses the target downlink coding mode to encode the selected data packet to form a coded selection data packet, where
  • the coded selection data packet includes flag information of the target uplink coding mode and flag information of the target downlink coding mode.
  • the mobile terminal may consider the error rate of the coding mode, and select the uplink coding mode and the downlink coding mode with the lowest error rate from the Z uplink coding mode and the X downlink coding mode as the target uplink coding mode and the target downlink coding mode.
  • the mobile terminal can also select the target uplink coding mode and the target downlink coding mode based on other rules.
  • the target uplink coding mode and the target downlink coding mode can make the communication between the mobile terminal and the information security device smoother, reduce the bit error rate and the packet loss rate, and improve the communication efficiency.
  • the selected data packet may also stipulate other format information related to the communication.
  • the length information of the frame header protection and the frame tail protection may be agreed, which is not described in this application. That is, selecting a data packet can be regarded as a data packet that agrees on the communication format during communication.
  • Step S210 The mobile terminal sends the encoded selection data packet to the information security device.
  • Step S211 the information security device decodes the received encoded selected data packet to obtain a selected data packet, and obtains the target uplink coding mode tag information and the target downlink coding mode tag information from the selected data packet.
  • Step S212 the information security device determines the target uplink coding mode and the target downlink coding mode according to the mark information of the target uplink coding mode and the mark information of the target downlink coding mode.
  • the information security device has learned the uplink coding mode and the downlink coding mode that are required for communication.
  • Step S213 The information security device encodes the selected response packet by using a target uplink coding manner to form a coded selection response packet, and sends the encoded selection response packet to the mobile terminal.
  • the mobile terminal may be a notebook computer, a mobile phone, a tablet computer, a smart watch, smart glasses, etc., and an audio interface product that may appear in the future.
  • the information security device may be a smart cipher key or a smart cryptographic key audio transfer device
  • the smart cipher key may be a USB key with a signature function, an OTP with a dynamic password function, etc.
  • the audio transfer device may be an audio adapter.
  • the embodiment provides a method for communication between a mobile terminal and an information security device.
  • the mobile terminal and the information security device can quickly determine the codec method to be used for communication between the two parties through two information interactions, thereby avoiding Due to the difference in the codec mode, the decoding cannot be decoded and the communication fails, thereby improving the communication efficiency.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供一种移动终端与信息安全设备通信的方法,包括:移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,并发送至信息安全设备;信息安全设备解码得到X1个检测数据包,并获取X1种下行编码方式的标记信息,信息安全设备对响应数据包进行编码形成N个编码后的响应数据包,并发送至移动终端;移动终端解码得到Y1个响应数据包,并获取Y1种上行编码方式的标记信息和X1种下行编码方式的标记信息,并最终确定目标上行编码方式和目标下行编码方式。本方法可以避免因编码方式的不同而导致无法解码进而造成通信失败的现象,从而提高通信的效率。

Description

一种移动终端与信息安全设备通信的方法 技术领域
本发明涉及一种电子技术领域,尤其涉及一种移动终端与信息安全设备通信的方法。
背景技术
在现有技术中,移动终端(如手机等)与信息安全设备(如智能密码钥匙、智能密码钥匙的音频转接设备等)进行通信时,需要双方都能够解码对方的数据包。移动终端一般支持少数几种编解码方式,而信息安全设备支持的编码方式与移动终端支持的编码方法可能不全相同。当移动终端支持多种编码方式时,由于移动终端无法主动选择正确的或者合适的编码方式,因此,移动终端当前采用的编码方式可能是信息安全设备不支持的编码方式,进而使得信息安全设备无法对来自移动终端的编码数据进行解码。同样,信息安全设备采用的编码方式也可能是移动终端不支持的编码方式,因此,上行方向的数据传输也可能存在类似情况,从而导致信息安全设备与移动终端之间的通信失败。
发明内容
本发明旨在解决上述信息安全设备与移动终端之间的通信失败的问题。
本发明的主要目的在于提供一种移动终端与信息安全设备通信的方法。
本发明的另一主要目的在于提出另一种移动终端与信息安全设备通信的方法。
为达到上述目的,本发明的技术方案具体是这样实现的:
本发明一方面提供了一种移动终端与信息安全设备通信的方法,该方法包括:
移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息,M为正整数;
所述移动终端发送所述M个编码后的检测数据包至信息安全设备;
所述信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包,并从所述X1个检测数据包中获取X1种下行编码方式的标记信息,其中,X1为正整数,X1≤M;
所述信息安全设备采用N种上行编码方式对响应数据包进行编码形成N个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和所述X1种下行编码方式的标记信息,N为正整数;
所述信息安全设备发送所述N个编码后的响应数据包至所述移动终端;
所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包,并从所述Y1个响应数据包获取Y1种上行编码方式的标记信息和所述X1种下行编码方式的标记信息,其中,Y1为正整数,Y1≤N;
所述移动终端根据获取到的所述Y1种上行编码方式的标记信息和所述X1种下行编码方式的标记信息,确定所述Y1种上行编码方式和所述X1种下行编码方式;
所述移动终端在所述Y1种上行编码方式和所述X1种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用所述目标下行编码方式对选择数据包进行编码形成编码后的选择数据包,所述编码后的选择数据包中包含所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
所述移动终端将所述编码后的选择数据包发送至所述信息安全设备;
所述信息安全设备对接收到的所述编码后的选择数据包进行解码得到所述选择数据包,并从所述选择数据包中获取所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
所述信息安全设备根据所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息,确定所述目标上行编码方式和所述目标下行编码方式;
所述信息安全设备采用所述目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将所述编码后的选择响应包发送至所述移动终端。
此外,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包的步骤包括:所述信息安全设备对接收到的X1个编码后的检测数据包进行解码得到X1个检测数据包。
此外,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包的步骤包括:所述信息安全设备接收X1+i个编码后的检测数据包;依次对X1+i个编码后的检测数据包进行解码,得到X1个检测数据包,其中,i为正整数,且X1+i≤M。
此外,所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包的步骤包括:所述移动终端对接收到的Y1个编码后的响应数据包进行解码得到Y1个响应数据包。
此外,所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包的步骤包括:所述移动终端接收Y1+j个编码后的响应数据包;依次对Y1+j个编码后的响应数据包进行解码,得到Y1个响应数据包,其中,j为正整数,且Y1+j≤N。
此外,所述上行编码方式和所述下行编码方式为FSK编码方式。
此外,在所述FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,其中,S1≠S2,T1≠T2,S1和S2均为正整数。
此外,所述信息安全设备为智能密码钥匙。
此外,所述信息安全设备为音频转接头或音频转接设备。
由上述本发明提供的技术方案可以看出,本发明提供了一种移动终端和信息安全设备通信的方法,使得移动终端和信息安全设备通过两次信息交互,即可以快速确定双方通信所要采用的编解码方法,避免了因编解码方式的不同而导致无法解码进而造成通信失败的现象,从而提高通信的效率。
本发明一方面还提供了另一种移动终端与信息安全设备通信的方法,该方法包括:
移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息和所述移动终端能够解码的N种上行编码方式的标记信息,M和N均为正整数;
所述移动终端发送所述M个编码后的检测数据包至信息安全设备;
所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包,并从所述X个检测数据包中获取X种下行编码方式的标记信息和所述N种上行编码方式的标记信息,其中,X为正整数,X≤M;
所述信息安全设备根据所述N种上行编码方式的标记信息,确定所述N种上行编码方式;
所述信息安全设备在所述N种上行编码方式中,选择所述信息安全设备支持的Y种上行编码方式对响应数据包进行编码形成Y个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和所述X种下行编码方式的标记信息,Y为正整数,Y≤N;
所述信息安全设备发送所述Y个编码后的响应数据包至所述移动终端;
所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包,并从所述Z个响应数据包获取Z种上行编码方式的标记信息和所述X种下行编码方式的标记信息,其中,Z为正整数,Z≤Y;
所述移动终端根据获取到的所述Z种上行编码方式的标记信息和所述X种下行编码方式的标记信息,确定所述Z种上行编码方式和所述X种下行编码方式;
所述移动终端在所述Z种上行编码方式和所述X种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用所述目标下行编码方式对选择数据包进行编码形成编码 后的选择数据包,其中:所述编码后的选择数据包中包含所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
所述移动终端将所述编码后的选择数据包发送至所述信息安全设备;
所述信息安全设备对接收到的所述编码后的选择数据包进行解码得到所述选择数据包,并从所述选择数据包中获取所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
所述信息安全设备根据所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息,确定所述目标上行编码方式和所述目标下行编码方式;
所述信息安全设备采用所述目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将所述编码后的选择响应包发送至所述移动终端。
此外,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包的步骤包括:所述信息安全设备对接收到的X个编码后的检测数据包进行解码得到X个检测数据包。
此外,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包的步骤包括:所述信息安全设备接收X+i个编码后的检测数据包;依次对X+i个编码后的检测数据包进行解码,得到X个检测数据包,其中,i为正整数,且X+i≤M。
此外,所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包的步骤包括:所述移动终端对接收到的Z个编码后的响应数据包进行解码得到Z个响应数据包。
此外,所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包的步骤包括:所述移动终端接收Z+j个编码后的响应数据包;依次对Z+j个编码后的响应数据包进行解码,得到Z个响应数据包,其中,j为正整数,且Z+j≤Y。
此外,所述上行编码方式和所述下行编码方式为FSK编码方式。
此外,在所述FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,其中,S1≠S2,T1≠T2,S1和S2均为正整数。
此外,所述信息安全设备为智能密码钥匙。
此外,所述信息安全设备为音频转接头或音频转接设备。
由上述本发明提供的技术方案可以看出,本发明提供了一种移动终端和信息安全设备通信的方法,使得移动终端和信息安全设备通过两次信息交互,即可以快速确定双方通信所要采用的编码方式,避免了因编码方式的不同而导致无法解码进而造成通信失败的现象, 从而提高通信的效率。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他附图。
图1为本发明实施例1提供的移动终端和信息安全设备通信的方法流程图;以及
图2为本发明实施例2提供的移动终端和信息安全设备通信的方法流程图。
具体实施方式
下面结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明的保护范围。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本发明中的具体含义。此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或数量或位置。
下面将结合附图对本发明实施例作进一步地详细描述。
实施例1
本实施例提供一种移动终端与信息安全设备通信的方法,如图1所示,该方法主要包括以下步骤(S101-步骤S112)。
步骤S101,移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息,M为正整数。
具体的,所谓上行编码方式和下行编码方式均是相对于移动终端而言。信息安全设备向移动终端发送数据时,信息安全设备对数据进行编码所采用的编码方式为上行编码方式, 移动终端向信息安全设备发送数据时,移动终端对数据进行编码所采用的编码方式为下行编码方式是。优选的,上行编码方式和下行编码方式为FSK编码方式。在FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,其中,S1≠S2,T1≠T2,S1和S2均为正整数。例如,当采样频率为44.1KHz时,在FSK-4-8编码方式中,采样4个采样点对数据信号进行采样后,可以得到频率为44.1/4=11.025KHz的正弦波,该波形的周期T1为1/11.025KHz,该周期T1为1/11.025KHz的正弦波用来表示逻辑0;采用8个采样点对数据信号进行采样后,可以得到频率为44.1/8=5.5125KHz的正弦波,该波形的周期T2为1/5.5125KHz,该周期T2为1/5.5125KHz的正弦波用来表示逻辑1。具体的组合方式还有许多种,在此不再赘叙。采用FSK编码方式来进行编码,即利用频率差异的信号来传递信息,具有编码速率高、解码简单等优点。
具体的,M种互不相同的下行编码方式可以是移动终端所支持的全部下行编码方式,也可以是移动终端从支持的下行编码方式中选出几种下行编码方式。
作为本发明的发明点之一,移动终端在检测数据包中包含了所采用的下行编码方式的标记信息,可以使得信息安全设备在接收到检测数据包时,获取到所采用的下行编码方式的标记信息,从而使得信息安全设备可以得知可以接收和解码的检测数据包为何种编码方式,而且可以通过将下行编码方式的标记信息包含在响应数据包中,方便移动终端获知信息安全设备能够解码何种编码方式,则之后的通信中,移动终端可以采取该下行编码方式进行编码发送数据,节省信息交互代价。具体的,上行编码方式的标记信息和下行编码方式的标记信息可以是两套标记方式,不应当导致混淆。例如,上行编码方式的标记信息可以是“1、2、3……”,而下行编码方式的标记信息可以是“A、B、C……”。
示例性地,以M=3为例,M种互不相同的下行编码方式可以是下行编码方式1、下行编码方式2和下行编码方式3,相应地,用于表示该M种互不相同的下行编码方式的标记信息可以是“1、2、3”。则步骤S101具体可以通过如下步骤1-3实现。
步骤1,移动终端采用下行编码方式1对包括“1”(该下行编码方式1的标记信息)的检测数据包进行编码形成第1个编码后的数据包,该第1个编码后的数据包包括“1”。
步骤2,移动终端采用下行编码方式2对包括“2”(该下行编码方式2的标记信息)的检测数据包进行编码形成第2个编码后的数据包,该第2个编码后的数据包包括“2”。
步骤3,移动终端采用下行编码方式3对包括“3”(该下行编码方式3的标记信息)的检测数据包进行编码形成第3个编码后的数据包,该第3个编码后的数据包包括“3”。
另外,移动终端与信息安全设备可以事先约定好编码方式的标记信息的对应关系,也 可以根据行业内约定的标记信息的对应方式,还可以是其他能够实现的对应方式。
步骤S102,移动终端发送M个编码后的检测数据包至信息安全设备。
具体的,移动终端可以通过音频接口将编码后的检测数据包发送至信息安全设备。当然,在双方通信许可的情况下,移动终端也可以通过其他接口将编码后的检测数据包发送至信息安全设备,或者通过无线传输的方式发送。
步骤S103,信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包,并从X1个检测数据包中获取X1种下行编码方式的标记信息,其中,X1为正整数,X1≤M。
信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包有以下两种可能。
(1)信息安全设备对接收到的X1个编码后的检测数据包进行解码得到X1个检测数据包。即,由于丢包等原因,虽然移动终端发送了M个编码后的检测数据包,但信息安全设备只接收到了X1个编码后的检测数据包,而且信息安全设备中存有该X1个编码后的检测数据包的解码方式,能够对接收到的X1个编码后的检测数据包全部进行解码,因此得到X1个检测数据包。
(2)信息安全设备接收X1+i个编码后的检测数据包,依次对X1+i个编码后的检测数据包进行解码,得到X1个检测数据包,其中,i为正整数,且X1+i≤M。即,移动终端发送了M个编码后的检测数据包,但信息安全设备接收X1+i个编码后的检测数据包,取决于是否丢包的问题,X1+i≤M。信息安全设备依次对X1+i个编码后的检测数据包进行解码,但由于信息安全设备中仅存有X1个编码后的检测数据包的解码方式,因此仅能对接收到的X1个编码后的检测数据包进行解码,而对于另外i个编码后的检测数据包无法解码,因此也只能得到X1个检测数据包。
步骤S104,信息安全设备采用N种上行编码方式对响应数据包进行编码形成N个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和X1种下行编码方式的标记信息,N为正整数。
具体的,由于信息安全设备和移动终端支持的上行编码方式和下行编码方式可能存在不对应的情况。也就是说移动终端将采用某种下行编码方式编码后的下行数据发送给信息安全设备,信息安全设备可能无法对接收到的下行数据进行解码;同样,信息安全设备将采用某种上行编码方式编码后的上行数据发送给移动终端,移动终端可能无法对接收到的上行数据进行解码。
因而,信息安全设备在接收到移动终端发来的检测包后,为了实现与移动终端的通信, 信息安全设备可以使用信息安全设备支持的所有上行编码方式,或者优选出N种上行编码方式与移动终端进行通信。作为本发明相应的另一发明点,信息安全设备反馈给移动终端的响应数据包中包含该响应数据所采用的上行编码方式的标记信息和所能够解码的下行编码方式的标记信息,从而使得移动终端可以得知应该采用何种上行编码方式和下行编码方式进行通信,方便移动终端与信息安全设备协商所应当采用的编码方式。
示例性地,与M种下行编码方式类似,可以用标记信息“A、B、C”来表示N种上行编码方式,确定出的N种上行编码方式依次是上行编码方式A、上行编码方式B和上行编码方式C。
步骤S105,信息安全设备发送N个编码后的响应数据包至移动终端。
同样的,信息安全设备可以通过音频接口将编码后的检测数据包发送至移动终端。当然,在双方通信许可的情况下,信息安全设备也可以通过其他接口将编码后的检测数据包发送至移动终端,或者通过无线传输的方式发送。
步骤S106,移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包,并从Y1个响应数据包获取Y1种上行编码方式的标记信息和X1种下行编码方式的标记信息,其中,Y1为正整数,Y1≤N。
移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包有以下两种可能。
(1)移动终端对接收到的Y1个编码后的响应数据包进行解码得到Y1个响应数据包。即,由于丢包等原因,虽然信息安全设备发送了Y1个编码后的检测数据包,但移动终端只接收到了Y1个编码后的检测数据包,而且移动终端中存有该Y1个编码后的检测数据包的解码方式,能够对接收到的Y1个编码后的检测数据包全部进行解码,因此得到Y1个检测数据包。
(2)移动终端接收Y1+j个编码后的响应数据包,依次对Y1+j个编码后的响应数据包进行解码,得到Y1个响应数据包,其中,j为正整数,且Y1+j≤Y1。即,信息安全设备发送了Y1个编码后的检测数据包,移动终端接收Y1+j个编码后的检测数据包,取决于是否丢包的问题,Y1+j≤Y1。移动终端依次对Y1+j个编码后的检测数据包进行解码,但由于移动终端中仅存有Y1个编码后的检测数据包的解码方式,因此仅能对接收到的Y1个编码后的检测数据包进行解码,而对于另外j个编码后的检测数据包无法解码,因此也只能得到Y1个检测数据包。
步骤S107,移动终端根据获取到的Y1种上行编码方式的标记信息和X1种下行编码方式的标记信息,确定Y1种上行编码方式和X1种下行编码方式。
具体的,根据编码方式的标记信息的对应关系可以确定Z种上行编码方式和X1种下行编码方式。
步骤S108,移动终端在Y1种上行编码方式和X1种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用目标下行编码方式对选择数据包进行编码形成编码后的选择数据包,编码后的选择数据包中包含目标上行编码方式的标记信息和目标下行编码方式的标记信息。
具体的,移动终端可以考虑编码方式的误码率,从Y种上行编码方式和X1种下行编码方式中选择误码率最低的上行编码方式和下行编码方式作为目标上行编码方式和目标下行编码方式。当然,移动终端也可以基于其他规则来选择目标上行编码方式和目标下行编码方式。采用目标上行编码方式和目标下行编码方式可以使得移动终端与信息安全设备的通信更加顺畅,减少误码率和丢包率,提高通信效率。
当然,选择数据包中除了包括目标上行编码方式和目标下行编码方式之外,还可以约定与通信相关的其他格式信息。例如,可以约定帧头保护和帧尾保护的长度信息,本申请对此不再赘叙。即选择数据包可以被视为在通信过程中约定通信格式的数据包。
步骤S109,移动终端将编码后的选择数据包发送至信息安全设备。
步骤S110,信息安全设备对接收到的编码后的选择数据包进行解码得到选择数据包,并从选择数据包中获取目标上行编码方式的标记信息和目标下行编码方式的标记信息。
步骤S111,信息安全设备根据目标上行编码方式的标记信息和目标下行编码方式的标记信息,确定目标上行编码方式和目标下行编码方式。
至此步骤,信息安全设备已经获知了进行通信所需要采用的上行编码方式和下行编码方式。
步骤S112,信息安全设备采用目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将编码后的选择响应包发送至移动终端。
具体的,移动终端可以是笔记本电脑、手机、平板电脑、智能手表、智能眼镜等,以及将来可能会出现的音频接口的产品。
具体的,信息安全设备可以是智能密码钥匙或者智能密码钥匙的音频转接设备,智能密码钥匙可以是具有签名功能的USBkey、具有生成动态口令功能的OTP等,音频转接设备可以是音频转接头。
综上,本实施例提供了一种移动终端和信息安全设备进行通信的方法,移动终端和信息安全设备通过两次信息交互,即可以快速确定双方通信所要采用的编解码方法,避免了因编解码方式的不同而导致无法解码进而造成通信失败的现象,从而提高通信的效率。
实施例2
本实施例提供一种移动终端与信息安全设备通信的方法,如图2所示,该方法主要包括以下步骤(S201-步骤S213)。
步骤S201,移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息和移动终端能够解码的N种上行编码方式的标记信息,M和N均为正整数。
具体的,所谓上行编码方式和下行编码方式均是相对于移动终端而言。信息安全设备向移动终端发送数据时,信息安全设备对数据进行编码所采用的编码方式为上行编码方式,移动终端向信息安全设备发送数据时,移动终端对数据进行编码所采用的编码方式为下行编码方式是。优选的,上行编码方式和下行编码方式为FSK编码方式。在FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,其中,S1≠S2,T1≠T2,S1和S2均为正整数。例如,当采样频率为44.1KHz时,在FSK-4-8编码方式中,采样4个采样点对数据信号进行采样后,可以得到频率为44.1/4=11.025KHz的正弦波,该波形的周期T1为1/11.025KHz,该周期T1为1/11.025KHz的正弦波用来表示逻辑0;采用8个采样点对数据信号进行采样后,可以得到频率为44.1/8=5.5125KHz的正弦波,该波形的周期T2为1/5.5125KHz,该周期T2为1/5.5125KHz的正弦波用来表示逻辑1。具体的组合方式还有许多种,在此不再赘叙。采用FSK编码方式来进行编码,即利用频率差异的信号来传递信息,具有编码速率高、解码简单等优点。
具体的,M种互不相同的下行编码方式可以是移动终端所支持的全部下行编码方式,也可以是移动终端从支持的下行编码方式中选出几种下行编码方式;同样,N种上行编码方式也可以是移动终端所能够支持的上行编码方式,也可以是移动终端从支持的上行编码方式中选出的几种上行编码方式。
作为本发明的发明点之一,移动终端在检测数据包中包含了所能够支持的上行编码方式的标记信息和所采用的下行编码方式的标记信息,可以使得信息安全设备在接收到检测数据包时,获取到上行编码方式的标记信息和下行编码方式的标记信息,从而使得信息安全设备可以得知应该采用何种上行编码方式和下行编码方式进行通信,而且可以通过将上行编码方式的标记信息和下行编码方式的标记信息包含在响应数据包中,方便地与移动终端协商所应当采用的编码方式,节省信息交互代价。具体的,上行编码方式的标记信息和下行编码方式的标记信息可以是两套标记方式,不应当导致混淆。例如,上行编码方式的 标记信息可以是“1、2、3……”,而下行编码方式的标记信息可以是“A、B、C……”。
示例性地,以M=3、N=3为例,M种互不相同的下行编码方式可以是下行编码方式1、下行编码方式2和下行编码方式3,相应地,用于表示该M种互不相同的下行编码方式的标记信息可以是“1、2、3”;移动终端能够解码的N种上行编码方式可以是上行编码方式A、上行编码方式B和上行编码方式C,相应地,用于表示该移动终端能够解码的N种上行编码方式的标记信息可以是“A、B、C”。则步骤S201具体可以通过如下步骤4-6实现。
步骤4,移动终端采用下行编码方式1对包括“1”(该下行编码方式1的标记信息)和“A、B、C”(移动终端能够解码的N种上行编码方式的标记信息)的检测数据包进行编码形成第1个编码后的数据包,该第1个编码后的数据包包括“1”和“A、B、C”。
步骤5,移动终端采用下行编码方式2对包括“2”(该下行编码方式2的标记信息)和“A、B、C”(移动终端能够解码的N种上行编码方式的标记信息)的检测数据包进行编码形成第2个编码后的数据包,该第2个编码后的数据包包括“2”和“A、B、C”。
步骤6,移动终端采用下行编码方式3对包括“3”(该下行编码方式3的标记信息)和“A、B、C”(移动终端能够解码的N种上行编码方式的标记信息)的检测数据包进行编码形成第3个编码后的数据包,该第3个编码后的数据包包括“3”和“A、B、C”。
步骤S202,移动终端发送M个编码后的检测数据包至信息安全设备。
具体的,移动终端可以通过音频接口将编码后的检测数据包发送至信息安全设备。当然,在双方通信许可的情况下,移动终端也可以通过其他接口将编码后的检测数据包发送至信息安全设备,或者通过无线传输的方式发送。
步骤S203,信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包,并从X个检测数据包中获取X种下行编码方式的标记信息和N种上行编码方式的标记信息,其中,X为正整数,X≤M。
信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包有以下两种可能。
(1)信息安全设备对接收到的X个编码后的检测数据包进行解码得到X个检测数据包。即,由于丢包等原因,虽然移动终端发送了M个编码后的检测数据包,但信息安全设备只接收到了X个编码后的检测数据包,而且信息安全设备中存有该X个编码后的检测数据包的解码方式,能够对接收到的X个编码后的检测数据包全部进行解码,因此得到X个检测数据包。
(2)信息安全设备接收X+i个编码后的检测数据包,依次对X+i个编码后的检测数据 包进行解码,得到X个检测数据包,其中,i为正整数,且X+i≤M。即,移动终端发送了M个编码后的检测数据包,但信息安全设备接收X+i个编码后的检测数据包,取决于是否丢包的问题,X+i≤M。信息安全设备依次对X+i个编码后的检测数据包进行解码,但由于信息安全设备中仅存有X个编码后的检测数据包的解码方式,因此仅能对接收到的X个编码后的检测数据包进行解码,而对于另外i个编码后的检测数据包无法解码,因此也只能得到X个检测数据包。
步骤S204,信息安全设备根据N种上行编码方式的标记信息,确定N种上行编码方式。
具体的,移动终端与信息安全设备可以事先约定好编码方式的标记信息的对应关系,也可以根据行业内约定的标记信息的对应方式,还可以是其他能够实现的对应方式。因此信息安全设备根据N种上行编码方式的标记信息,可以确定这N种上行编码方式。
示例性地,以用于表示N种上行编码方式的标记信息是“A、B、C”为例,确定出的N种上行编码方式依次是上行编码方式A、上行编码方式B和上行编码方式C。
步骤S205,信息安全设备在N种上行编码方式中,选择信息安全设备支持的Y种上行编码方式对响应数据包进行编码形成Y个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和X种下行编码方式的标记信息,Y为正整数,Y≤N。
具体的,由于信息安全设备和移动终端支持的上行编码方式和下行编码方式可能存在不对应的情况。也就是说移动终端将采用某种下行编码方式编码后的下行数据发送给信息安全设备,信息安全设备可能无法对接收到的下行数据进行解码;同样,信息安全设备将采用某种上行编码方式编码后的上行数据发送给移动终端,移动终端可能无法对接收到的上行数据进行解码。
因而,信息安全设备在接收到移动终端发来的检测包后,获取了移动终端能够解码的N种上行编码方式,而为了实现与移动终端的通信,信息安全设备需要从移动终端支持的N种上行编码方式中,选择信息安全设备能够支持的Y种上行编码方式与移动终端进行通信。作为本发明相应的另一发明点,信息安全设备反馈给移动终端的响应数据包中也包含该响应数据包所采用的上行编码方式的标记信息和所能够解码的下行编码方式的标记信息,从而使得移动终端可以得知应该采用何种上行编码方式和下行编码方式进行通信,方便移动终端与信息安全设备协商所应当采用的编码方式。
步骤S206,信息安全设备发送Y个编码后的响应数据包至移动终端。
同样的,信息安全设备可以通过音频接口将编码后的检测数据包发送至移动终端。当 然,在双方通信许可的情况下,信息安全设备也可以通过其他接口将编码后的检测数据包发送至移动终端,或者通过无线传输的方式发送。
步骤S207,移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包,并从Z个响应数据包获取Z种上行编码方式的标记信息和X种下行编码方式的标记信息,其中,Z为正整数,Z≤Y。
移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包有以下两种可能。
(1)所述移动终端对接收到的Z个编码后的响应数据包进行解码得到Z个响应数据包。即,由于丢包等原因,虽然信息安全设备发送了Y个编码后的检测数据包,但移动终端只接收到了Z个编码后的检测数据包,而且移动终端中存有该Z个编码后的检测数据包的解码方式,能够对接收到的Z个编码后的检测数据包全部进行解码,因此得到Z个检测数据包。
(2)所述移动终端接收Z+j个编码后的响应数据包,依次对Z+j个编码后的响应数据包进行解码,得到Z个响应数据包,其中,j为正整数,且Z+j≤Y。即,信息安全设备发送了Y个编码后的检测数据包,移动终端接收Z+j个编码后的检测数据包,取决于是否丢包的问题,Z+j≤Y。移动终端依次对Z+j个编码后的检测数据包进行解码,但由于移动终端中仅存有Z个编码后的检测数据包的解码方式,因此仅能对接收到的Z个编码后的检测数据包进行解码,而对于另外j个编码后的检测数据包无法解码,因此也只能得到Z个检测数据包。
至此步骤,移动终端已经获知了移动终端和信息安全设备双方都能够支持的Z种上行编码方式的标记信息和X种下行编码方式的标记信息,通过只传递标记信息,可以使得信息安全设备和移动终端能够以更小的代价协商出适用于通信的上行和下行编码方式,从而提高通信的效率。
步骤S208,移动终端根据获取到的Z种上行编码方式的标记信息和X种下行编码方式的标记信息,确定Z种上行编码方式和X种下行编码方式。
具体的,根据编码方式的标记信息的对应关系可以确定Z种上行编码方式和X种下行编码方式。
步骤S209,移动终端在Z种上行编码方式和X种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用目标下行编码方式对选择数据包进行编码形成编码后的选择数据包,其中,编码后的选择数据包中包含目标上行编码方式的标记信息和目标下行编码方式的标记信息。
具体的,移动终端可以考虑编码方式的误码率,从Z种上行编码方式和X种下行编码方式中选择误码率最低的上行编码方式和下行编码方式作为目标上行编码方式和目标下行编码方式。当然,移动终端也可以基于其他规则来选择目标上行编码方式和目标下行编码方式。采用目标上行编码方式和目标下行编码方式可以使得移动终端与信息安全设备的通信更加顺畅,减少误码率和丢包率,提高通信效率。
当然,选择数据包中除了包括目标上行编码方式和目标下行编码方式之外,还可以约定与通信相关的其他格式信息。例如,可以约定帧头保护和帧尾保护的长度信息,本申请对此不再赘叙。即选择数据包可以被视为在通信过程中约定通信格式的数据包。
步骤S210,移动终端将编码后的选择数据包发送至信息安全设备。
步骤S211,信息安全设备对接收到的编码后的选择数据包进行解码得到选择数据包,并从选择数据包中获取目标上行编码方式的标记信息和目标下行编码方式的标记信息。
步骤S212,信息安全设备根据目标上行编码方式的标记信息和目标下行编码方式的标记信息,确定目标上行编码方式和目标下行编码方式。
至此步骤,信息安全设备已经获知了进行通信所需要采用的上行编码方式和下行编码方式。
步骤S213,信息安全设备采用目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将编码后的选择响应包发送至移动终端。
具体的,移动终端可以是笔记本电脑、手机、平板电脑、智能手表、智能眼镜等,以及将来可能会出现的音频接口的产品。
具体的,信息安全设备可以是智能密码钥匙或者智能密码钥匙的音频转接设备,智能密码钥匙可以是具有签名功能的USBkey、具有生成动态口令功能的OTP等,音频转接设备可以是音频转接头。
综上所述,本实施例提供了一种移动终端和信息安全设备进行通信的方法,移动终端和信息安全设备通过两次信息交互,即可以快速确定双方通信所要采用的编解码方法,避免了因编解码方式的不同而导致无法解码进而造成通信失败的现象,从而提高通信的效率。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。
应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。
此外,在本发明各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。
上述提到的存储介质可以是只读存储器,磁盘或光盘等。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在不脱离本发明的原理和宗旨的情况下在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。本发明的范围由所附权利要求及其等同限定。

Claims (15)

  1. 一种移动终端与信息安全设备通信的方法,其特征在于,该方法包括:
    移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息,M为正整数;
    所述移动终端发送所述M个编码后的检测数据包至信息安全设备;
    所述信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包,并从所述X1个检测数据包中获取X1种下行编码方式的标记信息,其中,X1为正整数,X1≤M;
    所述信息安全设备采用N种上行编码方式对响应数据包进行编码形成N个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和所述X1种下行编码方式的标记信息,N为正整数;
    所述信息安全设备发送所述N个编码后的响应数据包至所述移动终端;
    所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包,并从所述Y1个响应数据包获取Y1种上行编码方式的标记信息和所述X1种下行编码方式的标记信息,其中,Y1为正整数,Y1≤N;
    所述移动终端根据获取到的所述Y1种上行编码方式的标记信息和所述X1种下行编码方式的标记信息,确定所述Y1种上行编码方式和所述X1种下行编码方式;
    所述移动终端在所述Y1种上行编码方式和所述X1种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用所述目标下行编码方式对选择数据包进行编码形成编码后的选择数据包,所述编码后的选择数据包中包含所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
    所述移动终端将所述编码后的选择数据包发送至所述信息安全设备;
    所述信息安全设备对接收到的所述编码后的选择数据包进行解码得到所述选择数据包,并从所述选择数据包中获取所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
    所述信息安全设备根据所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息,确定所述目标上行编码方式和所述目标下行编码方式;
    所述信息安全设备采用所述目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将所述编码后的选择响应包发送至所述移动终端。
  2. 根据权利要求1所述的方法,其特征在于,所述信息安全设备对接收到的编码 后的检测数据包进行解码得到X1个检测数据包的步骤包括:
    所述信息安全设备对接收到的X1个编码后的检测数据包进行解码得到X1个检测数据包。
  3. 根据权利要求1所述的方法,其特征在于,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X1个检测数据包的步骤包括:
    所述信息安全设备接收X1+i个编码后的检测数据包;
    依次对X1+i个编码后的检测数据包进行解码,得到X1个检测数据包,其中,i为正整数,且X1+i≤M。
  4. 根据权利要求1所述的方法,其特征在于,所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包的步骤包括:
    所述移动终端对接收到的Y1个编码后的响应数据包进行解码得到Y1个响应数据包。
  5. 根据权利要求1所述的方法,其特征在于,所述移动终端对接收到的编码后的响应数据包进行解码得到Y1个响应数据包的步骤包括:
    所述移动终端接收Y1+j个编码后的响应数据包;
    依次对Y1+j个编码后的响应数据包进行解码,得到Y1个响应数据包,其中,j为正整数,且Y1+j≤N。
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述上行编码方式和所述下行编码方式为FSK编码方式。
  7. 根据权利要求1至5任一项所述的方法,其特征在于,在所述FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,其中,S1≠S2,T1≠T2,S1和S2均为正整数。
  8. 根据权利要求1至5任一项所述的方法,其特征在于,所述信息安全设备为智能密码钥匙或者智能密码钥匙的音频转接设备。
  9. 一种移动终端与信息安全设备通信的方法,其特征在于,该方法包括:
    移动终端采用M种互不相同的下行编码方式对检测数据包编码形成M个编码后的检测数据包,其中,每个编码后的检测数据包中包含各自所采用的下行编码方式的标记信息和所述移动终端能够解码的N种上行编码方式的标记信息,M和N均为正整数;
    所述移动终端发送所述M个编码后的检测数据包至信息安全设备;
    所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包,并从所述X个检测数据包中获取X种下行编码方式的标记信息和所述N种上行编码方式的标记信息,其中,X为正整数,X≤M;
    所述信息安全设备根据所述N种上行编码方式的标记信息,确定所述N种上行编码方式;
    所述信息安全设备在所述N种上行编码方式中,选择所述信息安全设备支持的Y种上行编码方式对响应数据包进行编码形成Y个编码后的响应数据包,其中,每个编码后的响应数据包中包含各自所采用的上行编码方式的标记信息和所述X种下行编码方式的标记信息,Y为正整数,Y≤N;
    所述信息安全设备发送所述Y个编码后的响应数据包至所述移动终端;
    所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包,并从所述Z个响应数据包获取Z种上行编码方式的标记信息和所述X种下行编码方式的标记信息,其中,Z为正整数,Z≤Y;
    所述移动终端根据获取到的所述Z种上行编码方式的标记信息和所述X种下行编码方式的标记信息,确定所述Z种上行编码方式和所述X种下行编码方式;
    所述移动终端在所述Z种上行编码方式和所述X种下行编码方式中,确定目标上行编码方式和目标下行编码方式,采用所述目标下行编码方式对选择数据包进行编码形成编码后的选择数据包,其中:所述编码后的选择数据包中包含所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
    所述移动终端将所述编码后的选择数据包发送至所述信息安全设备;
    所述信息安全设备对接收到的所述编码后的选择数据包进行解码得到所述选择数据包,并从所述选择数据包中获取所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息;
    所述信息安全设备根据所述目标上行编码方式的标记信息和所述目标下行编码方式的标记信息,确定所述目标上行编码方式和所述目标下行编码方式;
    所述信息安全设备采用所述目标上行编码方式对选择响应包进行编码形成编码后的选择响应包,并将所述编码后的选择响应包发送至所述移动终端。
  10. 根据权利要求9所述的方法,其特征在于,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包的步骤包括:
    所述信息安全设备对接收到的X个编码后的检测数据包进行解码得到X个检测数据包。
  11. 根据权利要求9所述的方法,其特征在于,所述信息安全设备对接收到的编码后的检测数据包进行解码得到X个检测数据包的步骤包括:
    所述信息安全设备接收X+i个编码后的检测数据包;
    依次对X+i个编码后的检测数据包进行解码,得到X个检测数据包,其中,i为正 整数,且X+i≤M。
  12. 根据权利要求9所述的方法,其特征在于,所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包的步骤包括:
    所述移动终端对接收到的Z个编码后的响应数据包进行解码得到Z个响应数据包。
  13. 根据权利要求9所述的方法,其特征在于,所述移动终端对接收到的编码后的响应数据包进行解码得到Z个响应数据包的步骤包括:
    所述移动终端接收Z+j个编码后的响应数据包;
    依次对Z+j个编码后的响应数据包进行解码,得到Z个响应数据包,其中,j为正整数,且Z+j≤Y。
  14. 根据权利要求9至13任一项所述的方法,其特征在于,所述上行编码方式和所述下行编码方式为FSK编码方式,其中,在所述FSK编码方式中,采用S1个采样点获得周期为T1的正弦波来表示逻辑1,采用S2个采样点获得周期为T2的正弦波来表示逻辑0,S1≠S2,T1≠T2,S1和S2均为正整数。
  15. 根据权利要求9至14任一项所述的方法,其特征在于,所述信息安全设备为智能密码钥匙或者智能密码钥匙的音频转接设备。
PCT/CN2015/070738 2014-01-27 2015-01-15 一种移动终端与信息安全设备通信的方法 WO2015109967A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410040948.X 2014-01-27
CN201410040340.7 2014-01-27
CN201410040948.XA CN103763066B (zh) 2014-01-27 2014-01-27 一种移动终端与信息安全设备通信的方法
CN201410040340.7A CN103763065A (zh) 2014-01-27 2014-01-27 一种移动终端与信息安全设备通信的方法

Publications (1)

Publication Number Publication Date
WO2015109967A1 true WO2015109967A1 (zh) 2015-07-30

Family

ID=53680802

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/070738 WO2015109967A1 (zh) 2014-01-27 2015-01-15 一种移动终端与信息安全设备通信的方法

Country Status (1)

Country Link
WO (1) WO2015109967A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929352A (zh) * 2021-01-28 2021-06-08 杭州迪普科技股份有限公司 一种IPSec VPN协商方法、装置及设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223201A (zh) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 一种编解码器能力协商方法及终端
CN102843350A (zh) * 2011-10-17 2012-12-26 杭州世导通讯有限公司 Ip通话时在媒体协商过程中编解码选取方法及系统
CN103763066A (zh) * 2014-01-27 2014-04-30 天地融科技股份有限公司 一种移动终端与信息安全设备通信的方法
CN103763065A (zh) * 2014-01-27 2014-04-30 天地融科技股份有限公司 一种移动终端与信息安全设备通信的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223201A (zh) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 一种编解码器能力协商方法及终端
CN102843350A (zh) * 2011-10-17 2012-12-26 杭州世导通讯有限公司 Ip通话时在媒体协商过程中编解码选取方法及系统
CN103763066A (zh) * 2014-01-27 2014-04-30 天地融科技股份有限公司 一种移动终端与信息安全设备通信的方法
CN103763065A (zh) * 2014-01-27 2014-04-30 天地融科技股份有限公司 一种移动终端与信息安全设备通信的方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929352A (zh) * 2021-01-28 2021-06-08 杭州迪普科技股份有限公司 一种IPSec VPN协商方法、装置及设备

Similar Documents

Publication Publication Date Title
US9521642B2 (en) Configuration of a new enrollee device for use in a communication network
US10719671B1 (en) Tag-to-tag communication using RFID readers
US10097948B2 (en) Point-and-connect bluetooth pairing
CN108886526B (zh) 用于激活连接对象的方法
WO2015120758A1 (zh) 一种数据通信方法、终端及信息安全设备
WO2012113234A1 (zh) 一种用户设备之间的数据传输方法及系统
WO2017050234A1 (zh) 数据传输方法及数据处理设备
CN103812536A (zh) 蓝牙设备连接方法和蓝牙设备
WO2017000915A1 (zh) 组播传输方法、信息提取方法及相应的终端和设备
WO2022227818A1 (zh) 用于配网的方法、装置和智能家居设备
US10536464B2 (en) Secure and smart login engine
WO2015120759A1 (zh) 音频信号的传输方法、移动终端和智能密钥设备
CN103812535A (zh) 蓝牙设备连接方法和蓝牙设备
CN102217209B (zh) 信息发送和获取的方法、装置和系统
CN114828076B (zh) 无线感知测量进程管理方法、装置、设备及存储介质
WO2016101548A1 (zh) 一种通讯录更新的方法和相应装置
WO2015109967A1 (zh) 一种移动终端与信息安全设备通信的方法
US9667434B2 (en) Information transmission system and method
KR102189511B1 (ko) 데이터 송신 방법과 장치, 데이터 수신 방법과 장치
EP2782400A1 (en) NFC controller architecture for simultaneous emulation of multiple NFC technologies in one NFC listen device
CN110049460A (zh) 服务器端的智能手表交友方法及设备
JP5276673B2 (ja) 不均一なメッセージ保護を提供するためのシステムおよび方法
CN102316508B (zh) 信息发送和获取的方法、装置和系统
US20110026544A1 (en) Signals communication apparatus
US10805819B2 (en) Wi-Fi measurement report enhancement techniques

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15740817

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15740817

Country of ref document: EP

Kind code of ref document: A1