CN105577366B - Sound wave based on embedded device generates and recognition methods - Google Patents
Sound wave based on embedded device generates and recognition methods Download PDFInfo
- Publication number
- CN105577366B CN105577366B CN201510950494.4A CN201510950494A CN105577366B CN 105577366 B CN105577366 B CN 105577366B CN 201510950494 A CN201510950494 A CN 201510950494A CN 105577366 B CN105577366 B CN 105577366B
- Authority
- CN
- China
- Prior art keywords
- sonic data
- sound wave
- embedded device
- module
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000001514 detection method Methods 0.000 claims abstract description 14
- 230000002452 interceptive effect Effects 0.000 claims abstract description 4
- 230000000737 periodic effect Effects 0.000 claims description 15
- 238000012795 verification Methods 0.000 claims description 5
- 238000010200 validation analysis Methods 0.000 claims description 2
- 238000011160 research Methods 0.000 abstract description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The invention discloses a kind of sound wave generation and recognition methods based on embedded device comprising customized sonic data generation module, sound wave are except module of making an uproar, the detection of customized sonic data and identification module, effective sonic data determination module and sonic data twin check module.It can identify customized sonic data, and identify except making an uproar and take twin check for sonic data.The present invention is based on Linux embedded platforms to be generated using the sound wave of independent research, except making an uproar, identifying and checking algorithm, and Linux embedded device platform is relied on, and increases a kind of new mode for Linux embedded device secure interactive.
Description
Technical field
The present invention relates to a kind of sound wave generation and recognition methods based on embedded device.
Background technique
With the development of social science and technology, Linux embedded device is more and more accepted by people and uses, than
Such as various intelligent terminals.But there are security risk during using these Linux embedded devices, undesirable passes through
Network is kidnapped, and the means such as wooden horse obtain user identity, account number cipher and associated privacy information, is seriously endangered user benefit, is caused
The property of user is impaired.
Summary of the invention
Object of the present invention is to: provide that a kind of sound wave based on embedded device generates and recognition methods linux is embedded sets
The new method of secure interactive between standby.
It according to foregoing invention purpose, provides the following technical solutions: a kind of sound wave generation and identification based on embedded device
Method comprising following steps:
S0: sonic data generation module, sound wave are provided except module of making an uproar, sonic data detection and identification module, effective sound wave
Data judging module and sonic data twin check module;
Privacy information is converted into the sonic data of user-defined format by sound wave generation module by the S1: the first equipment, is passed through
The audio interface of first equipment plays;
S2: the second equipment removes the noise in module removal reception sonic data of making an uproar by sound wave, the sound after removal noise
Wave number is according to the sonic data detection and identification module for passing to the second equipment;
S3: the second equipment receives the sonic data of the first equipment by sonic data detection with identification module, passes through detection
Whether comprising continuous customized sonic data head and CRC check end value in sonic data, to judge currently received sound
Whether wave number is according to including customized sonic data, wherein customized sonic data format is as follows:
After detecting in sonic data comprising customized sonic data, sonic data is passed through recognizer by identification module
Privacy information is translated into, and privacy information is passed into effective sonic data determination module;
And recognizer is described as follows:
The each byte of sound wave encryption data is 8, is calculated using the periodic function of 8 kinds of different cycles it, and will
As a result it is superimposed, every kind of period represents an of a byte
Citing: the byte value before identification is 0xFF, binary one 1111111;
Byte value after identification is 0x02, Binary Zero 0000010.
Then there was only the waveform of the 7th kind of periodic function, other positions are all 0.
S4: the second equipment receives the sonic data detection from the second equipment by effective sonic data determination module and knows
The privacy information of other module differentiates the effective of sonic data by detecting length and the privacy information building form of privacy information
Property, and the privacy information after correct decision is passed into sonic data twin check module;
S5: the second equipment receives effective sonic data from the second equipment by sonic data twin check module and determines
The privacy information of module and the sonic data of the sonic data of the second equipment detection and identification module, pass through CRC validation and sound wave
The time tolerance of data verifies, to verify the accuracy of privacy information.
Preferably, secure interactive information of the sonic data of the user-defined format between embedded device.
Preferably, the embedded device is Linux equipment.
Preferably, generate and identify the principle of customized sonic data for periodical letter in the sonic data generation module
Then number is added multiplied by oneself period can obtain a positive number, and periodic function is close multiplied by the last addition result of other functions
0。
Preferably, the periodic function used is the combination of SIN function sin and cosine function cos.
Preferably, the periodic function use 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/
11。
Preferably, the sonic data of user-defined format includes data head, data segment, timestamp and CRC check section.
Preferably, the data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
Preferably, be that each byte is 8 in sound wave encryption data, using 8 kinds of different cycles periodic function to its into
Row calculates, and result is superimposed, and every kind of period represents one of a byte.
The invention has the advantages that: there is the present invention sound wave to remove noise ability, avoid external noise to the shadow of sound wave identification module
It rings;Using the sound wave generating algorithm of independent research, by privacy information sound wave;Using customized sound wave identification technology, by privacy
Information is extracted from customized sonic data and is restored.The present invention uses double verification mechanism to the privacy information after identification,
Achieve the purpose that precise verification.
Detailed description of the invention
Fig. 1 is structure chart of the invention.
Fig. 2 is flow chart of the invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawing
Embodiment: as shown in Figs. 1-2, for a kind of sound wave generation and recognition methods based on embedded device of the present invention
Embodiment comprising following steps:
User inputs privacy information using the first Linux embedded device, and the first Linux embedded device is by privacy information
It is converted to customized sonic data to play by the audio interface of the equipment itself, at this moment external noise is also mixed into wherein;Its
Middle privacy information includes identity information, payment information, encrypted message etc..
The customized sonic data of the first Linux embedded device of 2nd Linux embedded device short distance reception and the external world
Noise by receiving the noise composition in sonic data except the removal of noise module, and carries out customized sound wave identification to it, restores
Double verification is done at user privacy information, and to privacy information, to achieve the purpose that precise verification.
Wherein generate and identify the principle of customized sonic data are as follows:
Then periodic function is added multiplied by oneself period can obtain a positive number;
Periodic function is multiplied by the last addition result of other functions close to 0.
Preferably, the periodic function used is the combination of SIN function sin and cosine function cos.
Preferably, the periodic function use 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/
11。
Preferably, the sonic data of user-defined format includes data head, data segment, timestamp and CRC check section.
Preferably, the data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
Preferably, be that each byte is 8 in sound wave encryption data, using 8 kinds of different cycles periodic function to its into
Row calculates, and result is superimposed, and every kind of period represents one of a byte.
Implementing procedure is exemplified below:
User enters the password of the 2nd Linux embedded device application system by the input of the first Linux embedded device
Information, then the first Linux embedded device by encrypted message be converted into customized sonic data by the first Linux it is embedded
Equipment audio port plays what the first Linux embedded device audio interface of the 2nd Linux embedded device short distance reception of played
Sonic data, detection, denoises and identifies customized sonic data, and carries out valid data detection with after twin check, allows
User accesses the application system of the 2nd Linux embedded device by the first Linux embedded device.
Certainly the above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow be familiar with technique
People can understand the content of the present invention and implement it accordingly, it is not intended to limit the scope of the present invention.It is all according to this hair
The equivalent transformation or modification that the Spirit Essence of bright main technical schemes is done, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of sound wave based on embedded device generates and recognition methods, it is characterised in that comprising:
S0: sonic data generation module, sound wave are provided except module of making an uproar, sonic data detection and identification module, effective sonic data
Determination module and sonic data twin check module;
Privacy information is converted into the sonic data of user-defined format by sound wave generation module by the S1: the first equipment, passes through first
The audio interface of equipment plays;
S2: the second equipment removes the noise in module removal reception sonic data of making an uproar by sound wave, the sound wave number after removal noise
According to the sonic data detection and identification module for passing to the second equipment;
S3: the second equipment receives the sonic data of the first equipment by sonic data detection with identification module, by detecting sound wave
Whether comprising continuous customized sonic data head and CRC check end value in data, to judge currently received sound wave number
Whether according to including customized sonic data, after detecting in sonic data comprising customized sonic data, identification module is by sound
Wave number evidence translates into privacy information by recognizer, and privacy information is passed to effective sonic data determination module;
S4: the second equipment receives sonic data detection and identification mould from the second equipment by effective sonic data determination module
The privacy information of block differentiates the validity of sonic data by detecting length and the privacy information building form of privacy information,
And the privacy information after correct decision is passed into sonic data twin check module;
S5: the second equipment receives effective sonic data determination module from the second equipment by sonic data twin check module
Privacy information and the second equipment sonic data detection and the sonic data of identification module, pass through CRC validation and sonic data
Time tolerance verification, to verify the accuracy of privacy information.
2. a kind of sound wave based on embedded device according to claim 1 generates and recognition methods, it is characterised in that: institute
State secure interactive information of the sonic data of user-defined format between embedded device.
3. a kind of sound wave based on embedded device according to claim 2 generates and recognition methods, it is characterised in that: institute
Stating embedded device is Linux equipment.
4. a kind of sound wave based on embedded device according to claim 1 generates and recognition methods, it is characterised in that: institute
It states and generates and identify that the principle of customized sonic data is that periodic function is right multiplied by oneself period in sonic data generation module
A positive number can be obtained by being added afterwards, and periodic function multiplied by the last addition result of other functions close to 0.
5. a kind of sound wave based on embedded device according to claim 4 generates and recognition methods, it is characterised in that: institute
State the combination that periodic function is SIN function sin and cosine function cos.
6. a kind of sound wave based on embedded device according to claim 5 generates and recognition methods, it is characterised in that: institute
Periodic function is stated using 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/11.
7. a kind of sound wave based on embedded device according to claim 6 generates and recognition methods, it is characterised in that: institute
The sonic data for stating user-defined format includes data head, data segment, timestamp and CRC check section.
8. a kind of sound wave based on embedded device according to claim 7 generates and recognition methods, it is characterised in that: institute
Stating data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510950494.4A CN105577366B (en) | 2015-12-18 | 2015-12-18 | Sound wave based on embedded device generates and recognition methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510950494.4A CN105577366B (en) | 2015-12-18 | 2015-12-18 | Sound wave based on embedded device generates and recognition methods |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105577366A CN105577366A (en) | 2016-05-11 |
CN105577366B true CN105577366B (en) | 2019-03-01 |
Family
ID=55887084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510950494.4A Active CN105577366B (en) | 2015-12-18 | 2015-12-18 | Sound wave based on embedded device generates and recognition methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105577366B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BR112019005438A2 (en) * | 2016-09-21 | 2019-06-18 | Mastercard International Inc | double data anonymization method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335755A (en) * | 2008-05-19 | 2008-12-31 | 北京深思洛克数据保护中心 | Method for enhancing security verified by information security device using acoustic information |
CN102394724A (en) * | 2011-11-01 | 2012-03-28 | 南京音优行信息技术有限公司 | Highly-reliable data transmission method and device based on dual tone multiple frequency sound waves |
CN104202337A (en) * | 2014-09-22 | 2014-12-10 | 上海众人科技有限公司 | Audio signal based data transmission system and method |
CN104954079A (en) * | 2015-06-15 | 2015-09-30 | 广东小天才科技有限公司 | Method and system for coding and decoding in sound wave communication |
-
2015
- 2015-12-18 CN CN201510950494.4A patent/CN105577366B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335755A (en) * | 2008-05-19 | 2008-12-31 | 北京深思洛克数据保护中心 | Method for enhancing security verified by information security device using acoustic information |
CN102394724A (en) * | 2011-11-01 | 2012-03-28 | 南京音优行信息技术有限公司 | Highly-reliable data transmission method and device based on dual tone multiple frequency sound waves |
CN104202337A (en) * | 2014-09-22 | 2014-12-10 | 上海众人科技有限公司 | Audio signal based data transmission system and method |
CN104954079A (en) * | 2015-06-15 | 2015-09-30 | 广东小天才科技有限公司 | Method and system for coding and decoding in sound wave communication |
Also Published As
Publication number | Publication date |
---|---|
CN105577366A (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10135818B2 (en) | User biological feature authentication method and system | |
US8862888B2 (en) | Systems and methods for three-factor authentication | |
CN104158664A (en) | Identity authentication method and system | |
CN105512535A (en) | User authentication method and user authentication device | |
TW201546642A (en) | Methods and apparatus to enhance security of authentication | |
Inthavisas et al. | Secure speech biometric templates for user authentication | |
CN102254559A (en) | Identity authentication system and method based on vocal print | |
WO2008127431A3 (en) | Systems and methods for identification and authentication of a user | |
CN110458662B (en) | Anti-fraud wind control method and device | |
CN109802942A (en) | A kind of voiceprint authentication method and system, mobile terminal of secret protection | |
CN104168117B (en) | A kind of speech digit endorsement method | |
CN107634834A (en) | A kind of trusted identity authentication method based on the more scenes in multiple terminals | |
CN109861946A (en) | Method, system and the call receiving apparatus of calling number verification | |
CN110110507A (en) | A kind of method, apparatus, system and the storage medium of soft ware authorization and protection | |
Nematollahi et al. | Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition | |
CN110505185A (en) | Auth method, equipment and system | |
CN105577366B (en) | Sound wave based on embedded device generates and recognition methods | |
CN104751042B (en) | Creditability detection method based on cryptographic hash and living things feature recognition | |
WO2017016038A1 (en) | Payment method, payment apparatus, terminal and payment system | |
CN104468979A (en) | Number password input method resistant to peeping and attacking based on voice prompt | |
Seo et al. | Construction of a new biometric-based key derivation function and its application | |
Phipps et al. | Securing voice communications using audio steganography | |
CN106330902B (en) | Dual factors rapid authentication method based on ambient sound | |
KR100980321B1 (en) | System for user authenticating and Method thereof | |
Phipps et al. | Your password is music to my ears: Cloud based authentication using sound |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A method for generating and recognizing sound waves based on embedded devices Granted publication date: 20190301 Pledgee: Nanjing Bank Co.,Ltd. Nanjing Financial City Branch Pledgor: Nanjing Jusha Display Technology Co.,Ltd. Registration number: Y2024980006263 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |