CN107786505B - Method and system for determining target client, client and server - Google Patents

Method and system for determining target client, client and server Download PDF

Info

Publication number
CN107786505B
CN107786505B CN201610737808.7A CN201610737808A CN107786505B CN 107786505 B CN107786505 B CN 107786505B CN 201610737808 A CN201610737808 A CN 201610737808A CN 107786505 B CN107786505 B CN 107786505B
Authority
CN
China
Prior art keywords
client
login request
sound wave
identifier
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610737808.7A
Other languages
Chinese (zh)
Other versions
CN107786505A (en
Inventor
张洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610737808.7A priority Critical patent/CN107786505B/en
Publication of CN107786505A publication Critical patent/CN107786505A/en
Application granted granted Critical
Publication of CN107786505B publication Critical patent/CN107786505B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The embodiment of the application discloses a method and a system for determining a target client, the client and a server. The method comprises the following steps: responding to a login request sent by a first client, and generating a first identifier according to a preset rule; sending the first identifier to the first client, the first identifier being associated with the login request; receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value; and determining a target client from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values. According to the embodiment of the application, the user experience can be improved, and the login efficiency of the user can be improved.

Description

Method and system for determining target client, client and server
Technical Field
The present application relates to the field of user login technologies, and in particular, to a method and a system for determining a target client, a client, and a server.
Background
Generally, when a user logs in a website or software at a client, the user can input an account and a password at a login interface. However, in recent years, with rapid development of network technologies, network security risks are increasing, and the probability that a user suffers from network security accidents such as account theft is increased by inputting an account and a password in a login manner. Therefore, in order to improve the security of the user login mode, many websites or software push mobile phone authentication login, for example, when a user sends a login request in a website or application of a PC, a background service server of the website or software sends an authentication code to a mobile phone of the user, and the user can complete login after inputting the authentication code received by the mobile phone in the website or software of the PC.
The login mode through inputting the verification code not only needs the user to manually input the account and the password, but also needs to read and input the verification code, the login process is complex, and the user experience degree is low. In the prior art, in order to reduce the complexity of user login, a two-dimensional code scanning mobile phone verification login method is provided. In the login process of two-dimension code scanning, a user opens a login webpage or application at a PC (personal computer) end, and the webpage or application interface displays the two-dimension code and prompts the user to scan the two-dimension code. The user opens the mobile phone and the corresponding application program, clicks a two-dimension code scanning button of the application program and starts a mobile phone camera, the two-dimension code displayed in the webpage or the application interface is scanned and the login of the PC terminal is authorized, and the background server receives the login authorization sent by the mobile phone of the user and allows the user to log in the webpage or the application of the PC terminal. Through the process of two-dimensional code scanning login, the user at least needs to open the mobile phone application program and start the corresponding application program and other operations, the login process is still complicated, and the user experience is not high enough.
Therefore, in the prior art, the user login method based on the mobile phone authentication is complex and complicated in operation process and low in user experience.
Disclosure of Invention
The embodiment of the application aims to provide a method and a system for determining a target client, a client and a server, which can improve the login efficiency of a user and improve the experience of the user.
The method and the system for determining the target client, the client and the server provided by the embodiment of the application are realized as follows:
a method of determining a target client, the method comprising:
responding to a login request sent by a first client, and generating a first identifier according to a preset rule;
sending the first identifier to the first client, the first identifier being associated with the login request;
receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value;
and determining a target client from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
A server, the server comprising:
the first identification generation unit is used for responding to the login request and generating a first identification according to a preset rule;
a first identifier sending unit, configured to send the first identifier to the first client, where the first identifier is associated with the login request;
the second login request receiving unit is used for receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value;
and the target client determining unit is used for determining a target client from the second clients of which the second identifications are matched with the first identifications.
A method of determining a target client, the method comprising:
receiving a login request sent by a first client, wherein the login request sent by the first client comprises a first identifier;
receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value;
and determining a target client from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
A server, the server comprising:
the system comprises a first login request receiving unit, a first identification receiving unit and a second identification receiving unit, wherein the first login request receiving unit is used for receiving a login request sent by a first client, and the login request sent by the first client comprises a first identification;
the second login request receiving unit is used for receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value;
and the target client determining unit is used for determining a target client from the second clients of which the second identifications are matched with the first identifications according to the sound wave characteristic values.
A method of determining a target client, the method comprising:
sending a login request;
receiving a first identification associated with the login request;
and generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process.
A client, the client comprising:
a login request issuing unit for issuing a login request;
a first identifier receiving unit, configured to receive a first identifier associated with the login request;
and the sound wave transmitting unit is used for generating sound waves corresponding to the first identification and transmitting the sound waves to at least one second client in the moving process.
A method of determining a target client, the method comprising:
generating a first identifier and sending a login request containing the first identifier to a server;
and generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process.
A client, the client comprising:
the first identification generating unit is used for generating a first identification and sending a login request containing the first identification to a server;
and the sound wave transmitting unit is used for generating sound waves corresponding to the first identification and transmitting the sound waves to at least one second client in the moving process.
A method of determining a target client, the method comprising:
receiving sound waves and acquiring sound wave characteristic values corresponding to the sound waves;
converting the sound wave characteristic value into a second identifier according to a preset algorithm;
and sending the second identification and the frequency characteristic value corresponding to the sound wave.
A client, the client comprising:
the sound wave receiving unit is used for receiving sound waves and acquiring frequency characteristic values corresponding to the sound waves;
the second identifier generation unit is used for converting the frequency characteristic value into a second identifier according to a preset algorithm;
and the second identification sending unit is used for sending the second identification and the frequency characteristic value corresponding to the sound wave.
A method of determining a target client, the method comprising:
the server receives a login request sent by a first client;
the server responds to the login request and generates a first identifier according to a preset rule;
the server sends the first identification to the first client, wherein the first identification is associated with the login request;
the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the frequency value into a second identifier according to a preset algorithm;
the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values.
A system for determining a target client, the system comprising a server, a first client and at least one second client, wherein,
the server is used for receiving a login request sent by a first client; the login server is also used for responding to the login request and generating a first identifier according to a preset rule; further configured to send the first identifier to the first client, the first identifier being associated with the login request;
the first client is used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client in the moving process;
the at least one second client is used for acquiring a frequency sound wave characteristic value corresponding to the sound wave and converting the sound wave characteristic value into a second identifier according to a preset algorithm;
the server is further used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the target client is determined from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
A method of determining a target client, the method comprising:
a first client generates a first identifier and sends a login request containing the first identifier to a server;
the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the frequency value into a second identifier according to a preset algorithm;
the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values.
A system for determining a target client, the system comprising a server, a first client and at least one second client, wherein,
the first client is used for generating a first identifier and sending a login request containing the first identifier to a server; the mobile terminal is also used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client terminal in the moving process;
the at least one second client is used for acquiring a sound wave characteristic value corresponding to the sound wave and converting the frequency value into a second identifier according to a preset algorithm;
the server is used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the target client is determined from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
According to the method and the system for determining the target client, the client and the server, the first identifier can be encoded through sound waves, encoded sound wave information is sent to the at least one second client in a Doppler frequency offset mode, the frequency value of the sound waves after frequency offset is generated is decoded by the at least one second client, and therefore the first identifier corresponding to the sound wave signals after frequency offset can be obtained. And analyzing the sound wave frequency value sent by the at least one second client by using the server, so that the target client in the user login process can be determined from the plurality of second clients. Compared with the prior art, the method has the advantages that the user can complete account login at the target client only by completing simple operations of sending a login request and shaking the first client at the first client without complex and complicated operations such as inputting an account number and scanning a two-dimensional code, so that the user experience can be improved, and the user login efficiency can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
FIG. 1 is a method flow diagram of one embodiment of a method of targeting clients provided herein;
FIG. 2 is a schematic diagram of a scenario for filtering a second client according to distance provided herein;
FIG. 3 is a schematic diagram of a scenario for screening a second client according to time provided herein;
FIG. 4 is a block diagram of one embodiment of a server provided herein;
FIG. 5 is an interaction diagram of an application scenario for targeting a client as provided herein;
FIG. 6 is a schematic diagram of an application scenario of a targeted client provided herein;
FIG. 7 is a method flow diagram of another embodiment of a method of determining a target client provided herein;
FIG. 8 is a block diagram of another embodiment of a server provided herein;
FIG. 9 is a method flow diagram of another embodiment of a method of targeting clients as provided herein;
FIG. 10 is a block diagram illustrating an exemplary client architecture;
FIG. 11 is a method flow diagram of another embodiment of a method of targeting clients provided herein;
FIG. 12 is a block diagram of another embodiment of a client provided herein;
FIG. 13 is a method flow diagram of another embodiment of a method of targeting clients as provided herein;
FIG. 14 is a block diagram of another embodiment of a client provided herein;
FIG. 15 is a method flow diagram of another embodiment of a method of targeting clients as provided herein;
fig. 16 is a flowchart of a method of another embodiment of the method for determining a target client provided herein.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The method for determining a target client according to the present application is described in detail below with reference to the accompanying drawings. Fig. 1 is a schematic method flow diagram of an embodiment of a method for determining a target client provided in the present application. Although the present application provides method steps as shown in the following examples or figures, more or fewer steps may be included in the method based on conventional or non-inventive efforts. In the case of steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by the embodiments of the present application. The method can be executed sequentially or in parallel (for example, in the context of a parallel processor or a multi-thread process) according to the method shown in the embodiment or the figures when the user logs in or the system executes in practice.
Specifically, an embodiment of the method for determining a target client provided by the present application is shown in fig. 1, where the method may include:
s1: and responding to a login request sent by the first client, and generating a first identifier according to a preset rule.
In this embodiment, the server may receive a login request sent by the first client, and generate the first identifier according to a preset rule in response to the login request sent by the first client. The server may include a hardware device having a data information processing function and necessary software required to drive the hardware device to operate, and the server may analyze the received login request to determine a target client. The server may provide a predetermined port through which a login request provided by a first client may be received. For example, the server may perform network data interaction with the first client based on a network protocol such as HTTP, TCP/IP or FTP and a network communication module.
In this embodiment, the first client may be a terminal device capable of accessing a communication network based on a network protocol. Specifically, for example, the first client may be a mobile smart phone, a computer (including a laptop computer and a desktop computer), a tablet electronic device, a Personal Digital Assistant (PDA), or a smart wearable device. In addition, the first client may also be software running on any of the above listed devices, such as a pay bank client, a mobile phone tab client, and the like, and the first client may also be a website having a user management function.
In this embodiment, when the user of the first client wants to log in at another client, a login request may be generated in the first client. The first client may be software with user management functions, such as WeChat, Taobao, QQ, etc. In a specific embodiment, for example, the first client is a mobile payment client, and when a user of the first client needs to log in at a web page of a notebook computer for payment, a PC-side login request can be initiated in the mobile payment client, and the PC-side login request can be the login request.
In this embodiment, after the first client terminal generates the login request, the login request may be sent to the server. In a specific embodiment, for example, the server may be a background service server of the payment client, and the background service server may store data associated with the payment client, and may further perform data transmission and instruction interaction with the payment client.
In an embodiment of the present application, the login request sent by the first client may include account information of the first client. The user account information may be a character string preset by the user of the first client or preset by the first client for the user. For example, the account information may be a user's pay account or a wechat account.
Of course, in another embodiment of the present application, the login request sent by the first client may not include the user account information of the first client, and the login request may be only a field written according to a preset format, where information such as the type of the request and the source IP address of the request initiator may be indicated in the field.
In this embodiment, after receiving the login request, the server may respond to the login request and generate the first identifier according to a preset rule.
In an embodiment of the present application, the first identifier may be a character string calculated by the server according to the user account information and the date and time of the current time according to a preset algorithm. The character string may be coded by decimal numbers such as 496729, binary numbers such as 011011, or a combination of numbers and letters such as 26e8T6, for example. In this embodiment, the first identifier may further have timeliness, where the timeliness refers to: after a preset time length from the moment of generating the first identifier, the first identifier loses effectiveness and cannot be recognized by a server or a client. For example, after a first identifier such as 496729 is generated, the first identifier has a validity time of 2 minutes, and then the first identifier will fail after 2 minutes. When the failed first identifier is provided to the server or the client, the failed first identifier cannot be recognized by the server or the client, so that subsequent user login operation cannot be performed according to the first identifier.
In this embodiment, a character string including the user account information and the current time date and time may be obtained, where the character string may be "qaanqian 20160508155825", where "qaanqian" may be the user account, "20160508" may be the current time date, and "155825" may indicate that the current time is 58 minutes and 25 seconds at 3 pm. In an embodiment of the application, the preset rule may include a hash algorithm, and the hash algorithm may convert the character string into a hash value, and use the hash value obtained through conversion as the first identifier.
In this embodiment, a first identifier may be generated according to a preset rule in response to the login request, and the first identifier may be used as a unique identifier of the login request of this time, so as to provide a data source for subsequent sound wave encoding.
S2: sending the first identifier to the first client, the first identifier being associated with the login request.
In this embodiment, since the first identifier is generated in response to a login request sent by the first client, the server may associate the first identifier with the login request. In this way, in the user login process of this time, within the valid time limit of the first identifier, the first identifier may be used as a password or a credential for user login. And the client sides of the two parties for user login can realize the authorization of user login through the first identifier.
In this embodiment, the server may store the first identifier and the login request in an associated manner through a data table, one column in the data table may store the first identifier, another column may store the login request, and the associated first identifier and the login request may be in the same row. Of course, the way of associating the first identifier with the login request is not limited to the above example, and other modifications are possible for those skilled in the art in light of the technical spirit of the present application, and all that can be achieved is covered by the scope of the present application as long as the achieved functions and effects are the same as or similar to the present application.
In this embodiment, after associating the first identifier with the login request, the server may send the first identifier to the first client. Specifically, the server may send the first identifier to the first client through a predetermined port.
In this embodiment, after receiving the first identifier, the first client may read characters included in the first identifier, and perform sound wave encoding on each character in the first identifier according to a provided relationship set between the characters and sound wave characteristic values (for example, sound wave frequencies). For example, the characters may include numerals 0 to 9 and subtitles a to f, and the correspondence between the characters and the sound wave frequency may be as shown in table 1.
TABLE 1 correspondence between characters and acoustic frequencies
Character(s) Sonic frequency/kHz
0 18
1 18.2
2 18.4
f 21
In this way, the first client may send the sound wave corresponding to the first identifier to the second client in a sound wave coding manner. In this embodiment, the second client may be a terminal device capable of accessing a communication network based on a network protocol. Specifically, for example, the second client may be a mobile smart phone, a computer (including a laptop computer and a desktop computer), a tablet electronic device, a Personal Digital Assistant (PDA), or a smart wearable device. In addition, the second client may be software with a user management function, such as WeChat, Paibao, Jingdong, and the like, and the second client may also be a website with a user management function, such as WeChat, Paibao official website, and the like. In one embodiment, for example, the second client may log in to a web page for a pay pal on a laptop computer. In the sound wave receiving process, generally, the sound wave receiving device of the device where the second client is located, such as a microphone, an external microphone, and the like, needs to be opened. It should be noted that, in an actual application scenario, there may be a plurality of second clients around the first client, and when the first client sends a sound wave signal through a speaker of the terminal device, at least one second client around the first client may receive the sound wave signal through a sound wave receiving device. In particular, when a first client needs to send a first identification of 8a67 to at least one second client, four segments of sound waves of different frequencies will be generated. The first client may sequentially send the four sound waves with different frequencies according to an order from left to right of the characters in the first identifier. In this embodiment, the first client may set the duration of each sound wave, which may be 100ms, for example, so that when the first client transmits the sound waves in sequence, the first identifier 8a67 will correspond to the sound wave band of 400 ms.
When the first client and the second client are both still, the second client may analyze the sound wave after receiving the sound wave, recognize the frequencies corresponding to the four sound waves, and then decode the four sound waves into the first identifier 8a67 according to the correspondence between the sound wave frequencies and the characters. However, in a practical application scenario, the number of the second clients may be more than one, and each second client may receive the four sound waves transmitted by the first client and may decode to obtain the first identifier. In this case, if each second client obtains the user login authorization from the server through the first identifier, the leakage of the personal information of the user is caused.
In view of the above, in this embodiment, the first client may generate relative motion with the second client, and according to the doppler effect, when the sound wave source and the sound wave receiving object generate relative motion, the frequency of the sound wave received by the sound wave receiving object may increase; when the sound wave source and the sound wave receiving object move away from each other, the frequency of the sound wave received by the sound wave receiving object decreases. The frequency value increase or decrease of the sound wave generated by the doppler effect may be referred to as a doppler frequency offset value (denoted as Δ f), and the doppler frequency offset value and the speed of the relative motion of the sound wave source and the sound wave receiving object may have a positive correlation, specifically, the positive correlation may be as follows:
Figure BDA0001093174870000091
wherein v is a relative movement speed between the sound wave source and the sound wave receiving object, λ is a sound wave wavelength, and θ is an included angle between a connecting line direction between the sound wave source and the sound wave receiving object and a relative movement direction between the sound wave source and the sound wave receiving object. The value of the frequency of the acoustic wave finally received by the acoustic wave receiving object can be obtained from the frequency value of the acoustic wave generated by the acoustic wave source and the doppler frequency offset value. Taking the example that the sound wave source and the sound wave receiving object move in opposite directions, the frequency of the sound wave finally received by the sound wave receiving object can be obtained by adding the value of the frequency of the sound wave generated by the sound wave source and the doppler frequency offset value. In this embodiment, the source of the sound wave of the at least one second client may be the first client. Therefore, in the process of transmitting the sound wave to the at least one second client by the first client, if relative motion occurs between the first client and the at least one second client, the frequency of the sound wave received by the at least one second client may increase due to the doppler effect. In an actual application scenario, the relative operation between the first client and the second client may be, for example: the first user holds the terminal device and swings towards the second client, relative motion can be generated between the two terminal devices, values of the included angles are different along with different positions between the second client and the first client, and accordingly Doppler frequency offset values generated due to the relative motion between the first client and the second client can be different, and different second clients can be identified according to the different Doppler frequency offset values.
In this embodiment, after the at least one second client receives the sound wave with frequency offset, the received sound wave may also be decoded. In a practical application scenario, a relative movement direction between the first client and the second client may be predefined, for example, a movement direction of the first client towards the second client may be predefined. Therefore, the frequency value of the sound wave received by the second client is higher than that of the sound wave sent by the first client. In this case, after the second client receives the sound wave with frequency offset, the sound wave frequency value with frequency offset may be compared with the original sound wave frequency value, so as to determine the original sound wave frequency value matching with the sound wave frequency value after frequency offset, and then the characters corresponding to the sound wave may be queried according to the determined original sound wave frequency value through the relationship table shown in table 1.
In this embodiment, the first identifier may be associated with the login request and sent to the first client, so that the clients of both parties performing user login may realize authorization of user login through the first identifier.
S3: and receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value.
In this embodiment, when at least one second client receives the sound wave sent by the first client, the sound wave characteristic value corresponding to the sound wave may be identified, and the corresponding first identifier may be obtained by decoding according to the sound wave characteristic value. Then, the at least one second client may send the decoded first identifier and the frequency value of the sound wave to the server. It should be noted that, in an actual application scenario, in order to ensure security of data transmission between the client and the server, the first identifier sent from the second client may be encrypted by a preset encryption rule, so that the first identifier is converted into another character string. In this embodiment, the encryption rule may be, for example, DES3 algorithm or AES algorithm. In this embodiment, a character string obtained by encrypting the first identifier may be referred to as a second identifier. Then, after generating the second identity, the at least one second client may send a login request to the server. The second identifier and a characteristic value of a sound wave may be included in the login request. The sound wave characteristic value may be obtained by the second client through identification according to the received sound wave, and the sound wave characteristic value may include a frequency value of the sound wave, for example, the frequency value of the sound wave may be a frequency value after doppler frequency offset occurs. For example, the frequency values sent by the first client are 18kHz, 19kHz and 19.4kHz, and since relative motion occurs between the first client and the second client, the second client can obtain three frequency values with frequency offset, namely 18.12kHz, 19.12kHz and 19.52kHz, after recognizing according to the received sound wave signal. The second client may send the three frequency values at which the frequency offset occurred to the server.
In this embodiment, the frequency value of the sound wave may also be a doppler frequency offset value, that is, a difference value between the frequency value after the frequency offset occurs and the original frequency value. Specifically, assuming that the frequency values sent by the first client are 18kHz, 19kHz and 19.4kHz, since the first client and the second client perform relative motion, the second client can obtain three frequency values of frequency offset, namely 18.12kHz, 19.12kHz and 19.52kHz, after recognizing according to the received sound wave signal. Then, the second client may calculate that a doppler frequency offset value between the frequency value of the generated frequency offset and the original frequency value is 0.12kHz, so that the second client may send 0.12kHz to the server.
In this embodiment, the second client receives the sound wave sent by the first client, decodes the sound wave to generate a second identifier, and sends a login request to the server according to the second identifier and the frequency value of the received sound wave. The server may determine a target client from the second clients by analytically comparing the second identifier with the first identifier.
S4: and determining a target client from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
In this embodiment, when the second identifier matches the first identifier, the second client may participate in a user login process initiated by the first client. If the second identification is not matched with the first identification, it is indicated that the second client is possibly too far away from the first client, the received sound wave signal is inaccurate, and the recognized character string is also inaccurate. In addition or alternatively, the acoustic signal received by the second client is sent by other clients than the first client, in which case the second client should not be able to participate in the user login process initiated by the first client.
In this embodiment, the way that the second identifier matches with the first identifier may include at least one of the following:
the second identifier is the same as the first identifier;
the second identification and the first identification meet the corresponding relation of a preset algorithm.
Specifically, the second identifier may be the same as the first identifier in terms of content of the second identifier being the same as that of the first identifier. The second identifier and the first identifier satisfy a predetermined algorithm corresponding relationship, and may be obtained by performing a decryption operation on the received second identifier according to a predetermined decryption algorithm, for example, DES3 algorithm or AES algorithm, and determining that the second identifier matches the first identifier when the decrypted second identifier is the same as the first identifier. Or, a weighting operation may be performed on the received second identifier, for example, a binary number of the second identifier may be subjected to a weighting operation to obtain a weighted second identifier, and it is determined that the second identifier matches the first identifier when the weighted second identifier is the same as the first identifier. Of course, matching the second identifier with the first identifier may also include other ways, and the embodiments of the present application are not limited to the above list.
In an actual application scenario, when two clients are making user login requests, the distance between the two clients is often short. In this case, an included angle between a connection direction between the two clients and the direction of the relative motion is often small, and then the doppler frequency offset generated between the two clients is often large. Thus, as the distance between two clients increases, the corresponding doppler frequency offset tends to become smaller. Based on this, in this embodiment, the server may select the target client from the at least one second client after determining according to the frequency value of the sound wave sent by the at least one second client. Specifically, for example, the server may rank the frequency values of the received sound waves, and take the second client corresponding to the sound wave with the largest frequency value as the target client.
In an embodiment of the application, the determining, according to the sound wave feature value, a target client from among second clients whose second identifiers match the first identifiers includes:
and taking the second client corresponding to the sound wave with the second identifier matched with the first identifier and the maximum frequency value as a target client.
In this embodiment, as can be seen from the above description, when the first client and the at least one second client move in the opposite direction, due to the doppler effect and the difference between the speeds of the first client and the at least one second client moving in the opposite direction, the frequency increase values of the sound waves received by the at least one second client are different, so that the frequency value of the at least one sound wave received by the at least one second client has the maximum value. Therefore, when the at least one second client sends the frequency of the sound wave received by the at least one second client to the service server, the service server may perform judgment according to the frequency value of the received at least one sound wave, and determine the second client corresponding to the maximum frequency value, where the second client corresponding to the sound wave with the maximum frequency value is the target client.
In one embodiment of the present application, the frequency value may comprise a doppler frequency offset value.
In this embodiment, as can be seen from the above, when the first client and the at least one second client move in the opposite direction, due to the doppler effect, the frequency value of the sound wave received by the at least one second client is increased, and the difference between the increased frequency value and the original frequency value may be the doppler frequency offset value. Therefore, at least one second client may only send the doppler bias value to the server, and the server may determine the doppler bias value according to the received doppler bias value, thereby determining the corresponding second client.
In one embodiment of the present application, the sound wave characteristic value may further include an intensity value of the sound wave;
accordingly, when there are a plurality of the maximum frequency values, the second client corresponding to the sound wave having the maximum frequency value and the maximum intensity value may be used as the target client.
As can be seen from the foregoing embodiments, the second client corresponding to the sound wave with the largest frequency value may be taken as the target client, but in an actual scenario, there may be a plurality of second clients corresponding to the largest frequency value. In this embodiment, the maximum frequency value may indicate that the user makes an included angle between the relative movement direction of the two clients and the connection direction between the two clients smaller. However, the intensity attribute of the sound wave may represent the intensity of the sound wave received by the second client, and the intensity value of the received sound wave is larger as the distance between the second client and the first client is closer. When the included angle between the relative movement direction of the two clients and the connection direction between the two clients is the minimum and the distance between the two clients is the shortest, it can be determined that the second client is the target client. Therefore, when there are a plurality of the maximum frequency values, the second client corresponding to the sound wave having the maximum frequency value and the maximum intensity value may be used as the target client.
In one embodiment of the present application, the frequency value of the sound wave may include an average value of frequencies of sound waves received by the second client within a predetermined period of time.
In this embodiment, the first client may send sound waves to the at least one second client. When relative motion occurs between the first client and the at least one second client, the frequency of the sound wave received by the at least one second client will increase or decrease due to the doppler effect. And the doppler frequency offset values are different according to the difference of the relative movement speeds, so that the rising or falling values of the frequency of the sound wave received by the at least one second client are also different, and thus the average values of the frequency of the sound wave within the preset time period are also different. For example, the first client sends four sound waves with frequencies of 19kHz, 20kHz, 20.2kHz and 20.4kHz to the second client a and the second client B within 400ms, the frequency offset value of the second client a due to the doppler effect is 500Hz, and the frequency offset value of the second client B due to the doppler effect is 200 Hz. The average value of the frequency of the sound wave received by the second client a is higher than the average value of the frequency of the sound wave received by the second client B within 400 ms. Therefore, after the server receives the frequency values sent by the two second clients, the client corresponding to the maximum frequency value can be determined to be the second client a, and the second client a is the target client.
In this embodiment, when the server analyzes that the second identifier matches the first identifier, a target client may be determined from the at least one second client according to the frequency value of the sound wave, and data transmission is performed by using the characteristics of the sound wave, so that not only is efficiency improved, but also user experience is improved.
In this embodiment, the method may further include:
calculating a distance between the first client and the second client;
screening out the second client side with the distance smaller than a preset distance threshold;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
As described above, in an actual application scenario, the distance between two clients that are performing user login requests is often short, and in a scenario where multiple second clients send login requests, if a server processes the login requests one by one, more time is inevitably consumed, the cost is high, and the efficiency is low. In this embodiment, before determining the target client, the second client may be preliminarily screened according to the distance parameter. For example, the distance between the first client and the second client may be obtained, and the second client whose distance is smaller than a preset distance threshold may be screened out. The distance may be calculated according to the geographical location information of the first client and the second client. In one embodiment of the present application, the login request sent by the first client and the second client may include geographical location information. In an embodiment of the present application, the server may send a request to the first client and the second client to obtain the geographic location information. Fig. 2 is a schematic diagram of a scenario in which second clients are screened according to distances provided by the present application, and as shown in fig. 2, a server receives second identifiers sent by multiple second clients, such as PC-A, PC-B and PC-C, and calculates, according to geographical location information of the first client and the second clients, distances a, B, and C between the first client and PC-A, PC-B and PC-C, respectively. And setting a preset distance threshold value as R, screening out second client sides PC-A and PC-B with the distance smaller than R, and then, processing login requests sent by the PC-A and the PC-B by the server only, so that the processing time can be shortened, and the processing efficiency can be improved.
In another embodiment of the present application, the method may further include:
calculating the time between the first client side sending the login request and the second client side sending the login request;
screening out second clients with the time less than a preset time threshold;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
In this embodiment, the login request does not generally extend the request time indefinitely, andin practical application scenarios, after the first client sends the login request, the sound wave is generally sent to the target client in a short time. Therefore, in this embodiment, the second client may be preliminarily screened according to the time parameter before determining the target client. For example, the time that the first client sends the login request is far from the time that the target client sends the login request may be calculated, and the second clients whose time is less than the preset time threshold may be screened out. The time may be calculated according to time information when the first client and the second client send login requests. In an embodiment of the present application, time information may be included in the login request sent by the first client and the second client. In an embodiment of the present application, the server may send a request to the first client and the second client, and obtain time information when the first client and the second client send login requests. Fig. 3 is a schematic diagram of a scenario of filtering second clients according to time provided in the present application, and as shown in fig. 3, a server receives second identifiers sent by multiple second clients, such as PC-1, PC-2, …, and PC-6, where the first client is at T0The login request is sent at the moment, and the second clients PC-1, PC-2, … and PC-6 respectively send login requests at T1Time, T2Time …, T6And sending a login request at any time. Respectively calculating the time interval between the login requests sent by the second clients PC-1, PC-2, … and PC-6 and the login request sent by the first client, and setting a preset time threshold TthScreening out the time interval less than TthAs shown in fig. 3, the second client has the screening results of PC-1, PC-2, PC-3, and PC-4, and thereafter, the server can only process the login request sent by PC-1, PC-2, PC-3, and PC-4, which can shorten the processing time and improve the processing efficiency.
In another embodiment of the present application, the method may further include:
acquiring a preset authorization identifier set of the first client and a physical or network identifier of the second client;
screening out a second client side of which the physical or network identifier is contained in the preset authorization identifier set;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
In a practical scenario, the first client may only authorize the specified client to log in, for example, a small mobile phone may only authorize the small PC, PAD, etc. to log in. At this time, a preset authorization identifier set corresponding to the first client may be set, where the preset authorization identifier set may include a physical identifier or a network identifier corresponding to an authorized client, where the physical identifier may be a physical address of the authorized client, such as a MAC address, and the network identifier may be a network address of the authorized client, such as an IP address, a network card physical address, and the like. In this embodiment, the second client may be preliminarily screened according to the physical or network identifier before determining the target client. For example, a second client having a physical or network identity included in the preset set of authorized identities may be screened out.
In this embodiment, the second client is preliminarily screened before the target client is determined, so that the time for subsequently determining the target client can be shortened, and the processing efficiency of the server can be improved.
Based on the foregoing method for determining a target client, another aspect of the present application further provides a server, fig. 4 is a schematic block structure diagram of an embodiment of the server provided in the present application, and as shown in fig. 4, the server 40 may include:
a first identifier generating unit 41, configured to generate a first identifier according to a preset rule in response to the login request;
a first identifier sending unit 42, configured to send the first identifier to the first client, where the first identifier is associated with the login request;
a second login request receiving unit 43, configured to receive a login request sent by at least one second client, where the login request sent by the second client includes a second identifier and a sound wave characteristic value;
a target client determining unit 44, configured to determine a target client from the second clients whose second identities match the first identities.
According to the method and the server for determining the target client, the first identifier can be encoded through sound waves, encoded sound wave information is sent to the at least one second client in a Doppler frequency offset mode, the frequency value of the sound waves after frequency offset is decoded by the at least one second client, and therefore the first identifier corresponding to the sound wave signals after frequency offset can be obtained. And analyzing the sound wave frequency value sent by the at least one second client by using the server, so that the target client in the user login process can be determined from the plurality of second clients. Compared with the prior art, the method has the advantages that the user can complete account login at the target client only by completing simple operations of sending a login request and shaking the first client at the first client without complex and complicated operations such as inputting an account number and scanning a two-dimensional code, so that the user experience can be improved, and the user login efficiency can be improved.
Fig. 5 and fig. 6 are an interaction diagram and a schematic diagram of an application scenario of a target client, respectively, provided by the present application, where after a first user opens a pay client on a client PC-a, a program of the pay client controls the client PC-a to open a microphone, and at this time, the microphone is in a listening state. The first user initiates a login request of a short distance through a pay bank client running on a first mobile terminal, the login request can be sent to a pay bank service server, and the login request can include a pay bank account of the first user. After receiving the login request, the service server of the treasury payment may calculate a first identifier "397620" according to the account number of the treasury payment and the date and time of the current time by using a hash algorithm, and bind the first identifier with the login request and send the first identifier to the client of the treasury payment on the first mobile terminal.
After receiving the first identifier, the payer client on the first mobile terminal may automatically turn on the speaker of the first mobile terminal, and may sequentially play the sound waves with frequency values corresponding to the numbers in "397620" according to the preset correspondence between the characters and the sound wave frequency values. As shown in fig. 6, at this time, the first user may hold the first mobile terminal to move towards the target client PC-a with an acceleration a, for example, may flick the first mobile terminal towards the target client PC-a. Thus, as shown in fig. 6, the frequency value of the sound wave received by the target client PC-a is doppler-shifted, and meanwhile, the client a and the client B may also receive the sound wave, and the frequency value of the received sound wave may also be doppler-shifted. The pay bank client of the client PC-a, the client a, and the client B may decode the frequency value of the frequency shifted sound wave to obtain the first identifier "397620". The pay bank clients on the client PC-a, the client a, and the client B may use "397620" as the second identifier, and send the second identifier and the frequency value of the received sound wave as a login request to the pay bank service server.
As described above, the payer service server may receive a login request from other terminals such as the client a and the client B, in addition to the login request from the payer client on the target client PC-a. And the payment service server extracts a login request with the second identifier matched with the first identifier from a plurality of requests, and takes the client corresponding to the sound wave with the maximum frequency value as a target client. Since the client PC-a is closest to the first mobile terminal, the target client may be a paymate client on the client PC-a. Thereafter, the Payment treasure service server can send authorization login information to the target client PC-A, and the client PC-A can display a logged-in Payment treasure interface.
In one embodiment of the present application, the first identifier may also be generated by the first client, rather than by the server. Fig. 7 is a flowchart of a method of another embodiment of the method for determining a target client provided in the present application, and as shown in fig. 7, the method may include:
s71: the method comprises the steps of receiving a login request sent by a first client, wherein the login request sent by the first client comprises a first identifier.
S72: and receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value.
S73: and determining a target client from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
In this embodiment, the first identifier may be generated by the first client. The specific method for generating the first identifier is consistent with the description in the above embodiment, and is not described herein again. After the first client generates the first identifier, a login request including the first identifier may be sent to the server.
In this embodiment, after the first client generates the first identifier, the first identifier may be converted into sound waves having different sound wave characteristic values according to the correspondence between the characters and the sound wave characteristic values as described in S2, and the sound waves may be sent to at least one second client by means of doppler shift. After decoding the received sound wave, the at least one second client may obtain a second identifier, and send a login request to the server, where the login request may include the second identifier obtained by decoding and the received sound wave characteristic value. In this way, the server may determine the target client from the at least one second client and send authorized login information to the target client.
In this embodiment, for the specific implementation of the method S71-S73 for determining the target client, reference may be made to the implementation of S1-S4, which is not described herein again.
Based on the foregoing method for determining a target client, another aspect of the present application further provides a server, fig. 8 is a schematic block structure diagram of another embodiment of the server provided in the present application, and as shown in fig. 8, the server 80 may include:
a first login request receiving unit 81, configured to receive a login request sent by a first client, where the login request sent by the first client includes a first identifier;
a second login request receiving unit 82, configured to receive a login request sent by at least one second client, where the login request sent by the second client includes a second identifier and a sound wave characteristic value;
and the target client determining unit 83 is configured to determine a target client from the second clients whose second identifiers match the first identifiers according to the sound wave feature values.
According to the method and the server for determining the target client, the first identifier can be generated from the first client, and the server does not need to generate the first identifier according to the login request of the first client and then send the first identifier to the first client.
Another aspect of the present application also provides a method for determining a target client from a perspective of a first client, and fig. 9 is a flowchart of a method of another embodiment of the method for determining a target client provided by the present application, and as shown in fig. 9, the method may include:
s91: sending a login request;
s92: receiving a first identification associated with the login request;
s93: and generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process.
In this embodiment, after the first client sends the login request, the server responds to the login request, generates a first identifier according to a preset rule, associates the first identifier with the login request, and sends the first identifier to the first client. After receiving the first identifier, the first client may convert the first identifier into sound waves having different sound wave characteristic values according to the correspondence between the characters and the sound wave characteristic values as described in S2, and send the sound waves to at least one second client by means of doppler shift.
In this embodiment, for the specific implementation of the method S91-S93 for determining the target client, reference may be made to the implementation of S1-S4, which is not described herein again.
In one embodiment of the application, the moving process comprises any one of:
the first client moves at a speed greater than a first preset threshold;
the first client moves at an acceleration greater than a second preset threshold.
In an actual application scenario, if the motion amplitude of the first client is small, the sound wave emitted by the first client may be too weak, so that the target client cannot receive the sound wave. In one embodiment of the present application, the first client may operate at a speed greater than a first preset threshold. In one embodiment of the present application, the first client may also operate at a speed greater than a first preset threshold.
Based on the foregoing method for determining a target client, another aspect of the present application further provides a client, fig. 10 is a schematic block structure diagram of an embodiment of the client provided in the present application, and as shown in fig. 10, the client 100 may include:
a login request issuing unit 101 configured to issue a login request;
a first identifier receiving unit 102, configured to receive a first identifier associated with the login request;
and the sound wave transmitting unit 103 is used for generating a sound wave corresponding to the first identifier and transmitting the sound wave to at least one second client in the moving process.
According to the method for determining the target client and the client, after the client sends the login request, the client can receive the first identification which is sent by the server and is associated with the login request, according to the first identification, the client can generate the sound wave corresponding to the first identification, and the sound wave is sent to at least one second client in the moving process. Compared with the prior art, the method has the advantages that the user can complete account login at the target client only by completing simple operations of sending a login request and shaking the first client at the first client without complex and complicated operations such as inputting an account number and scanning a two-dimensional code, so that the user experience can be improved, and the user login efficiency can be improved.
In one embodiment of the present application, the first identifier may also be generated by the first client, rather than by the server. Fig. 11 is a flowchart of a method of another embodiment of a method for determining a target client provided in the present application, and as shown in fig. 11, the method may include:
s111: generating a first identifier and sending a login request containing the first identifier to a server;
s112: and generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process.
In this embodiment, after the first client generates the first identifier, the first identifier may be converted into sound waves having different sound wave characteristic values according to the correspondence between the characters and the sound wave characteristic values as described in S2, and the sound waves may be sent to at least one second client by means of doppler shift.
In this embodiment, for the specific implementation of the method S111-S112 for determining the target client, reference may be made to the implementation of S1-S4, which is not described herein again.
Based on the foregoing method for determining a target client, another aspect of the present application further provides a client, fig. 12 is a schematic block structure diagram of another embodiment of the client provided in the present application, and as shown in fig. 12, the client 120 may include:
a first identifier generating unit 121, configured to generate a first identifier, and send a login request including the first identifier to a server;
and the sound wave transmitting unit 122 is used for generating sound waves corresponding to the first identification and transmitting the sound waves to at least one second client in the moving process.
According to the method for determining the target client and the client, the first identifier can be generated from the first client, and the server does not need to generate the first identifier according to the login request of the first client and then send the first identifier to the first client.
Another aspect of the present application also provides a method for determining a target client from a perspective of a second client, and fig. 13 is a flowchart of a method of another embodiment of the method for determining a target client provided by the present application, and as shown in fig. 13, the method may include:
s131: receiving sound waves and acquiring sound wave characteristic values corresponding to the sound waves;
s132: converting the sound wave characteristic value into a second identifier according to a preset algorithm;
s133: and sending the second identification and the frequency characteristic value corresponding to the sound wave.
In this embodiment, when receiving the sound wave sent by the first client, the second client may recognize a sound wave characteristic value corresponding to the sound wave, and may decode the sound wave characteristic value to obtain the corresponding first identifier. And then, the second client encrypts the first identifier to obtain a second identifier. At this time, the at least one second client may send the second identifier and the sound wave characteristic value to the server.
In this embodiment, for the specific implementation of the method S131 to S132 for determining the target client, reference may be made to the implementation of S1 to S4, which is not described herein again.
Based on the above method for determining a target client, another aspect of the present application further provides a client, fig. 14 is a schematic block structure diagram of another embodiment of the client provided by the present application, and as shown in fig. 14, the client 140 may include:
the sound wave receiving unit 141 is used for receiving sound waves and acquiring frequency characteristic values corresponding to the sound waves;
a second identifier generating unit 142, configured to convert the frequency characteristic value into a second identifier according to a preset algorithm;
and a second identifier transmitting unit 143, configured to transmit the second identifier and a frequency characteristic value corresponding to the sound wave.
According to the method for determining the target client and the client, when the second client receives the sound wave sent by the first client, the sound wave characteristic value corresponding to the sound wave can be identified, and the corresponding first identifier can be obtained by decoding according to the sound wave characteristic value. And then, the second client encrypts the first identifier to obtain a second identifier.
In another aspect of the present application, a method for determining a target client is further provided from a server and a client through bilateral interaction, fig. 15 is a flowchart of a method according to another embodiment of the method for determining a target client provided by the present application, and as shown in fig. 15, the method may include:
s151: the server receives a login request sent by a first client;
s152: the server responds to the login request and generates a first identifier according to a preset rule;
s153: the server sends the first identification to the first client, wherein the first identification is associated with the login request;
s154: the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
s155: the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the frequency value into a second identifier according to a preset algorithm;
s156: the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
s157: and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values.
Accordingly, the present application also provides a system for determining a target client, which may include a server, a first client, and at least one second client, wherein,
the server is used for receiving a login request sent by a first client; the login server is also used for responding to the login request and generating a first identifier according to a preset rule; further configured to send the first identifier to the first client, the first identifier being associated with the login request; the first client is used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client in the moving process;
the at least one second client is used for acquiring the sound wave characteristic value and converting the frequency sound wave characteristic value into a second identifier according to a preset algorithm;
the server is further used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the target client is determined from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
In another aspect of the present application, a method for determining a target client is further provided from a server and a client through bilateral interaction, fig. 16 is a flowchart of a method according to another embodiment of the method for determining a target client provided by the present application, and as shown in fig. 16, the method may include:
s161: a first client generates a first identifier and sends a login request containing the first identifier to a server;
s162: the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
s163: the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the frequency value into a second identifier according to a preset algorithm;
s164: the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
s165: and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values.
Accordingly, the present application also provides a system for determining a target client, which may include a server, a first client, and at least one second client, wherein,
the first client is used for generating a first identifier and sending a login request containing the first identifier to a server; the mobile terminal is also used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client terminal in the moving process;
the at least one second client is used for acquiring a sound wave characteristic value corresponding to the sound wave and converting the frequency value into a second identifier according to a preset algorithm;
the server is used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the target client is determined from the second clients of which the second identifiers are matched with the first identifiers according to the sound wave characteristic values.
Although the present application contents refer to the data transmission and processing description such as sending a login request, generating a first identifier, converting a sound wave into a second identifier, and the like in the embodiments, the present application is not limited to the case where the data transmission and processing have to be completely described in the embodiments. The embodiments slightly modified from those described in the embodiments can also achieve the same, equivalent or similar effects as those of the embodiments described above, or can be modified to realize the expected effects. Of course, even if the data processing and transmission mode is not adopted, the same application can be still realized as long as the data processing, information interaction and information feedback modes according to the above embodiments of the present application are met, and details are not described here.
Although the present application provides method steps as described in an embodiment or flowchart, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
The server, the system and the unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by an article with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations as the present application. Of course, a module that implements the same function may also be implemented by multiple sub-modules or a combination of sub-modules in a unit module described in this application.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
While the present application has been described with examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and permutations without departing from the spirit of the application.

Claims (28)

1. A method of determining a target client, the method comprising:
responding to a login request sent by a first client, and generating a first identifier according to a preset rule; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
sending the first identifier to the first client, the first identifier being associated with the login request;
receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value; the sound wave characteristic value is obtained by identifying the received sound wave by the second client; the sound wave is sent to a second client by the first client in the moving process and corresponds to the first identifier; the second identification is obtained by converting the sound wave characteristic value by the second client according to a preset algorithm;
and according to the sound wave characteristic value, determining a target client from second clients of which the second identifications are matched with the first identifications so as to respond to the login request of the target client.
2. The method of claim 1, wherein the login request sent by the first client includes user account information of the first client.
3. The method of claim 1, further comprising:
calculating a distance between the first client and the second client;
screening out the second client side with the distance smaller than a preset distance threshold;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
4. The method of claim 1, further comprising:
calculating the time between the first client side sending the login request and the second client side sending the login request;
screening out second clients with the time less than a preset time threshold;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
5. The method of claim 1, further comprising:
acquiring a preset authorization identifier set of the first client and a physical or network identifier of the second client;
screening out a second client side of which the physical or network identifier is contained in the preset authorization identifier set;
accordingly, the determining a target client from the second clients whose second identities match the first identity comprises:
and determining a target client from the screened second clients with the second identifications matched with the first identifications.
6. The method of claim 1, wherein the second identifier matching the first identifier comprises at least one of:
the second identifier is the same as the first identifier;
the second identification and the first identification meet the corresponding relation of a preset algorithm.
7. The method of claim 1, wherein the sonic signature value comprises a sonic frequency value.
8. The method of claim 7, wherein the determining a target client from the second clients whose second identifiers match the first identifiers according to the sound wave feature values comprises:
and taking the second client corresponding to the sound wave with the second identifier matched with the first identifier and the maximum frequency value as a target client.
9. The method of claim 7 or 8, wherein the frequency values comprise doppler bias values.
10. The method of claim 8, wherein the acoustic signature value further comprises an intensity value of the acoustic wave;
correspondingly, when the maximum frequency value is multiple, the second client corresponding to the sound wave with the maximum frequency value and the maximum intensity value is taken as the target client.
11. The method of claim 7, wherein the sonic frequency value comprises an average of the sonic frequencies received by the second client over a predetermined period of time.
12. A server, characterized in that the server comprises:
the first identification generation unit is used for responding to the login request and generating a first identification according to a preset rule; the login request refers to a login request generated by a first client in the first client based on the login requirements of a user on other clients;
a first identifier sending unit, configured to send the first identifier to the first client, where the first identifier is associated with the login request;
the second login request receiving unit is used for receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value; the sound wave characteristic value is obtained by identifying the received sound wave by the second client; the sound wave is sent to a second client by the first client in the moving process and corresponds to the first identifier; the second identification is obtained by converting the sound wave characteristic value by the second client according to a preset algorithm;
and the target client determining unit is used for determining a target client from the second clients of which the second identifications are matched with the first identifications so as to respond to the login request of the target client.
13. A method of determining a target client, the method comprising:
receiving a login request sent by a first client, wherein the login request sent by the first client comprises a first identifier; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value; the sound wave characteristic value is obtained by identifying the received sound wave by the second client; the sound wave is sent to a second client by the first client in the moving process and corresponds to the first identifier; the second identification is obtained by converting the sound wave characteristic value by the second client according to a preset algorithm;
and according to the sound wave characteristic value, determining a target client from second clients of which the second identifications are matched with the first identifications so as to respond to the login request of the target client.
14. The method of claim 13, wherein the login request sent by the first client includes account information of the first client.
15. The method of claim 13, further comprising:
acquiring geographical position information of the first client and the target client;
calculating the distance between the first client and the target client according to the geographical position information of the first client and the target client;
and when the distance is smaller than a preset distance threshold value, sending authorized login information to the target client.
16. The method of claim 13, further comprising:
acquiring time information when the first client and the target client send login requests;
calculating the time between the first client side sending the login request and the target client side sending the login request according to the time information when the first client side and the target client side send the login request;
and when the time is less than a preset time threshold, sending authorized login information to the target client.
17. The method of claim 13, further comprising:
acquiring a preset authorization address set of the first client and an address identifier of the target client;
judging whether the address identification is contained in the preset authorization address set or not;
and if so, sending authorized login information to the target client.
18. A server, characterized in that the server comprises:
the system comprises a first login request receiving unit, a first identification receiving unit and a second identification receiving unit, wherein the first login request receiving unit is used for receiving a login request sent by a first client, and the login request sent by the first client comprises a first identification; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
the second login request receiving unit is used for receiving a login request sent by at least one second client, wherein the login request sent by the second client comprises a second identifier and a sound wave characteristic value; the sound wave characteristic value is obtained by identifying the received sound wave by the second client; the sound wave is sent to a second client by the first client in the moving process and corresponds to the first identifier; the second identification is obtained by converting the sound wave characteristic value by the second client according to a preset algorithm;
and the target client determining unit is used for determining a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic value so as to respond to the login request of the target client.
19. A method of determining a target client, the method comprising:
sending a login request; the login request is generated based on the login requirements of the user at other clients;
receiving a first identification associated with the login request;
generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process; enabling at least one second client to receive sound waves, identifying the received sound waves to obtain sound wave characteristic values, converting the sound wave characteristic values according to a preset algorithm to obtain second identifications, and sending login requests comprising the second identifications and the sound wave characteristic values to a server; and enabling the server to determine a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
20. A client, the client comprising:
a login request issuing unit for issuing a login request; the login request is generated based on the login requirements of the user at other clients;
a first identifier receiving unit, configured to receive a first identifier associated with the login request;
the sound wave transmitting unit is used for generating sound waves corresponding to the first identification and transmitting the sound waves to at least one second client in the moving process; enabling at least one second client to receive sound waves, identifying the received sound waves to obtain sound wave characteristic values, converting the sound wave characteristic values according to a preset algorithm to obtain second identifications, and sending login requests comprising the second identifications and the sound wave characteristic values to a server; and enabling the server to determine a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
21. A method of determining a target client, the method comprising:
generating a first identifier and sending a login request containing the first identifier to a server; the login request is generated based on the login requirements of the user at other clients;
generating sound waves corresponding to the first identification, and sending the sound waves to at least one second client in the moving process; enabling at least one second client to receive sound waves, identifying the received sound waves to obtain sound wave characteristic values, converting the sound wave characteristic values according to a preset algorithm to obtain second identifications, and sending login requests comprising the second identifications and the sound wave characteristic values to a server; and enabling the server to determine a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
22. A client, the client comprising:
the first identification generating unit is used for generating a first identification and sending a login request containing the first identification to a server; the login request is generated based on the login requirements of the user at other clients;
the sound wave transmitting unit is used for generating sound waves corresponding to the first identification and transmitting the sound waves to at least one second client in the moving process; enabling at least one second client to receive sound waves, identifying the received sound waves to obtain sound wave characteristic values, converting the sound wave characteristic values according to a preset algorithm to obtain second identifications, and sending login requests comprising the second identifications and the sound wave characteristic values to a server; and enabling the server to determine a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
23. A method of determining a target client, the method comprising:
receiving sound waves which are sent to a second client by a first client in the moving process and correspond to the first identification;
acquiring a sound wave characteristic value corresponding to the sound wave;
converting the sound wave characteristic value into a second identifier according to a preset algorithm;
sending the second identification and the sound wave characteristic value corresponding to the sound wave to a server; enabling the server to determine a target client from second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client; the server responds to a login request sent by a first client and generates the first identifier according to a preset rule; or the first identification is generated by the first client and is contained in the login request to be sent to the server; the login request is generated by the first client based on login requirements of the user at other clients.
24. A client, the client comprising:
the sound wave receiving unit is used for receiving sound waves, and the sound waves are sent to the second client by the first client in the moving process and correspond to the first identification; acquiring a sound wave characteristic value corresponding to the sound wave;
the second identifier generating unit is used for converting the sound wave characteristic value into a second identifier according to a preset algorithm;
the second identifier sending unit is used for sending the second identifier and the sound wave characteristic value corresponding to the sound wave to a server; enabling the server to determine a target client from second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client; the server responds to a login request sent by a first client and generates the first identifier according to a preset rule; or the first identification is generated by the first client and is contained in the login request to be sent to the server; the login request is generated by the first client based on login requirements of the user at other clients.
25. A method of determining a target client, the method comprising:
the server receives a login request sent by a first client; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
the server responds to the login request and generates a first identifier according to a preset rule;
the server sends the first identification to the first client, wherein the first identification is associated with the login request;
the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the sound wave characteristic value into a second identifier according to a preset algorithm;
the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
26. A system for targeting a client, the system comprising a server, a first client and at least one second client, wherein,
the server is used for receiving a login request sent by a first client; the login server is also used for responding to the login request and generating a first identifier according to a preset rule; further configured to send the first identifier to the first client, the first identifier being associated with the login request; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
the first client is used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client in the moving process;
the at least one second client is used for acquiring the sound wave characteristic value corresponding to the sound wave and converting the sound wave characteristic value into a second identifier according to a preset algorithm;
the server is further used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the server is further used for determining a target client from second clients of which the second identifications are matched with the first identifications according to the sound wave characteristic values so as to respond to a login request of the target client.
27. A method of determining a target client, the method comprising:
a first client generates a first identifier and sends a login request containing the first identifier to a server; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
the first client generates sound waves corresponding to the first identification and sends the sound waves to at least one second client in the moving process;
the at least one second client acquires a sound wave characteristic value corresponding to the sound wave, and converts the sound wave characteristic value into a second identifier according to a preset algorithm;
the server receives a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value;
and the server determines a target client from the second clients with the second identifications matched with the first identifications according to the sound wave characteristic values so as to respond to the login request of the target client.
28. A system for targeting a client, the system comprising a server, a first client and at least one second client, wherein,
the first client is used for generating a first identifier and sending a login request containing the first identifier to a server; the mobile terminal is also used for generating sound waves corresponding to the first identification and sending the sound waves to at least one second client terminal in the moving process; the login request sent by the first client is a login request generated in the first client by the first client based on the login requirements of users on other clients;
the at least one second client is used for acquiring the sound wave characteristic value corresponding to the sound wave and converting the sound wave characteristic value into a second identifier according to a preset algorithm;
the server is used for receiving a login request sent by the at least one second client, wherein the login request sent by the second client comprises the second identifier and the sound wave characteristic value; and the server is further used for determining a target client from second clients of which the second identifications are matched with the first identifications according to the sound wave characteristic values so as to respond to a login request of the target client.
CN201610737808.7A 2016-08-26 2016-08-26 Method and system for determining target client, client and server Active CN107786505B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610737808.7A CN107786505B (en) 2016-08-26 2016-08-26 Method and system for determining target client, client and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610737808.7A CN107786505B (en) 2016-08-26 2016-08-26 Method and system for determining target client, client and server

Publications (2)

Publication Number Publication Date
CN107786505A CN107786505A (en) 2018-03-09
CN107786505B true CN107786505B (en) 2021-08-06

Family

ID=61439436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610737808.7A Active CN107786505B (en) 2016-08-26 2016-08-26 Method and system for determining target client, client and server

Country Status (1)

Country Link
CN (1) CN107786505B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110349574A (en) * 2019-07-16 2019-10-18 中国工商银行股份有限公司 Account binding method and device based on voice-operated device
CN110400151A (en) * 2019-07-29 2019-11-01 中国工商银行股份有限公司 Voice payment method, apparatus, calculating equipment and medium applied to server
CN110474902B (en) * 2019-08-14 2022-05-03 中国工商银行股份有限公司 Account binding method, system, computing device and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103856886A (en) * 2012-11-30 2014-06-11 王方淇 Target terminal selection method, system and mobile terminal
CN103873593A (en) * 2014-04-02 2014-06-18 北京奇艺世纪科技有限公司 Website logging in method and system
US9269250B2 (en) * 2013-03-15 2016-02-23 Harry Nickles Immediate response security system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856886A (en) * 2012-11-30 2014-06-11 王方淇 Target terminal selection method, system and mobile terminal
US9269250B2 (en) * 2013-03-15 2016-02-23 Harry Nickles Immediate response security system
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103873593A (en) * 2014-04-02 2014-06-18 北京奇艺世纪科技有限公司 Website logging in method and system

Also Published As

Publication number Publication date
CN107786505A (en) 2018-03-09

Similar Documents

Publication Publication Date Title
US11663578B2 (en) Login using QR code
US10158621B2 (en) Method, apparatus, and system for providing a security check
US11258611B2 (en) Trusted data verification
JP6929883B2 (en) Data transmission methods, data transmitters, data receivers, and systems
CN107786505B (en) Method and system for determining target client, client and server
EP3061025B1 (en) Method and system for authenticating service
KR102038963B1 (en) Method and Apparatus for Selectively Providing Protection of Screen information data
CN111249740A (en) Resource data access method and system
WO2015179640A1 (en) Method, apparatus, and system for providing a security check
WO2015032255A1 (en) Intelligent key device, mobile terminal and dynamic password output method and system
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
CN115801317A (en) Service providing method, system, device, storage medium and electronic equipment
US11303672B2 (en) Detecting replay attacks using action windows
CN113099025A (en) Method and device for adding friends in social application
CN115174161B (en) Account login method and device, electronic equipment and storage medium
CN103414696A (en) Third-party login method and device based on limited skip
CN103927648A (en) Method, device and system for achieving remote payment services
CN107172115B (en) Data information sending and receiving method, client, server and system
CN115865446A (en) Application program login method and device, processor and electronic equipment
CN114493604A (en) Transaction verification method and device
TW201322722A (en) Multi-channel active identity authentication system and related computer program product and method
Wang et al. A New Text Based CAPTCHA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1252040

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant