Encryption and decryption method of transmission data based on audio interface

An audio interface and data transmission technology, applied in the field of communication, can solve problems such as account security risks

Inactive Publication Date: 2014-07-09
BEIJING WATCH DATA SYST
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the fixed-frequency carrier signal is transmitted between the mobile terminal and the card reader through the audio communication protocol, and the transmitted carrier signal with data information is easily intercepted by the outside world, thus causing a great security risk to the user's account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method of transmission data based on audio interface
  • Encryption and decryption method of transmission data based on audio interface
  • Encryption and decryption method of transmission data based on audio interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] figure 1 Shown is a schematic flow chart of a method for encrypting data transmitted based on an audio interface in the present invention, including:

[0060] Step 101: Put the data to be sent into the data field.

[0061] The data field specifically includes: the first byte, the second byte, and at least one data packet, and each data packet carries a node address (node ​​address, NAD), a protocol control byte (protocol control byte, PCB), a data packet Length (Data Len) and a data (Data); wherein, the data length (Data Len) is used to identify the number of bytes occupied by the data (Data) in each data packet.

[0062] The first byte and the second byte carry a length identifier, and the length identifier is used to determine the length of bytes in the data field to be read during decryption.

[0063] Step 102: Add an initial flag field in front of the data field, and the initial flag field carries multiple self-defined binary passwords.

[0064] The start flag fi...

Embodiment 2

[0081] image 3 Shown is a schematic flow chart of a method for decrypting data transmitted based on an audio interface in the present invention, which is a decryption method corresponding to the encryption method in Embodiment 1, specifically including:

[0082] Step 301: Receive an encrypted audio data frame.

[0083] Step 302: Perform audio decoding on the audio encrypted data frame to obtain an encrypted data frame.

[0084] Decapsulating the encrypted data frame to obtain data information, specifically:

[0085] Step 303: Read the frame header of the encrypted data frame.

[0086] When reading the high level for more than 16 consecutive cycles, it is used as the frame header of an encrypted data frame.

[0087] Step 304: Read the start flag field of the encrypted data frame, and the start flag field carries multiple self-defined binary passwords.

[0088] Read the binary password carried in the start flag field.

[0089] Step 305: Judging whether the binary password ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method of transmission data based on an audio interface. Data to be transmitted are packaged into an encrypted data frame in encryption which in particular includes putting the data to be transmitted into a data field, adding a start flag field carrying a multi-digit self-defined binary code before the data field, adding a frame header before the start flag field, adding a validation field behind the data field; and adding a frame end behind the validation field. In decryption, the frame header of the encrypted data frame is read out; the start flag field of the encrypted data frame is read out; whether the binary code carried in the start flag field is consistent with a reserved code is determined; if the result is consistent, the data field behind the start flag field is read out and data information is obtained; and if the result is not consistent, the scope of the data field cannot be accurately found out, and thus the data information in the data field cannot be read out to achieve secure transmission of carrier signals transmitted by the audio interface.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for encrypting and decrypting transmission data based on an audio interface. Background technique [0002] With the development of communication technology, mobile payment has become a commonly used payment method. Mobile payment is also called mobile payment (Mobile Payment), which means that mobile users establish a one-to-one correspondence relationship between mobile terminals and user bank card accounts, and use mobile terminals (usually mobile phones) to account for the goods or services they consume. A method of payment for services. Mobile payment is easy to operate, and payment operations can be performed anytime and anywhere. It is a major way of fast payment today. [0003] Mobile payment can be used to recharge and consume smart cards such as water cards, electricity cards, bus cards and bank cards. When using a mobile phone to pay a smart card for b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04W12/02
Inventor 黄刚王四军白婧孟翔
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products