CN106209899A - A kind of recognition methods based on sound wave and device - Google Patents
A kind of recognition methods based on sound wave and device Download PDFInfo
- Publication number
- CN106209899A CN106209899A CN201610620010.4A CN201610620010A CN106209899A CN 106209899 A CN106209899 A CN 106209899A CN 201610620010 A CN201610620010 A CN 201610620010A CN 106209899 A CN106209899 A CN 106209899A
- Authority
- CN
- China
- Prior art keywords
- client
- service end
- information
- sound wave
- low
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention discloses a kind of recognition methods based on sound wave and device, and method includes step: service end is launched by low-frequency sound wave signal after service end information being encrypted;Client detects that low-frequency sound wave signal is followed by by described low-frequency sound wave information, and client deciphering low-frequency sound wave information acquisition services client information, client is provided with client database, and client checks service end information according to client database;After service end information is checked successfully, client carries out secondary checking, and client secondary sends control information to service end after being verified.Client checks service end information according to client database, client is provided with white list, the only service end in client database could be mated, service end and client can be automatically performed coupling, and after service end information is checked successfully, client needs to carry out secondary checking and could send the transmission of control information to service end.
Description
Technical field
The present invention relates to art of acoustic waves, in particular, relate to a kind of recognition methods based on sound wave and device.
Background technology
Along with developing rapidly of the Internet and mobile communication technology, modern office and life area are proposed more by people
High-level safety and intelligent management demand, common door-locking system and manual room entry/exit management have not met the reality of modern
Border demand.In order to comply with the development of intelligent building and intelligent residential district, gate control system also must realize more reliable, safer and more square
Just intelligence system.Intelligent access control system fully utilizes sensing technology, digital information processing, computer technology, multimedia skill
Art and network technology, to realize the collection of gate control system information, to transmit and process.
In gate control system, of paramount importance ingredient is that ID identifies system.ID on current market identifies that system is main
Radio Frequency ID in the following ways: 1), including the Radio Frequency ID card of 125K, the MIFARE card of 13.56M and the identity card of secondary TYPEB
Card;2) fingerprint ID, including optical finger print and biological fingerprint;3) face ID.In three kinds of ID recognition method, based on wireless radio-frequency
The Radio Frequency ID card uniqueness of 125K low, be easiest to be replicated;MIFARE card possesses certain secure fashion, but the most
It is cracked, so its safety is the highest;The uniqueness of China second-generation identity card ID is high, but read head is costly, there is presently no
Gate inhibition promotes extensively above, and its use cost is higher.Comparatively speaking, fingerprint ID possesses certain secrecy advantage, but identifies
The low needs of time length, recognition accuracy repeatedly identifies.And the recognition accuracy of face ID technology also ratio at present is relatively low, particularly people
Face identification is more sensitive to external light source, and reliability is relatively low.
Summary of the invention
The technical problem to be solved is to provide a kind of convenient and safe recognition methods based on sound wave and device.
It is an object of the invention to be achieved through the following technical solutions:
A kind of recognition methods based on sound wave, including step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave
Information acquisition services client information, client is provided with client database, and client is according to client database verification service end letter
Breath;
After service end information is checked successfully, client carries out secondary checking, and client secondary will control information after being verified
Send to service end.
Preferably, described control information includes that client-side information, service end are provided with service end data base, described service end root
According to service end database check client-side information.
Service end arranges white list, and the client data library storage of client has safe service end information, only visitor
Find service end information ability and the service end communication of correspondence in the client database of family, improve safety.
Preferably, service end scanning face obtains face information, and service end is according to service end database check face information.
Increase recognition of face and improve safety further.
Preferably, at least one during the checking of described secondary includes unlocking screen, password authentification, pattern checking.
Secondary checking can utilize the existing technology of client, and low cost is effective.
Preferably, service end information includes random handshake code, client obtain described random handshake code and by described at random
Handshake code passback service end checking.
Safety is improved further by disposable random handshake code.
Preferably, client secondary sends control information to service end and includes that the checking of client secondary is logical after being verified
Later control information is sent to service end through background server.
Control information is sent through background server, different with Transfer pipe before, greatly improve transmission peace
Quan Xing.
Preferably, send to service end after control information being encrypted after client secondary is verified.
Information encryption is safer.
Preferably, client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.
Client by other means, controls letter as bluetooth or WIFI or mobile network or ZigBee send to service end
Breath, transmits not in use by low-frequency sound wave, and asymmetrical transmission means is safer, even if other people have intercepted the letter of low-frequency sound wave transmission
Breath, also cannot intercept the information of other transmission means transmission.
A kind of identification device based on sound wave, including service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, and described client is deciphered
Low-frequency sound wave information acquisition services client information, described client is provided with client database, and described client is according to number clients
Service end information is checked according to storehouse;
Described client carries out secondary checking after service end information is checked successfully, after described client secondary is verified
Send control information to service end.
Identification device based on sound wave also includes background server, and it is logical that described background server receives the checking of client secondary
Later the control information sent, described background server sends control information to service end.
Due to the fact that service end is launched by low-frequency sound wave signal after service end information being encrypted, client is deciphered
Low-frequency sound wave information acquisition services client information, client is according to client database verification service end information, and client is provided with white
List, the only service end in client database could mate, and service end and client can be automatically performed coupling, are not required to
Wanting user operation to complete, after service end information is checked successfully, client needs to carry out secondary checking and could send control information
Sending to service end, if the client of user is lost, other people hold the most uncontrollable service end of client.
Accompanying drawing explanation
Fig. 1 is a kind of based on sound wave the recognition methods schematic diagram of the embodiment of the present invention.
Detailed description of the invention
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
As it is shown in figure 1, a kind of recognition methods based on sound wave, including step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave
Information acquisition services client information, client is provided with client database, and client is according to client database verification service end letter
Breath;
After service end information is checked successfully, client carries out secondary checking, and client secondary will control information after being verified
Send to service end.
Launched by low-frequency sound wave signal after service end information being encrypted due to service end, client deciphering all-bottom sound
Ripple information acquisition services client information, client is according to client database verification service end information, and client is provided with white list, only
Having the service end in client database to mate, service end and client can be automatically performed coupling, it is not necessary to user
Operation can complete, and after service end information is checked successfully, client needs to carry out secondary checking and could send the transmission of control information extremely
Service end, if the client of user is lost, other people hold the most uncontrollable service end of client.Especially in gate control system
In.
Described control information includes that client-side information, service end are provided with service end data base, and described service end is according to service
Client database verification client-side information.Service end arranges white list, and the client data library storage of client has safe service
Client information, only finds service end information ability and the service end communication of correspondence in client database, improves safety.
Service end scanning face obtains face information, and service end is according to service end database check face information.Increase people
Face identification improves safety further.
The checking of described secondary includes at least one in unlocking screen, password authentification, pattern checking.Secondary checking can be in order to
By the existing technology of client, low cost, effective.
Service end information includes random handshake code, and client obtains described random handshake code and returned by described random handshake code
Biography service end is verified.Safety is improved further by disposable random handshake code.
Client secondary sends control information to service end and includes that client secondary will after being verified after being verified
Control information sends to service end through background server.Send control information through background server, lead to transmission before
Road is different, greatly improves transmission security.
Client secondary sends to service end after control information being encrypted after being verified.Information encryption is safer.
Client sends control information by bluetooth or WIFI or mobile network or ZigBee to service end.Client is passed through
Other modes, as bluetooth or WIFI or mobile network or ZigBee send control information to service end, not in use by low-frequency sound wave
Transmission, asymmetrical transmission means is safer, even if other people have intercepted the information of low-frequency sound wave transmission, also cannot intercept other and pass
The information that defeated mode is transmitted.
A kind of identification device based on sound wave, including service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, and described client is deciphered
Low-frequency sound wave information acquisition services client information, described client is provided with client database, and described client is according to number clients
Service end information is checked according to storehouse;
Described client carries out secondary checking after service end information is checked successfully, after described client secondary is verified
Send control information to service end.
Identification device based on sound wave also includes background server, and it is logical that described background server receives the checking of client secondary
Later the control information sent, described background server sends control information to service end.
Above content is to combine concrete preferred implementation further description made for the present invention, it is impossible to assert
Being embodied as of the present invention is confined to these explanations.For general technical staff of the technical field of the invention,
On the premise of present inventive concept, it is also possible to make some simple deduction or replace, all should be considered as belonging to the present invention's
Protection domain.
Claims (8)
1. a recognition methods based on sound wave, it is characterised in that include step:
Service end is launched by low-frequency sound wave signal after service end information being encrypted;
Client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, client deciphering low-frequency sound wave information
Obtaining service end information, client is provided with client database, and client checks service end information according to client database;
After service end information is checked successfully, client carries out secondary checking, and control information is sent after being verified by client secondary
To service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that described control information includes visitor
Family client information, service end is provided with service end data base, and described service end is according to service end database check client-side information.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that the checking of described secondary includes screen
At least one in curtain unblock, password authentification, pattern checking.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client secondary is verified
After send control information to service end include client secondary be verified after by control information through background server send
To service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client secondary is verified
After by control information encrypt after send to service end.
A kind of recognition methods based on sound wave the most according to claim 1, it is characterised in that client by bluetooth or
WIFI or mobile network or ZigBee send control information to service end.
7. an identification device based on sound wave, it is characterised in that include service end, client,
Described service end is launched by low-frequency sound wave signal after service end information being encrypted;
Described client detects that described low-frequency sound wave signal is followed by by described low-frequency sound wave information, described client deciphering low frequency
Information of acoustic wave obtains service end information, and described client is provided with client database, and described client is according to client database
Verification service end information;
Described client carries out secondary checking after service end information is checked successfully, and described client secondary will control after being verified
Information processed sends to service end.
A kind of identification device based on sound wave the most according to claim 7, it is characterised in that also include background server,
Described background server receives the control information sent after client secondary is verified, and described background server will control
Information sends to service end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610620010.4A CN106209899A (en) | 2016-07-31 | 2016-07-31 | A kind of recognition methods based on sound wave and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610620010.4A CN106209899A (en) | 2016-07-31 | 2016-07-31 | A kind of recognition methods based on sound wave and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209899A true CN106209899A (en) | 2016-12-07 |
Family
ID=57498022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610620010.4A Pending CN106209899A (en) | 2016-07-31 | 2016-07-31 | A kind of recognition methods based on sound wave and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209899A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566884A (en) * | 2017-08-24 | 2018-01-09 | 深圳创维-Rgb电子有限公司 | A kind of connection method, service end and terminal |
-
2016
- 2016-07-31 CN CN201610620010.4A patent/CN106209899A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566884A (en) * | 2017-08-24 | 2018-01-09 | 深圳创维-Rgb电子有限公司 | A kind of connection method, service end and terminal |
CN107566884B (en) * | 2017-08-24 | 2020-03-03 | 深圳创维-Rgb电子有限公司 | Connection method, server and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11417159B2 (en) | Methods and systems for controlling a smart lock | |
US11438169B2 (en) | Time-bound secure access | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
EP3029906B1 (en) | Authentication system and transmit terminal for authenticating the light signal | |
CN105279832A (en) | Intelligent door lock system and control method thereof | |
AU2016273890A1 (en) | Controlling physical access to secure areas via client devices in a networked environment | |
WO2018231703A1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
WO2013043534A1 (en) | Mobile computing device authentication using scannable images | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
KR20160003796A (en) | User authentication | |
CN108712389A (en) | A kind of intelligent lock system | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN103024706A (en) | Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication | |
CN115810232A (en) | Passage control method based on offline two-dimensional code and face characteristic value | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
CN106209899A (en) | A kind of recognition methods based on sound wave and device | |
WO2023224749A1 (en) | Touchless identity card emulator systems and methods | |
KR101635278B1 (en) | Multi-factor authentication with dynamic handshake quick-response code | |
CN107480485A (en) | The factory reset system and method for information safety devices | |
JP2007052514A (en) | Target device and authentication method | |
CN106228792A (en) | A kind of recognition methods based on sound wave | |
DE102012216396B4 (en) | Determine IT authorization information using a mechanical key | |
CN105513176A (en) | Authentication method and system for iris entrance guard remote management | |
CN106384499A (en) | Recognition method based on sound waves | |
US12001910B1 (en) | Initialization of touchless identity card emulator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161207 |