CN106209899A - A kind of recognition methods based on sound wave and device - Google Patents

A kind of recognition methods based on sound wave and device Download PDF

Info

Publication number
CN106209899A
CN106209899A CN201610620010.4A CN201610620010A CN106209899A CN 106209899 A CN106209899 A CN 106209899A CN 201610620010 A CN201610620010 A CN 201610620010A CN 106209899 A CN106209899 A CN 106209899A
Authority
CN
China
Prior art keywords
client
service end
information
sound wave
low
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610620010.4A
Other languages
Chinese (zh)
Inventor
许琴琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610620010.4A priority Critical patent/CN106209899A/en
Publication of CN106209899A publication Critical patent/CN106209899A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention discloses a kind of recognition methods based on sound wave and device, and method includes step: service end is launched by low-frequency sound wave signal after service end information being encrypted;Client detects that low-frequency sound wave signal is followed by by described low-frequency sound wave information, and client deciphering low-frequency sound wave information acquisition services client information, client is provided with client database, and client checks service end information according to client database;After service end information is checked successfully, client carries out secondary checking, and client secondary sends control information to service end after being verified.Client checks service end information according to client database, client is provided with white list, the only service end in client database could be mated, service end and client can be automatically performed coupling, and after service end information is checked successfully, client needs to carry out secondary checking and could send the transmission of control information to service end.

Description

A kind of recognition methods based on sound wave and device
Technical field
The present invention relates to art of acoustic waves, in particular, relate to a kind of recognition methods based on sound wave and device.
Background technology
Along with developing rapidly of the Internet and mobile communication technology, modern office and life area are proposed more by people High-level safety and intelligent management demand, common door-locking system and manual room entry/exit management have not met the reality of modern Border demand.In order to comply with the development of intelligent building and intelligent residential district, gate control system also must realize more reliable, safer and more square Just intelligence system.Intelligent access control system fully utilizes sensing technology, digital information processing, computer technology, multimedia skill Art and network technology, to realize the collection of gate control system information, to transmit and process.
In gate control system, of paramount importance ingredient is that ID identifies system.ID on current market identifies that system is main Radio Frequency ID in the following ways: 1), including the Radio Frequency ID card of 125K, the MIFARE card of 13.56M and the identity card of secondary TYPEB Card;2) fingerprint ID, including optical finger print and biological fingerprint;3) face ID.In three kinds of ID recognition method, based on wireless radio-frequency The Radio Frequency ID card uniqueness of 125K low, be easiest to be replicated;MIFARE card possesses certain secure fashion, but the most It is cracked, so its safety is the highest;The uniqueness of China second-generation identity card ID is high, but read head is costly, there is presently no Gate inhibition promotes extensively above, and its use cost is higher.Comparatively speaking, fingerprint ID possesses certain secrecy advantage, but identifies The low needs of time length, recognition accuracy repeatedly identifies.And the recognition accuracy of face ID technology also ratio at present is relatively low, particularly people Face identification is more sensitive to external light source, and reliability is relatively low.
Summary of the invention
The technical problem to be solved is to provide a kind of convenient and safe recognition methods based on sound wave and device.
It is an object of the invention to be achieved through the following technical solutions:
A kind of recognition methods based on sound wave, including step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave Information acquisition services client information, client is provided with client database, and client is according to client database verification service end letter Breath;
After service end information is checked successfully, client carries out secondary checking, and client secondary will control information after being verified Send to service end.
Preferably, described control information includes that client-side information, service end are provided with service end data base, described service end root According to service end database check client-side information.
Service end arranges white list, and the client data library storage of client has safe service end information, only visitor Find service end information ability and the service end communication of correspondence in the client database of family, improve safety.
Preferably, service end scanning face obtains face information, and service end is according to service end database check face information.
Increase recognition of face and improve safety further.
Preferably, at least one during the checking of described secondary includes unlocking screen, password authentification, pattern checking.
Secondary checking can utilize the existing technology of client, and low cost is effective.
Preferably, service end information includes random handshake code, client obtain described random handshake code and by described at random Handshake code passback service end checking.
Safety is improved further by disposable random handshake code.
Preferably, client secondary sends control information to service end and includes that the checking of client secondary is logical after being verified Later control information is sent to service end through background server.
Control information is sent through background server, different with Transfer pipe before, greatly improve transmission peace Quan Xing.
Preferably, send to service end after control information being encrypted after client secondary is verified.
Information encryption is safer.
Preferably, client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.
Client by other means, controls letter as bluetooth or WIFI or mobile network or ZigBee send to service end Breath, transmits not in use by low-frequency sound wave, and asymmetrical transmission means is safer, even if other people have intercepted the letter of low-frequency sound wave transmission Breath, also cannot intercept the information of other transmission means transmission.
A kind of identification device based on sound wave, including service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, and described client is deciphered Low-frequency sound wave information acquisition services client information, described client is provided with client database, and described client is according to number clients Service end information is checked according to storehouse;
Described client carries out secondary checking after service end information is checked successfully, after described client secondary is verified Send control information to service end.
Identification device based on sound wave also includes background server, and it is logical that described background server receives the checking of client secondary Later the control information sent, described background server sends control information to service end.
Due to the fact that service end is launched by low-frequency sound wave signal after service end information being encrypted, client is deciphered Low-frequency sound wave information acquisition services client information, client is according to client database verification service end information, and client is provided with white List, the only service end in client database could mate, and service end and client can be automatically performed coupling, are not required to Wanting user operation to complete, after service end information is checked successfully, client needs to carry out secondary checking and could send control information Sending to service end, if the client of user is lost, other people hold the most uncontrollable service end of client.
Accompanying drawing explanation
Fig. 1 is a kind of based on sound wave the recognition methods schematic diagram of the embodiment of the present invention.
Detailed description of the invention
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
As it is shown in figure 1, a kind of recognition methods based on sound wave, including step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave Information acquisition services client information, client is provided with client database, and client is according to client database verification service end letter Breath;
After service end information is checked successfully, client carries out secondary checking, and client secondary will control information after being verified Send to service end.
Launched by low-frequency sound wave signal after service end information being encrypted due to service end, client deciphering all-bottom sound Ripple information acquisition services client information, client is according to client database verification service end information, and client is provided with white list, only Having the service end in client database to mate, service end and client can be automatically performed coupling, it is not necessary to user Operation can complete, and after service end information is checked successfully, client needs to carry out secondary checking and could send the transmission of control information extremely Service end, if the client of user is lost, other people hold the most uncontrollable service end of client.Especially in gate control system In.
Described control information includes that client-side information, service end are provided with service end data base, and described service end is according to service Client database verification client-side information.Service end arranges white list, and the client data library storage of client has safe service Client information, only finds service end information ability and the service end communication of correspondence in client database, improves safety.
Service end scanning face obtains face information, and service end is according to service end database check face information.Increase people Face identification improves safety further.
The checking of described secondary includes at least one in unlocking screen, password authentification, pattern checking.Secondary checking can be in order to By the existing technology of client, low cost, effective.
Service end information includes random handshake code, and client obtains described random handshake code and returned by described random handshake code Biography service end is verified.Safety is improved further by disposable random handshake code.
Client secondary sends control information to service end and includes that client secondary will after being verified after being verified Control information sends to service end through background server.Send control information through background server, lead to transmission before Road is different, greatly improves transmission security.
Client secondary sends to service end after control information being encrypted after being verified.Information encryption is safer.
Client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.Client is passed through Other modes, as bluetooth or WIFI or mobile network or ZigBee send control information to service end, not in use by low-frequency sound wave Transmission, asymmetrical transmission means is safer, even if other people have intercepted the information of low-frequency sound wave transmission, also cannot intercept other and pass The information that defeated mode is transmitted.
A kind of identification device based on sound wave, including service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, and described client is deciphered Low-frequency sound wave information acquisition services client information, described client is provided with client database, and described client is according to number clients Service end information is checked according to storehouse;
Described client carries out secondary checking after service end information is checked successfully, after described client secondary is verified Send control information to service end.
Identification device based on sound wave also includes background server, and it is logical that described background server receives the checking of client secondary Later the control information sent, described background server sends control information to service end.
Above content is to combine concrete preferred implementation further description made for the present invention, it is impossible to assert Being embodied as of the present invention is confined to these explanations.For general technical staff of the technical field of the invention, On the premise of present inventive concept, it is also possible to make some simple deduction or replace, all should be considered as belonging to the present invention's Protection domain.

Claims (8)

1. a recognition methods based on sound wave, it is characterised in that include step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave information Obtaining service end information, client is provided with client database, and client checks service end information according to client database;
After service end information is checked successfully, client carries out secondary checking, and control information is sent after being verified by client secondary To service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that described control information includes visitor Family client information, service end is provided with service end data base, and described service end is according to service end database check client-side information.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that the checking of described secondary includes screen At least one in curtain unblock, password authentification, pattern checking.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client secondary is verified After send control information to service end include client secondary be verified after by control information through background server send To service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client secondary is verified After by control information encrypt after send to service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client by bluetooth or WIFI or mobile network or ZigBee send control information to service end.
7. an identification device based on sound wave, it is characterised in that include service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, described client deciphering low frequency Information of acoustic wave obtains service end information, and described client is provided with client database, and described client is according to client database Verification service end information;
Described client carries out secondary checking after service end information is checked successfully, and described client secondary will control after being verified Information processed sends to service end.
A kind of identification device based on sound wave the most according to claim 7, it is characterised in that also include background server,
Described background server receives the control information sent after client secondary is verified, and described background server will control Information sends to service end.
CN201610620010.4A 2016-07-31 2016-07-31 A kind of recognition methods based on sound wave and device Pending CN106209899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610620010.4A CN106209899A (en) 2016-07-31 2016-07-31 A kind of recognition methods based on sound wave and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610620010.4A CN106209899A (en) 2016-07-31 2016-07-31 A kind of recognition methods based on sound wave and device

Publications (1)

Publication Number Publication Date
CN106209899A true CN106209899A (en) 2016-12-07

Family

ID=57498022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610620010.4A Pending CN106209899A (en) 2016-07-31 2016-07-31 A kind of recognition methods based on sound wave and device

Country Status (1)

Country Link
CN (1) CN106209899A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566884A (en) * 2017-08-24 2018-01-09 深圳创维-Rgb电子有限公司 A kind of connection method, service end and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566884A (en) * 2017-08-24 2018-01-09 深圳创维-Rgb电子有限公司 A kind of connection method, service end and terminal
CN107566884B (en) * 2017-08-24 2020-03-03 深圳创维-Rgb电子有限公司 Connection method, server and terminal

Similar Documents

Publication Publication Date Title
US11417159B2 (en) Methods and systems for controlling a smart lock
US11438169B2 (en) Time-bound secure access
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
EP3029906B1 (en) Authentication system and transmit terminal for authenticating the light signal
CN105279832A (en) Intelligent door lock system and control method thereof
AU2016273890A1 (en) Controlling physical access to secure areas via client devices in a networked environment
WO2018231703A1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
WO2013043534A1 (en) Mobile computing device authentication using scannable images
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
KR20160003796A (en) User authentication
CN108712389A (en) A kind of intelligent lock system
CN105574967A (en) Intelligent access control system and operation method thereof
CN103024706A (en) Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication
CN115810232A (en) Passage control method based on offline two-dimensional code and face characteristic value
CN102413146A (en) Client authorized logon method based on dynamic codes
CN106209899A (en) A kind of recognition methods based on sound wave and device
WO2023224749A1 (en) Touchless identity card emulator systems and methods
KR101635278B1 (en) Multi-factor authentication with dynamic handshake quick-response code
CN107480485A (en) The factory reset system and method for information safety devices
JP2007052514A (en) Target device and authentication method
CN106228792A (en) A kind of recognition methods based on sound wave
DE102012216396B4 (en) Determine IT authorization information using a mechanical key
CN105513176A (en) Authentication method and system for iris entrance guard remote management
CN106384499A (en) Recognition method based on sound waves
US12001910B1 (en) Initialization of touchless identity card emulator

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161207