Supercharge Your Innovation With Domain-Expert AI Agents!

Visible light communication system and method with security function

A visible light communication and visible light technology, which is applied in the visible light communication system and the field of communication, can solve problems such as easy leakage of user system information, network resource occupation, and active attacks

Pending Publication Date: 2019-01-11
SOUTH CHINA UNIV OF TECH +1
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Network resources will be occupied by unauthorized and illegal users;
[0004] 2. There are problems with encryption algorithms commonly used in WiFi security standards such as WEP, WPA / WPA2, WPA-PSK / WPA2-PSK, etc.;
[0005] 3. It is easy to be eavesdropped, and it is easy to leak important security information such as user system information and PSK;
[0006] 4. The authentication mechanism is simple and easy to be actively attacked by various methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visible light communication system and method with security function
  • Visible light communication system and method with security function
  • Visible light communication system and method with security function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 It is a schematic diagram of a visible light communication system with a security function provided in this embodiment. The visible light communication system includes a communication sending end and a communication receiving end, wherein the communication sending end includes a cascaded FPGA modulation module and is used as For the Micro-LED display screen, the communication receiving end includes a cascaded visible light detection module, an electrical signal amplification module, and an FPGA demodulation module.

[0040] The visible light communication system adopts physical shading and CDMA encryption technology to achieve the effect of secure communication.

[0041] Wherein, the FPGA modulation module is used to perform modulation and digital-to-analog conversion on the binary sequence to be transmitted, and then combine it with the PWM modulation signal to obtain the first electrical signal, and send the first electrical signal to the Micro-LED;

[0042]...

Embodiment 2

[0062] This embodiment discloses a visible light communication method with a security function, and the steps of the visible light communication method are as follows:

[0063] Step S1, the FPGA modulation module receives the data, selects binary on-off keying to modulate the data, then uses code division multiple access to encrypt the data, finally combines with the PWM modulation signal to obtain the first electrical signal, and converts the first Electrical signals are sent to Micro-LEDs that are used as display screens.

[0064] In step S2, the Micro-LED converts the first electrical signal into electro-optic to generate an optical signal and sends it, and also plays a role of display.

[0065] Step S3, the electrical signal amplifying module adjusts the gain of the second electrical signal according to the optical power of the optical signal to obtain a third electrical signal.

[0066] Step S4, the FPGA demodulation module uses the received pseudo-random code to decrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a visible light communication system and method with a security function. The latest generation display technology Micro-LED is subjected to dual modulation to achievecommunication and display integration. The bandwidth of the Micro-LED is several times of that of a common LED, and the transmission speed can reach above 100Mb / s. The visual light is employed as a signal transmission media, the communication signals of the system can be completely sealed indoors through a light shielding means and are difficult to be monitored by a conventional monitoring means outdoors. The communication signals of the system employ the CDMA technology, even through the signals are intercepted in a condition of secrecy of spreading codes, the transmission information cannotbe cracked, and the visual light is employed to transmit so that the visible light communication system and method can be used for an area with sensitive radio frequency. Therefore, the visible lightcommunication system and method with a security function are efficient and energy-saving, integrated in communication and display, high in transmission rate and good in security, and is suitable for the area with sensitive radio frequency and special occasions with high safety requirements.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a visible light communication system and a communication method with a security function. Background technique [0002] With the development of Internet technology, the demand for communication speed, capacity, and convenience has risen sharply. Short-distance wireless communication represented by WIFI and Bluetooth has been more and more widely used. However, there are many problems in traditional short-distance wireless communication. Currently unresolved security issues. For example, WIFI communication has the following security problems: [0003] 1. Network resources will be occupied by unauthorized and illegal users; [0004] 2. There are problems with encryption algorithms commonly used in WiFi security standards such as WEP, WPA / WPA2, WPA-PSK / WPA2-PSK, etc.; [0005] 3. It is easy to be eavesdropped, and it is easy to leak important security information such as u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B10/116H04B10/85
CPCH04B10/116H04B10/85
Inventor 文尚胜王杏林刘俊宏梁明珠姜昕宇陈浩伟
Owner SOUTH CHINA UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More