Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data transmission system and method based on audio signals

A technology of a data transmission system and a data transmission method, applied in the field of verification data transmission, can solve problems such as low user experience and cumbersomeness, and achieve the effect of ensuring security performance, enhancing user experience, and speeding up the process.

Active Publication Date: 2017-06-06
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Technically, there are three forms of dynamic tokens, time synchronization, event synchronization, and challenge / response. Among them, the challenge / response method is often used in online business. It enters the challenge code issued by the server on the website / response, and the dynamic token Enter the challenge code with the card, and generate a 6 / 8-digit random number through the built-in algorithm. The password is valid once. This technology is currently the most widely used, including scratch cards, SMS passwords, and dynamic tokens. There are also challenge / response forms. However, this method requires manual input of the challenge code, which is cumbersome and the user experience is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission system and method based on audio signals
  • A data transmission system and method based on audio signals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be specifically described below in conjunction with the accompanying drawings and embodiments. The drawings in the following description are only some embodiments of the invention. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.

[0047] Such as figure 1 As shown, the present invention provides an audio signal-based data transmission system, which mainly includes a client, a server, and a sound wave token.

[0048] Specifically, the client is used to form the verification data, and at the same time encapsulate the verification data to generate a corresponding data frame. In the present invention, when the network transaction information verification is to be performed in the client, the above-mentioned verification data is the user's transaction informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, in particular to a verification data transmission system and method for use in the traditional token data verification process, and provides an audio signal based data transmission system. The system comprises a client, a server and an acoustic token. The client is used for generating data to be transmitted and packaging the data into a corresponding data frame. The server is used for generating a first frame check value according to the data frame and converting the data frame and the first frame check value into an audio signal. The acoustic token is used for generating a second frame check valve from the data frame to check the first frame check valve so as to encrypt the data, to be transmitted to the acoustic token, by an encryption algorithm. In the whole process, security of the data to be transmitted is guaranteed, and even after the data is intercepted in the transmitting process, cracking the content of the data is very difficult.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for verifying data transmission in the process of traditional token verifying data. Background technique [0002] Dynamic password, that is, an unpredictable and difficult-to-crack random authentication string password is generated according to a specific algorithm, and each generated password can only be used once and is valid for a limited time interval, so it can be used to confirm the legality of the user's identity This method is widely used in banks, securities and third-party payment, and OA systems of large enterprises, etc. [0003] At present, dynamic tokens are widely used to generate dynamic passwords to realize the security of network transactions and other processes. Technically, there are three forms of dynamic tokens, time synchronization, event synchronization, and challenge / response. Among them, the challenge / response method is often used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L1/00
Inventor 谈剑锋尤磊盛学明钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products