CN105577366B - Sound wave based on embedded device generates and recognition methods - Google Patents

Sound wave based on embedded device generates and recognition methods Download PDF

Info

Publication number
CN105577366B
CN105577366B CN201510950494.4A CN201510950494A CN105577366B CN 105577366 B CN105577366 B CN 105577366B CN 201510950494 A CN201510950494 A CN 201510950494A CN 105577366 B CN105577366 B CN 105577366B
Authority
CN
China
Prior art keywords
sonic data
sound wave
embedded device
module
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510950494.4A
Other languages
Chinese (zh)
Other versions
CN105577366A (en
Inventor
王卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Jusha Display Technology Co Ltd
Original Assignee
Nanjing Jusha Display Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Jusha Display Technology Co Ltd filed Critical Nanjing Jusha Display Technology Co Ltd
Priority to CN201510950494.4A priority Critical patent/CN105577366B/en
Publication of CN105577366A publication Critical patent/CN105577366A/en
Application granted granted Critical
Publication of CN105577366B publication Critical patent/CN105577366B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention discloses a kind of sound wave generation and recognition methods based on embedded device comprising customized sonic data generation module, sound wave are except module of making an uproar, the detection of customized sonic data and identification module, effective sonic data determination module and sonic data twin check module.It can identify customized sonic data, and identify except making an uproar and take twin check for sonic data.The present invention is based on Linux embedded platforms to be generated using the sound wave of independent research, except making an uproar, identifying and checking algorithm, and Linux embedded device platform is relied on, and increases a kind of new mode for Linux embedded device secure interactive.

Description

Sound wave based on embedded device generates and recognition methods
Technical field
The present invention relates to a kind of sound wave generation and recognition methods based on embedded device.
Background technique
With the development of social science and technology, Linux embedded device is more and more accepted by people and uses, than Such as various intelligent terminals.But there are security risk during using these Linux embedded devices, undesirable passes through Network is kidnapped, and the means such as wooden horse obtain user identity, account number cipher and associated privacy information, is seriously endangered user benefit, is caused The property of user is impaired.
Summary of the invention
Object of the present invention is to: provide that a kind of sound wave based on embedded device generates and recognition methods linux is embedded sets The new method of secure interactive between standby.
It according to foregoing invention purpose, provides the following technical solutions: a kind of sound wave generation and identification based on embedded device Method comprising following steps:
S0: sonic data generation module, sound wave are provided except module of making an uproar, sonic data detection and identification module, effective sound wave Data judging module and sonic data twin check module;
Privacy information is converted into the sonic data of user-defined format by sound wave generation module by the S1: the first equipment, is passed through The audio interface of first equipment plays;
S2: the second equipment removes the noise in module removal reception sonic data of making an uproar by sound wave, the sound after removal noise Wave number is according to the sonic data detection and identification module for passing to the second equipment;
S3: the second equipment receives the sonic data of the first equipment by sonic data detection with identification module, passes through detection Whether comprising continuous customized sonic data head and CRC check end value in sonic data, to judge currently received sound Whether wave number is according to including customized sonic data, wherein customized sonic data format is as follows:
After detecting in sonic data comprising customized sonic data, sonic data is passed through recognizer by identification module Privacy information is translated into, and privacy information is passed into effective sonic data determination module;
And recognizer is described as follows:
The each byte of sound wave encryption data is 8, is calculated using the periodic function of 8 kinds of different cycles it, and will As a result it is superimposed, every kind of period represents an of a byte
Citing: the byte value before identification is 0xFF, binary one 1111111;
Byte value after identification is 0x02, Binary Zero 0000010.
Then there was only the waveform of the 7th kind of periodic function, other positions are all 0.
S4: the second equipment receives the sonic data detection from the second equipment by effective sonic data determination module and knows The privacy information of other module differentiates the effective of sonic data by detecting length and the privacy information building form of privacy information Property, and the privacy information after correct decision is passed into sonic data twin check module;
S5: the second equipment receives effective sonic data from the second equipment by sonic data twin check module and determines The privacy information of module and the sonic data of the sonic data of the second equipment detection and identification module, pass through CRC validation and sound wave The time tolerance of data verifies, to verify the accuracy of privacy information.
Preferably, secure interactive information of the sonic data of the user-defined format between embedded device.
Preferably, the embedded device is Linux equipment.
Preferably, generate and identify the principle of customized sonic data for periodical letter in the sonic data generation module Then number is added multiplied by oneself period can obtain a positive number, and periodic function is close multiplied by the last addition result of other functions 0。
Preferably, the periodic function used is the combination of SIN function sin and cosine function cos.
Preferably, the periodic function use 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/ 11。
Preferably, the sonic data of user-defined format includes data head, data segment, timestamp and CRC check section.
Preferably, the data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
Preferably, be that each byte is 8 in sound wave encryption data, using 8 kinds of different cycles periodic function to its into Row calculates, and result is superimposed, and every kind of period represents one of a byte.
The invention has the advantages that: there is the present invention sound wave to remove noise ability, avoid external noise to the shadow of sound wave identification module It rings;Using the sound wave generating algorithm of independent research, by privacy information sound wave;Using customized sound wave identification technology, by privacy Information is extracted from customized sonic data and is restored.The present invention uses double verification mechanism to the privacy information after identification, Achieve the purpose that precise verification.
Detailed description of the invention
Fig. 1 is structure chart of the invention.
Fig. 2 is flow chart of the invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawing
Embodiment: as shown in Figs. 1-2, for a kind of sound wave generation and recognition methods based on embedded device of the present invention Embodiment comprising following steps:
User inputs privacy information using the first Linux embedded device, and the first Linux embedded device is by privacy information It is converted to customized sonic data to play by the audio interface of the equipment itself, at this moment external noise is also mixed into wherein;Its Middle privacy information includes identity information, payment information, encrypted message etc..
The customized sonic data of the first Linux embedded device of 2nd Linux embedded device short distance reception and the external world Noise by receiving the noise composition in sonic data except the removal of noise module, and carries out customized sound wave identification to it, restores Double verification is done at user privacy information, and to privacy information, to achieve the purpose that precise verification.
Wherein generate and identify the principle of customized sonic data are as follows:
Then periodic function is added multiplied by oneself period can obtain a positive number;
Periodic function is multiplied by the last addition result of other functions close to 0.
Preferably, the periodic function used is the combination of SIN function sin and cosine function cos.
Preferably, the periodic function use 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/ 11。
Preferably, the sonic data of user-defined format includes data head, data segment, timestamp and CRC check section.
Preferably, the data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
Preferably, be that each byte is 8 in sound wave encryption data, using 8 kinds of different cycles periodic function to its into Row calculates, and result is superimposed, and every kind of period represents one of a byte.
Implementing procedure is exemplified below:
User enters the password of the 2nd Linux embedded device application system by the input of the first Linux embedded device Information, then the first Linux embedded device by encrypted message be converted into customized sonic data by the first Linux it is embedded Equipment audio port plays what the first Linux embedded device audio interface of the 2nd Linux embedded device short distance reception of played Sonic data, detection, denoises and identifies customized sonic data, and carries out valid data detection with after twin check, allows User accesses the application system of the 2nd Linux embedded device by the first Linux embedded device.
Certainly the above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow be familiar with technique People can understand the content of the present invention and implement it accordingly, it is not intended to limit the scope of the present invention.It is all according to this hair The equivalent transformation or modification that the Spirit Essence of bright main technical schemes is done, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of sound wave based on embedded device generates and recognition methods, it is characterised in that comprising:
S0: sonic data generation module, sound wave are provided except module of making an uproar, sonic data detection and identification module, effective sonic data Determination module and sonic data twin check module;
Privacy information is converted into the sonic data of user-defined format by sound wave generation module by the S1: the first equipment, passes through first The audio interface of equipment plays;
S2: the second equipment removes the noise in module removal reception sonic data of making an uproar by sound wave, the sound wave number after removal noise According to the sonic data detection and identification module for passing to the second equipment;
S3: the second equipment receives the sonic data of the first equipment by sonic data detection with identification module, by detecting sound wave Whether comprising continuous customized sonic data head and CRC check end value in data, to judge currently received sound wave number Whether according to including customized sonic data, after detecting in sonic data comprising customized sonic data, identification module is by sound Wave number evidence translates into privacy information by recognizer, and privacy information is passed to effective sonic data determination module;
S4: the second equipment receives sonic data detection and identification mould from the second equipment by effective sonic data determination module The privacy information of block differentiates the validity of sonic data by detecting length and the privacy information building form of privacy information, And the privacy information after correct decision is passed into sonic data twin check module;
S5: the second equipment receives effective sonic data determination module from the second equipment by sonic data twin check module Privacy information and the second equipment sonic data detection and the sonic data of identification module, pass through CRC validation and sonic data Time tolerance verification, to verify the accuracy of privacy information.
2. a kind of sound wave based on embedded device according to claim 1 generates and recognition methods, it is characterised in that: institute State secure interactive information of the sonic data of user-defined format between embedded device.
3. a kind of sound wave based on embedded device according to claim 2 generates and recognition methods, it is characterised in that: institute Stating embedded device is Linux equipment.
4. a kind of sound wave based on embedded device according to claim 1 generates and recognition methods, it is characterised in that: institute It states and generates and identify that the principle of customized sonic data is that periodic function is right multiplied by oneself period in sonic data generation module A positive number can be obtained by being added afterwards, and periodic function multiplied by the last addition result of other functions close to 0.
5. a kind of sound wave based on embedded device according to claim 4 generates and recognition methods, it is characterised in that: institute State the combination that periodic function is SIN function sin and cosine function cos.
6. a kind of sound wave based on embedded device according to claim 5 generates and recognition methods, it is characterised in that: institute Periodic function is stated using 8 periods, respectively 4,16/5,8/3,16/7,2,16/9,8/5,16/11.
7. a kind of sound wave based on embedded device according to claim 6 generates and recognition methods, it is characterised in that: institute The sonic data for stating user-defined format includes data head, data segment, timestamp and CRC check section.
8. a kind of sound wave based on embedded device according to claim 7 generates and recognition methods, it is characterised in that: institute Stating data head is 2 bytes, and timestamp is 8 bytes, and CRC check section is 2 bytes.
CN201510950494.4A 2015-12-18 2015-12-18 Sound wave based on embedded device generates and recognition methods Active CN105577366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510950494.4A CN105577366B (en) 2015-12-18 2015-12-18 Sound wave based on embedded device generates and recognition methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510950494.4A CN105577366B (en) 2015-12-18 2015-12-18 Sound wave based on embedded device generates and recognition methods

Publications (2)

Publication Number Publication Date
CN105577366A CN105577366A (en) 2016-05-11
CN105577366B true CN105577366B (en) 2019-03-01

Family

ID=55887084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510950494.4A Active CN105577366B (en) 2015-12-18 2015-12-18 Sound wave based on embedded device generates and recognition methods

Country Status (1)

Country Link
CN (1) CN105577366B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112019005438A2 (en) * 2016-09-21 2019-06-18 Mastercard International Inc double data anonymization method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335755A (en) * 2008-05-19 2008-12-31 北京深思洛克数据保护中心 Method for enhancing security verified by information security device using acoustic information
CN102394724A (en) * 2011-11-01 2012-03-28 南京音优行信息技术有限公司 Highly-reliable data transmission method and device based on dual tone multiple frequency sound waves
CN104202337A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Audio signal based data transmission system and method
CN104954079A (en) * 2015-06-15 2015-09-30 广东小天才科技有限公司 Method and system for coding and decoding in sound wave communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335755A (en) * 2008-05-19 2008-12-31 北京深思洛克数据保护中心 Method for enhancing security verified by information security device using acoustic information
CN102394724A (en) * 2011-11-01 2012-03-28 南京音优行信息技术有限公司 Highly-reliable data transmission method and device based on dual tone multiple frequency sound waves
CN104202337A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Audio signal based data transmission system and method
CN104954079A (en) * 2015-06-15 2015-09-30 广东小天才科技有限公司 Method and system for coding and decoding in sound wave communication

Also Published As

Publication number Publication date
CN105577366A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
US10135818B2 (en) User biological feature authentication method and system
US8862888B2 (en) Systems and methods for three-factor authentication
CN104158664A (en) Identity authentication method and system
TW201546642A (en) Methods and apparatus to enhance security of authentication
CN104883367B (en) A kind of method, system and applications client that auxiliary verification logs in
CN102543084A (en) Online voiceprint recognition system and implementation method thereof
CN102254559A (en) Identity authentication system and method based on vocal print
WO2008127431A3 (en) Systems and methods for identification and authentication of a user
CN110458662B (en) Anti-fraud wind control method and device
CN109802942A (en) A kind of voiceprint authentication method and system, mobile terminal of secret protection
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
CN104168117B (en) A kind of speech digit endorsement method
CN107634834A (en) A kind of trusted identity authentication method based on the more scenes in multiple terminals
CN109861946A (en) Method, system and the call receiving apparatus of calling number verification
CN110110507A (en) A kind of method, apparatus, system and the storage medium of soft ware authorization and protection
Nematollahi et al. Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
CN110505185A (en) Auth method, equipment and system
CN105577366B (en) Sound wave based on embedded device generates and recognition methods
CN104751042B (en) Creditability detection method based on cryptographic hash and living things feature recognition
WO2017016038A1 (en) Payment method, payment apparatus, terminal and payment system
CN104468979A (en) Number password input method resistant to peeping and attacking based on voice prompt
Seo et al. Construction of a new biometric-based key derivation function and its application
CN106330902B (en) Dual factors rapid authentication method based on ambient sound
CN109768969A (en) Authority control method and internet-of-things terminal, electronic equipment
KR100980321B1 (en) System for user authenticating and Method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method for generating and recognizing sound waves based on embedded devices

Granted publication date: 20190301

Pledgee: Nanjing Bank Co.,Ltd. Nanjing Financial City Branch

Pledgor: Nanjing Jusha Display Technology Co.,Ltd.

Registration number: Y2024980006263

PE01 Entry into force of the registration of the contract for pledge of patent right