CN103888256A - Password key authentication method and system - Google Patents

Password key authentication method and system Download PDF

Info

Publication number
CN103888256A
CN103888256A CN201210566635.9A CN201210566635A CN103888256A CN 103888256 A CN103888256 A CN 103888256A CN 201210566635 A CN201210566635 A CN 201210566635A CN 103888256 A CN103888256 A CN 103888256A
Authority
CN
China
Prior art keywords
detection signal
sonic detection
mobile terminal
cipher key
demodulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210566635.9A
Other languages
Chinese (zh)
Other versions
CN103888256B (en
Inventor
程玉芳
张翌维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nationz Technologies Inc
Original Assignee
Nationz Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nationz Technologies Inc filed Critical Nationz Technologies Inc
Priority to CN201210566635.9A priority Critical patent/CN103888256B/en
Publication of CN103888256A publication Critical patent/CN103888256A/en
Application granted granted Critical
Publication of CN103888256B publication Critical patent/CN103888256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the field of audio data reliability transmission design, and provides a password key authentication method and system. According to the method and the system, a mobile terminal sends sound wave detection signals to a password key for at least two times, and carries out matching on a sound wave detection signal returned by the password key for the last time; and if the matching is successful, transaction data are transmitted. Compared with the existing method that audio data are sent once for the mobile terminal for authentication, the method and the system have the advantages that the audio data can be more safely and reliably transmitted, and the safety of follow-up transaction data is ensured.

Description

A kind of authentication method of cipher key and system
Technical field
The invention belongs to the reliability transmission design field of voice data, relate in particular to a kind of authentication method and system of cipher key.
Background technology
Along with a large amount of of the mobile terminal such as fast development and smart mobile phone of mobile Internet popularize, each bank has released mobile banking service successively, and user can, by being arranged on the client login Mobile banking on mobile terminal, realize the functions such as online payment.
The USB Key that the digital certificate that traditional Web bank is used normally can be connected with PC, this USB Key is connected with PC by USB interface, for PC, this USB Key is equivalent to one from equipment, and USB interface on existing mobile terminal is also from equipment, and interconnective two USB device of USB technical requirement must be a main equipment and one from equipment, traditional USBKey cannot directly be connected with the USB interface of mobile terminal.
For this reason, prior art has proposed a kind of cipher key based on audio data transmission, and this cipher key is realized and being connected of mobile terminal by wired mode or wireless mode, and the transaction data that mobile terminal is exported in audio frequency mode is signed.In order to ensure the fail safe of transfer of data, mobile terminal, transmitting before transaction data with cable pin key, need carry out safety certification to cable pin key, and the typical practice of this verification process is: mobile terminal is modulated to the PIN code of user's input after voice data, send to cable pin key, cable pin key to voice data demodulation after, extract PIN code, and this PIN code is authenticated, if certification is passed through, start to transmit transaction data, if certification is not passed through, report an error.But under this kind of authentication mode, the voice data that cable pin key only sends for mobile terminal authenticates, thereby fail safe is still poor, cannot ensure security reliability and the correctness of transmission of transaction data, has limited the range of application of cipher key.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of authentication method of cipher key, be intended to solve in prior art, the voice data that cable pin key only sends for mobile terminal authenticates, and cannot ensure the security reliability of transmission of transaction data and the problem of correctness.
The embodiment of the present invention is achieved in that a kind of authentication method of cipher key, and described method comprises:
Step S1: before transmission transaction data, control sonic detection signal and between mobile terminal and cipher key, carry out at least twice transmitting-receiving transmission, and when described mobile terminal sends after described sonic detection signal, while receiving the described sonic detection signal that described cipher key returns, controls described mobile terminal and send sonic detection signal next time to described cipher key to described cipher key at this;
Step S2: in the time that the described mobile terminal of control receives described sonic detection signal for the last time, controlling described mobile terminal mates the described sonic detection signal receiving for the last time, if the match is successful, control described mobile terminal and transmit described transaction data to cipher key.
Another object of inventive embodiments is, a kind of cipher key is also provided, and described cipher key comprises:
The first receiver module, the sonic detection signal sending for mobile terminal receive;
Modulation module, for adopting default modulation system, the described sonic detection signal receiving being modulated to selected sound frequency;
The second sending module, for sending to described mobile terminal by the sonic detection signal after described modulation module modulation;
Sound control module, sonic detection signal after the coupling sending for mobile terminal that described the first receiver module is received, described carries out the Sound control of two-band, and the sonic detection signal after Sound control is sent to described mobile terminal by described the second sending module.
Another object of inventive embodiments is, a kind of mobile terminal is also provided, and described mobile terminal comprises:
The first sending module, for sending sonic detection signal to cipher key;
The second receiver module, the sonic detection signal after, modulation that described cipher key sends for receiving;
Demodulation module, carry out demodulation for the sonic detection signal that described the second receiver module is received, if the sonic detection signal that the sonic detection signal after demodulation and mobile terminal send is identical, send sonic detection signal after demodulation to described cipher key by described the first sending module;
Echo matching module, for receiving at described the second receiver module after the echo of the sonic detection signal after the demodulation that described the second sending module returns, judge whether described echo mates with the sonic detection signal after described modulation module demodulation, if coupling, sends to described cipher key by described the first sending module by the sonic detection signal after coupling;
The first extraction module, acoustic feature and/or the language feature of the described sonic detection signal after, Sound control that described the second receiver module receives for extracting;
The second extraction module, acoustic feature and/or the language feature of the echo of the described sonic detection signal after, demodulation that described the second receiver module receives for extracting;
Pattern matching module, carries out pattern matching for described acoustic feature and/or language feature that described the first extraction module or described the second extraction module are extracted, if the match is successful, transmits transaction data.
Another object of inventive embodiments is, a kind of Verification System of cipher key is also provided, and described system comprises a kind of cipher key as above and a kind of mobile terminal as above.
In the authentication method and system of cipher key of the present invention, mobile terminal at least sends sonic detection signal twice to cipher key, and the sonic detection signal that cipher key is returned for the last time mates, if the match is successful, transmits transaction data.The mode authenticating with respect to the existing voice data only sending for mobile terminal, the transmission of audio data that the method and system can be more safe and reliable, the safety of guarantee subsequent transaction data.
Brief description of the drawings
Fig. 1 is the flow chart of the authentication method of cipher key provided by the invention;
Fig. 2 is in the present invention, a kind of interaction diagrams between mobile terminal and cipher key;
Fig. 3 is in the present invention, the another kind of interaction diagrams between mobile terminal and cipher key;
Fig. 4 is in the present invention, another interaction diagrams between mobile terminal and cipher key;
Fig. 5 is the structure chart of the Verification System of cipher key provided by the invention;
Fig. 6 is in Fig. 5, a kind of structure chart of authentication ' unit;
Fig. 7 is in Fig. 5, the another kind of structure chart of authentication ' unit;
Fig. 8 is in Fig. 5, another structure chart of authentication ' unit.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The problem existing for prior art, in the present invention, mobile terminal at least sends sonic detection signal twice to cipher key, and the sonic detection signal that cipher key is returned for the last time mates, if the match is successful, transmit transaction data (as: account, householder, the amount of money etc.).Cipher key in the present invention comprises wired cipher key and wireless cipher key.
Fig. 1 shows the flow process of the authentication method of cipher key provided by the invention, comprises the following steps:
Step S1: before transmission transaction data, control sonic detection signal and between mobile terminal and cipher key, carry out at least twice transmitting-receiving transmission, and when mobile terminal sends after sonic detection signal to cipher key at this, while receiving the sonic detection signal that cipher key returns, control mobile terminal and send sonic detection signal next time to cipher key.
Step S2: in the time that control mobile terminal receives sonic detection signal for the last time, control mobile terminal the sonic detection signal receiving is for the last time mated, if the match is successful, control mobile terminal and transmit transaction data to cipher key.
Below divide three embodiment that said method is described in detail in detail:
In the authentication method of the cipher key providing in first embodiment of the invention, mobile terminal divides three times to cipher key transmission sonic detection signal, and as shown in Figure 2, now, step S1 further comprises:
Step S101: mobile terminal sends sonic detection signal to cipher key;
Step S102: the sonic detection signal that cipher key mobile terminal receive sends, and the default modulation system of employing, the sonic detection signal receiving is modulated to selected sound frequency, this modulation system can be existing frequency shift keying (Frequency-shift Keying, FSK) mode, amplitude shift keying (Amplitude ShiftKeying, ASK) mode, phase shift keying (Phase-shift Keying, PSK) mode, phase quadrature amplitude modulation (Quadrature Amplitude Modulation, QAM) mode, OFDM (OrthogonalFrequency Division Multiplexing, etc. OFDM) any in,
Step S103: the sonic detection signal after modulation is sent to mobile terminal by cipher key;
Step S104: mobile terminal receives the sonic detection signal after that cipher key sends, modulation, and the sonic detection signal receiving is carried out to demodulation;
Step S105: if the sonic detection signal after mobile terminal demodulation is identical with the sonic detection signal that mobile terminal sends, the sonic detection signal after mobile terminal transmission demodulation is to cipher key;
Step S106: cipher key solution receives the sonic detection signal after adjusting, return to afterwards the echo of the sonic detection signal after demodulation to mobile terminal, this echo can be the sonic detection signal itself after demodulation, also can be sonic detection signal after the demodulation signal after encoded, and coded system to the sonic detection signal after demodulation can be CLC verification, HASH coding, Bose-Chaudhuri-Hocquenghem Code etc.;
Step S107: mobile terminal reception of echoes, and judge whether this echo mates with sonic detection signal that send, after demodulation before, judges that whether sonic detection signal this echo and transmission before, after demodulation is consistent;
Step S108: if mobile terminal judges echo and sonic detection Signal Matching that send, after demodulation before, the sonic detection signal after coupling is sent to cipher key;
Step S109: the sonic detection signal after the coupling that cipher key mobile terminal receive sends, and the sonic detection signal after coupling is carried out to the Sound control of two-band;
Step S110: the sonic detection signal after Sound control is sent to mobile terminal by cipher key.
Wherein, in step S109, if sonic detection signal is two-frequency signal, can adopt following three kinds of modes to realize the Sound control of two-band: one, two-way sonic detection signal to be superposed to a road sonic detection signal, this kind of mode both can increase the throughput of information, can increase again communication speed; Two, voice data sonic detection signal being carried is modulated on a road signal, and check code is modulated on another road signal, and this check code characterizes the start-stop position of the signal that is loaded with voice data; Three, voice data sonic detection signal being carried is modulated on a road signal, and synchronizing information is modulated on another road signal, and this synchronizing information characterizes the frequency range of the signal that is loaded with voice data.Latter two mode wherein can ensure the transmission security of voice data.
In the authentication method of the cipher key providing in first embodiment of the invention, step S2 further comprises:
Step S201: mobile terminal extracts acoustic feature and/or the language feature in sonic detection signal that receive, after Sound control;
Step S202: the acoustic feature extracting and/or language feature are carried out to pattern matching, if the match is successful, transmit transaction data.Pattern matching algorithm wherein can be probability statistics algorithm, dynamic time warping algorithm, Vector Quantization algorithm, stealthy Markov model algorithm, artificial neural network algorithm etc., and it is that Application on Voiceprint Recognition field is known, does not enumerate at this.
In the authentication method of the cipher key providing in second embodiment of the invention, mobile terminal sends sonic detection signal to cipher key at twice, and as shown in Figure 3, now, step S1 further comprises:
Step S111: mobile terminal sends sonic detection signal to cipher key;
Step S112: the sonic detection signal that cipher key mobile terminal receive sends, and adopt default modulation system, the sonic detection signal receiving is modulated to selected sound frequency, this modulation system is described above, does not repeat them here;
Step S113: the sonic detection signal after modulation is sent to mobile terminal by cipher key;
Step S114: mobile terminal carries out demodulation to the sonic detection signal receiving;
Step S115: if the sonic detection signal after mobile terminal demodulation is identical with the sonic detection signal that mobile terminal sends, the sonic detection signal after mobile terminal transmission demodulation is to cipher key;
Step S116: cipher key is after the sonic detection signal receiving after demodulation, return to the echo of the sonic detection signal after demodulation to mobile terminal, this echo can be the sonic detection signal itself after demodulation, also can be sonic detection signal after the demodulation signal after encoded, and coded system to the sonic detection signal after demodulation can be CLC verification, HASH coding, Bose-Chaudhuri-Hocquenghem Code etc.
In the authentication method of the cipher key providing in second embodiment of the invention, step S2 further comprises:
Step S203: mobile terminal extracts acoustic feature and/or the language feature in the echo of sonic detection signal that receive, after demodulation;
Step S204: the acoustic feature extracting and/or language feature are carried out to pattern matching, if the match is successful, transmit transaction data.Pattern matching algorithm is wherein described above, does not repeat them here.
In the authentication method of the cipher key providing in third embodiment of the invention, mobile terminal sends sonic detection signal to cipher key equally at twice, and as shown in Figure 4, now, step S1 further comprises:
Step S117: mobile terminal sends sonic detection signal to cipher key;
Step S118: the sonic detection signal that cipher key mobile terminal receive sends, and adopt default modulation system, the sonic detection signal receiving is modulated to selected sound frequency, this modulation system is described above, does not repeat them here;
Step S119: the sonic detection signal after modulation is sent to mobile terminal by cipher key;
Step S120: the sonic detection signal after the modulation that mobile terminal reception cipher key sends, and the sonic detection signal after modulation is carried out to demodulation;
Step S121: if the sonic detection signal after mobile terminal demodulation is identical with the sonic detection signal that mobile terminal sends, the sonic detection signal after mobile terminal transmission demodulation is to cipher key;
Step S122: the sonic detection signal after the demodulation that cipher key sends mobile terminal carries out the Sound control of two-band;
Step S123: the sonic detection signal after Sound control is sent to mobile terminal by cipher key.
In the authentication method of the cipher key providing in third embodiment of the invention, the authentication method of the cipher key that the concrete steps of step S2 provide with first embodiment of the invention is identical, does not repeat them here.
The present invention also provides a kind of Verification System of cipher key, as the structure that Fig. 5 shows this Verification System, for convenience of explanation, only shows part related to the present invention.
Particularly, the Verification System of cipher key provided by the invention comprises: authentication ' unit 1, for before transmission transaction data, control sonic detection signal and between mobile terminal and cipher key, carry out at least twice transmitting-receiving transmission, and when mobile terminal sends after sonic detection signal to cipher key at this, while receiving the sonic detection signal that cipher key returns, control mobile terminal and send sonic detection signal next time to cipher key; Transaction control unit 2, while receiving for the last time sonic detection signal for controlling mobile terminal in authentication ' unit 1, control mobile terminal and mate receiving for the last time sonic detection signal, if the match is successful, control mobile terminal and transmit transaction data to cipher key.
Below divide three embodiment that said system is described in detail in detail:
In the Verification System of the cipher key providing in first embodiment of the invention, mobile terminal divides three times to cipher key transmission sonic detection signal, as shown in Figure 6, and now, authentication ' unit 1 comprises: be placed in the first sending module 101 of mobile terminal, for sending sonic detection signal to cipher key; Be placed in the first receiver module 102 of cipher key, the sonic detection signal sending for receiving the first sending module 101; Be placed in the modulation module 103 of cipher key, for adopting default modulation system, the sonic detection signal receiving being modulated to selected sound frequency, this modulation system is described above, does not repeat them here; Be placed in the second sending module 104 of cipher key, send to mobile terminal for the sonic detection signal after modulation module 103 is modulated; Be placed in the second receiver module 105 of mobile terminal, for receive cipher key send, modulation after sonic detection signal; Be placed in the demodulation module 106 of mobile terminal, carry out demodulation for the sonic detection signal that the second receiver module 105 is received, if the sonic detection signal that the sonic detection signal after demodulation and mobile terminal send is identical, send sonic detection signal after demodulation to the first receiver module 102 by the first sending module 101; Be placed in the echo matching module 108 of mobile terminal, for receiving at the second receiver module 105 after the echo of the sonic detection signal after the demodulation that the second sending module 104 returns, judge whether this echo mates with the sonic detection signal after modulation module 103 demodulation, if coupling, sends to the first receiver module 102 by the first sending module 101 by the sonic detection signal after coupling; Be placed in the Sound control module 109 of cipher key, carry out the Sound control of two-band for the sonic detection signal after the coupling that the first receiver module 102 is received, and the sonic detection signal after Sound control is sent to the second receiver module 105 by the second sending module 104, its detailed process is described above, is not repeated herein.
Wherein, when the sonic detection signal after echo is demodulation itself, the sonic detection signal after the demodulation that the second sending module 104 directly receives the first receiver module 102 sends to the second receiver module 105; When signal after sonic detection signal after echo is demodulation is encoded, authentication ' unit 1 can also comprise: the coding module 107 that is placed in cipher key, encode for the sonic detection signal after the demodulation that the first receiver module 102 is received, the sonic detection signal after the demodulation after the second sending module 104 is encoded coding module 107 sends to the second receiver module 105.Wherein, the coded system of coding module 107 to the sonic detection signal after demodulation, can be CLC verification, HASH coding, Bose-Chaudhuri-Hocquenghem Code etc.
In the Verification System of the cipher key providing in first embodiment of the invention, transaction control unit 2 further comprises: the first extraction module, and for extracting, the second receiver module 105 is that receive, acoustic feature and/or the language feature of sonic detection signal after Sound control; Pattern matching module, carries out pattern matching for acoustic feature and/or language feature that the first extraction module is extracted, if the match is successful, transmits transaction data.Pattern matching algorithm is wherein described above, is not repeated herein.
Further, in the Verification System of the cipher key providing in first embodiment of the invention, mobile terminal can comprise: connect the second receiver module 105, with the first low noise amplifier of automatic gain control function, the intensity of the sonic detection signal receiving for detection of the second receiver module 105, and regulate the gain size of the second receiver module 105 according to testing result, for example, if when the intensity detecting is more than or equal to a preset strength value, reduce the gain of the second receiver module 105; And the first noise filter of connection the first low noise amplifier, for the sonic detection signal of the first low noise amplifier output is carried out to filtering processing, with wherein unwanted frequency signal of filtering.Similarly, cipher key can comprise: connect the first receiver module 102, with the second low noise amplifier of automatic gain control function, the intensity of the sonic detection signal receiving for detection of the first receiver module 102, and regulate the gain size of the first receiver module 102 according to testing result, for example, if when the intensity detecting is more than or equal to a preset strength value, reduce the gain of the first receiver module 102; And the second noise filter of connection the second low noise amplifier, for the sonic detection signal of the second low noise amplifier output is carried out to filtering processing, with wherein unwanted frequency signal of filtering.
In the Verification System of the cipher key providing in second embodiment of the invention, mobile terminal sends sonic detection signal to cipher key at twice, as shown in Figure 7, from different shown in Fig. 6, authentication ' unit 1 now does not comprise the Sound control module 109 and the echo matching module 108 that are placed in cipher key, other structure and function are described above, are not repeated herein.
In the Verification System of the cipher key providing in second embodiment of the invention, transaction control unit 2 further comprises: the second extraction module, and for extracting, the second receiver module 105 is that receive, acoustic feature and/or the language feature of the echo of sonic detection signal after demodulation; Pattern matching module, carries out pattern matching for acoustic feature and/or language feature that the second extraction module is extracted, if the match is successful, transmits transaction data.
Similarly, in the Verification System of the cipher key providing in second embodiment of the invention, mobile terminal can comprise the first low noise amplifier as above and the first noise filter, and cipher key can comprise the second low noise amplifier as above and the second noise filter.
In the Verification System of the cipher key providing in third embodiment of the invention, mobile terminal sends sonic detection signal to cipher key at twice, as shown in Figure 8, from different shown in Fig. 6, now, authentication ' unit 1 does not comprise the echo matching module 108 that is placed in mobile terminal and the coding module 107 that is placed in cipher key, and other structure is same as shown in Figure 6.Wherein, the first sending module 101 is for sending sonic detection signal to cipher key; The sonic detection signal that the first receiver module 102 sends for receiving the first sending module 101; Modulation module 103 is for adopting default modulation system, the sonic detection signal receiving being modulated to selected sound frequency, and this modulation system is described above, does not repeat them here; The second sending module 104 sends to mobile terminal for the sonic detection signal after modulation module 103 is modulated; The second receiver module 105 for receive cipher key send, modulation after sonic detection signal; The sonic detection signal of demodulation module 106 after for the modulation that the second receiver module 105 is received carries out demodulation, if the sonic detection signal that the sonic detection signal after demodulation and mobile terminal send is identical, send sonic detection signal after demodulation to the first receiver module 102 by the first sending module 101; The sonic detection signal of Sound control module 109 after for the demodulation that the first receiver module 102 is received carries out the Sound control of two-band, and the sonic detection signal after Sound control is sent to the second receiver module 105 by the second sending module 104, its detailed process is described above, is not repeated herein.
Similarly, in the Verification System of the cipher key providing in third embodiment of the invention, mobile terminal can comprise the first low noise amplifier as above and the first noise filter, and cipher key can comprise the second low noise amplifier as above and the second noise filter.
The embodiment of the present invention also provides a kind of cipher key.In one embodiment of the invention, mobile terminal divides three times to cipher key transmission sonic detection signal, and key key specifically comprises the first receiver module 102 as above, modulation module 103, the second sending module 104, Sound control module 109.
Wherein, when the sonic detection signal after echo is demodulation itself, the sonic detection signal after the demodulation that the second sending module 104 directly receives the first receiver module 102 sends to mobile terminal; When signal after sonic detection signal after echo is demodulation is encoded, cipher key can also comprise coding module 107 as above.
In one embodiment of the invention, cipher key also can comprise the second low noise amplifier as above and the second noise filter.
The key key providing with one embodiment of the invention is corresponding, and the embodiment of the present invention also provides a kind of mobile terminal.Mobile terminal specifically comprises: the first sending module 101, the second receiver module 105, demodulation module 106, echo matching module 108, the first extraction module, pattern matching module.
Further, mobile terminal also can comprise the first low noise amplifier as above and the first noise filter.
In another embodiment, mobile terminal sends sonic detection signal to cipher key at twice, and key key specifically comprises the first receiver module 102 as above, modulation module 103, the second sending module 104.
Wherein, when the sonic detection signal after echo is demodulation itself, the sonic detection signal after the demodulation that the second sending module 104 directly receives the first receiver module 102 sends to mobile terminal; When signal after sonic detection signal after echo is demodulation is encoded, cipher key can also comprise coding module 107 as above.
In another embodiment, cipher key also can comprise the second low noise amplifier as above and the second noise filter.
The key key providing with another embodiment of the present invention is corresponding, and the embodiment of the present invention also provides a kind of mobile terminal.Mobile terminal specifically comprises: the first sending module 101, the second receiver module 105, demodulation module 106, the second extraction module, pattern matching module.
Further, mobile terminal also can comprise the first low noise amplifier as above and the first noise filter.
In another embodiment of the present invention, mobile terminal sends sonic detection signal to cipher key at twice, and key key specifically comprises the first receiver module 102 as above, modulation module 103, the second sending module 104, Sound control module 109.
In another embodiment of the present invention, cipher key also can comprise the second low noise amplifier as above and the second noise filter.
The key key providing with another embodiment of the present invention is corresponding, and the embodiment of the present invention also provides a kind of mobile terminal.Mobile terminal specifically comprises: the first sending module 101, the second receiver module 105, demodulation module 106, the first extraction module, pattern matching module.
Further, mobile terminal also can comprise the first low noise amplifier as above and the first noise filter.
In the authentication method and system of cipher key of the present invention, mobile terminal at least sends sonic detection signal twice to cipher key, and the sonic detection signal that cipher key is returned for the last time mates, if the match is successful, transmits transaction data.The mode authenticating with respect to the existing voice data only sending for mobile terminal, the transmission of audio data that the method and system can be more safe and reliable, the safety of guarantee subsequent transaction data.Have, in one embodiment, mobile terminal can adopt the mode of echo coupling again, and the sonic detection signal that judgement is sent and the consistency of its echo have further ensured the transmission security of voice data.Have, the method and system can adopt the mode of Application on Voiceprint Recognition again, and the sonic detection signal that mobile terminal is received for the last time carries out Application on Voiceprint Recognition, has guaranteed the identity reality of cipher key, has further ensured the transmission security of voice data.Have again, in mobile terminal and/or cipher key, can be provided with low noise amplifier and the noise filter of automatic gain control function, can reduce the interference of distance factor or the surrounding environment factor voice data to transmission, the transmission of steady sound audio data.
One of ordinary skill in the art will appreciate that all or part of step realizing in above-described embodiment method is can control relevant hardware by program to complete, described program can be being stored in a computer read/write memory medium, described storage medium, as ROM/RAM, disk, CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. an authentication method for cipher key, is characterized in that, described method comprises:
Step S1: before transmission transaction data, control sonic detection signal and between mobile terminal and cipher key, carry out at least twice transmitting-receiving transmission, and when described mobile terminal sends after described sonic detection signal, while receiving the described sonic detection signal that described cipher key returns, controls described mobile terminal and send sonic detection signal next time to described cipher key to described cipher key at this;
Step S2: in the time that the described mobile terminal of control receives described sonic detection signal for the last time, controlling described mobile terminal mates the described sonic detection signal receiving for the last time, if the match is successful, control described mobile terminal and transmit described transaction data to cipher key.
2. the authentication method of cipher key as claimed in claim 1, is characterized in that, described step S1 further comprises:
Step S101: described mobile terminal sends described sonic detection signal to described cipher key;
Step S102: described cipher key receives the described sonic detection signal that described mobile terminal sends, and employing is preset modulation system, described sonic detection signal is modulated to selected sound frequency;
Step S103: the sonic detection signal after modulation is sent to described mobile terminal by described cipher key;
Step S104: described mobile terminal receives the sonic detection signal after described modulation, and the sonic detection signal after described modulation is carried out to demodulation;
Step S105: if the sonic detection signal after described mobile terminal demodulation is identical with the sonic detection signal that described mobile terminal sends, described mobile terminal sends sonic detection signal after described demodulation to described cipher key;
Step S106: the sonic detection signal after described cipher key solution receiving demodulation, returns to the echo of the sonic detection signal after demodulation afterwards to described mobile terminal;
Step S107: described mobile terminal receives described echo, and judge whether described echo mates with sonic detection signal that send, after demodulation before;
Step S108: if described mobile terminal judges described echo and sonic detection Signal Matching that send, after demodulation before, the sonic detection signal after coupling is sent to described cipher key;
Step S109: described cipher key receives the sonic detection signal after the coupling that described mobile terminal sends, and the sonic detection signal after coupling is carried out to the Sound control of two-band;
Step S110: the sonic detection signal after Sound control is sent to described mobile terminal by described cipher key.
3. the authentication method of cipher key as claimed in claim 1, is characterized in that, described step S1 further comprises:
Step S117: described mobile terminal sends sonic detection signal to described cipher key;
Step S118: described cipher key receives described sonic detection signal, and employing is preset modulation system, the described sonic detection signal receiving is modulated to selected sound frequency;
Step S119: the sonic detection signal after modulation is sent to described mobile terminal by described cipher key;
Step S120: described mobile terminal receives the sonic detection signal after the modulation that described cipher key sends, and the sonic detection signal after modulation is carried out to demodulation;
Step S121: if the sonic detection signal after described mobile terminal demodulation is identical with the sonic detection signal that described mobile terminal sends, the sonic detection signal after described mobile terminal transmission demodulation is to described cipher key;
Step S122: the sonic detection signal after the demodulation that described cipher key sends described mobile terminal carries out the Sound control of two-band;
Step S123: the sonic detection signal after Sound control is sent to described mobile terminal by described cipher key.
4. the authentication method of cipher key as claimed in claim 2 or claim 3, is characterized in that, described step S2 further comprises:
Step S201: described mobile terminal extracts acoustic feature and/or the language feature in sonic detection signal that receive, after Sound control;
Step S202: the described acoustic feature extracting and/or language feature are carried out to pattern matching, if the match is successful, transmit transaction data.
5. the authentication method of cipher key as claimed in claim 1, is characterized in that, described step S1 further comprises:
Step S111: described mobile terminal sends sonic detection signal to described cipher key;
Step S112: described cipher key receives described sonic detection signal, and employing is preset modulation system, the sonic detection signal receiving is modulated to selected sound frequency;
Step S113: the sonic detection signal after modulation is sent to described mobile terminal by described cipher key;
Step S114: described mobile terminal carries out demodulation to the sonic detection signal receiving;
Step S115: if the sonic detection signal after described mobile terminal demodulation is identical with the sonic detection signal that described mobile terminal sends, the sonic detection signal after described mobile terminal transmission demodulation is to described cipher key;
Step S116: described cipher key, after the sonic detection signal receiving after demodulation, returns to the echo of the sonic detection signal after demodulation to described mobile terminal.
6. the authentication method of cipher key as claimed in claim 5, is characterized in that, described step S2 further comprises:
Step S203: described mobile terminal extracts acoustic feature and/or the language feature in the echo of sonic detection signal that receive, after demodulation;
Step S204: the described acoustic feature extracting and/or language feature are carried out to pattern matching, if the match is successful, transmit transaction data.
7. a cipher key, is characterized in that, described cipher key comprises:
The first receiver module, the sonic detection signal sending for mobile terminal receive;
Modulation module, for adopting default modulation system, the described sonic detection signal receiving being modulated to selected sound frequency;
The second sending module, for sending to described mobile terminal by the sonic detection signal after described modulation module modulation;
Sound control module, sonic detection signal after the coupling sending for mobile terminal that described the first receiver module is received, described carries out the Sound control of two-band, and the sonic detection signal after Sound control is sent to described mobile terminal by described the second sending module.
8. a mobile terminal, is characterized in that, described mobile terminal comprises:
The first sending module, for sending sonic detection signal to cipher key;
The second receiver module, the sonic detection signal after, modulation that described cipher key sends for receiving;
Demodulation module, carry out demodulation for the sonic detection signal that described the second receiver module is received, if the sonic detection signal that the sonic detection signal after demodulation and mobile terminal send is identical, send sonic detection signal after demodulation to described cipher key by described the first sending module;
Echo matching module, for receiving at described the second receiver module after the echo of the sonic detection signal after the demodulation that described the second sending module returns, judge whether described echo mates with the sonic detection signal after described modulation module demodulation, if coupling, sends to described cipher key by described the first sending module by the sonic detection signal after coupling;
The first extraction module, acoustic feature and/or the language feature of the described sonic detection signal after, Sound control that described the second receiver module receives for extracting;
The second extraction module, acoustic feature and/or the language feature of the echo of the described sonic detection signal after, demodulation that described the second receiver module receives for extracting;
Pattern matching module, carries out pattern matching for described acoustic feature and/or language feature that described the first extraction module or described the second extraction module are extracted, if the match is successful, transmits transaction data.
9. mobile terminal as claimed in claim 8, is characterized in that, described mobile terminal also comprises:
Connect described the second receiver module, the first low noise amplifier with automatic gain control function, the intensity of the described sonic detection signal receiving for detection of described the second receiver module, and regulate the gain size of described the second receiver module according to testing result;
Connect the first noise filter of described the first low noise amplifier, for the sonic detection signal of described the first low noise amplifier output is carried out to filtering processing.
10. a Verification System for cipher key, is characterized in that, described system comprises cipher key as claimed in claim 7 and mobile terminal as claimed in claim 8.
CN201210566635.9A 2012-12-24 2012-12-24 The authentication method and system of a kind of cipher key Active CN103888256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210566635.9A CN103888256B (en) 2012-12-24 2012-12-24 The authentication method and system of a kind of cipher key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210566635.9A CN103888256B (en) 2012-12-24 2012-12-24 The authentication method and system of a kind of cipher key

Publications (2)

Publication Number Publication Date
CN103888256A true CN103888256A (en) 2014-06-25
CN103888256B CN103888256B (en) 2018-01-05

Family

ID=50956984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210566635.9A Active CN103888256B (en) 2012-12-24 2012-12-24 The authentication method and system of a kind of cipher key

Country Status (1)

Country Link
CN (1) CN103888256B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106251149A (en) * 2015-06-08 2016-12-21 乔睿科技股份有限公司 Electronic transaction system and electronic transaction method applying dual-frequency voiceprint communication technology

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842989A (en) * 2003-07-22 2006-10-04 高通股份有限公司 Digital authentication over acoustic channel
CN101807995A (en) * 2010-01-18 2010-08-18 北京天地融科技有限公司 Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal
CN201846343U (en) * 2010-09-25 2011-05-25 北京天地融科技有限公司 Electronic signature tool communicating with mobile phone through speech mode
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN102263638A (en) * 2010-05-31 2011-11-30 索尼公司 Authentication device, authentication method, program, and signature generation device
CN102769590A (en) * 2012-06-21 2012-11-07 天地融科技股份有限公司 Self-adaptive method, self-adaptive system and self-adaptive device for audio communication modulation modes and electronic signature implement
US8788835B2 (en) * 2007-08-28 2014-07-22 Alcatel Lucent Methods for selectively capturing and replicating one-time password generator functionality from device to device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842989A (en) * 2003-07-22 2006-10-04 高通股份有限公司 Digital authentication over acoustic channel
US8788835B2 (en) * 2007-08-28 2014-07-22 Alcatel Lucent Methods for selectively capturing and replicating one-time password generator functionality from device to device
CN101807995A (en) * 2010-01-18 2010-08-18 北京天地融科技有限公司 Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal
CN102263638A (en) * 2010-05-31 2011-11-30 索尼公司 Authentication device, authentication method, program, and signature generation device
CN201846343U (en) * 2010-09-25 2011-05-25 北京天地融科技有限公司 Electronic signature tool communicating with mobile phone through speech mode
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN102769590A (en) * 2012-06-21 2012-11-07 天地融科技股份有限公司 Self-adaptive method, self-adaptive system and self-adaptive device for audio communication modulation modes and electronic signature implement

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106251149A (en) * 2015-06-08 2016-12-21 乔睿科技股份有限公司 Electronic transaction system and electronic transaction method applying dual-frequency voiceprint communication technology

Also Published As

Publication number Publication date
CN103888256B (en) 2018-01-05

Similar Documents

Publication Publication Date Title
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
US10740747B2 (en) NFC-enabled devices for performing secure contactless transactions and using HCE
CN104602364B (en) The method and wireless device, intelligent terminal of wireless device connection wireless access point
US10068224B2 (en) Near field authentication through communication of enclosed content sound waves
CN103049850A (en) Mobile payment terminal, system and payment method thereof based on NFC (Near Field Communication)
US10467619B2 (en) Method and system for contactless payments
CN102355308A (en) Information transmission method, receiving method and terminal equipment
CN103955822A (en) Method for mobile payment by transmitting data through variable frequency sound waves
EP3468135B1 (en) Data transmission method, data transmitter, data receiver, and system
CN104363589A (en) Identity authentication method, device and terminal
CN104660307B (en) Based near field magnetic relaying and the soft replacement encrypted wireless communication system of user
CN104821882A (en) Network security verification method based on voice biometric features
Nelson et al. Security of the near field communication protocol: an overview
CN105704092A (en) User identity authentication method, device and system
CN104901808A (en) Voiceprint authentication system and method based on time type dynamic password
CN116888898A (en) Method and apparatus for adapting near field communication
CN102917357A (en) Authentication method and device
CN102487319A (en) Method for carrying out unidirectional or multidirectional communication by virtue of vibration
CN107395580B (en) Data verification method and device
EP3334086A1 (en) Online authentication method based on smart card, smart card and authentication server
US20080198907A1 (en) Circuit For A Communication Device And Method Of Controlling A Transmission
CN103888256A (en) Password key authentication method and system
US9817962B2 (en) Module for managing a transaction between a terminal and an electronic device
US10938448B2 (en) Method for processing data by means of an electronic data-acquisition device, corresponding device and program
CN102624680A (en) Mobile payment system employing combined cipher and mobile payment method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An Authentication Method and System of Password Key

Effective date of registration: 20221017

Granted publication date: 20180105

Pledgee: Shenzhen hi tech investment small loan Co.,Ltd.

Pledgor: NATIONZ TECHNOLOGIES Inc.

Registration number: Y2022980018337

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231027

Granted publication date: 20180105

Pledgee: Shenzhen hi tech investment small loan Co.,Ltd.

Pledgor: NATIONZ TECHNOLOGIES Inc.

Registration number: Y2022980018337