CN108573159A - A kind of data interactive method and system - Google Patents
A kind of data interactive method and system Download PDFInfo
- Publication number
- CN108573159A CN108573159A CN201710137024.5A CN201710137024A CN108573159A CN 108573159 A CN108573159 A CN 108573159A CN 201710137024 A CN201710137024 A CN 201710137024A CN 108573159 A CN108573159 A CN 108573159A
- Authority
- CN
- China
- Prior art keywords
- terminal
- data
- communication interface
- wired communication
- level signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 230000002452 interceptive effect Effects 0.000 title abstract 2
- 238000004891 communication Methods 0.000 claims abstract description 285
- 230000008859 change Effects 0.000 claims abstract description 73
- 230000005540 biological transmission Effects 0.000 claims description 114
- 230000002457 bidirectional effect Effects 0.000 claims description 30
- 230000008569 process Effects 0.000 claims description 28
- 230000003993 interaction Effects 0.000 claims description 13
- 238000012545 processing Methods 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of data interactive method and system, this method includes:First terminal sends the level signal of the first data by the first wired communication interface;First terminal detects the level change of level signal at the first wired communication interface during sending the level signal of the first data, when the level change of level signal meets timing trigger condition at the first wired communication interface, starts timing;Second terminal detects the level change of level signal at the second wired communication interface during receiving the level signal of the first data, when the level change of level signal meets timing trigger condition at the second wired communication interface, starts timing;When the numerical value that second terminal timing obtains reaches default value, second terminal sends the level signal of the second data by the second wired communication interface;When the numerical value that first terminal timing obtains reaches default value, first terminal allows to begin through the level signal that the first wired communication interface receives the second data.
Description
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a data interaction method and system.
Background
When the electronic signature device communicates with a host device (for example, a PC device, a mobile device, etc.), the host device sends data to be processed to the electronic signature device, the electronic signature device receives the data to be processed and performs corresponding processing on the data to be processed to obtain processed data, the electronic signature device sends the processed data to the host device, and according to an existing communication protocol, if the host device receives the processed data within a specified waiting time, the received data is considered as normal data, and subsequent operations (for example, transaction operations, authorization operations, etc.) are continued.
However, if data communication is performed between the electronic signature device and the host device, the third party illegal device hijacks data transmitted by the electronic signature device and performs illegal operations such as forwarding or tampering to obtain illegal data, and as long as the illegal data can be returned to the host device within the waiting time specified by the existing communication protocol, the host device still considers the received illegal data as normal data and continues to use the illegal data to perform subsequent operations, which affects the security of the subsequent operations. The prior art can not ensure the security of data transmission, and can not effectively identify illegal data after the data remote hijacking occurs.
Disclosure of Invention
The present invention is directed to solving the above problems.
The invention mainly aims to provide a data interaction method.
Another object of the present invention is to provide a data interaction system.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
one aspect of the present invention provides a data interaction method, including: the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface; the first terminal detects the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starts timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition; the second terminal receives a level signal of the first data through the second wired communication interface; the second terminal detects the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starts timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition; when the value obtained by the timing of the second terminal reaches a preset value, the second terminal generates a level signal of second data, and sends the level signal of the second data through the second wired communication interface, wherein the second data is obtained by processing the first data by the second terminal; and when the value obtained by the first terminal in timing reaches the preset value, the first terminal allows the first terminal to start receiving the level signal of the second data through the first wired communication interface.
Wherein, the first terminal detects the level change of the level signal at the first wired communication interface, and when the level change of the level signal at the first wired communication interface meets a timing trigger condition, the first terminal starts timing, including: the first terminal detects whether the level characteristics of the level signals at the first wired communication interface accord with the characteristics of a data start bit, if so, the first terminal continues to detect the characteristic values of subsequent level signals at the first wired communication interface, and if the characteristic values indicate that the first wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity; the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including: and the second terminal detects whether the level characteristics of the level signals at the second wired communication interface accord with the characteristics of the data start bit, if so, the characteristic values of subsequent level signals at the second wired communication interface are continuously detected, and if the characteristic values indicate that the second wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity.
Wherein, the first terminal detects the level change of the level signal at the first wired communication interface, and when the level change of the level signal at the first wired communication interface meets a timing trigger condition, the first terminal starts timing, including: the first terminal detects a characteristic value of a level signal at the first wired communication interface, if the characteristic value indicates that the first wired communication interface is in a data transmission state, whether the level characteristic of a subsequent level signal at the first wired communication interface accords with a data ending bit characteristic or not is continuously detected, and if the characteristic value accords with the data ending bit characteristic, timing is started, wherein the data ending bit characteristic comprises the level characteristic of a specific level signal or the level characteristic which changes in a specific regularity; the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including: and the second terminal detects the characteristic value of the level signal at the second wired communication interface, if the characteristic value indicates that the second wired communication interface is in a data transmission state, the second terminal continuously detects whether the level characteristic of a subsequent level signal at the second wired communication interface accords with a data ending bit characteristic, and if so, timing is started, wherein the data ending bit characteristic comprises the level characteristic of a specific level signal or the level characteristic which changes in a specific regularity.
Wherein, the preset value is preset duration, when the value obtained by the second terminal timing reaches the preset value, the method includes: when the time length obtained by timing of the second terminal reaches the preset time length; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: when the time length obtained by the first terminal in timing reaches the preset time length; or, the preset value is a preset counting value, and the starting timing includes: starting counting; when the value obtained by timing at the second terminal reaches a preset value, the method comprises the following steps: when the value counted by the second terminal reaches a preset counting value; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: and when the numerical value obtained by counting by the first terminal reaches a preset counting numerical value.
Before the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface, the method further comprises the following steps: the first terminal and the second terminal carry out bidirectional identity authentication, and after the bidirectional identity authentication is passed, the first terminal and the second terminal negotiate to obtain a transmission key; the second terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; or the first terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the second terminal; the second terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; or the first terminal and the second terminal perform bidirectional identity authentication; after the bidirectional identity authentication is passed, the second terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the first terminal, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and stores the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the second terminal, and sends the encrypted preset numerical value to the second terminal; and the second terminal decrypts the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and stores the preset numerical value.
Before the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface, the method further comprises the following steps: the first terminal generates the preset numerical value; the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value are obtained; after the second terminal receives the level signal of the first data through the second wired communication interface, the method further includes: and the second terminal acquires the preset value and the tamper-proof check value from the first data, verifies the tamper-proof check value, and stores the preset value after the verification is passed.
In another aspect, the present invention provides a data interaction system, including: the first terminal is used for generating a level signal of first data and sending the level signal of the first data through the first wired communication interface; detecting the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starting timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition; the second terminal is used for receiving a level signal of the first data through the second wired communication interface; detecting the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starting timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition; the second terminal is further used for generating a level signal of second data when the value obtained by the second terminal through timing reaches a preset value, and sending the level signal of the second data through the second wired communication interface, wherein the second data is obtained after the second terminal processes the first data; the first terminal is further configured to allow the first wired communication interface to start receiving the level signal of the second data when the value obtained by the first terminal through timing reaches the preset value.
The first terminal is specifically configured to detect whether a level feature of a level signal at the first wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the first wired communication interface, and start timing when the feature value indicates that the first wired communication interface is in a data transmission state, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity; the second terminal is specifically configured to detect whether a level feature of a level signal at the second wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the second wired communication interface, and if the feature value indicates that the second wired communication interface is in a data transmission state, start timing, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity.
The first terminal is specifically configured to detect a characteristic value of a level signal at the first wired communication interface, and if the characteristic value indicates that the first wired communication interface is in a data transmission state, continue to detect whether a level characteristic of a subsequent level signal at the first wired communication interface conforms to a data end bit characteristic, and if so, start timing, where the data end bit characteristic includes a level characteristic of a specific level signal or a level characteristic that changes in a specific regularity; the second terminal is specifically configured to detect a characteristic value of a level signal at the second wired communication interface, continue to detect whether a level characteristic of a subsequent level signal at the second wired communication interface meets a data end bit characteristic if the characteristic value indicates that the second wired communication interface is in a data transmission state, and start timing if the characteristic value meets the data end bit characteristic, where the data end bit characteristic includes a level characteristic of a specific level signal or a level characteristic that changes in a specific regularity.
The second terminal is specifically configured to generate a level signal of second data when a time length obtained by timing of the second terminal reaches a preset time length; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a time length obtained by timing of the first terminal reaches a preset time length; or, the preset value is a preset counting value, and the first terminal is specifically configured to start counting; the second terminal is specifically used for starting counting; the second terminal is specifically configured to generate a level signal of second data when a value counted by the second terminal reaches a preset counting value; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a value counted by the first terminal reaches a preset count value.
The first terminal is further configured to perform bidirectional identity authentication with the second terminal, and after the bidirectional identity authentication is passed, the first terminal is further configured to negotiate with the second terminal to obtain a transmission key; the second terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the first terminal; the first terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or the first terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the second terminal; the second terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or, the first terminal is further configured to perform bidirectional identity authentication with the second terminal; after the bidirectional identity authentication is passed, the second terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the first terminal, and send the encrypted preset value to the first terminal; the first terminal is also used for decrypting the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and storing the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the second terminal, and send the encrypted preset value to the second terminal; and the second terminal is also used for decrypting the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and storing the preset numerical value.
The first terminal is further configured to generate the preset numerical value; the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value are obtained; the second terminal is further configured to obtain the preset value and the tamper-proof check value from the first data after receiving a level signal of the first data through the second wired communication interface, check the tamper-proof check value, and store the preset value after the check is passed.
According to the technical scheme provided by the invention, under the condition of normal communication, when the timing of the second terminal reaches the preset value, after the second data is sent to the first terminal, because the transmission delay under the condition of wired connection is very small and can be ignored, the first terminal can also receive the second data when the timing reaches the preset value. If remote hijacking of third-party illegal equipment exists between the first terminal and the second terminal, and a certain time is needed after the third-party illegal equipment conducts illegal operations such as forwarding or tampering on the hijacked data, the second terminal always sends second data when the second data reaches a preset value according to timing, the second data is subjected to remote hijacking of the third-party illegal equipment and then sends the processed illegal data to the first terminal, at the moment, the illegal data received by the first terminal and returned by the first terminal inevitably exceed the preset value reached by timing, the first terminal only allows the second data to be received when the timing reaches the preset value, and the data which reaches overtime cannot be received, so that the illegal data can be effectively identified after the remote hijacking of the data occurs, and the safety of data transmission between the first terminal and the second terminal is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a data interaction method provided in embodiment 1;
fig. 2 is a schematic structural diagram of a data interaction system provided in embodiment 2.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or quantity or location.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
In this embodiment, a first wired communication interface is disposed on a first terminal, and a second wired communication interface is disposed on a second terminal, where the first terminal includes but is not limited to a PC, a mobile terminal, a palm computer, a card reader supporting a contact type IC card interface, and the second terminal includes but is not limited to an electronic signature device, such as a usb key, a contact type IC card, and the like; the first wired communication interface and the second wired communication interface may be both USB interfaces, contact IC card interfaces, and the like.
The first wired communication interface of the first terminal is in wired connection with the second wired communication interface of the second terminal, so that wired communication can be conveniently carried out between the first terminal and the second terminal.
Example 1
Fig. 1 is a flowchart of a data interaction method according to embodiment 1 of the present invention. Referring to fig. 1, the method at least comprises:
101. the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface;
in this embodiment, after the first terminal and the second terminal establish the wired communication connection, the first terminal and the second terminal send data through the high and low level signals. When the first terminal sends the first data to the second terminal, the first terminal generates a level signal of the first data and sends the level signal through the first wired communication interface, at the moment, the level change of the first wired communication interface caused by sending the level signal of the first data also causes the second wired communication interface to generate corresponding level change, and the second terminal can receive the first data by detecting the level change generated by the second wired communication interface.
102. The first terminal detects the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starts timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition;
in this embodiment, in the process of sending the level signal of the first data by the first terminal, the level change of the level signal at the first wired communication interface is detected. The level change of the level signal may be, for example, a change in a level value of the level signal, and different level values may represent different meanings during data transmission, for example, a data transmission state may be determined by a characteristic value of the level signal, a data start bit and a data end bit may be represented by a level characteristic value conforming to a certain preset format, and the like.
In this embodiment, the number of pins for data transmission in the first wired communication interface may be multiple, for example, when the first wired communication interface is a USB interface, the number of pins for data transmission is two, and the two pins are a D + pin and a D-pin respectively. It is understood that the level change of the level signal at the first wired communication interface specifically refers to: for example, taking a USB interface as an example, the level change of the level signal at the USB interface specifically refers to: a level change of the level signal at the D + pin and a level change of the level signal at the D-pin. Other interface forms are similar and are not described in detail herein.
In this embodiment, if the level change of the level signal at the first wired communication interface meets the timing trigger condition, the start of timing is triggered, so that when the timing reaches a preset value, the first terminal allows the start of receiving data through the first wired communication interface.
The implementation manner of the first terminal timing includes but not limited to the following: timing by adopting a clock, wherein the numerical value obtained by timing is duration; or a counter is adopted for timing, and the numerical value obtained by timing is a counting numerical value.
103. The second terminal receives a level signal of the first data through the second wired communication interface;
in this embodiment, the first wired communication interface is connected to the second wired communication interface by a wired connection, and when the first terminal sends the level signal of the first data through the first wired communication interface, correspondingly, the second terminal may receive the level signal of the first data through the second wired communication interface. It will be appreciated that the level change of the level signal at the first wired communication interface is identical to the level change of the level signal at the second wired communication interface.
104. The second terminal detects the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starts timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition;
in this embodiment, in the process of receiving the level signal of the first data, the second terminal detects a level change of the level signal at the second wired communication interface. The level change of the level signal may be, for example, a change of a level value of the level signal, and different level values may represent different meanings during data transmission, for example, a data transmission state may be represented by a differential characteristic value of the level signal, a data start bit and a data end bit may be represented by a level characteristic value conforming to a certain preset format, and the like.
In this embodiment, the number of the pins for data transmission in the second wired communication interface may be multiple, for example, when the second wired communication interface is a USB interface, the number of the pins for data transmission is two, and the two pins are a D + pin and a D-pin respectively. It is understood that the level change of the level signal at the second wired communication interface specifically refers to: for example, taking a USB interface as an example, the level change of the level signal at the USB interface specifically refers to: a level change of the level signal at the D + pin and a level change of the level signal at the D-pin. Other interface forms are similar and are not described in detail herein.
In this embodiment, if the level change of the level signal at the second wired communication interface satisfies the timing trigger condition, the start of timing is triggered.
The implementation manner of the second terminal timing includes but not limited to the following: timing by adopting a clock, wherein the numerical value obtained by timing is duration; or a counter is adopted for timing, and the numerical value obtained by timing is a counting numerical value.
In order to ensure the synchronicity of the timing of the first terminal and the timing of the second terminal, the timing trigger condition adopted by the first terminal is consistent with the timing trigger condition adopted by the second terminal, so that the timing operation of the first terminal and the timing operation of the second terminal can be synchronously performed.
In this embodiment, the second terminal timing and the first terminal timing may adopt the same timing mode or different timing modes. And is not limited herein.
105. When the value obtained by the timing of the second terminal reaches a preset value, the second terminal generates a level signal of second data, and sends the level signal of the second data through the second wired communication interface, wherein the second data is obtained by processing the first data by the second terminal;
in this embodiment, after receiving the first data, the second terminal processes the first data to obtain second data. For example, the first data is data to be signed, and the second data obtained by processing the first data by the second terminal may specifically be signed data obtained by signing the data to be signed.
In this embodiment, the second terminal does not immediately return the second data to the first terminal after obtaining the second data, but sends the second data to the first terminal through the second wired communication interface when the second terminal reaches the preset value, so as to receive the second data when the second terminal also reaches the preset value.
106. And when the value obtained by the first terminal in timing reaches the preset value, the first terminal allows the first terminal to start receiving the level signal of the second data through the first wired communication interface.
In this embodiment, the preset value reached by the timing of the first terminal is consistent with the preset value reached by the timing of the second terminal, the first terminal allows the data to be received when the timing reaches the preset value, and the first terminal does not allow the data to be received when the timing does not reach or exceeds the preset value.
In this embodiment, in the case of normal communication, after the second terminal sends the second data to the first terminal when the timing reaches the preset value, the first terminal may also receive the second data when the timing reaches the preset value because the transmission delay is very small and can be ignored under the wired connection condition. If remote hijacking of third-party illegal equipment exists between the first terminal and the second terminal, and a certain time is needed after the third-party illegal equipment conducts illegal operations such as forwarding or tampering on the hijacked data, the second terminal always sends second data when the second data reaches a preset value according to timing, the second data is subjected to remote hijacking of the third-party illegal equipment and then sends the processed illegal data to the first terminal, at the moment, the illegal data received by the first terminal and returned by the first terminal inevitably exceed the preset value reached by timing, the first terminal only allows the second data to be received when the timing reaches the preset value, and the data which reaches overtime cannot be received, so that the illegal data can be effectively identified after the remote hijacking of the data occurs, and the safety of data transmission between the first terminal and the second terminal is guaranteed.
As an optional implementation manner of this embodiment, when the timing manner is clock timing, the preset value is preset duration, and when the value obtained by timing at the second terminal reaches the preset value, the method includes: when the time length obtained by timing of the second terminal reaches the preset time length; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: when the time length obtained by the first terminal in timing reaches the preset time length;
when the timing mode is that the counter counts time, the preset numerical value is a preset counting numerical value, and the starting of timing comprises the following steps: starting counting; when the value obtained by timing at the second terminal reaches a preset value, the method comprises the following steps: when the value counted by the second terminal reaches a preset counting value; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: and when the numerical value obtained by counting by the first terminal reaches a preset counting numerical value.
As an optional implementation manner of this embodiment, the preset value may be pre-stored in the secure storage area in the first terminal and the secure storage area in the second terminal in advance, and when the first terminal and the second terminal need to be used, the preset value is obtained from the respective secure storage areas.
As an alternative to this embodiment, the preset value may also be obtained as follows: the first terminal and the second terminal perform negotiation with each other to obtain a preset value, the negotiation to obtain the preset value may be performed before the first terminal generates a level signal of the first data and sends the level signal of the first data through the first wired communication interface, and the negotiation to obtain the preset value may be performed in the following manner: the first terminal and the second terminal carry out bidirectional identity authentication, and after the bidirectional identity authentication is passed, the first terminal and the second terminal negotiate to obtain a transmission key; the second terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; or the first terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the second terminal; the second terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; alternatively, the following manner may be adopted to implement the negotiation to obtain the preset value: the first terminal and the second terminal carry out bidirectional identity authentication; after the bidirectional identity authentication is passed, the second terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the first terminal, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and stores the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the second terminal, and sends the encrypted preset numerical value to the second terminal; and the second terminal decrypts the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and stores the preset numerical value.
As an alternative to this embodiment, the preset value may also be obtained as follows: the preset value is generated by the first terminal and carried in the first data, and the second terminal obtains the preset value from the first data while receiving the first data. The implementation of obtaining the preset value in this embodiment is as follows: before the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface, the method further comprises the following steps: the first terminal generates the preset numerical value; the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value (for example, the tamper-proof check value is calculated by an MAC check algorithm); after the second terminal receives the level signal of the first data through the second wired communication interface, the method further includes: the second terminal obtains the preset value and the tamper-proof check value from the first data, and checks the tamper-proof check value (for example, the obtained preset value is calculated by the same MAC check algorithm to obtain a check value, the calculated check value is compared with the tamper-proof check value obtained from the first data, if the comparison is successful, the check is considered to be successful, otherwise, the check is considered not to be successful), and after the check is successful, the preset value is stored.
As an optional implementation manner of this embodiment, the above timing may be triggered at the beginning of data transmission, and the specific implementation of triggering timing is as follows:
the first terminal detects the level change of the level signal at the first wired communication interface, and starts timing when the level change of the level signal at the first wired communication interface meets a timing trigger condition, including:
the first terminal detects whether the level characteristics of the level signals at the first wired communication interface accord with the characteristics of a data start bit, if so, the first terminal continues to detect the characteristic values of subsequent level signals at the first wired communication interface, and if the characteristic values indicate that the first wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity;
the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including:
and the second terminal detects whether the level characteristics of the level signals at the second wired communication interface accord with the characteristics of the data start bit, if so, the characteristic values of subsequent level signals at the second wired communication interface are continuously detected, and if the characteristic values indicate that the second wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity.
Taking the first wired communication interface and the second wired communication interface as USB interfaces as an example, the following implementation processes of the first terminal and the second terminal performing communication through the USB interfaces are briefly introduced: when data is not transmitted, the USB interface is in an idle state, when data needs to be transmitted, level signals at D + and D-in the USB interface are switched from the idle state to a K state (this process is also referred to as a start of packet (SOP) state), and then the USB interface starts to transmit data by using a differential signal, where a first bit of the data is usually a first bit of a SYNC field SYNC, and when the first bit of the SYNC field SYNC is detected, it can be determined that the USB interface is in a data transmission state. When the data transmission is finished, the last bit of the data is usually the check bit CRC, and after the check bit CRC is transmitted, the D + and D-level signals in the USB interface enter the SE0 state, and then the state is changed from the SE0 state to the J state (this process is also referred to as an end of packet (EOP) state). The characteristics of the level signals at D + and D-positions in the USB interface in the SOP state and the EOP state may specifically refer to the relevant specifications in the USB protocol, and are not described herein again.
The implementation scheme based on the USB interface triggering timing is as follows: when the first terminal detects that the level characteristics at the D + pin and the D-pin enter the K state from the idle state (that is, detects that the data packet starts SOP), it indicates that a level signal conforming to the characteristics of the data start bit is detected, and continues to detect the characteristic values of the level signals at the subsequent D + pin and D-pin, and if the characteristic values are differential signals and indicate the first bit of the information packet, for example, the first bit of the SYNC field SYNC, it indicates that the first wired communication interface is in the data transmission state, and at this time, timing starts.
Similarly, when the second terminal detects that the level characteristics at the D + pin and the D-pin enter the K state from the idle state (that is, detects the start SOP of the data packet), it indicates that a level signal conforming to the characteristics of the start bit of the data is detected, continues to detect the characteristic values of the level signals at the subsequent D + pin and D-pin, and if the characteristic value is a differential signal and indicates the first bit of the information packet, for example, the first bit of the SYNC field SYNC, it indicates that the first wired communication interface is in the data transmission state, and starts to time.
Of course, the first wired communication interface and the second wired communication interface may also be contact IC card communication interfaces, and the following implementation process of the first terminal and the second terminal performing communication through a contact IC is briefly described: the input/output I/O interface of the contact type IC card adopts a character mode to transmit data. Before data transmission, the I/O interface is in a high state. Each character consists of 10 consecutive bits: a start bit of 1 low state, 8 data bits constituting a data byte, and 1 parity bit. And after the character transmission is finished, the I/O interface enters the protection time, and the I/O interface is in a high level state in the protection time.
The contact type IC card communication interface based triggering timing is realized as follows: when the first terminal detects that the first wired communication interface (i.e. the I/O interface) changes from a high level to a low level, indicating that a level signal conforming to the characteristics of a data start bit is detected, and subsequently when the first data bit in the level signals representing 8 data bits is continuously detected, indicating that the first wired communication interface (i.e. the I/O interface) is in a data transmission state, starting timing;
similarly, when the second terminal detects that the second wired communication interface (i.e., the I/O interface) changes from the high level to the low level, it indicates that the level signal conforming to the characteristics of the data start bit is detected, and then when the first data bit in the level signal representing 8 data bits is continuously detected, it indicates that the second wired communication interface (i.e., the I/O interface) is in the data transmission state, and then timing is started.
Of course, the first wired communication interface and the second wired communication interface may also adopt the following third communication mode: two data pins for transmitting data are arranged in the first wired communication interface and the second wired communication interface. Data transmission is performed through the differential signal formed by the two data pins, a start bit is usually set when data transmission is started, the start bit of data is usually represented by parallel signals, for example, the two data pins are both high levels, or the two data pins are both low levels, the start bit is formed by specifically adopting the combination of the high levels, the low levels, the level values and the levels, and can be set differently according to different application scenes, and the description is omitted here. After data starts to be transmitted, the transmitted data is represented by differential signals, for example, one of the two data pins is at a high level, the other is at a low level, the transmitted data is different, the differential signals formed by the two data pins are also different, and the differential signals can be specifically set according to different application scenarios, which is not described herein again. When data transmission is finished, an end bit is set, and the end bit of data is usually represented by a parallel signal, for example, both the two data pins are at a high level, or both the two data pins are at a low level, and the end bit formed by specifically adopting a combination of a high level or a low level, the level value and the level value can be set differently according to different application scenarios, which is not described herein again. It is understood that the specific level value of the parallel signal used by the start bit of the data is different from the specific level value of the parallel signal used by the end bit of the data for distinguishing.
The implementation of triggering timing based on the third communication mode is as follows: taking the example that the first wired communication interface is provided with a first pin and a second pin for transmitting data, and the second wired communication interface is provided with a third pin and a fourth pin for transmitting data;
the first terminal detects a parallel signal representing a start bit in the level signal at the first pin and the level signal at the second pin, and then detects a differential signal for data transmission in the level signal at the first pin and the level signal at the second pin, which indicates that the level signal conforming to the characteristics of the start bit is detected first and then data transmission is detected, and then timing is started;
similarly, the second terminal detects a parallel signal representing a start bit in the level signal at the third pin and the level signal at the fourth pin, and subsequently detects a differential signal for data transmission in the level signal at the third pin and the level signal at the fourth pin, which indicates that the level signal conforming to the characteristics of the start bit is detected first and then data transmission is detected, and then starts timing;
as an optional implementation manner of this embodiment, the above timing may be triggered at the end of data transmission, and the specific implementation of triggering timing is as follows:
the first terminal detects the level change of the level signal at the first wired communication interface, and starts timing when the level change of the level signal at the first wired communication interface meets a timing trigger condition, including:
the first terminal detects a characteristic value of a level signal at the first wired communication interface, if the characteristic value indicates that the first wired communication interface is in a data transmission state, whether the level characteristic of a subsequent level signal at the first wired communication interface conforms to a data ending bit characteristic is continuously detected, and if the level characteristic conforms to the data ending bit characteristic, timing is started;
the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including:
and the second terminal detects the characteristic value of the level signal at the second wired communication interface, if the characteristic value indicates that the second wired communication interface is in a data transmission state, the second terminal continuously detects whether the level characteristic of the subsequent level signal at the second wired communication interface conforms to the data end bit characteristic, and if so, timing is started.
The implementation scheme based on the USB interface triggering timing is as follows: the first terminal detects the characteristic values of the level signals at the D + pin and the D-pin, if the characteristic values of the level signals are differential signals and represent transmitted data, such as check bits CRC, which may indicate that the first wired communication interface is in a data transmission state, and continuously detects whether the level characteristics at the D + pin and the D-pin conform to the end bit characteristics, if the level characteristics are detected to be shifted from the SE0 state to the J state, that is, the end EOP of the data packet is detected, it indicates that data is transmitted and then the level signals conforming to the end bit characteristics of the data are detected, so that timing is started.
Similarly, the second terminal detects the characteristic values of the level signals at the D + pin and the D-pin, if the characteristic values of the level signals are differential signals and indicate transmitted data, such as check bits CRC, which may indicate that the first wired communication interface is in a data transmission state, and continues to detect whether the level characteristics at the D + pin and the D-pin conform to the end bit characteristics, if it is detected that the level characteristics are shifted from the SE0 state to the J state, that is, it is detected that the EOP of the data packet ends, it indicates that it is detected that data is transmitted first and then the level signals conforming to the end bit characteristics of the data are detected, so that timing is started.
The contact type IC card communication interface based triggering timing is realized as follows: when the first terminal detects the check bit at the first wired communication interface (i.e. the I/O interface), it indicates that the first wired communication interface (i.e. the I/O interface) is in a data transmission state, and subsequently continues to detect whether the first wired communication interface (i.e. the I/O interface) is at a high level (i.e. enters a protection time), if so, it indicates that a level signal conforming to the characteristics of the data end bit is detected, timing is started;
similarly, when the second terminal detects the check bit at the second wired communication interface (i.e., I/O interface), it indicates that the first wired communication interface (i.e., I/O interface) is in the data transmission state, and then continues to detect whether the second wired communication interface (i.e., I/O interface) is at a high level (i.e., enters the protection time), and if so, it indicates that a level signal conforming to the characteristics of the data end bit is detected, then timing is started.
The implementation of triggering timing based on the third communication method is as follows (the implementation of communication based on the third communication method is described above and is not described here again): taking the example that the first wired communication interface is provided with a first pin and a second pin for transmitting data, and the second wired communication interface is provided with a third pin and a fourth pin for transmitting data;
the first terminal detects a differential signal used for transmitting data in the level signal at the first pin and the level signal at the second pin, and subsequently detects a parallel signal representing an end bit in the level signal at the first pin and the level signal at the second pin, which indicates that data transmission is detected firstly, and then detects a level signal conforming to the characteristics of the end bit, and then starts timing;
similarly, the second terminal detects a differential signal for transmitting data in the level signal at the third pin and the level signal at the fourth pin, and subsequently detects a parallel signal representing an end bit in the level signal at the third pin and the level signal at the fourth pin, which indicates that data transmission is detected first, and then detects a level signal conforming to the characteristics of the end bit, and then starts timing;
in this embodiment, as can be seen from the above description, the data start bit characteristic is a level characteristic of a specific level signal, for example, a level signal corresponding to the data start bit characteristic in the contact IC card communication interface is represented by a low level, a level signal corresponding to the data end bit characteristic is represented by a high level (the protection time is a period of high level), or a level characteristic that the data start bit characteristic changes in a specific regularity, for example, a level signal corresponding to the data start bit characteristic in the USB interface is represented by SOP (the level signal changes from an idle state to a K state), and a level signal corresponding to the data end bit characteristic is represented by EOP (the level signal changes from an SE0 state to a J state). Of course, without limitation, different types of level characteristics may be used to represent the data start bit characteristics according to different communication interfaces, for example, a combination of multiple high levels and low levels, or a single high level, or a single low level, etc., may also be used, and is not limited herein.
Example 2
This embodiment provides a data interaction system, as shown in fig. 2, where a first wired communication interface of a first terminal is connected to a second wired communication interface of a second terminal, the system including: a first terminal 10 and a second terminal 20;
wherein, the first terminal 10 is configured to generate a level signal of first data and transmit the level signal of the first data through the first wired communication interface; detecting the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starting timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition;
the second terminal 20 is configured to receive a level signal of the first data through the second wired communication interface; detecting the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starting timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition;
the second terminal 20 is further configured to generate a level signal of second data when a value obtained by the second terminal through timing reaches a preset value, and send the level signal of the second data through the second wired communication interface, where the second data is obtained after the second terminal processes the first data;
the first terminal 10 is further configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when the value obtained by the first terminal timing reaches the preset value.
In this embodiment, the preset value reached by the timing of the first terminal is consistent with the preset value reached by the timing of the second terminal, the first terminal allows the data to be received when the timing reaches the preset value, and the first terminal does not allow the data to be received when the timing does not reach or exceeds the preset value.
In this embodiment, in the case of normal communication, after the second terminal sends the second data to the first terminal when the timing reaches the preset value, the first terminal may also receive the second data when the timing reaches the preset value because the transmission delay is very small and can be ignored under the wired connection condition. If remote hijacking of third-party illegal equipment exists between the first terminal and the second terminal, and a certain time is needed after the third-party illegal equipment conducts illegal operations such as forwarding or tampering on the hijacked data, the second terminal always sends second data when the second data reaches a preset value according to timing, the second data is subjected to remote hijacking of the third-party illegal equipment and then sends the processed illegal data to the first terminal, at the moment, the illegal data received by the first terminal and returned by the first terminal inevitably exceed the preset value reached by timing, the first terminal only allows the second data to be received when the timing reaches the preset value, and the data which reaches overtime cannot be received, so that the illegal data can be effectively identified after the remote hijacking of the data occurs, and the safety of data transmission between the first terminal and the second terminal is guaranteed.
As an optional implementation manner of this embodiment, when the timing manner is clock timing, the preset value is a preset duration, and the second terminal is specifically configured to generate a level signal of second data when a duration obtained by the second terminal through timing reaches the preset duration; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a time length obtained by timing of the first terminal reaches a preset time length;
or when the timing mode is that a counter counts, the preset numerical value is a preset counting numerical value, and the first terminal is specifically used for starting counting; the second terminal is specifically used for starting counting; the second terminal is specifically configured to generate a level signal of second data when a value counted by the second terminal reaches a preset counting value; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a value counted by the first terminal reaches a preset count value.
As an optional implementation manner of this embodiment, the preset value may be pre-stored in the secure storage area in the first terminal and the secure storage area in the second terminal in advance, and when the first terminal and the second terminal need to be used, the preset value is obtained from the respective secure storage areas.
As an alternative to this embodiment, the preset value may also be obtained as follows: the first terminal and the second terminal perform negotiation with each other to obtain a preset value, the negotiation to obtain the preset value may be performed before the first terminal generates a level signal of the first data and sends the level signal of the first data through the first wired communication interface, and the negotiation to obtain the preset value may be performed in the following manner:
the first terminal is further configured to perform bidirectional identity authentication with the second terminal, and after the bidirectional identity authentication is passed, the first terminal is further configured to negotiate with the second terminal to obtain a transmission key; the second terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the first terminal; the first terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or the first terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the second terminal; the second terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or,
the first terminal is also used for performing bidirectional identity authentication with the second terminal; after the bidirectional identity authentication is passed, the second terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the first terminal, and send the encrypted preset value to the first terminal; the first terminal is also used for decrypting the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and storing the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the second terminal, and send the encrypted preset value to the second terminal; and the second terminal is also used for decrypting the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and storing the preset numerical value.
As an alternative to this embodiment, the preset value may also be obtained as follows: the preset value is generated by the first terminal and carried in the first data, and the second terminal obtains the preset value from the first data while receiving the first data. The implementation of obtaining the preset value in this embodiment is as follows: the first terminal is further used for generating the preset numerical value; the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value (for example, the tamper-proof check value is calculated by an MAC check algorithm); the second terminal is further configured to, after receiving a level signal of first data through a second wired communication interface, obtain the preset value and the tamper-proof check value from the first data, and check the tamper-proof check value (for example, the obtained preset value is calculated through the same MAC check algorithm to obtain a check value, and the calculated check value is compared with the tamper-proof check value obtained from the first data, if the check value is compared with the tamper-proof check value, the check is considered to be passed, otherwise, the check is considered to be not passed), and after the check is passed, store the preset value.
As an optional implementation manner of this embodiment, the above timing may be triggered at the beginning of data transmission, and the specific implementation of triggering timing is as follows:
the first terminal is specifically configured to detect whether a level feature of a level signal at the first wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the first wired communication interface, and start timing when the feature value indicates that the first wired communication interface is in a data transmission state, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity;
the second terminal is specifically configured to detect whether a level feature of a level signal at the second wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the second wired communication interface, and if the feature value indicates that the second wired communication interface is in a data transmission state, start timing, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity.
Taking the first wired communication interface and the second wired communication interface as USB interfaces as an example, the following implementation processes of the first terminal and the second terminal performing communication through the USB interfaces are briefly introduced: when data is not transmitted, the USB interface is in an idle state, when data needs to be transmitted, level signals at D + and D-in the USB interface are switched from the idle state to a K state (this process is also referred to as a start of packet (SOP) state), and then the USB interface starts to transmit data by using a differential signal, where a first bit of the data is usually a first bit of a SYNC field SYNC, and when the first bit of the SYNC field SYNC is detected, it can be determined that the USB interface is in a data transmission state. When the data transmission is finished, the last bit of the data is usually the check bit CRC, and after the check bit CRC is transmitted, the D + and D-level signals in the USB interface enter the SE0 state, and then the state is changed from the SE0 state to the J state (this process is also referred to as an end of packet (EOP) state). The characteristics of the level signals at D + and D-positions in the USB interface in the SOP state and the EOP state may specifically refer to the relevant specifications in the USB protocol, and are not described herein again.
The implementation scheme based on the USB interface triggering timing is as follows: when the first terminal detects that the level characteristics at the D + pin and the D-pin enter the K state from the idle state (that is, detects that the data packet starts SOP), it indicates that a level signal conforming to the characteristics of the data start bit is detected, and continues to detect the characteristic values of the level signals at the subsequent D + pin and D-pin, and if the characteristic values are differential signals and indicate the first bit of the information packet, for example, the first bit of the SYNC field SYNC, it indicates that the first wired communication interface is in the data transmission state, and at this time, timing starts.
Similarly, when the second terminal detects that the level characteristics at the D + pin and the D-pin enter the K state from the idle state (that is, detects the start SOP of the data packet), it indicates that a level signal conforming to the characteristics of the start bit of the data is detected, continues to detect the characteristic values of the level signals at the subsequent D + pin and D-pin, and if the characteristic value is a differential signal and indicates the first bit of the information packet, for example, the first bit of the SYNC field SYNC, it indicates that the first wired communication interface is in the data transmission state, and starts to time.
Of course, the first wired communication interface and the second wired communication interface may also be contact IC card communication interfaces, and the following implementation process of the first terminal and the second terminal performing communication through a contact IC is briefly described: the input/output I/O interface of the contact type IC card adopts a character mode to transmit data. Before data transmission, the I/O interface is in a high state. Each character consists of 10 consecutive bits: a start bit of 1 low state, 8 data bits constituting a data byte, and 1 parity bit. And after the character transmission is finished, the I/O interface enters the protection time, and the I/O interface is in a high level state in the protection time.
The contact type IC card communication interface based triggering timing is realized as follows: when the first terminal detects that the first wired communication interface (i.e. the I/O interface) changes from high level to low level, indicating that a level signal conforming to the characteristics of a data start bit is detected, and subsequently when the first data bit in the level signals representing 8 data bits is continuously detected, indicating that the first wired communication interface (i.e. the I/O interface) is in a data transmission state, starting timing;
similarly, when the second terminal detects that the second wired communication interface (i.e., I/O interface) changes from high level to low level, it indicates that the level signal conforming to the characteristics of the data start bit is detected, and then continues to detect the first data bit in the level signals representing 8 data bits, it indicates that the second wired communication interface (i.e., I/O interface) is in a data transmission state, and then starts to time.
The implementation of triggering timing based on the third communication method is as follows (for the implementation of communication based on the third communication method, see the relevant description in embodiment 1, and will not be described here again): taking the example that the first wired communication interface is provided with a first pin and a second pin for transmitting data, and the second wired communication interface is provided with a third pin and a fourth pin for transmitting data;
the first terminal detects a parallel signal representing a start bit in the level signal at the first pin and the level signal at the second pin, and then detects a differential signal for data transmission in the level signal at the first pin and the level signal at the second pin, which indicates that the level signal conforming to the characteristics of the start bit is detected first and then data transmission is detected, and then timing is started;
similarly, the second terminal detects a parallel signal representing a start bit in the level signal at the third pin and the level signal at the fourth pin, and subsequently detects a differential signal for data transmission in the level signal at the third pin and the level signal at the fourth pin, which indicates that the level signal conforming to the characteristics of the start bit is detected first, and then the data transmission is detected, and then starts timing.
As an optional implementation manner of this embodiment, the above timing may be triggered at the end of data transmission, and the specific implementation of triggering timing is as follows:
the first terminal is specifically configured to detect a characteristic value of a level signal at the first wired communication interface, continue to detect whether a level characteristic of a subsequent level signal at the first wired communication interface conforms to a data end bit characteristic if the characteristic value indicates that the first wired communication interface is in a data transmission state, and start timing if the level characteristic conforms to the data end bit characteristic;
the second terminal is specifically configured to detect a characteristic value of a level signal at the second wired communication interface, continue to detect whether a level characteristic of a subsequent level signal at the second wired communication interface conforms to a data end bit characteristic if the characteristic value indicates that the second wired communication interface is in a data transmission state, and start timing if the level characteristic conforms to the data end bit characteristic.
The implementation scheme based on the USB interface triggering timing is as follows: the first terminal detects the characteristic values of the level signals at the D + pin and the D-pin, if the characteristic values of the level signals are differential signals and represent transmitted data, such as check bits CRC, which may indicate that the first wired communication interface is in a data transmission state, and continuously detects whether the level characteristics at the D + pin and the D-pin conform to the end bit characteristics, if the level characteristics are detected to be shifted from the SE0 state to the J state, that is, the end EOP of the data packet is detected, it indicates that data is transmitted and then the level signals conforming to the end bit characteristics of the data are detected, so that timing is started.
Similarly, the second terminal detects the characteristic values of the level signals at the D + pin and the D-pin, if the characteristic values of the level signals are differential signals and indicate transmitted data, such as check bits CRC, which may indicate that the first wired communication interface is in a data transmission state, and continues to detect whether the level characteristics at the D + pin and the D-pin conform to the end bit characteristics, if it is detected that the level characteristics are shifted from the SE0 state to the J state, that is, it is detected that the EOP of the data packet ends, it indicates that it is detected that data is transmitted first and then the level signals conforming to the end bit characteristics of the data are detected, so that timing is started.
The contact type IC card communication interface based triggering timing is realized as follows: when the first terminal detects the check bit at the first wired communication interface (i.e. the I/O interface), it indicates that the first wired communication interface (i.e. the I/O interface) is in a data transmission state, and subsequently continues to detect whether the first wired communication interface (i.e. the I/O interface) is at a high level (i.e. enters a protection time), if so, it indicates that a level signal conforming to the characteristics of the data end bit is detected, timing is started;
similarly, when the second terminal detects the check bit at the second wired communication interface (i.e., I/O interface), it indicates that the first wired communication interface (i.e., I/O interface) is in the data transmission state, and then continues to detect whether the second wired communication interface (i.e., I/O interface) is at a high level (i.e., enters the protection time), and if so, it indicates that a level signal conforming to the characteristics of the data end bit is detected, then timing is started.
The implementation of triggering timing based on the third communication method is as follows (the implementation of communication based on the third communication method is described above and is not described here again): taking the example that the first wired communication interface is provided with a first pin and a second pin for transmitting data, and the second wired communication interface is provided with a third pin and a fourth pin for transmitting data;
the first terminal is specifically configured to detect a differential signal used for data transmission in the level signal at the first pin and the level signal at the second pin, and subsequently detect a parallel signal indicating an end bit in the level signal at the first pin and the level signal at the second pin, which indicates that data transmission is detected first, and then start timing when a level signal conforming to the characteristics of the end bit is detected;
similarly, the second terminal is specifically configured to detect a differential signal used for data transmission in the level signal at the third pin and the level signal at the fourth pin, and subsequently detect a parallel signal indicating an end bit in the level signal at the third pin and the level signal at the fourth pin, which indicates that data transmission is detected first and then a level signal conforming to the end bit characteristic is detected, and then start timing;
in this embodiment, as can be seen from the above description, the data start bit characteristic is a level characteristic of a specific level signal, for example, a level signal corresponding to the data start bit characteristic in the contact IC card communication interface is represented by a low level, a level signal corresponding to the data end bit characteristic is represented by a high level (the protection time is a period of high level), or a level characteristic that the data start bit characteristic changes in a specific regularity, for example, a level signal corresponding to the data start bit characteristic in the USB interface is represented by SOP (the level signal changes from an idle state to a K state), and a level signal corresponding to the data end bit characteristic is represented by EOP (the level signal changes from an SE0 state to a J state). Of course, without limitation, different types of level characteristics may be used to represent the data start bit characteristics according to different communication interfaces, for example, a combination of multiple high levels and low levels, or a single high level, or a single low level, etc., may also be used, and is not limited herein.
It should be noted that the system provided in this embodiment may implement the data interaction method provided in embodiment 1, the related function implementation of the first terminal may also refer to the description related to the first terminal side in embodiment 1, and the related function implementation of the second terminal may also refer to the description related to the second terminal side in embodiment 1, which is not described herein again.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (12)
1. A data interaction method, wherein a first wired communication interface of a first terminal is connected with a second wired communication interface of a second terminal, the method comprising:
the first terminal generates a level signal of first data and transmits the level signal of the first data through the first wired communication interface;
the first terminal detects the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starts timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition;
the second terminal receives a level signal of the first data through the second wired communication interface;
the second terminal detects the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starts timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition;
when the value obtained by the timing of the second terminal reaches a preset value, the second terminal generates a level signal of second data, and sends the level signal of the second data through the second wired communication interface, wherein the second data is obtained by processing the first data by the second terminal;
and when the value obtained by the first terminal in timing reaches the preset value, the first terminal allows the first terminal to start receiving the level signal of the second data through the first wired communication interface.
2. The method of claim 1,
the first terminal detects the level change of the level signal at the first wired communication interface, and starts timing when the level change of the level signal at the first wired communication interface meets a timing trigger condition, including:
the first terminal detects whether the level characteristics of the level signals at the first wired communication interface accord with the characteristics of a data start bit, if so, the first terminal continues to detect the characteristic values of subsequent level signals at the first wired communication interface, and if the characteristic values indicate that the first wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity;
the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including:
and the second terminal detects whether the level characteristics of the level signals at the second wired communication interface accord with the characteristics of the data start bit, if so, the characteristic values of subsequent level signals at the second wired communication interface are continuously detected, and if the characteristic values indicate that the second wired communication interface is in a data transmission state, timing is started, wherein the characteristics of the data start bit comprise the level characteristics of a specific level signal or the level characteristics changing in a specific regularity.
3. The method of claim 1,
the first terminal detects the level change of the level signal at the first wired communication interface, and starts timing when the level change of the level signal at the first wired communication interface meets a timing trigger condition, including:
the first terminal detects a characteristic value of a level signal at the first wired communication interface, if the characteristic value indicates that the first wired communication interface is in a data transmission state, whether the level characteristic of a subsequent level signal at the first wired communication interface accords with a data ending bit characteristic or not is continuously detected, and if the characteristic value accords with the data ending bit characteristic, timing is started, wherein the data ending bit characteristic comprises the level characteristic of a specific level signal or the level characteristic which changes in a specific regularity;
the second terminal detects the level change of the level signal at the second wired communication interface, and starts timing when the level change of the level signal at the second wired communication interface meets a timing trigger condition, including:
and the second terminal detects the characteristic value of the level signal at the second wired communication interface, if the characteristic value indicates that the second wired communication interface is in a data transmission state, the second terminal continuously detects whether the level characteristic of a subsequent level signal at the second wired communication interface accords with a data ending bit characteristic, and if so, timing is started, wherein the data ending bit characteristic comprises the level characteristic of a specific level signal or the level characteristic which changes in a specific regularity.
4. The method according to any one of claims 1 to 3, wherein the preset value is a preset duration, and when the value obtained by the second terminal timing reaches the preset value, the method comprises: when the time length obtained by timing of the second terminal reaches the preset time length; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: when the time length obtained by the first terminal in timing reaches the preset time length;
or, the preset value is a preset counting value, and the starting timing includes: starting counting; when the value obtained by timing at the second terminal reaches a preset value, the method comprises the following steps: when the value counted by the second terminal reaches a preset counting value; when the value obtained by the first terminal in timing reaches the preset value, the method comprises the following steps: and when the numerical value obtained by counting by the first terminal reaches a preset counting numerical value.
5. The method of any of claims 1-3, further comprising, prior to the first terminal generating the level signal of the first data and transmitting the level signal of the first data over the first wired communication interface:
the first terminal and the second terminal carry out bidirectional identity authentication, and after the bidirectional identity authentication is passed, the first terminal and the second terminal negotiate to obtain a transmission key; the second terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; or the first terminal generates the preset numerical value, encrypts the preset numerical value by using the transmission key, and sends the encrypted preset numerical value to the second terminal; the second terminal decrypts the encrypted preset value by using the transmission key to obtain the preset value and stores the preset value; or,
the first terminal and the second terminal carry out bidirectional identity authentication; after the bidirectional identity authentication is passed, the second terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the first terminal, and sends the encrypted preset numerical value to the first terminal; the first terminal decrypts the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and stores the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal generates the preset numerical value, encrypts the preset numerical value by using the public key of the second terminal, and sends the encrypted preset numerical value to the second terminal; and the second terminal decrypts the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and stores the preset numerical value.
6. The method of any of claims 1-3, further comprising, prior to the first terminal generating the level signal of the first data and transmitting the level signal of the first data over the first wired communication interface:
the first terminal generates the preset numerical value;
the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value are obtained;
after the second terminal receives the level signal of the first data through the second wired communication interface, the method further includes:
and the second terminal acquires the preset value and the tamper-proof check value from the first data, verifies the tamper-proof check value, and stores the preset value after the verification is passed.
7. A data interaction system is characterized in that a first wired communication interface of a first terminal is connected with a second wired communication interface of a second terminal,
the first terminal is used for generating a level signal of first data and transmitting the level signal of the first data through the first wired communication interface; detecting the level change of the level signal at the first wired communication interface in the process of sending the level signal of the first data, and starting timing when the level change of the level signal at the first wired communication interface meets a timing triggering condition;
the second terminal is used for receiving a level signal of the first data through the second wired communication interface; detecting the level change of the level signal at the second wired communication interface in the process of receiving the level signal of the first data, and starting timing when the level change of the level signal at the second wired communication interface meets the timing triggering condition;
the second terminal is further used for generating a level signal of second data when the value obtained by the second terminal through timing reaches a preset value, and sending the level signal of the second data through the second wired communication interface, wherein the second data is obtained after the second terminal processes the first data;
the first terminal is further configured to allow the first wired communication interface to start receiving the level signal of the second data when the value obtained by the first terminal through timing reaches the preset value.
8. The system of claim 7,
the first terminal is specifically configured to detect whether a level feature of a level signal at the first wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the first wired communication interface, and start timing when the feature value indicates that the first wired communication interface is in a data transmission state, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity;
the second terminal is specifically configured to detect whether a level feature of a level signal at the second wired communication interface meets a data start bit feature, if so, continue to detect a feature value of a subsequent level signal at the second wired communication interface, and if the feature value indicates that the second wired communication interface is in a data transmission state, start timing, where the data start bit feature includes a level feature of a specific level signal or a level feature that changes in a specific regularity.
9. The system of claim 7,
the first terminal is specifically configured to detect a characteristic value of a level signal at the first wired communication interface, continue to detect whether a level characteristic of a subsequent level signal at the first wired communication interface conforms to a data end bit characteristic if the characteristic value indicates that the first wired communication interface is in a data transmission state, and start timing if the characteristic value conforms to the data end bit characteristic, where the data end bit characteristic includes a level characteristic of a specific level signal or a level characteristic that changes in a specific regularity;
the second terminal is specifically configured to detect a characteristic value of a level signal at the second wired communication interface, continue to detect whether a level characteristic of a subsequent level signal at the second wired communication interface meets a data end bit characteristic if the characteristic value indicates that the second wired communication interface is in a data transmission state, and start timing if the characteristic value meets the data end bit characteristic, where the data end bit characteristic includes a level characteristic of a specific level signal or a level characteristic that changes in a specific regularity.
10. The system according to any one of claims 7 to 9,
the second terminal is specifically configured to generate a level signal of second data when the time obtained by the second terminal through timing reaches the preset time; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a time length obtained by timing of the first terminal reaches a preset time length;
or, the preset value is a preset counting value, and the first terminal is specifically configured to start counting; the second terminal is specifically used for starting counting; the second terminal is specifically configured to generate a level signal of second data when a value counted by the second terminal reaches a preset counting value; the first terminal is specifically configured to allow the first terminal to start receiving the level signal of the second data through the first wired communication interface when a value counted by the first terminal reaches a preset count value.
11. The system according to any one of claims 7 to 9,
the first terminal is further configured to perform bidirectional identity authentication with the second terminal, and after the bidirectional identity authentication is passed, the first terminal is further configured to negotiate with the second terminal to obtain a transmission key; the second terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the first terminal; the first terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or the first terminal is further configured to generate the preset value, encrypt the preset value by using the transmission key, and send the encrypted preset value to the second terminal; the second terminal is further configured to decrypt the encrypted preset value by using the transmission key to obtain the preset value, and store the preset value; or,
the first terminal is also used for performing bidirectional identity authentication with the second terminal; after the bidirectional identity authentication is passed, the second terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the first terminal, and send the encrypted preset value to the first terminal; the first terminal is also used for decrypting the encrypted preset numerical value by using a private key of the first terminal to obtain the preset numerical value and storing the preset numerical value; or after the bidirectional identity authentication is passed, the first terminal is further configured to generate the preset value, encrypt the preset value by using the public key of the second terminal, and send the encrypted preset value to the second terminal; and the second terminal is also used for decrypting the encrypted preset numerical value by using a private key of the second terminal to obtain the preset numerical value and storing the preset numerical value.
12. The system according to any one of claims 7 to 9,
the first terminal is further used for generating the preset numerical value;
the first data further includes at least: the preset value and a tamper-proof check value calculated based on the preset value are obtained;
the second terminal is further configured to obtain the preset value and the tamper-proof check value from the first data after receiving a level signal of the first data through the second wired communication interface, check the tamper-proof check value, and store the preset value after the check is passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710137024.5A CN108573159A (en) | 2017-03-09 | 2017-03-09 | A kind of data interactive method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710137024.5A CN108573159A (en) | 2017-03-09 | 2017-03-09 | A kind of data interactive method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108573159A true CN108573159A (en) | 2018-09-25 |
Family
ID=63577698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710137024.5A Pending CN108573159A (en) | 2017-03-09 | 2017-03-09 | A kind of data interactive method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108573159A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102754106A (en) * | 2009-12-23 | 2012-10-24 | 原子能和辅助替代能源委员会 | Method of protection in a contactless radiofrequency communication |
CN103024736A (en) * | 2011-09-28 | 2013-04-03 | 国民技术股份有限公司 | Communication connecting method and device |
CN103138929A (en) * | 2011-12-05 | 2013-06-05 | 赛酷特(北京)信息技术有限公司 | Contactless smart card cellphone authentication equipment based on audio interface |
CN104158567A (en) * | 2014-07-25 | 2014-11-19 | 天地融科技股份有限公司 | Pairing method and system and data interaction method and system for Bluetooth equipment |
US9251723B2 (en) * | 2011-09-14 | 2016-02-02 | Jonas Moses | Systems and methods of multidimensional encrypted data transfer |
-
2017
- 2017-03-09 CN CN201710137024.5A patent/CN108573159A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102754106A (en) * | 2009-12-23 | 2012-10-24 | 原子能和辅助替代能源委员会 | Method of protection in a contactless radiofrequency communication |
US9251723B2 (en) * | 2011-09-14 | 2016-02-02 | Jonas Moses | Systems and methods of multidimensional encrypted data transfer |
CN103024736A (en) * | 2011-09-28 | 2013-04-03 | 国民技术股份有限公司 | Communication connecting method and device |
CN103138929A (en) * | 2011-12-05 | 2013-06-05 | 赛酷特(北京)信息技术有限公司 | Contactless smart card cellphone authentication equipment based on audio interface |
CN104158567A (en) * | 2014-07-25 | 2014-11-19 | 天地融科技股份有限公司 | Pairing method and system and data interaction method and system for Bluetooth equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8943562B2 (en) | Secure Wiegand communications | |
CN103248491B (en) | A kind of backup method of electronic signature token private key and system | |
CN104639538A (en) | Identity card information obtaining method and system | |
WO2014173288A1 (en) | Encryption/decryption device and information processing method and system | |
CN106027457B (en) | A kind of ID card information transmission method and system | |
US20190020214A1 (en) | Multifunctional wireless charging system and its data transmission method | |
CN107392001B (en) | Authorization method, system and card | |
CN108573157B (en) | Data interaction method and system | |
CN104933379B (en) | ID card information acquisition methods, apparatus and system | |
CN103973455B (en) | A kind of information interacting method | |
CN108574665B (en) | Safe transmission method and system | |
CN108573158B (en) | Data communication method and system | |
CN108573159A (en) | A kind of data interactive method and system | |
CN108574663B (en) | Safe transmission method and system | |
CN112713991A (en) | Secure communication method and system for protecting key negotiation by using timing communication | |
CN104933349B (en) | With the USB switching devices and download verification method for downloading authentication function | |
CN108574662B (en) | Data communication method and system | |
HK1198349A1 (en) | Intelligent secret key equipment, mobile terminal and transmission method and system for audio data | |
CN107689946B (en) | Data communication method and data communication system | |
WO2023103425A1 (en) | Communicative connection method, system, and apparatus, storage medium, and processor | |
CN103984906A (en) | Electronic key device without button | |
CN110868715B (en) | Security protection method, device, system, electronic equipment and storage medium | |
CN107688760B (en) | Data communication method and data communication system | |
CN103839335B (en) | The method and system of processing information | |
CN107688761B (en) | Data communication method and data communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |