CN105303659A - Method and device for identifying access control identity based on ultrasonic waves - Google Patents
Method and device for identifying access control identity based on ultrasonic waves Download PDFInfo
- Publication number
- CN105303659A CN105303659A CN201510650740.4A CN201510650740A CN105303659A CN 105303659 A CN105303659 A CN 105303659A CN 201510650740 A CN201510650740 A CN 201510650740A CN 105303659 A CN105303659 A CN 105303659A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- held mobile
- hand
- door access
- access machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention provides a method and a device for identifying access control identity based on ultrasonic waves. The method comprises the following steps of enabling each user to install an access control APP (application) at a hand-held mobile terminal, and use the ID (identity) to register as the user of the access control APP; generating an encrypting key and a decrypting key; enabling an access control machine to obtain the information of the users, and storing into a local database; when the distance between the hand-held mobile terminal and the access control machine is controlled within the setting range, using an encrypting algorithm and the encrypting key to encrypt the ID to obtain encrypting information, converting the encrypting information into a data frame, converting the data frame into an ultrasonic signal by an ultrasonic digital encoding type, transiting the ultrasonic signal via a loudspeaker, enabling the access control machine to receive the ultrasonic signal and convert the ultrasonic signal into the data frame, demodulating, and decrypting to obtain a plain text; if the plain text is matched with the information of the local database, automatically opening a door. The method and the device for identifying the access control identify based on the ultrasonic waves have the beneficial effects that the safety is higher, the use cost is reduced, and the reliability is higher.
Description
Technical field
The present invention relates to gate inhibition and identify field, particularly one is based on hyperacoustic gate inhibition's personal identification method and device.
Background technology
Along with the develop rapidly of internet and mobile communication technology, people propose higher level safety and intelligent management demand to modern office and life area, and common door-locking system and manual room entry/exit management have not met the actual demand of modern.In order to comply with the development of intelligent building and intelligent residential district, gate control system also must realize more reliable, safer and intelligent system more easily.Intelligent access control system has fully utilized sensing technology, digital information processing, computer technology, multimedia technology and network technology, to realize the collection of gate control system information, transmission and process.
In gate control system, of paramount importance ingredient is ID recognition system.ID recognition system on current market is main in the following ways: 1) Radio Frequency ID, comprises the ID card of the Radio Frequency ID card of 125K, the MIFARE card of 13.56M and two generation TYPEB; 2) fingerprint ID, comprises optical finger print and biological fingerprint; 3) face ID.In three kinds of ID recognition method, the Radio Frequency ID card uniqueness based on the 125K of wireless radio-frequency is low, is the most easily replicated; MIFARE jig for certain secure fashion, but is cracked at present, so its security is not high; The uniqueness of China second-generation identity card ID is high, but read head costly, and also extensively do not promote on gate inhibition at present, its use cost is higher.Comparatively speaking, fingerprint ID possesses certain secret advantage, but recognition time is long, recognition accuracy low needs repeatedly identify.And the recognition accuracy of face ID technology is also lower at present, particularly recognition of face is more responsive to external light source, and reliability is lower.
Along with the development of mobile technology, mobile phone more and more be unable to do without the life of people.The system of real name of mobile phone also makes mobile phone progressively uniquely bind with identity, makes it to possess the possibility becoming mobile key.How mobile phone, as a kind of mobile key, carries out simple and effective communication with gate control system, and a lot of technology can realize this point in theory: bluetooth, bluetooth LE, WiFi be direct-connected, found etc. by local WiFi network.But based on these methods, all need comprehensively to upgrade to gate inhibition's machine and transform, the renewal cost of gate inhibition's hardware is higher.
Summary of the invention
The technical problem to be solved in the present invention is, the defect that above-mentioned security for prior art is not high, use cost is higher, reliability is lower, the renewal cost of gate inhibition's hardware is higher, provide a kind of security higher, reduce that use cost, reliability are higher, the renewal cost that reduces gate inhibition's hardware based on hyperacoustic gate inhibition's personal identification method and device.
The technical solution adopted for the present invention to solve the technical problems is: structure is a kind of based on hyperacoustic gate inhibition's personal identification method, and described method comprises the steps:
A) each user installs access control APP on its hand-held mobile terminal, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by described background server, and the ID of log-on message and door access machine is bound, described encryption key is handed down to described hand-held mobile terminal by described background server, and described decruption key is handed down to described door access machine;
B) described door access machine obtains the described log-on message of each user from described background server by network, and is saved in local data base; Perform step C) or C ');
C) described background server obtains the positional information of described door access machine and the positional information of described hand-held mobile terminal, and calculates the distance between described hand-held mobile terminal and described door access machine, performs step D);
C ') described background server obtains the positional information of described door access machine, and send it to the access control APP of described hand-held mobile terminal, the access control APP of described hand-held mobile terminal calculates the distance between described hand-held mobile terminal and described door access machine, performs step D);
D) distance between described hand-held mobile terminal and described door access machine is judged whether in setting range, in this way, the access control APP of described hand-held mobile terminal uses cryptographic algorithm and described encryption key to be encrypted described identity ID and obtains cipher-text information, and described cipher-text information is converted to the Frame meeting setting data form, perform step e); Otherwise, return step C) or C ');
E) described Frame is converted to ultrasonic signal by ultrasonic digital coded system by the access control APP of described hand-held mobile terminal, and is gone out by the horn launch of described ultrasonic signal from described hand-held mobile terminal, performs step F);
F) described door access machine carries out ultrasonic monitoring and judges whether to receive the ultrasonic signal of described hand-held mobile terminal transmitting, in this way, described ultrasonic signal is carried out demodulation according to described ultrasonic digital coded system and obtains described Frame by described door access machine, and according to described setting data form, parsing is carried out to the Frame of demodulation and obtain described cipher-text information, and according to described cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information, perform step G); Otherwise, return step e);
G) log-on message in described cleartext information and described local data base is compared by described door access machine, and judges whether the information that matches, if any, then described door access machine automatic opening door lock; Otherwise, return that it fails to match.
Of the present invention based in hyperacoustic gate inhibition's personal identification method, described identity ID is the dynamic password of phone number or ID (identity number) card No. or SMS.
Of the present invention based in hyperacoustic gate inhibition's personal identification method, described cryptographic algorithm is rivest, shamir, adelman.
Of the present invention based in hyperacoustic gate inhibition's personal identification method, described setting data form comprises target seeker, 8 bit length codes, 128 bit data codes and 8 bit check codes.
Of the present invention based in hyperacoustic gate inhibition's personal identification method, described ultrasonic digital coded system adopts 100%ASK numerical coding, use 24KHz ultrasonic wave modulation, adopt the byte code order of LSB (LeastSignificantBit, least significant bit (LSB)).
The invention still further relates to and a kind ofly realize the above-mentioned device based on hyperacoustic gate inhibition's personal identification method, comprising:
Registration binding issues unit: on its hand-held mobile terminal, install access control APP for making each user, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by described background server, and the ID of log-on message and door access machine is bound, described encryption key is handed down to described hand-held mobile terminal by described background server, and described decruption key is handed down to described door access machine;
Acquisition of information storage unit: for the described log-on message making described door access machine be obtained each user from described background server by network, and be saved in local data base;
Position acquisition computing unit: for making described background server obtain the positional information of described door access machine and the positional information of described hand-held mobile terminal, and calculate the distance between described hand-held mobile terminal and described door access machine;
Position acquisition delivery unit: for the positional information making described background server obtain described door access machine, and sending it to the access control APP of described hand-held mobile terminal, the access control APP of described hand-held mobile terminal calculates the distance between described hand-held mobile terminal and described door access machine;
Distance Judgment unit: for judging distance between described hand-held mobile terminal and described door access machine whether in setting range, in this way, the access control APP of described hand-held mobile terminal uses cryptographic algorithm and described encryption key to be encrypted described identity ID and obtains cipher-text information, and described cipher-text information is converted to the Frame meeting setting data form; Otherwise, carry out position acquisition;
Ultrasonic signal switching emission unit: for making the access control APP of described hand-held mobile terminal that described Frame is converted to ultrasonic signal by ultrasonic digital coded system, and the horn launch of described ultrasonic signal from described hand-held mobile terminal is gone out;
Information receives judging unit: carry out ultrasonic monitoring for making described door access machine and judge whether to receive the ultrasonic signal that described hand-held mobile terminal launches, in this way, described ultrasonic signal is carried out demodulation according to described ultrasonic digital coded system and obtains described Frame by described door access machine, and according to described setting data form, parsing is carried out to the Frame of demodulation and obtain described cipher-text information, and according to described cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information; Otherwise, carry out conversion and the transmitting of ultrasonic signal;
Comparing unit: for making described door access machine be compared by the log-on message in described cleartext information and described local data base, and judge whether the information that matches, if any, then described door access machine automatic opening door lock; Otherwise, return that it fails to match.
In device of the present invention, described identity ID is the dynamic password of phone number or ID (identity number) card No. or SMS.
In device of the present invention, described cryptographic algorithm is rivest, shamir, adelman.
In device of the present invention, described setting data form comprises target seeker, 8 bit length codes, 128 bit data codes and 8 bit check codes.
In device of the present invention, described ultrasonic digital coded system adopts 100%ASK numerical coding, uses 24KHz ultrasonic wave modulation, adopts the byte code order of LSB.
Implement of the present invention based on hyperacoustic gate inhibition's personal identification method and device, there is following beneficial effect: due to when the distance between hand-held mobile terminal and door access machine is in setting range, the access control APP of hand-held mobile terminal uses cryptographic algorithm and encryption key to be encrypted identity ID and obtains cipher-text information, and cipher-text information is converted to the Frame meeting setting data form, then Frame is converted to ultrasonic signal by ultrasonic digital coded system, the horn launch of ultrasonic signal from hand-held mobile terminal is gone out, the security of data can be increased like this, after door access machine receives, according to ultrasonic digital coded system, ultrasonic signal is carried out demodulation and obtain Frame, and according to setting data form, parsing is carried out to the Frame of demodulation and obtain ciphertext, and according to cryptographic algorithm and decruption key the ciphertext be resolved to is decrypted and obtains cleartext information, when cleartext information mates with the log-on message in local data base, door access machine automatic opening door lock, use the ultrasound I D recognition technology in cryptographic algorithm and setting range, it possesses higher safe class, the transmission of ultrasonic signal, monitor and identify and automatically carry out, without the need to human intervention, add reliability, background server and door access machine can dynamically update and allow the user passed through to realize flexible management, in addition, without key door-opening mode, for physical disabilities provide, more ID easily identify passage, by adopting ultrasound I D recognition technology, utilize existing hand-held mobile terminal and the existing loudspeaker of door access machine and microphone, greatly reduce the cost of current gate inhibition's hardware update, social resources are saved, its security is higher, reduce use cost, reliability is higher, reduce the renewal cost of gate inhibition's hardware.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the process flow diagram that the present invention is based on method in hyperacoustic gate inhibition's personal identification method and device embodiment;
Fig. 2 is the structural representation of device in described embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under the prerequisite of not making creative work, all belongs to the scope of protection of the invention.
Other a lot of equipment of mobile phone and surrounding has loudspeaker and microphone.These two kinds of hardware can transmit and receive data with sound, are similar to the thing that modulator-demodular unit is done on a telephone line.If the frequency that operating system support sends and receives is enough high, a noiseless data channel so just can be created.Ultrasound wave is a kind of frequency higher than the sound wave of 20000 hertz, its good directionality, and penetration capacity is strong, and acoustic energy ratio is more concentrated, in medical science, military affairs, industry with agriculturally there is a lot of application.Hyperacoustic lower-frequency limit is greater than the upper limit of hearing of people.Like this, just can send ultrasound wave by loudspeaker, accept ultrasound wave by microphone.High pitch loudspeaker specially playback power amplifier export sound signal in HFS, its operating frequency range is generally 2.5kHz-25kHz.Squawker specially playback power amplifier export sound signal in intermediate-frequency section, its operating frequency range is generally 500Hz-7500Hz.Woofer is compared with high, Squawker, and woofer is then reset low frequency signal specially, and its frequency of operation is generally 15Hz-5000Hz.Full range speaker refers to that the frequency of work can cover the high, medium and low full frequency band of audio frequency.Based on these technical foundation, the present invention uses a kind of based on hyperacoustic gate inhibition ID recognition technology, will describe in detail below to it.
The present invention is based in hyperacoustic gate inhibition's personal identification method and device embodiment, its process flow diagram based on hyperacoustic gate inhibition's personal identification method as shown in Figure 1.Gate identification system is applied to based on hyperacoustic gate inhibition's personal identification method in the present embodiment.In Fig. 1, should comprise the steps: based on hyperacoustic gate inhibition's personal identification method
The each user of step S01 installs access control APP on its hand-held mobile terminal, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by background server, and the ID of log-on message and door access machine is bound, encryption key is handed down to hand-held mobile terminal by background server, decruption key is handed down to door access machine: in this step, need each user of gate inhibition's identification, on its hand-held mobile terminal, access control APP is installed, then the registration of access control APP user is carried out, specifically its identity ID is used to carry out registering (certification registration) at background server exactly, distribute corresponding encryption key and decruption key by background server simultaneously, and the ID of log-on message and door access machine is bound, access information correspondence table will be generated like this, encryption key is handed down to hand-held mobile terminal by background server, decruption key is handed down to door access machine, above-mentioned access information correspondence table comprises gate inhibition ID, the log-on message of user, encryption key and decryption key information etc., this access information correspondence table is saved in database.Certainly, the positional information of door access machine can also be comprised in access information table.
It is worth mentioning that, in the present embodiment, identity ID preferably can select the dynamic password of phone number or ID (identity number) card No. or SMS, namely the recognition method of identity ID can comprise with phone number be unique ID recognition method, with ID (identity number) card No. be unique ID recognition method and take the dynamic password of SMS as the recognition method of unique ID, can be selected any one in three.Certainly, under the certain situation of the present embodiment, the recognition method of identity ID also can be not limited to above-mentioned three kinds of ID recognition method, also can adopt other recognition method: it is the recognition method of unique ID that the recognition method being such as unique ID with ID (identity number) card No. can replace with Hongkong and Macro's passnumber or passport number etc.Hand-held mobile terminal can be mobile phone or panel computer etc.
Step S02 door access machine obtains the log-on message of each user from background server by network, and be saved in local data base: in this step, door access machine obtains the log-on message of relevant each user from background server by network, and download and be saved in local data base, local data base can in real time and the data of background server keep synchronous.Execute this step, can select as the case may be to perform step S03 or step S03 '.
Step S03 background server obtains the positional information of door access machine and the positional information of hand-held mobile terminal, and the distance calculated between hand-held mobile terminal and door access machine: in this step, background server obtains the positional information of door access machine and the positional information of hand-held mobile terminal, then calculates the distance between hand-held mobile terminal and door access machine.Execute this step, perform step S04.
Step S03 ' background server obtains the positional information of door access machine, and send it to the access control APP of hand-held mobile terminal, the access control APP of hand-held mobile terminal calculates the distance between hand-held mobile terminal and door access machine: in this step, background server obtains the positional information of door access machine, and send it to the access control APP of hand-held mobile terminal, then, the access control APP of hand-held mobile terminal calculates the distance between hand-held mobile terminal and door access machine.Execute this step, perform step S04.
Step S04 judges distance between hand-held mobile terminal and door access machine whether in setting range: in this step, judge distance between hand-held mobile terminal and door access machine whether in setting range, namely judge distance between hand-held mobile terminal and associated door access machine whether in setting range, specifically, if the distance between hand-held mobile terminal and door access machine is calculated by background server, then in this step, distance between hand-held mobile terminal and door access machine is judged whether in setting range by background server, if the distance between hand-held mobile terminal and door access machine is calculated by the access control APP of hand-held mobile terminal, then in this step, distance between hand-held mobile terminal and door access machine is judged whether in setting range by the access control APP of hand-held mobile terminal, in this step, if the result judged is yes, then perform step S05, otherwise, return step S03 or step S03 '.It is worth mentioning that, in the present embodiment, setting range is 5 meters, and certainly, under the certain situation of the present embodiment, the size of setting range to adjust as the case may be, such as: 4 meters, 6 meters etc.
The access control APP of step S05 hand-held mobile terminal uses cryptographic algorithm and encryption key to be encrypted identity ID and obtains cipher-text information, and cipher-text information is converted to the Frame meeting setting data form: if the result that above-mentioned steps S04 judges is yes, namely determine that the distance between hand-held mobile terminal and associated door access machine is less than 5 meters of scopes, then perform this step.In this step, the access control APP of hand-held mobile terminal uses cryptographic algorithm and encryption key to be encrypted identity ID, identity ID is expressly become cipher-text information, and cipher-text information is converted to the Frame meeting setting data form.In the present embodiment, cryptographic algorithm is rivest, shamir, adelman.Such as: identity ID is originally expressly 510105, after encryption, cipher-text information $ #^* & % is just become.It is worth mentioning that, above-mentioned setting data form comprises target seeker, 8 bit length codes, the longest 128 bit data codes and 8 bit check codes, the namely data layout of a frame.Such as: cipher-text information $ #^* & % leaves in numeric data code.In the present embodiment, hand-held mobile terminal is provided with ultrasonic transmitter, when transmitting identity ID, carries out in ultrasonic transmitter.Execute this step, perform step S06.
Frame is converted to ultrasonic signal by ultrasonic digital coded system by the access control APP of step S06 hand-held mobile terminal, and the horn launch of ultrasonic signal from hand-held mobile terminal is gone out: this step, above-mentioned cipher-text information is converted to the Frame meeting setting data form by the access control APP of hand-held mobile terminal, and this Frame is converted to ultrasonic signal by ultrasonic digital coded system, then the horn launch of ultrasonic signal from hand-held mobile terminal is gone out.Above-mentioned ultrasonic digital coded system adopts 100%ASK numerical coding, use 24KHz ultrasonic wave modulation, adopt the byte code order of LSB, bit rate is 1200bit/sec, single-bit 0.8333ms interval time, is just converted to the ultrasonic signal of physics by Frame by ultrasonic digital coded system.By being encrypted identity ID, the security of data can be ensured like this, to prevent eavesdropping.Execute this step, perform step S07.
Step S07 door access machine carries out ultrasonic monitoring and judges whether to receive the ultrasonic signal of hand-held mobile terminal transmitting: when hand-held mobile terminal walks close to drop into the scope of ultrasonic communication, door access machine will receive the ultrasonic signal from hand-held mobile terminal.In this step, door access machine carries out ultrasonic monitoring and judges whether it receives the ultrasonic signal of hand-held mobile terminal transmitting, if the result judged is yes, then performs step S08; Otherwise, return step S06.What be worth one carries, and in the present embodiment, door access machine is provided with ultrasonic receiver, and ultrasonic receiver is used for receiving the ultrasonic signal that hand-held mobile terminal is launched.
Ultrasonic signal is carried out demodulation according to ultrasonic digital coded system and obtains Frame by step S08 door access machine, and according to setting data form, parsing is carried out to the Frame of demodulation and obtain cipher-text information, and according to cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information: if the judged result of above-mentioned steps S07 is yes, then perform this step.In this step, door access machine receives ultrasonic signal, according to ultrasonic digital coded system, demodulate Frame, this data frame packet is containing target seeker, 8 bit length codes, 128 bit data codes (including cipher-text information) and 8 bit check codes, and the Frame of demodulation is resolved, obtain cipher-text information, such as: $ #^* & %.Then, then according to cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information 510105, be namely reduced to identity ID.Execute this step, perform step S09.
Log-on message in cleartext information and local data base is compared by step S09 door access machine, and judge whether the information that matches: in this step, log-on message in the cleartext information that step S08 obtains by door access machine and local data base is compared, and judge whether the information that matches, namely judge in local data base, whether there be the identity ID identical with cleartext information (identity ID), if the result judged is yes, do not carry out authentication registration before the user of namely current handheld mobile terminal, then perform step S11; Otherwise, perform step S10.
Step S10 returns that it fails to match: if the judged result of above-mentioned steps S09 is no, carries out authentication registration mistake, then perform this step before the user of namely current handheld mobile terminal.In this step, return the information that it fails to match, at this moment door lock just can not be opened.
Step S11 door access machine automatic opening door lock: if the judged result of above-mentioned steps S09 is yes, then perform this step.In this step, door access machine automatic opening door lock, waits for that the user of current handheld mobile terminal enters.It is worth mentioning that, in the present embodiment, ultrasonic receiver is provided with and suppresses undesired signal software module, effectively can suppress the interference of ultrasonic reflections ripple.Advantage is strong interference immunity, even if under 80dB neighbourhood noise, can also carry out effective communication.By using ultrasound I D recognition technology, it possesses higher safe class, in addition, without key door-opening mode, for physical disabilities provide, more ID easily identify passage, by adopting ultrasound I D recognition technology, greatly reducing the cost of current gate inhibition's hardware update, having saved social resources, due to without the need to manual intervention, it can respond fast, it is simple and convenient to use.
The present embodiment also relates to and a kind ofly realizes the above-mentioned device based on hyperacoustic gate inhibition's personal identification method, and its structural representation as shown in Figure 2.In Fig. 2, this device comprises that registration binding issues unit 1, acquisition of information storage unit 2, position acquisition computing unit 3, position acquisition delivery unit 3 ', Distance Judgment unit 4, ultrasonic signal switching emission unit 5, information receive judging unit 6 and comparing unit 7; Wherein, registration binding issues unit 1 and on its hand-held mobile terminal, installs access control APP for making each user, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by background server, and the ID of log-on message and door access machine is bound, encryption key is handed down to hand-held mobile terminal by background server, and decruption key is handed down to door access machine; The log-on message of acquisition of information storage unit 2 for making door access machine be obtained each user from background server by network, and be saved in local data base; Position acquisition computing unit 3 obtains the positional information of door access machine and the positional information of hand-held mobile terminal for making background server, and calculates the distance between hand-held mobile terminal and door access machine; The positional information of position acquisition delivery unit 3 ' for making background server obtain door access machine, and send it to the access control APP of hand-held mobile terminal, the access control APP of hand-held mobile terminal calculates the distance between hand-held mobile terminal and door access machine; Distance Judgment unit 4 is for judging distance between hand-held mobile terminal and door access machine whether in setting range, in this way, the access control APP of hand-held mobile terminal uses cryptographic algorithm and encryption key to be encrypted identity ID and obtains cipher-text information, and cipher-text information is converted to the Frame meeting setting data form; Otherwise, carry out position acquisition; Frame is converted to ultrasonic signal by ultrasonic digital coded system for making the access control APP of hand-held mobile terminal by ultrasonic signal switching emission unit 5, and is gone out by the horn launch of ultrasonic signal from hand-held mobile terminal; Information receives judging unit 6 for making door access machine carry out ultrasonic monitoring and judging whether that receiving hand-held mobile terminal launches ultrasonic signal, in this way, ultrasonic signal is carried out demodulation according to ultrasonic digital coded system and obtains Frame by door access machine, and according to setting data form, parsing is carried out to the Frame of demodulation and obtain cipher-text information, and according to cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information; Otherwise, carry out conversion and the transmitting of ultrasonic signal; Log-on message in cleartext information and local data base is compared for making door access machine by comparing unit 7, and judges whether the information that matches, if any, then door access machine automatic opening door lock; Otherwise, return that it fails to match.By using ultrasound I D recognition technology, it possesses higher safe class, in addition, without key door-opening mode, for physical disabilities provide, more ID easily identify passage, by adopting ultrasound I D recognition technology, the renewal cost greatly reduce the cost of current gate inhibition's hardware update, saved social resources, its security is higher, reduction use cost, reliability are higher, reducing gate inhibition's hardware.
In the present embodiment, identity ID is the dynamic password of phone number or ID (identity number) card No. or SMS.Cryptographic algorithm is rivest, shamir, adelman, and above-mentioned setting data form comprises target seeker, 8 bit length codes, 128 bit data codes and 8 bit check codes.Above-mentioned ultrasonic digital coded system adopts 100%ASK numerical coding, uses 24KHz ultrasonic wave modulation, adopts the byte code order of LSB.
In a word, in the present embodiment, achieve and identified by the identity ID based on ultrasonic technology in a mobile environment.By adopting ultrasonic technology, achieve the communication of hand-held mobile terminal and door access machine.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. based on hyperacoustic gate inhibition's personal identification method, it is characterized in that, described method comprises the steps:
A) each user installs access control APP on its hand-held mobile terminal, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by described background server, and the ID of log-on message and door access machine is bound, described encryption key is handed down to described hand-held mobile terminal by described background server, and described decruption key is handed down to described door access machine;
B) described door access machine obtains the described log-on message of each user from described background server by network, and is saved in local data base; Perform step C) or C ');
C) described background server obtains the positional information of described door access machine and the positional information of described hand-held mobile terminal, and calculates the distance between described hand-held mobile terminal and described door access machine, performs step D);
C ') described background server obtains the positional information of described door access machine, and send it to the access control APP of described hand-held mobile terminal, the access control APP of described hand-held mobile terminal calculates the distance between described hand-held mobile terminal and described door access machine, performs step D);
D) distance between described hand-held mobile terminal and described door access machine is judged whether in setting range, in this way, the access control APP of described hand-held mobile terminal uses cryptographic algorithm and described encryption key to be encrypted described identity ID and obtains cipher-text information, and described cipher-text information is converted to the Frame meeting setting data form, perform step e); Otherwise, return step C) or C ');
E) described Frame is converted to ultrasonic signal by ultrasonic digital coded system by the access control APP of described hand-held mobile terminal, and is gone out by the horn launch of described ultrasonic signal from described hand-held mobile terminal, performs step F);
F) described door access machine carries out ultrasonic monitoring and judges whether to receive the ultrasonic signal of described hand-held mobile terminal transmitting, in this way, described ultrasonic signal is carried out demodulation according to described ultrasonic digital coded system and obtains described Frame by described door access machine, and according to described setting data form, parsing is carried out to the Frame of demodulation and obtain described cipher-text information, and according to described cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information, perform step G); Otherwise, return step e);
G) log-on message in described cleartext information and described local data base is compared by described door access machine, and judges whether the information that matches, if any, then described door access machine automatic opening door lock; Otherwise, return that it fails to match.
2. according to claim 1ly it is characterized in that based on hyperacoustic gate inhibition's personal identification method, described identity ID is the dynamic password of phone number or ID (identity number) card No. or SMS.
3. according to claim 1 and 2ly it is characterized in that based on hyperacoustic gate inhibition's personal identification method, described cryptographic algorithm is rivest, shamir, adelman.
4. according to claim 3ly it is characterized in that based on hyperacoustic gate inhibition's personal identification method, described setting data form comprises target seeker, 8 bit length codes, 128 bit data codes and 8 bit check codes.
5. according to claim 3ly it is characterized in that based on hyperacoustic gate inhibition's personal identification method, described ultrasonic digital coded system adopts 100%ASK numerical coding, uses 24KHz ultrasonic wave modulation, adopts the byte code order of LSB.
6. realize, as claimed in claim 1 based on a device for hyperacoustic gate inhibition's personal identification method, it is characterized in that, comprising:
Registration binding issues unit: on its hand-held mobile terminal, install access control APP for making each user, identity ID is used to carry out the registration of access control APP user at background server, and generate corresponding encryption key and decruption key by described background server, and the ID of log-on message and door access machine is bound, described encryption key is handed down to described hand-held mobile terminal by described background server, and described decruption key is handed down to described door access machine;
Acquisition of information storage unit: for the described log-on message making described door access machine be obtained each user from described background server by network, and be saved in local data base;
Position acquisition computing unit: for making described background server obtain the positional information of described door access machine and the positional information of described hand-held mobile terminal, and calculate the distance between described hand-held mobile terminal and described door access machine;
Position acquisition delivery unit: for the positional information making described background server obtain described door access machine, and sending it to the access control APP of described hand-held mobile terminal, the access control APP of described hand-held mobile terminal calculates the distance between described hand-held mobile terminal and described door access machine;
Distance Judgment unit: for judging distance between described hand-held mobile terminal and described door access machine whether in setting range, in this way, the access control APP of described hand-held mobile terminal uses cryptographic algorithm and described encryption key to be encrypted described identity ID and obtains cipher-text information, and described cipher-text information is converted to the Frame meeting setting data form; Otherwise, carry out position acquisition;
Ultrasonic signal switching emission unit: for making the access control APP of described hand-held mobile terminal that described Frame is converted to ultrasonic signal by ultrasonic digital coded system, and the horn launch of described ultrasonic signal from described hand-held mobile terminal is gone out;
Information receives judging unit: carry out ultrasonic monitoring for making described door access machine and judge whether to receive the ultrasonic signal that described hand-held mobile terminal launches, in this way, described ultrasonic signal is carried out demodulation according to described ultrasonic digital coded system and obtains described Frame by described door access machine, and according to described setting data form, parsing is carried out to the Frame of demodulation and obtain described cipher-text information, and according to described cryptographic algorithm and decruption key the cipher-text information be resolved to is decrypted and obtains cleartext information; Otherwise, carry out conversion and the transmitting of ultrasonic signal;
Comparing unit: for making described door access machine be compared by the log-on message in described cleartext information and described local data base, and judge whether the information that matches, if any, then described door access machine automatic opening door lock; Otherwise, return that it fails to match.
7. device according to claim 6, is characterized in that, described identity ID is the dynamic password of phone number or ID (identity number) card No. or SMS.
8. the device according to claim 6 or 7, is characterized in that, described cryptographic algorithm is rivest, shamir, adelman.
9. device according to claim 8, is characterized in that, described setting data form comprises target seeker, 8 bit length codes, 128 bit data codes and 8 bit check codes.
10. device according to claim 8, is characterized in that, described ultrasonic digital coded system adopts 100%ASK numerical coding, uses 24KHz ultrasonic wave modulation, adopts the byte code order of LSB.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510650740.4A CN105303659B (en) | 2015-10-10 | 2015-10-10 | A kind of gate inhibition's personal identification method and device based on ultrasonic wave |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510650740.4A CN105303659B (en) | 2015-10-10 | 2015-10-10 | A kind of gate inhibition's personal identification method and device based on ultrasonic wave |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105303659A true CN105303659A (en) | 2016-02-03 |
CN105303659B CN105303659B (en) | 2017-11-10 |
Family
ID=55200874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510650740.4A Active CN105303659B (en) | 2015-10-10 | 2015-10-10 | A kind of gate inhibition's personal identification method and device based on ultrasonic wave |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105303659B (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105679000A (en) * | 2016-02-24 | 2016-06-15 | 南京阙音文化传媒有限公司 | System for operating control device by utilizing sound wave and operation method of system |
CN105915334A (en) * | 2016-03-24 | 2016-08-31 | 南京阙音文化传媒有限公司 | Sound wave remote control method based on cloud verification |
CN106023352A (en) * | 2016-05-03 | 2016-10-12 | 东南和创(厦门)电梯安全科技有限公司 | Entrance guard control method |
CN106097492A (en) * | 2016-06-03 | 2016-11-09 | 深圳大学 | A kind of gate inhibition's access control method and gate control system |
CN106097486A (en) * | 2016-05-26 | 2016-11-09 | 深圳市前海速普得技术有限公司 | The verification method of a kind of gate inhibition's password based on sonic transmissions and checking system |
CN106355698A (en) * | 2016-08-28 | 2017-01-25 | 刘建林 | Gate opening method and system based on mobile phone coordinates |
CN106887066A (en) * | 2017-03-29 | 2017-06-23 | 深圳市前海速普得技术有限公司 | A kind of Door-access control method and device based on ultrasonic wave |
CN107046524A (en) * | 2016-11-29 | 2017-08-15 | 深圳智乐信息科技有限公司 | It is a kind of based on ultrasonic wave use intelligent entrance guard method and system |
CN107134039A (en) * | 2017-06-27 | 2017-09-05 | 上海星尘电子科技有限公司 | Acoustic communication smart lock and acoustic communication intelligent lock system |
CN107545619A (en) * | 2016-06-23 | 2018-01-05 | 苏州触达信息技术有限公司 | A kind of sound wave gate control system and sound wave access control method |
WO2018006347A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Verification method and system based on ultrasonic wave |
WO2018006345A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Method and system for verifying intelligent entrance guard based on ultrasonic wave |
WO2018006343A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Intelligent entrance guard management method and system based on ultrasonic wave |
WO2018006344A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Ultrasound-based operation method and system for intelligent access control |
WO2018006346A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Police calling method and system based on mobile terminal and ultrasound |
CN107679379A (en) * | 2017-04-18 | 2018-02-09 | 上海擎云物联网股份有限公司 | A kind of Voiceprint Recognition System and recognition methods |
CN107993315A (en) * | 2017-11-27 | 2018-05-04 | 北京长城华冠汽车技术开发有限公司 | Car door system for unlocking, unlocking method and automobile based on visible light communication technology |
CN108230512A (en) * | 2018-01-22 | 2018-06-29 | 成都清轻信息技术有限公司 | Security certificate unlocking system and method based on sound wave Streaming Media |
CN108877015A (en) * | 2018-07-17 | 2018-11-23 | 黄月英 | Novel access control system based on GIS |
CN109285003A (en) * | 2018-11-23 | 2019-01-29 | 深圳市万通顺达科技股份有限公司 | Two dimensional code call-out method based on ultrasound, device, payment system |
CN109840974A (en) * | 2019-01-18 | 2019-06-04 | 深圳市沃特沃德股份有限公司 | Unlocking cipher generation method, device, terminal device and system |
CN110675541A (en) * | 2019-11-04 | 2020-01-10 | 北京海益同展信息科技有限公司 | Access control method, access processing method, device and system |
CN110956798A (en) * | 2019-11-27 | 2020-04-03 | 吴明远 | Access control method and device and user terminal |
CN110969775A (en) * | 2018-09-29 | 2020-04-07 | 京东数字科技控股有限公司 | Article access method, electronic device, self-service cabinet and computer-readable storage medium |
CN112735007A (en) * | 2020-12-25 | 2021-04-30 | 熵基科技股份有限公司 | Access control method, software platform and access control system |
CN113012325A (en) * | 2021-03-22 | 2021-06-22 | 江门职业技术学院 | Control method, system, terminal and storage medium of ultrasonic access control |
CN113096293A (en) * | 2021-03-17 | 2021-07-09 | 国网河北省电力有限公司邯郸供电分公司 | Intelligent access system of transformer substation |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977562B (en) * | 2017-11-30 | 2021-11-02 | 努比亚技术有限公司 | Identity recognition method, recognition terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999055057A2 (en) * | 1998-04-16 | 1999-10-28 | Filetrac A/S | A system for supervision and control of objects or persons |
CN103795540A (en) * | 2013-11-14 | 2014-05-14 | 深圳光启创新技术有限公司 | Mobile device, authentication device and authentication system |
CN104112307A (en) * | 2014-06-24 | 2014-10-22 | 福建歌航电子信息科技有限公司 | Electronic lock by using sound waves for unlocking and unlocking method thereof |
CN104143230A (en) * | 2014-07-29 | 2014-11-12 | 诚迈科技(南京)股份有限公司 | Intelligent lock system |
CN104867214A (en) * | 2015-05-22 | 2015-08-26 | 青岛歌尔声学科技有限公司 | Acoustic wave recognition based door opening method and system |
-
2015
- 2015-10-10 CN CN201510650740.4A patent/CN105303659B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999055057A2 (en) * | 1998-04-16 | 1999-10-28 | Filetrac A/S | A system for supervision and control of objects or persons |
CN103795540A (en) * | 2013-11-14 | 2014-05-14 | 深圳光启创新技术有限公司 | Mobile device, authentication device and authentication system |
CN104112307A (en) * | 2014-06-24 | 2014-10-22 | 福建歌航电子信息科技有限公司 | Electronic lock by using sound waves for unlocking and unlocking method thereof |
CN104143230A (en) * | 2014-07-29 | 2014-11-12 | 诚迈科技(南京)股份有限公司 | Intelligent lock system |
CN104867214A (en) * | 2015-05-22 | 2015-08-26 | 青岛歌尔声学科技有限公司 | Acoustic wave recognition based door opening method and system |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105679000A (en) * | 2016-02-24 | 2016-06-15 | 南京阙音文化传媒有限公司 | System for operating control device by utilizing sound wave and operation method of system |
CN105915334A (en) * | 2016-03-24 | 2016-08-31 | 南京阙音文化传媒有限公司 | Sound wave remote control method based on cloud verification |
CN106023352A (en) * | 2016-05-03 | 2016-10-12 | 东南和创(厦门)电梯安全科技有限公司 | Entrance guard control method |
CN106097486A (en) * | 2016-05-26 | 2016-11-09 | 深圳市前海速普得技术有限公司 | The verification method of a kind of gate inhibition's password based on sonic transmissions and checking system |
CN106097492A (en) * | 2016-06-03 | 2016-11-09 | 深圳大学 | A kind of gate inhibition's access control method and gate control system |
CN107545619A (en) * | 2016-06-23 | 2018-01-05 | 苏州触达信息技术有限公司 | A kind of sound wave gate control system and sound wave access control method |
WO2018006344A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Ultrasound-based operation method and system for intelligent access control |
WO2018006346A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Police calling method and system based on mobile terminal and ultrasound |
WO2018006347A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Verification method and system based on ultrasonic wave |
WO2018006345A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Method and system for verifying intelligent entrance guard based on ultrasonic wave |
WO2018006343A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Intelligent entrance guard management method and system based on ultrasonic wave |
CN106355698A (en) * | 2016-08-28 | 2017-01-25 | 刘建林 | Gate opening method and system based on mobile phone coordinates |
CN107046524A (en) * | 2016-11-29 | 2017-08-15 | 深圳智乐信息科技有限公司 | It is a kind of based on ultrasonic wave use intelligent entrance guard method and system |
CN106887066A (en) * | 2017-03-29 | 2017-06-23 | 深圳市前海速普得技术有限公司 | A kind of Door-access control method and device based on ultrasonic wave |
CN107679379A (en) * | 2017-04-18 | 2018-02-09 | 上海擎云物联网股份有限公司 | A kind of Voiceprint Recognition System and recognition methods |
CN107134039A (en) * | 2017-06-27 | 2017-09-05 | 上海星尘电子科技有限公司 | Acoustic communication smart lock and acoustic communication intelligent lock system |
CN107993315A (en) * | 2017-11-27 | 2018-05-04 | 北京长城华冠汽车技术开发有限公司 | Car door system for unlocking, unlocking method and automobile based on visible light communication technology |
CN108230512A (en) * | 2018-01-22 | 2018-06-29 | 成都清轻信息技术有限公司 | Security certificate unlocking system and method based on sound wave Streaming Media |
CN108877015A (en) * | 2018-07-17 | 2018-11-23 | 黄月英 | Novel access control system based on GIS |
CN110969775A (en) * | 2018-09-29 | 2020-04-07 | 京东数字科技控股有限公司 | Article access method, electronic device, self-service cabinet and computer-readable storage medium |
CN109285003A (en) * | 2018-11-23 | 2019-01-29 | 深圳市万通顺达科技股份有限公司 | Two dimensional code call-out method based on ultrasound, device, payment system |
CN109840974A (en) * | 2019-01-18 | 2019-06-04 | 深圳市沃特沃德股份有限公司 | Unlocking cipher generation method, device, terminal device and system |
CN110675541A (en) * | 2019-11-04 | 2020-01-10 | 北京海益同展信息科技有限公司 | Access control method, access processing method, device and system |
CN110956798A (en) * | 2019-11-27 | 2020-04-03 | 吴明远 | Access control method and device and user terminal |
CN112735007A (en) * | 2020-12-25 | 2021-04-30 | 熵基科技股份有限公司 | Access control method, software platform and access control system |
CN113096293A (en) * | 2021-03-17 | 2021-07-09 | 国网河北省电力有限公司邯郸供电分公司 | Intelligent access system of transformer substation |
CN113012325A (en) * | 2021-03-22 | 2021-06-22 | 江门职业技术学院 | Control method, system, terminal and storage medium of ultrasonic access control |
Also Published As
Publication number | Publication date |
---|---|
CN105303659B (en) | 2017-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105303659A (en) | Method and device for identifying access control identity based on ultrasonic waves | |
US20180329676A1 (en) | Access control and validation using sonic tones | |
JP6938702B2 (en) | Hearing devices with communication protection and related methods | |
CN107592308B (en) | Double-server multi-factor authentication method oriented to mobile payment scene | |
CN103237030A (en) | Biological recognition-based user authentication method and system | |
CN105141615A (en) | Method and system for opening account remotely, authentication method and system | |
CN104917715B (en) | Information processing method, information processing unit, server and electronic equipment | |
WO2016201811A1 (en) | Identity authentication method, apparatus and system | |
CN104955044B (en) | Target network access and its guidance method and its corresponding terminal | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
EP3386165B1 (en) | Method and device for implementing and managing secure communications, provisioning systems, authentication and signing systems | |
CN103561044A (en) | Data transmission method and data transmission system | |
Halevi et al. | Acoustic eavesdropping attacks on constrained wireless device pairing | |
CN103973445A (en) | Two-channel login method and system | |
CN109150508A (en) | Equipment control and controlled method, device, computer equipment and storage medium | |
US20110135093A1 (en) | Secure telephone devices, systems and methods | |
CN103916725A (en) | Bluetooth headset | |
US8693686B2 (en) | Secure telephone devices, systems and methods | |
CN104869568A (en) | Audio-based monitoring system configuration method and system | |
CN106850671A (en) | The identity identifying method and its system of a kind of utilization acoustic communication | |
CN105279831A (en) | Method for controlling locking based on mobile equipment audio coding | |
CN103297940A (en) | Short message encryption communication system and method | |
CN115776413B (en) | Iris encryption-based data transmission method and system | |
GB2602895A (en) | A method and system for authenticating a device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |