[go: up one dir, main page]

CN108322902A - A kind of data transmission method and data transmission system - Google Patents

A kind of data transmission method and data transmission system Download PDF

Info

Publication number
CN108322902A
CN108322902A CN201810107632.6A CN201810107632A CN108322902A CN 108322902 A CN108322902 A CN 108322902A CN 201810107632 A CN201810107632 A CN 201810107632A CN 108322902 A CN108322902 A CN 108322902A
Authority
CN
China
Prior art keywords
read
write equipment
user terminal
data transmission
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810107632.6A
Other languages
Chinese (zh)
Inventor
文旭东
吉志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhe Line Technology Co Ltd
Original Assignee
Shenzhen Zhe Line Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhe Line Technology Co Ltd filed Critical Shenzhen Zhe Line Technology Co Ltd
Publication of CN108322902A publication Critical patent/CN108322902A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/349Rechargeable cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/77Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

A kind of data transmission method of offer of the embodiment of the present invention and data transmission system, wherein data transmission method include:User terminal scans the identity module of the read-write equipment, obtains the identity information of the read-write equipment;Whether the user terminal verifies the identity information consistent with the original identity information of the read-write equipment;If the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment;The user terminal carries out legitimacy inspection to the read-write equipment;If read-write equipment is legal, the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.The embodiment of the present invention scans the identity module of read-write equipment by user terminal and read-write equipment establishes communication connection, and carries out data transmission after being examined to read-write equipment legitimacy, to realize the unique and safe and reliable data transmission of connecting object.

Description

A kind of data transmission method and data transmission system
Technical field
The invention belongs to the communications field, more particularly to a kind of data transmission method and data transmission system.
Background technology
Bluetooth is the home control network communication protocol of a standard, the transponder chip based on devices with low cost, and transmission range is close, low Power consumption.The short-range data that can be achieved between fixed equipment, mobile device and building personal area network exchanges.Because of his low work( The features such as consuming, is free, the application field in life is very wide, very common, is the first choice of short-range communication, such as:Between mobile device Card reader etc. is supplemented with money using Bluetooth transmission file, Baffle Box of Bluetooth, bluetooth headset, personal bluetooth, the use environment of these bluetooths That all compares is simple, and majority is aspectant exchange or looks at specification, determines the equipment that equipment is safe, the company of active Connect, etc. the confirmation of another party.
There are following technical problems for the bluetooth equipment of market at present:
1. connection mode problem.Connection mode is that one end actively connects, and waits for the confirmation of the other end to match, this connection side The drawbacks of formula is:Both sides will have the equipment of screen just can be with.
2. matching method problem.Matching method is to automatically confirm that pairing, such case are:First, on security level it is low very It is more, it is not known which platform of the equipment of connection is easy to after connection by the virus infection of criminal's equipment;Secondly at present on the market Many bluetooth equipments cannot be matched directly, and system equipment cannot be matched directly, for the bluetooth equipment of the other end, such as Fruit does not have screen just can not click the operation of pairing again, and significant limitation is just received in the use of application.
3. connecting object problem.The prior art generally use bluetooth connection or NFC connections, existing bluetooth BLE using Broadcast mode realizes connection and is connected that the search between bluetooth could be connected using pairing check.Specifically, existing The bluetooth module built in equipment is supplemented in public transport with money, and the Bluetooth signal for needing searching handset end to send out simultaneously manually selects pairing, if N platforms Bluetooth and N platforms in mobile phone are supplemented with money in the case that the bluetooth in equipment nearby works at the same time, and can there are problems that following three:The One, as shown in Figure 1, when the bluetooth that the bluetooth supplemented with money in equipment when one corresponds in more mobile phones simultaneously scans for, easy to produce not Know that the Bluetooth Priority of which platform mobile phone is connected to the problem of supplementing equipment bluetooth with money;Second, as shown in Fig. 2, supplementing equipment with money when more In bluetooth correspond to the bluetooth in a mobile phone when simultaneously scanning for, the bluetooth for easy ting produce mobile phone does not know which, which is connected to, supplements with money The problem of equipment bluetooth;Third, as shown in figure 3, when the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones simultaneously When search, easy tos produce and do not know which platform mobile phone is connected to the problem of which supplements equipment bluetooth with money.
Therefore, there is an urgent need to find a kind of stability and uniqueness that can either ensure multiple equipment connection, and can safety Reliable data transfer mode.
Invention content
The purpose of the present invention is ensure the uniqueness and certainty of multiple equipment connection;The connection of bluetooth read-write equipment is provided Security level, it is ensured that the specified equipment safety of Bluetooth communication connection is reliable, and connection equipment is avoided security risk occur.Therefore this hair It is bright to provide a kind of data transmission method and data transmission system.
To solve the above problems, the first aspect of the present invention provides a kind of data transmission method, including:User terminal is swept The identity module for retouching the read-write equipment obtains the identity information of the read-write equipment;Described in the user terminal verification Whether identity information is consistent with the original identity information of the read-write equipment;If the two is consistent, the user terminal with it is described Read-write equipment establishes one-to-one communication connection;The user terminal carries out legitimacy inspection to the read-write equipment;If read-write Equipment is legal, and the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.
Further, before the identity module that user terminal scans the read-write equipment, further include:Read-write equipment It generates the original identity information of the read-write equipment and is sent to the identity module of the read-write equipment.
Further, the identity module includes the identification code of the identity information, and being set as can be by the use Family terminal is read.
Further, the identity information includes:The ID of the read-write equipment and MAC corresponding with the read-write equipment ID Address.
Further, the original identity information includes:The ID of the read-write equipment and the read-write equipment ID are corresponding Original MAC address.
Further, wherein the read-write equipment verifies the step of identity information and includes:The user terminal is by institute The ID for stating read-write equipment is sent to server;The server is index with the ID of the read-write equipment, in the server Original MAC address corresponding with the read-write equipment ID is searched in memory module;The MAC read described in the server judgement Whether address is consistent with the original MAC address;If the MAC Address read is consistent with the original MAC address, institute It states server and verifies consistent message to user terminal transmission identity information.
Further, wherein the step of user terminal establishes one-to-one communication connection with the read-write equipment is wrapped It includes:User terminal opens user terminal communication module, and the broadcast for sending search read-write equipment corresponding with the MAC Address is asked It asks;The user terminal searches read-write equipment corresponding with the MAC Address;The user terminal communication module and the reading Write device communication module automatic matching connects.
Further, wherein the user terminal to the read-write equipment carry out legitimacy inspection the step of include:It is described User terminal sends legitimacy to the read-write equipment and examines request;The read-write equipment generates random number, and will be described random Number and the MAC Address are sent to the user terminal;The random number and the MAC Address are sent to by the user terminal The server;The server encrypts the random number and the MAC Address, generates the first ciphertext;The server will First ciphertext is sent to the user terminal, and first ciphertext is sent to the read-write equipment by the user terminal; The read-write equipment encrypts the random number and the MAC Address, generates the second ciphertext;The read-write equipment is by described first Ciphertext and the second ciphertext are compared;If first ciphertext is consistent with second ciphertext, the read-write equipment releases data Transmission controls and carries out data transmission with the user terminal.
According to another aspect of the present invention, a kind of data transmission system is provided, which includes:User Terminal, the server and read-write equipment being connect with the user terminal.
Further, user terminal includes:Read module, the identity information for reading the read-write equipment;Identity is believed Checking request module is ceased, is separately connected with the read module and the server, is tested for sending identity information to server Card request, and after the server receives the identity information checking request identity information is sent to the server; User terminal communication module, the identity information of the read-write equipment for being read based on the read module and described and read-write Equipment establishes communication connection;Legitimacy examines request module, and request is examined for sending legitimacy to the read-write equipment.
Further, read-write equipment includes:Read-write equipment communication module, for realizing the read-write equipment and the user The communications and data of terminal transmits;Identity module, it includes the identity information of the read-write equipment, being set as can be by institute State user terminal reading;The identity information includes:The ID of the read-write equipment and MAC corresponding with the read-write equipment ID Location;Read-write equipment random number generation module, it is raw after examining request in the legitimacy for receiving the subscriber terminal equipment transmission It is sent to the user terminal and the read-write equipment encrypting module at random number and by the random number and the MAC Address; Read-write equipment encrypting module generates the second ciphertext for being encrypted to the random number and the MAC Address;Data Transmission Controlling Module, for first ciphertext and the second ciphertext to be compared;If consistent, release Data Transmission Controlling and with the user Terminal carries out data transmission.
Further, server includes:Server authentication module, the identity for being sent based on the user terminal Whether identity information described in Information Authentication is consistent with the original identity information of the read-write equipment;Server for encrypting module, is used for The random number and the MAC Address are encrypted, the first ciphertext is generated;Memory module, the identity information for storing user.
The identity module that the embodiment of the present invention scans read-write equipment by user terminal is communicated with read-write equipment foundation Connection, and carried out data transmission by legitimacy inspection, to realize the unique and safe and reliable data transmission of connecting object.
The above-mentioned technical proposal of the present invention has following beneficial technique effect:
1. the uniqueness and certainty of multiple equipment connection can be determined;
2. improving the security level that read-write equipment is connect with user terminal communication, it is ensured that communicate to connect specified equipment safety Reliably.
Description of the drawings
Fig. 1 is the structural schematic diagram that a bluetooth supplemented with money in equipment corresponds to the bluetooth in more mobile phones in the prior art;
Fig. 2 is the structural schematic diagram for the bluetooth that the more bluetooths supplemented with money in equipment correspond in a mobile phone;
Fig. 3 is the structural schematic diagram that the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones;
Fig. 4 is a kind of flow diagram of data transmission method provided by the invention;
Fig. 5 is the flow diagram that identity information step is verified in a kind of data transmission method provided by the invention;
Fig. 6 is that user terminal establishes communication connection step with read-write equipment in a kind of data transmission method provided by the invention Flow diagram;
Fig. 7 is that user terminal carries out legitimacy inspection step to read-write equipment in a kind of data transmission method provided by the invention Rapid flow diagram;
Fig. 8 is a kind of structural schematic diagram of data transmission system provided by the invention.
Specific implementation mode
In order to make the objectives, technical solutions and advantages of the present invention clearer, With reference to embodiment and join According to attached drawing, the present invention is described in more detail.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this hair Bright range.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid this is unnecessarily obscured The concept of invention.
Stored value card in the prior art supplements equipment with money, and generally using bluetooth connection or NFC, (near radio is logical with user terminal News technology) connection.Existing bluetooth BLE (bluetooth low energy consumption technologies) is realized connection using broadcast mode and is connected, blue Search between tooth could be connected using pairing check.It illustrates specifically, when user terminal is generally mobile phone, existing Stored Value Card supplements the bluetooth built in equipment with money, and the Bluetooth signal for needing searching handset end to send out simultaneously manually selects pairing, if in N platform mobile phones Bluetooth and N platforms supplement with money in the case that the bluetooth in equipment nearby works at the same time, can there are problems that following three.
Referring to Fig. 1, Fig. 1 is the knot that a bluetooth supplemented with money in equipment corresponds to the bluetooth in more mobile phones in the prior art Structure schematic diagram.
As shown in Figure 1, when the bluetooth that the bluetooth supplemented with money in equipment when one corresponds in more mobile phones simultaneously scans for, it is easy production Life does not know that the Bluetooth Priority of which platform mobile phone is connected to the problem of supplementing equipment bluetooth with money.
Referring to Fig. 2, Fig. 2 is the structural schematic diagram for the bluetooth that the more bluetooths supplemented with money in equipment correspond in a mobile phone.
As shown in Fig. 2, when the bluetooth in the more bluetooths supplemented with money in equipment one mobile phone of correspondence simultaneously scans for, it is easy production The bluetooth of green hand's machine, which is not known, is connected to the problem of which supplements equipment bluetooth with money.
Referring to Fig. 3, Fig. 3 is the structural schematic diagram that the more bluetooths supplemented with money in equipment correspond to the bluetooth in more mobile phones.
As shown in figure 3, when the bluetooth that the bluetooth supplemented with money in equipment when more corresponds in more mobile phones simultaneously scans for, it is easy production Life does not know which platform mobile phone is connected to the problem of which supplements equipment bluetooth with money.
To solve the above problems, the present invention provides a kind of data transmission method and data transmission system, the present invention is implemented Example scans the identity module of read-write equipment by user terminal and read-write equipment establishes communication connection, and is examined by legitimacy It tests and carries out data transmission, to realize the unique and safe and reliable data transmission of connecting object.
Referring to Fig. 4, Fig. 4 is a kind of flow diagram of data transmission method provided by the invention.
As shown in figure 4, the data transmission method includes:
S100, user terminal scan the identity module of the read-write equipment, obtain the identity letter of the read-write equipment Breath.
As a preferred embodiment, user terminal can be mobile phone, tablet computer etc..
Wherein, the identity module includes the identification code of the identity information, and being set as can be by user end It reads at end.
As a preferred embodiment, user terminal is mobile phone, identification code is Quick Response Code, and Quick Response Code is set to read-write On the shell of equipment.User uses mobile phone, opens in mobile phone and supplements the application programs such as APP or small routine with money, unlatching scans the two-dimensional code Function, the Quick Response Code of read-write equipment is scanned, the identity information of read-write equipment is obtained.
The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
Specifically, user terminal is to read-write equipment two-dimensional code scanning and after obtaining identity information, to the identity information It is parsed, is obtained after parsing:The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID.
As a preferred embodiment, the MAC Address is string number, indicated using hexadecimal number, totally six A byte (48).MAC Address is corresponded with ID number, each read-write equipment has unique ID number and corresponding MAC Address.
S101, the user terminal verify the identity information whether the original identity information one with the read-write equipment It causes.
Wherein, the original identity information includes:The ID of the read-write equipment and the read-write equipment ID are corresponding original MAC Address.
Wherein, before the identity module that user terminal scans the read-write equipment, further include:
S001, read-write equipment generate the original identity information of the read-write equipment and are sent to the identity mark of the read-write equipment Know module.
Specifically, in manufacture, read-write equipment can generate corresponding with ID original read-write equipment according to the ID of read-write equipment MAC Address, read-write equipment can be stored in read-write equipment ID is corresponding with original MAC address in the memory module of server, Original identity information as read-write equipment.
After storage, the original identity information is sent to the identity module of read-write equipment by read-write equipment again.
As a preferred embodiment, referring to Fig. 5, Fig. 5 is in a kind of data transmission method provided by the invention The flow diagram for verifying identity information step, in step S101 user terminal verify the identity information whether with the read-write The original identity information of equipment it is consistent the specific steps are:
The ID of the read-write equipment is sent to server by S200, the user terminal.
Specifically, can be user terminal here to read-write equipment two-dimensional code scanning and after obtaining identity information, to institute It states identity information to be parsed, be obtained after parsing:The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID are used The ID of read-write equipment is sent to server by family terminal again.
As another embodiment, user terminal, can to read-write equipment two-dimensional code scanning and after obtaining identity information Not parse, identity information is directly sent to server, server parses the identity information, obtained after parsing The ID of read-write equipment and MAC Address corresponding with the read-write equipment ID.
S201, the server are index with the ID of the read-write equipment, are searched in the memory module of the server Original MAC address corresponding with the read-write equipment ID.
Wherein, according to step S001 it is found that read-write equipment has original identity in server storage in advance in manufacture Information, original identity information include the ID of read-write equipment and corresponding original MAC address.In S201 steps, Ke Yitong ID is crossed to find.
S202, the server judge described in the MAC Address that reads and the original MAC address it is whether consistent.
Specifically, by the original MAC found in MAC Address and server that user terminal in step S100 is read Location is compared.
S203, if the MAC Address read is consistent with the original MAC address, the server is to the use Family terminal sends identity information and verifies consistent message.
Specifically, if the two is consistent, illustrate that the MAC Address that user terminal is read is true, server is sent out to user terminal Identity information is sent to verify consistent message.
Opposite, if the two is inconsistent, illustrate that the MAC Address that user terminal is read is false, server is whole to user End sends identity information and verifies inconsistent message, and subsequent user terminal and read-write equipment is prevented to establish communication connection.This says The identity module on bright very possible user terminal surface, i.e. Quick Response Code are that criminal oneself forges, user when manufacture The true Quick Response Code of terminal end surface probably " has been stolen the beams and changed the pillars " by criminal.
It is to parse Quick Response Code above, is to index in whois lookup original MAC address, and will read with read-write equipment ID To the embodiment that compares of MAC Address and original MAC address.It in another embodiment, can also by original MAC Location is written with Quick Response Code rule in application APP or the small routine of user terminal in advance, and read-write equipment is read in user terminal Quick Response Code and after parsing MAC Address, the APP or small routine of user terminal automatically extract original MAC address and compare with it, Which offers a saving the steps interacted with server.
S102, if the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment.
Wherein, referring to Fig. 6, Fig. 6 is user terminal and read-write equipment in a kind of data transmission method provided by the invention The flow diagram of communication connection step is established, S102 is specifically included:
S300, user terminal open user terminal communication module, send and search for read-write equipment corresponding with the MAC Address Broadcast request.
Specifically, user terminal communication module can be bluetooth module, when above-mentioned steps user terminal verifies the identity letter After breath is consistent with original identity information, the bluetooth module of user terminal is opened, and is in broadcast mode, and send search for it is described The broadcast request of the corresponding read-write equipment of MAC Address.
S301, the user terminal search read-write equipment corresponding with the MAC Address.
Specifically, if in user terminal bluetooth discovery range of signal, read-write corresponding with the MAC Address sets Standby and read-write equipment also opens bluetooth module, then user terminal can search.
S302, the user terminal communication module are connect with the read-write equipment communication module automatic matching.
Specifically, user terminal bluetooth module and read-write equipment bluetooth module establish one-to-one connection, but at this time two Person only establishes preliminary communication connection, can not carry out data transmission and data interaction, i.e., user terminal and read-write equipment it Between communication be actually locked out, need further legitimacy checking procedure to carry out communication lock releasing.
S103, the user terminal carry out legitimacy inspection to the read-write equipment.
Wherein, referring to Fig. 7, Fig. 7 be in a kind of data transmission method provided by the invention user terminal to read-write equipment The flow diagram of legitimacy checking procedure is carried out, S103 is specifically included:
S400, the user terminal send legitimacy to the read-write equipment and examine request.
Specifically, user terminal can send out request by application APP or small routine.
S401, the read-write equipment generates random number, and the random number and the MAC Address are sent to the user Terminal.
Wherein, MAC Address here is the legal MAC Address that had verified that in above-mentioned steps, is unique MAC Location is the MAC Address with original MAC address.
The random number and the MAC Address are sent to the server by S402, the user terminal.
S403, the server encrypt the random number and the MAC Address, generate the first ciphertext.
First ciphertext is sent to the user terminal by S404, the server, and the user terminal is by described One ciphertext is sent to the read-write equipment.
Wherein, user terminal plays the role of transmitting the first ciphertext here, and server and read-write equipment are together in series.
S405, the read-write equipment encrypt the random number and the MAC Address, generate the second ciphertext.
Wherein, for random number here with the random number in S401, MAC Address is unique, and the same.
First ciphertext and the second ciphertext are compared for S406, the read-write equipment.
As another embodiment, the second ciphertext can be sent to the user terminal by read-write equipment, and user terminal again will Second ciphertext is sent to server, and process is compared in the first ciphertext and the second ciphertext by server.
S407, if first ciphertext is consistent with second ciphertext, the read-write equipment releases Data Transmission Controlling simultaneously Carry out data transmission with the user terminal.
Algorithm and server constant in random number and MAC Address if read-write equipment is legal, that read-write equipment uses Algorithm it is consistent under the premise of, read-write equipment generate ciphertext should with server generate ciphertext it is consistent, i.e. the first ciphertext with Second ciphertext is consistent.
If read-write equipment is illegal, the inevitable algorithm with server for encrypting of the encrypted algorithm of illegal read-write equipment It is inconsistent, then the second ciphertext generated will not be consistent with the first ciphertext.
S104, if user terminal is legal, the read-write equipment releases Data Transmission Controlling and is carried out with the user terminal Data transmission.
At this point, read-write equipment all have passed through with MAC Address (or can be described as the Quick Response Code on read-write equipment surface) it is legal Property verification, user terminal can carry out normal data transmission with read-write equipment.
As an implementation, read-write equipment legitimacy, which is examined, can not also use above-mentioned cipher mode, but adopt With public, private key encrypting and decrypting, specifically:Read-write equipment generates the first random number, and read-write equipment uses the first random number of public key pair It is encrypted with MAC Address, server is decrypted using private key;Server generates second random number again, and server makes It is encrypted with the second random number of public key pair and MAC Address, read-write equipment is decrypted using private key.
Referring to Fig. 8, Fig. 8 is a kind of structural schematic diagram of data transmission system provided by the invention.
As shown in figure 8, the present invention also provides a kind of data transmission systems, including:User terminal 50 and the user are whole Hold the server 60 and read-write equipment 70 of connection.
Wherein, user terminal 50 includes:
Read module 501, the identity information for reading the read-write equipment.
Identity information checking request module 502, is separately connected with the read module and the server, is used for service Device sends identity information checking request, and is sent out to the server after the server receives the identity information checking request Send the identity information.
User terminal communication module 503, the identity information of the read-write equipment for being read based on the read module It is communicated to connect with described established with read-write equipment.
Legitimacy examines request module 504, and request is examined for sending legitimacy to the read-write equipment.
Wherein, read-write equipment 70 includes:
Read-write equipment communication module 701 passes for realizing the communications and data of the read-write equipment and the user terminal It is defeated.
Identity module 702, it includes the identity information of the read-write equipment, being set as can be by the user terminal It reads.The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
Read-write equipment random number generation module 703, for being examined in the legitimacy for receiving the subscriber terminal equipment transmission After request, generates random number and the random number and the MAC Address are sent to the user terminal and the read-write equipment Encrypting module.
Read-write equipment encrypting module 704 generates the second ciphertext for being encrypted to the random number and the MAC Address.
Data transmission control module 705, for first ciphertext and the second ciphertext to be compared;If consistent, release Data Transmission Controlling simultaneously carries out data transmission with the user terminal.
Wherein, the server 60 includes:
Server authentication module 601, the identity information for being sent based on the user terminal verify the identity Whether information is consistent with the original identity information of the read-write equipment.
Server for encrypting module 602 generates the first ciphertext for encrypting the random number and the MAC Address.
Memory module 603, the identity information for storing user.
The identity module that the embodiment of the present invention scans read-write equipment by user terminal is communicated with read-write equipment foundation Connection, and carrying out data transmission after being examined to read-write equipment legitimacy, to realize that connecting object is unique and safe and reliable Data transmission.
It should be understood that the above-mentioned specific implementation mode of the present invention is used only for exemplary illustration or explains the present invention's Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (11)

1. a kind of data transmission method, which is characterized in that including:
User terminal scans the identity module of the read-write equipment, obtains the identity information of the read-write equipment;
Whether the user terminal verifies the identity information consistent with the original identity information of the read-write equipment;
If the two is consistent, the user terminal establishes one-to-one communication connection with the read-write equipment;
The user terminal carries out legitimacy inspection to the read-write equipment;
If read-write equipment is legal, the read-write equipment releases Data Transmission Controlling and carries out data transmission with the user terminal.
2. according to claim 1, wherein before the identity module that user terminal scans the read-write equipment, Further include:
Read-write equipment generates the original identity information of the read-write equipment and is sent to the identity module of the read-write equipment.
3. data transmission method according to claim 2, wherein the identity module includes the identity information Identification code is set as to be read by the user terminal.
4. data transmission method according to claim 3, wherein the identity information includes:
The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID.
5. data transmission method according to claim 2, wherein the original identity information includes:
The ID of the read-write equipment and the corresponding original MAC address of the read-write equipment ID.
6. according to claim 1-5 any one of them data transmission methods, wherein the user terminal verifies the identity letter Whether the step consistent with the original identity information of the read-write equipment includes breath:
The ID of the read-write equipment is sent to server by the user terminal;
The server is index with the ID of the read-write equipment, is searched and the read-write in the memory module of the server The corresponding original MAC address of device id;
Whether the MAC Address and the original MAC address read described in the server judgement be consistent;
If the MAC Address read is consistent with the original MAC address, the server is sent to the user terminal Identity information verifies consistent message.
7. data transmission method according to claim 6, wherein the user terminal is established a pair of with the read-write equipment The step of one communication connection includes:
User terminal opens user terminal communication module, and the broadcast for sending search read-write equipment corresponding with the MAC Address is asked It asks;
The user terminal searches read-write equipment corresponding with the MAC Address;
The user terminal communication module is connect with the read-write equipment communication module automatic matching.
8. data transmission method according to claim 7, wherein it is legal that the user terminal carries out the read-write equipment Property examine the step of include:
The user terminal sends legitimacy to the read-write equipment and examines request;
The read-write equipment generates random number, and the random number and the MAC Address are sent to the user terminal;
The random number and the MAC Address are sent to the server by the user terminal;
The server encrypts the random number and the MAC Address, generates the first ciphertext;
First ciphertext is sent to the user terminal by the server, and the user terminal sends first ciphertext To the read-write equipment;
The read-write equipment encrypts the random number and the MAC Address, generates the second ciphertext;
First ciphertext and the second ciphertext are compared the read-write equipment;
If first ciphertext is consistent with second ciphertext, the read-write equipment release Data Transmission Controlling and with the user Terminal carries out data transmission.
9. a kind of data transmission system, which is characterized in that including:It user terminal (50), the service that is connect with the user terminal Device (60) and read-write equipment (70), wherein user terminal (50) includes:
Read module (501), the identity information for reading the read-write equipment;
Identity information checking request module (502), is separately connected with the read module and the server, is used for server Identity information checking request is sent, and is sent to the server after the server receives the identity information checking request The identity information;
User terminal communication module (503), the identity information of the read-write equipment for being read based on the read module with Described established with read-write equipment communicates to connect;
Legitimacy examines request module (504), and request is examined for sending legitimacy to the read-write equipment.
10. data transmission system according to claim 9, wherein the read-write equipment (70) includes:
Read-write equipment communication module (701) is transmitted for realizing the communications and data of the read-write equipment and the user terminal;
Identity module (702) is set as to be read by the user terminal it includes the identity information of the read-write equipment It takes;The identity information includes:The ID of the read-write equipment and MAC Address corresponding with the read-write equipment ID;
Read-write equipment random number generation module (703), for being asked in the legitimacy inspection for receiving the subscriber terminal equipment transmission After asking, generates random number and the random number and the MAC Address are sent to the user terminal and the read-write equipment adds Close module;
Read-write equipment encrypting module (704) generates the second ciphertext for being encrypted to the random number and the MAC Address;
Data transmission control module (705), for first ciphertext and the second ciphertext to be compared;If consistent, divisor is solved It controls according to transmission and carries out data transmission with the user terminal.
11. data transmission system according to claim 10, wherein the server (60) includes:
Server authentication module (601), the identity information for being sent based on the user terminal verify the identity letter Whether breath is consistent with the original identity information of the read-write equipment;
Server for encrypting module (602) generates the first ciphertext for encrypting the random number and the MAC Address;
Memory module (603), the identity information for storing user.
CN201810107632.6A 2018-01-17 2018-02-02 A kind of data transmission method and data transmission system Pending CN108322902A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810045493 2018-01-17
CN2018100454939 2018-01-17

Publications (1)

Publication Number Publication Date
CN108322902A true CN108322902A (en) 2018-07-24

Family

ID=62864175

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201810108168.2A Pending CN108305068A (en) 2018-01-17 2018-02-02 A kind of recharge method and system of stored value card
CN201810108165.9A Pending CN108322560A (en) 2018-01-17 2018-02-02 A kind of method and system of read-write equipment initialization
CN201810107662.7A Pending CN108320152A (en) 2018-01-17 2018-02-02 A kind of recharge method and system of stored value card
CN201810107632.6A Pending CN108322902A (en) 2018-01-17 2018-02-02 A kind of data transmission method and data transmission system

Family Applications Before (3)

Application Number Title Priority Date Filing Date
CN201810108168.2A Pending CN108305068A (en) 2018-01-17 2018-02-02 A kind of recharge method and system of stored value card
CN201810108165.9A Pending CN108322560A (en) 2018-01-17 2018-02-02 A kind of method and system of read-write equipment initialization
CN201810107662.7A Pending CN108320152A (en) 2018-01-17 2018-02-02 A kind of recharge method and system of stored value card

Country Status (1)

Country Link
CN (4) CN108305068A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109497627A (en) * 2018-12-26 2019-03-22 南昌与德软件技术有限公司 Electronic cigarette device, cigarette control blue-tooth device and electronic cigarette dating system
CN113907715A (en) * 2021-10-11 2022-01-11 创启科技(广州)有限公司 One-to-one communication method for body fat scale
CN115134330A (en) * 2021-03-24 2022-09-30 佳能株式会社 Image/information processing apparatus, system, method, server apparatus, and medium

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858359A (en) * 2018-08-22 2020-03-03 深圳市文鼎创数据科技有限公司 Transaction method based on Bluetooth device, server, electronic device and storage medium
CN110941968A (en) * 2018-09-25 2020-03-31 西安中兴新软件有限责任公司 Processing method, device and system for integrated circuit card
CN109754505B (en) * 2018-12-19 2022-07-12 广州羊城通有限公司 Unlocking method and device based on IC card
CN109741492B (en) * 2018-12-19 2021-01-05 广州羊城通有限公司 IC card unlocking-based duration method and device
CN109858295B (en) * 2019-01-15 2022-02-01 重庆乔松信息技术有限公司 Network payment method for directly reading and writing IC card by mobile phone
CN109816379B (en) * 2019-01-15 2022-02-22 重庆乔松信息技术有限公司 Network payment system for directly reading and writing IC card by mobile phone
CN110177001A (en) * 2019-05-21 2019-08-27 广东联合电子服务股份有限公司 A kind of NFC circle deposit method, system and storage medium based on soft certificate
CN112131893B (en) * 2019-06-24 2025-03-25 高新兴科技集团股份有限公司 A method for switching card reading and writing modes by automatic identification
CN111063098B (en) * 2019-11-26 2023-03-28 广州羊城通有限公司 Method and system for realizing Bluetooth recharging
CN110910131A (en) * 2019-11-26 2020-03-24 广州羊城通有限公司 Interactive control method and system for Bluetooth recharging
CN111080282B (en) * 2019-11-26 2023-11-28 广州羊城通有限公司 Bluetooth recharging reminding method and mobile terminal
CN110992049B (en) * 2019-12-02 2021-02-26 北京市燃气集团有限责任公司 Intelligent card writing method and device
CN111954196B (en) * 2020-08-18 2021-02-26 龙杰科技(深圳)有限公司 Smart card recharging method and system based on Bluetooth, terminal equipment and storage medium
CN112001195B (en) * 2020-08-19 2023-07-28 珠海优特电力科技股份有限公司 Card reading and writing method, card reading and writing system, electronic device and storage medium
CN114757673A (en) * 2022-05-10 2022-07-15 中国工商银行股份有限公司 Electronic wallet loading method, device, loading chip card and loading system
JP7402294B1 (en) * 2022-11-02 2023-12-20 楽天グループ株式会社 Information processing system, information processing method, and information processing program

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040176032A1 (en) * 2002-03-26 2004-09-09 Sakari Kotola Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality
CN102983890A (en) * 2012-11-14 2013-03-20 北京小米科技有限责任公司 Method and device of pairing connection of equipment
CN103701613A (en) * 2014-01-06 2014-04-02 立德高科(北京)数码科技有限责任公司 Bidirectional authentication method between authentication terminal and host and device
CN104320412A (en) * 2014-11-11 2015-01-28 福建联迪商用设备有限公司 Bluetooth POS and safe Bluetooth POS connecting method and device
CN104363250A (en) * 2014-12-03 2015-02-18 北京深思数盾科技有限公司 Method and system for equipment connection
CN104378145A (en) * 2014-11-27 2015-02-25 北京深思数盾科技有限公司 Pairing method and system of Bluetooth device
CN106327189A (en) * 2016-09-20 2017-01-11 四川海力智能科技股份有限公司 IC card topping-up system
CN107454558A (en) * 2017-08-02 2017-12-08 神州融安科技(北京)有限公司 A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4752677A (en) * 1985-09-25 1988-06-21 Casio Computer Co., Ltd. Customer service system for use in IC card system
US6567377B1 (en) * 1999-03-18 2003-05-20 3Com Corporation High performance load balancing of outbound internet protocol traffic over multiple network interface cards
CN101098221A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Network layer safety authentication method in wireless cellular network
CN101217728B (en) * 2007-12-29 2013-01-30 北京握奇数据系统有限公司 A blank card for wireless card writing, wireless card writing server and wireless card writing method
CN103581356B (en) * 2012-08-10 2017-07-28 海尔集团公司 A kind of MAC Address distribution method
CN104079686B (en) * 2014-07-17 2017-11-21 福州瑞芯微电子股份有限公司 The method to set up and distribution method of terminal device MAC Address
CN104182875A (en) * 2014-08-22 2014-12-03 齐亚斌 Payment method and payment system
CN105184563A (en) * 2015-09-17 2015-12-23 广东欧珀移动通信有限公司 A security processing method and device for an NFC chip
CN105469129A (en) * 2015-12-23 2016-04-06 深圳市智水小荷技术有限公司 Water purchasing method and system based on IC card water meter
CN105554908A (en) * 2015-12-31 2016-05-04 福建联迪商用设备有限公司 Method, master device, slave device and system for achieving code scanning automatic bluetooth connection
CN105897721B (en) * 2016-05-03 2019-01-25 广州广电运通金融电子股份有限公司 Verify the method and device of fiscard user identity reliability
CN106027691B (en) * 2016-05-13 2019-06-14 深圳市同泰怡信息技术有限公司 A kind of inspection modification method of MAC Address of Network Card
CN106469370A (en) * 2016-09-19 2017-03-01 天地融科技股份有限公司 A kind of method of commerce, system and electronic signature equipment
CN106657033A (en) * 2016-12-02 2017-05-10 美的智慧家居科技有限公司 Method for verifying validity of device and generating authorization information, and communication device
CN206258975U (en) * 2016-12-15 2017-06-16 郑州安然测控技术股份有限公司 A kind of utilization bluetooth communication realizes the card reader/writer that IC-card is supplemented with money
CN106790756B (en) * 2016-12-29 2020-04-24 国网智能科技股份有限公司 Automatic generation method and system for MAC address of power distribution terminal
CN107038824A (en) * 2017-04-21 2017-08-11 深圳国微技术有限公司 A kind of POS terminal processing method and POS
CN107241412B (en) * 2017-06-09 2020-11-27 台州市吉吉知识产权运营有限公司 Method and system for storing MAC address of wireless access equipment
CN107453873B (en) * 2017-07-21 2020-10-20 金邦达有限公司 Intelligent IC card data verification method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040176032A1 (en) * 2002-03-26 2004-09-09 Sakari Kotola Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality
CN102983890A (en) * 2012-11-14 2013-03-20 北京小米科技有限责任公司 Method and device of pairing connection of equipment
CN103701613A (en) * 2014-01-06 2014-04-02 立德高科(北京)数码科技有限责任公司 Bidirectional authentication method between authentication terminal and host and device
CN104320412A (en) * 2014-11-11 2015-01-28 福建联迪商用设备有限公司 Bluetooth POS and safe Bluetooth POS connecting method and device
CN104378145A (en) * 2014-11-27 2015-02-25 北京深思数盾科技有限公司 Pairing method and system of Bluetooth device
CN104363250A (en) * 2014-12-03 2015-02-18 北京深思数盾科技有限公司 Method and system for equipment connection
CN106327189A (en) * 2016-09-20 2017-01-11 四川海力智能科技股份有限公司 IC card topping-up system
CN107454558A (en) * 2017-08-02 2017-12-08 神州融安科技(北京)有限公司 A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109497627A (en) * 2018-12-26 2019-03-22 南昌与德软件技术有限公司 Electronic cigarette device, cigarette control blue-tooth device and electronic cigarette dating system
CN115134330A (en) * 2021-03-24 2022-09-30 佳能株式会社 Image/information processing apparatus, system, method, server apparatus, and medium
CN113907715A (en) * 2021-10-11 2022-01-11 创启科技(广州)有限公司 One-to-one communication method for body fat scale

Also Published As

Publication number Publication date
CN108322560A (en) 2018-07-24
CN108305068A (en) 2018-07-20
CN108320152A (en) 2018-07-24

Similar Documents

Publication Publication Date Title
CN108322902A (en) A kind of data transmission method and data transmission system
US7403794B2 (en) Client terminal having a temporary connection establishing unit
CN101208981B (en) Security parameters for negotiation protecting management frames in wireless networks
US7721325B2 (en) Method and apparatus for managing communication security in wireless network
WO2017041675A1 (en) Method for sending and acquiring wifi networking information and corresponding apparatus
US20050266798A1 (en) Linking security association to entries in a contact directory of a wireless device
CN108259164B (en) Identity authentication method and equipment of Internet of things equipment
CN107005927A (en) Cut-in method, equipment and the system of user equipment (UE)
US20130070744A1 (en) Apparatus and method for providing security of a network connection
JP4405309B2 (en) Access point, wireless LAN connection method, medium recording wireless LAN connection program, and wireless LAN system
KR20160143333A (en) Method for Double Certification by using Double Channel
CN100571460C (en) The method and apparatus of secure roaming
CN103312677B (en) Terminal, server and the method for building up of communication connection
JP2004207965A (en) High speed authentication system and method for wireless lan
CN104796891A (en) Security certification system by means of service provider's network and corresponding method
US20040255121A1 (en) Method and communication terminal device for secure establishment of a communication connection
EP1398934B1 (en) Secure access to a subscription module
US9648495B2 (en) Method and device for transmitting a verification request to an identification module
WO2010124569A1 (en) Method and system for user access control
CN103763697A (en) Wireless access point multi-secret key support system and method
CN106792482A (en) A kind of method and system for being used between two devices set up near-field communication
CN107454557B (en) Router connection method and system
KR20120089388A (en) Method for Requesting Caller Authentication of Voice Network using Data Network, Caller Device and Program
JP3851781B2 (en) Wireless communication apparatus, wireless communication system, and connection authentication method
CN109743716A (en) An NFC-based wireless local area network authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180724