Communication connection and communication method between mobile pos and base
A communication method and communication technology, applied in secure communication devices, free space transmission, digital transmission systems, etc., can solve the problems of low transmission rate and poor communication confidentiality, achieve high transmission rate, low hardware cost, and ensure data integrity. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Embodiment one, refer to figure 1 , this embodiment proposes a communication connection between the mobile POS and the base, including the mobile POS1 and the base 2, the base 2 adopts a clam-shaped recessed structure, and the mobile POS is embedded at 30° to fully ensure that the relevant detectors cannot be inserted into it probing. In order to prevent external interference, an optical filter 5 is installed on the transmission path of the mobile POS and the base, which can effectively improve the transmission accuracy. In order to ensure high-speed communication, this embodiment adopts two-way communication, and the base is equipped with independent transmitting tube 4 and receiving tube 3. At the same time, the same design is also implemented in the mobile POS. The receiving and transmitting are paired for use, which is easy to reuse modules and reduce costs. . Specifically, in the mobile POS, the receiving tube 3 and the transmitting tube 4 are installed on the mo...
Embodiment 2
[0061] Embodiment 2, this embodiment proposes a communication method between the mobile POS and the base,
[0062] The main control processor outputs the sensitive data to the serializer in a highly encrypted data stream, and the serializer directly drives the reflector after serializing the parallel data to form an optical path on-off signal. It is converted into a serial voltage signal, and converted into parallel data that can be processed by the main control processor through the deserializer, and performs decryption operation. The mobile POS of the present invention uses the internal data transmission private key of the encryption IC to encrypt the data with the 3DES algorithm, uses the SHA algorithm to calculate the data integrity, and the base uses the same data transmission private key to decrypt the data with the 3DES algorithm, and recalculates whether the data is complete.
[0063] The key key management and key storage work is inside the encryption IC, and all data...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 