CN104869570B - A kind of terminal check method of speaking based on voice channel - Google Patents
A kind of terminal check method of speaking based on voice channel Download PDFInfo
- Publication number
- CN104869570B CN104869570B CN201510167780.3A CN201510167780A CN104869570B CN 104869570 B CN104869570 B CN 104869570B CN 201510167780 A CN201510167780 A CN 201510167780A CN 104869570 B CN104869570 B CN 104869570B
- Authority
- CN
- China
- Prior art keywords
- speaking
- server
- terminal
- terminal device
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
A kind of terminal check method of speaking based on voice channel of disclosure of the invention.Based on voice channel and three-way handshake, simple and quick confirmation is spoken terminal device.Terminal to server of speaking first sends communication request, and server can randomly generate an identifying code, be sent to terminal device of speaking.The identifying code that terminal of speaking receives, the characteristic information with equipment of speaking, such as IMEI(Mobile device international identity code), eap-message digest data are generated by hash algorithm, then VoP is converted to by frequency mapping algorithm and sends back to server, the request of response server.Server can match according to the Hash results for restoring the check code got and the machine preservation data from voice data, achieve the purpose that confirm terminal of speaking.
Description
Technical field
The present invention relates to voice channels and information security field to be reached by voice channel transmission terminal apparatus characteristic information
To the function of confirming terminal of speaking.The combined use of identifying code and hash algorithm, ensure that the timeliness of information, while also reinforce
The safety of information.
Background technology
The appearance of internet makes the transmission of information surmount the limitation of time region, and information transmission is allowed to become easily convenient,
Many traditional communications device functions such as IP phone, instant message applications are interconnected network technology and are realized.The present invention uses voice
Channel (such as GSM voice channels) replaces the safe transmission data packet of data channel, obtains the characteristic information for terminal device of speaking, reaches
To the purpose for confirming terminal.
It is computer or the public full auto-programs of people that identifying code, which is a kind of differentiation user,.It can prevent:Malice cracks
Password, brush ticket, forum pour water, and effectively prevent some hacker to some particular registered user specific program Brute Force mode
Progress constantly logs in trial, is the mode that many websites are passed through now with identifying code.Meanwhile to be also one kind ensure to count identifying code
It is believed that a kind of effective measures of breath timeliness, even if data can not be replicated use if being trapped.
IMEI (International Mobile Equipment Identity, mobile device world identification code, also known as
For International Mobile Station Equipment Identification) be mobile phone terminal unique identification number.IMEI is a kind of characteristic information of mobile phone terminal equipment,
With uniqueness.IMEI is made of 15 bit digitals, and 0~9 number is used only in bits per inch word, consisting of:
1, preceding 6 digit (TAC, Type Approval Code) is " Type Approval number ", general proxy type.
2, then 2 digits (FAC, Final Assembly Code) are " finally assembly number ", the general proxy place of production.
3, later 6 digits (SNR, Serial Number, serial number of dispatching from the factory) are " string number ", general proxy production sequence number.
4, last 1 digit (SP) is typically " 0 ", is check code, spare.
Hash technologies are exactly that the input (be called and do preliminary mapping) of random length is transformed into fixed length by hashing algorithm
The output of degree, the output are exactly hashed value.This conversion is a kind of compression mapping, it is, the space of hashed value is usually remote small
In the space of input, different inputs may hash to identical output, and can not possibly be defeated uniquely to determine from hashed value
Enter value.It is exactly briefly a kind of function of the eap-message digest of the message compression by random length to a certain regular length.In short,
Hash refers to identifying the prodigious one piece of data of capacity with a bit of data, to verify its integrality.
Due to the diversity of the application of hash function, they often aim at a certain application and design.For example, encryption dissipates
Array function hypothesis will find the enemy being originally inputted with same Hash value there are one.Hash function is one irreversible
One-way function, an outstanding cryptographic Hash function of design are " unidirectional " operations:For given hashed value, without practicality
Method can calculate one and be originally inputted, that is to say, that it is difficult to forge.For the function designed for the purpose of keyed hash, such as
MD5 is widely used as examining hash function.When such software download, Validation Code will be compareed and just downloaded just later
True file part.This code is possible to the variation because of environmental factor, has change such as machine configuration or the change of IP address
It is dynamic, to ensure the safety of source data.
Invention content
In view of the above-mentioned problems, the object of the present invention is to provide one kind passing through voice channel, safety transmission terminal device identification
Information confirms the method for terminal of speaking.
The present invention uses following technical scheme to achieve the above object:
A kind of terminal check method of speaking based on voice channel, method and step include:
(1) terminal device sends connection communication request to server:
A) terminal device by conventional dial connect in the way of, to server send the request based on voice channel communication,
The response of waiting for server.
(2) request of server response terminal device, to speaking, terminal device sends identifying code:
A) server receives the request for equipment of speaking.
B) server randomly generates one section of identifying code R.
C) identifying code R is converted into voice signal by D/A, then by voice channel, is sent to terminal device of speaking, and completes to ring
The step of answering.
(3) terminal device of speaking handles identifying code voice signal, generates feature and verifies VoP D, and returns to clothes
Business device:
Voice signal is converted into digital signal by terminal device of a) speaking by A/D, gets identifying code R.
B) parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0.
C) speak the characteristic information M of terminal device acquisition itself, such as IMEI.
D) pass through H=Hash (M, R) algorithm, generate eap-message digest, H is as feature check code.
E) feature check code is converted to by D=Y (H, S) frequency mapping function by voice data again.Wherein, S is related to
The selection principle of frequency map;
F) feature verification voice data D is converted into voice signal by D/A, then by voice channel, is sent to server.
(4) confirm terminal of speaking, speak terminal device and Server Initiates Communication:
A) voice signal is converted into digital signal by server by A/D, obtains feature verification VoP D.
B) parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0.
C) by H=Y ' (D, S) frequency mapping function, feature verification voice data D is reduced into feature check code H.
D) server obtains the characteristic information Mi ' (i=1 ... n) being locally stored, then carries out at Hi '=Hash (Mi ', R)
Reason.
E) H and Hi is matched, if H=Hi ', so that it may to confirm terminal of speaking, obtain its correlated characteristic information Mi ', start
Connection communication;If there is no the data that can be matched with H in Hi ' clusters, turn out this speak terminal not affirming score it
It is interior, communication failure.
The present invention due to using the technology described above, has the following advantages:
One, it using the voice channel of dial-up connection, can need not be resettled new with Speaker Identification seamless connection
Data channel confirms the authenticity of call terminal.The combination that the authenticity and speaker's identity of call terminal confirm, reduces
The space of attack, personation, increases the safety of this kind of system;
Two, the introducing of identifying code and Hash functions, 3 times simple and quick shake hands strengthens conventional method only Hash, or
Person's safety that only identifying code is verified.
Even if can not be re-used or read cleartext information if three, terminal feature voice messaging is trapped, identifying code, Hash
The use of algorithm and frequency mapping method ensure that timeliness and the safety of information.Meanwhile digital signal is converted to voice
Signal, the transmission data from voice channel.
It is voice signal that four, server was obtained from voice channel, which is data, needs first to be converted to digital signal as school
Test code.According to hash algorithm irreversibility and safe hash algorithm, as a consequence it is hardly possible to be believed by two different data
Breath obtains identical Hash results.So by matching the Hash of check code and local memory device information as a result, can be true
Recognize terminal device of speaking.
Description of the drawings
Fig. 1 is simple and quick handshake procedure three times;
Fig. 2 is the identifying code transmission process based on voice channel;
Fig. 3 is the response process of the terminal check method of speaking based on voice channel.
Specific implementation mode
A kind of terminal check method of speaking based on voice channel, including step:
One, terminal device sends connection communication request to server:
F) terminal device by conventional dial connect in the way of, to server send the request based on voice channel communication,
The response of waiting for server.
Two, the request of server response terminal device, to speaking, terminal device sends identifying code:
G) server receives the request for equipment of speaking.
H) server randomly generates one section of identifying code R.
I) identifying code R is converted into voice signal by D/A, then by voice channel, is sent to terminal device of speaking, and completes to ring
The step of answering.
Three, terminal device of speaking handles identifying code voice signal, generates feature and verifies VoP D, and returns to clothes
Business device:
Voice signal is converted into digital signal by terminal device of j) speaking by A/D, gets identifying code R.
K) parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0.
1) speak the characteristic information M of terminal device acquisition itself, such as IMEI.
M) pass through H=Hash (M, R) algorithm, generate eap-message digest, H is as feature check code.
N) feature check code is converted to by D=Y (H, S) frequency mapping function by voice data again.Wherein, S is related to
The selection principle of frequency map;
O) feature verification voice data D is converted into voice signal by D/A, then by voice channel, is sent to server.
Four, confirm terminal of speaking, speak terminal device and Server Initiates Communication:
P) voice signal is converted into digital signal by server by A/D, obtains feature verification VoP D.
Q) parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0.
R) by H=Y ' (D, S) frequency mapping function, feature verification voice data D is reduced into feature check code H.
S) server obtains the characteristic information Mi ' (i=1 ... n) being locally stored, then carries out at Hi '=Hash (Mi ', R)
Reason.
H and Hi is matched, if H=Hi ', so that it may to confirm terminal of speaking, obtain its correlated characteristic information Mi ', start to connect
Connect letter;If there is no the data that can be matched with H in Hi ' clusters, turns out this and speaks terminal not within affirming score,
Communication failure.
Claims (4)
1. a kind of terminal check method of speaking based on voice channel, it is characterised in that following steps:
Step 1, terminal device of speaking send connection communication request to server;
Step 2, server respond the request for terminal device of speaking, and to speaking, terminal device sends identifying code R;
Step 3, terminal of speaking receive identifying code R, generate feature and verify VoP D, and return to server;
Step 3 includes:
41) voice signal is converted into digital signal by terminal device of, speaking by A/D converter, gets identifying code R;
42), parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0, wherein R0 indicate identifying code R
A data;
43), speak the characteristic information M of terminal device acquisition itself;
44), by H=Hash (M, R) algorithm, eap-message digest is generated, H is as feature check code;
45) feature check code, is converted to by D=Y (H, S) frequency mapping function by voice data again;
46), feature verification VoP D is converted into voice signal by D/A converter, then by voice channel, is sent to clothes
Business device;
Step 4, server confirm terminal device of speaking, speak terminal device and Server Initiates Communication.
2. a kind of terminal check method of speaking based on voice channel according to claim 1, which is characterized in that step 1
Including terminal device sends the request based on voice channel communication, waiting for server in the way of dial-up connection, to server
Response.
3. a kind of terminal check method of speaking based on voice channel according to claim 1, which is characterized in that step 2
Including:
31), server receives the request for terminal device of speaking;
32), server randomly generates one section of identifying code R;
33), identifying code R is converted into voice signal by D/A converter, then by voice channel, is sent to terminal device of speaking, complete
The step of at response.
4. a kind of terminal check method of speaking based on voice channel according to claim 1, which is characterized in that step 4
Including:
51), voice signal is converted into digital signal by server by A/D converter, obtains feature verification VoP D;
52), parameter S of a data of identifying code R as frequency mapping function, i.e. S=R0, R0 indicate the of identifying code R
A data;
53), by H=Y ' (D, S) frequency mapping function, feature verification voice data D is reduced into feature check code H;
54), server obtains the characteristic information Mi ' (i=1 ... n) for the equipment of speaking being locally stored, then carries out Hi '=Hash
(Mi ', R) processing;
55) H and Hi, is matched, if H=Hi ', so that it may to confirm terminal of speaking, obtain its correlated characteristic information Mi ', start to connect
Connect letter;If not having the data that can be matched with H in Hi ' clusters, this speaks terminal not within affirming score, communication
Failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510167780.3A CN104869570B (en) | 2015-04-10 | 2015-04-10 | A kind of terminal check method of speaking based on voice channel |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510167780.3A CN104869570B (en) | 2015-04-10 | 2015-04-10 | A kind of terminal check method of speaking based on voice channel |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104869570A CN104869570A (en) | 2015-08-26 |
CN104869570B true CN104869570B (en) | 2018-08-28 |
Family
ID=53914998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510167780.3A Active CN104869570B (en) | 2015-04-10 | 2015-04-10 | A kind of terminal check method of speaking based on voice channel |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104869570B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107705791B (en) * | 2016-08-08 | 2021-06-04 | 中国电信股份有限公司 | Incoming call identity confirmation method and device based on voiceprint recognition and voiceprint recognition system |
CN107196972B (en) * | 2017-07-19 | 2020-12-22 | 中国银行股份有限公司 | Authentication method and system, terminal and server |
CN107959552B (en) * | 2017-10-27 | 2023-08-22 | 浙江浙大网新众合轨道交通工程有限公司 | Method and system for realizing request confirmation operation in single channel |
CN111404955B (en) * | 2020-03-25 | 2022-04-01 | 周晓明 | Method and system for transmitting data by multipoint control channel for releasing information |
CN112580009A (en) * | 2020-12-22 | 2021-03-30 | 北京八分量信息科技有限公司 | Method and device for authenticating user identity in big data system and related products |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439A (en) * | 2008-04-10 | 2008-08-27 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
CN101277341A (en) * | 2008-04-28 | 2008-10-01 | 华为技术有限公司 | Call processing method, system as well as verification server and interactive voice answering system |
CN101420305A (en) * | 2008-11-28 | 2009-04-29 | 重庆大学 | Speech identifying code implementing method |
CN102883325A (en) * | 2012-10-29 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Identification server, mobile terminal and end-to-end identification communication channel establishing method |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100146280A1 (en) * | 2008-12-10 | 2010-06-10 | Industrial Technology Research Institute | Remote assisting method and system |
-
2015
- 2015-04-10 CN CN201510167780.3A patent/CN104869570B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439A (en) * | 2008-04-10 | 2008-08-27 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
CN101277341A (en) * | 2008-04-28 | 2008-10-01 | 华为技术有限公司 | Call processing method, system as well as verification server and interactive voice answering system |
CN101420305A (en) * | 2008-11-28 | 2009-04-29 | 重庆大学 | Speech identifying code implementing method |
CN102883325A (en) * | 2012-10-29 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Identification server, mobile terminal and end-to-end identification communication channel establishing method |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
Non-Patent Citations (1)
Title |
---|
基于字符和汉字的语音验证码的实现;陈凤良等;《绵阳师范学院学报》;20120515;第31卷(第5期);84-87 * |
Also Published As
Publication number | Publication date |
---|---|
CN104869570A (en) | 2015-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104869570B (en) | A kind of terminal check method of speaking based on voice channel | |
KR101247914B1 (en) | Identity based symmetric cryptosystem using secure biometric model | |
US8214649B2 (en) | System and method for secure communications between at least one user device and a network entity | |
US20160269181A1 (en) | Method and Device for Information System Access Authentication | |
CN1154293C (en) | Method of and apparatus for encrypting signals for transmission | |
AU2015322158B2 (en) | Secure node-to-multinode communication | |
WO2014036913A1 (en) | Sound transmission-based verification method | |
RU2007130340A (en) | METHOD FOR CREATING A SAFE CODE, METHODS FOR ITS USE AND PROGRAMMABLE DEVICE FOR IMPLEMENTING THE METHOD | |
TW201545526A (en) | Method, apparatus, and system for providing a security check | |
CN107517194B (en) | Return source authentication method and device of content distribution network | |
CN105516195A (en) | Security authentication system and security authentication method based on application platform login | |
EP2377288B1 (en) | Method and apparatus for transmitting and receiving secure and non-secure data | |
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
CN113347215B (en) | Encryption method for mobile video conference | |
CN104767617A (en) | Message processing method, system and related device | |
HUP0500688A2 (en) | Method for registering and enabling pki functionalities | |
CN103220673A (en) | Wireless local area network (WLAN) user authentication method, authentication server and user equipment (UE) | |
CN108259445A (en) | MS windows desktops Security Login System and its login method based on smart mobile phone | |
CN110474922B (en) | Communication method, PC system and access control router | |
CN109089265B (en) | Equipment networking management system and method and intelligent equipment | |
CN107070659B (en) | Authentication of base station and headset | |
CN105306577A (en) | Data sharing system and method between handheld devices based on APP | |
CN105187417A (en) | Authority obtaining method and device | |
KR101739446B1 (en) | User authentication system and user authentication method therefor | |
US10708267B2 (en) | Method and associated processor for authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |