CN107977562B - Identity recognition method, recognition terminal and storage medium - Google Patents

Identity recognition method, recognition terminal and storage medium Download PDF

Info

Publication number
CN107977562B
CN107977562B CN201711255871.8A CN201711255871A CN107977562B CN 107977562 B CN107977562 B CN 107977562B CN 201711255871 A CN201711255871 A CN 201711255871A CN 107977562 B CN107977562 B CN 107977562B
Authority
CN
China
Prior art keywords
identification
key
coding
user
source file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711255871.8A
Other languages
Chinese (zh)
Other versions
CN107977562A (en
Inventor
郭佳良
孙丽
白金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711255871.8A priority Critical patent/CN107977562B/en
Publication of CN107977562A publication Critical patent/CN107977562A/en
Application granted granted Critical
Publication of CN107977562B publication Critical patent/CN107977562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an identity recognition method, which comprises the following steps: receiving a sound wave signal sent by a sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identifier and a coding table key according to the effective sound source file; inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule; and decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information. The invention also discloses an identification terminal and a storage medium. In the invention, the user can finish the identification operation only by using the sending terminal to send the ultrasonic signal, and the method is simple and convenient to operate, simple and easy to implement and beneficial to popularization.

Description

Identity recognition method, recognition terminal and storage medium
Technical Field
The present invention relates to the field of identity recognition technologies, and in particular, to an identity recognition method, an identity recognition terminal, and a storage medium.
Background
With the development of communication network technology, intelligent identification technology is in need of further improvement. The existing identification technology has wide application fields, such as access control technology, financial payment technology field, network service technology field and the like. Taking the technical field of payment as an example, the existing payment is usually two-dimensional code payment or payment information is manually input by a user, and a payer is required to keep network communication, the user operation is complicated, the payment is not convenient enough, wherein many operations are actually for realizing identity recognition, so the complicated operation of the user during payment reflects the complicated operation required by the user during identity recognition, the user needs to pay certain time cost, and when the user recognition terminal does not have a network, the identity recognition cannot be performed.
Therefore, the existing identity identification method has the problems of complicated user operation and networking requirements on the user identification terminal.
Disclosure of Invention
The invention mainly aims to provide an identity recognition method, and aims to solve the technical problems that a user recognition terminal needs to be online and the user operation is complicated when a user performs identity recognition.
In order to achieve the above object, the present invention provides an identity recognition method, including:
receiving a sound wave signal sent by a sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identifier and a coding table key according to the effective sound source file;
inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule;
and decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information.
Optionally, the step of obtaining the user id and the key of the code table according to the valid sound source file includes:
acquiring a user identification frequency band and a key frequency band in the effective sound source file, and decoding the user identification frequency band to acquire a user identification;
and acquiring a fixed code table according to the user identification, and decoding the key frequency band according to the fixed code table to acquire a code table key.
Optionally, the step of decoding the key information frequency band in the valid audio source file according to the latest coding table to obtain the identity information includes:
and acquiring a frequency peak value of a key information frequency band in the effective sound source file, and determining character information corresponding to the frequency peak value according to the latest coding table, wherein the character information is identity information.
Optionally, the step of decoding the key information frequency band in the valid audio source file according to the latest coding table to obtain the identity information includes:
decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain primary identity information;
determining whether the key information frequency band in the effective sound source file is subjected to binary coding according to the user identification;
if the key information frequency band is subjected to the binary coding, acquiring a binary number corresponding to the user identification;
and decoding the primary identity information according to the binary number to obtain identity information.
Optionally, the querying the preset database includes:
and inquiring a mapping table of the correspondence between the identification and the coding rule in the server database.
Optionally, the step of receiving the sound wave signal sent by the sending terminal, and identifying the sound wave signal to generate a corresponding valid sound source file includes:
receiving a sound wave signal sent by a sending terminal, and starting to record an effective sound wave signal from an initial identifier when the initial identifier in the sound wave signal is detected;
and identifying the effective sound wave signals to generate corresponding effective sound source files.
Optionally, the identity recognition method further includes:
and if the identity recognition fails, outputting a prompt message of the identity recognition failure.
Optionally, the step of obtaining the latest code table according to the code table key and the code rule includes:
substituting the coding table key as an input parameter into a coding rule function to obtain an output result of the coding rule function;
and the output result is the latest coding table.
In order to achieve the above object, the present invention further provides an identification terminal, including: the identification device comprises a memory, a processor and an identification program stored on the memory and capable of running on the processor, wherein the identification program realizes the steps of the identification method when being executed by the processor.
In addition, to achieve the above object, the present invention further provides a storage medium, wherein the storage medium stores an identification program, and the identification program, when executed by a processor, implements the steps of the identification method.
In the embodiment, the user identification and the coding table key in the effective sound source file in the form of ultrasonic waves are obtained, the coding rule for generating the latest coding table is obtained according to the user identification, the latest coding table for decoding key information such as identity information is obtained according to the coding rule and the coding table key, finally the key information is decoded based on the latest coding table to obtain the identity information, the safety and the accuracy of identity identification can be enhanced through multiple coding of the user identification, the coding table key, the coding rule and the like, the anti-interference capability of the ultrasonic waves is strong, the identity identification can be conveniently carried out by a user in various occasions, in addition, the sending terminal can locally store the coding rule and carry out coding, the ultrasonic wave signals are played/sent, the identity identification can be realized without networking, the application range of the scheme of the embodiment of the invention is expanded, and the user only needs to use the sending terminal to send the ultrasonic wave signals, the method can complete the identification operation without inputting various data or aligning the two-dimensional code by using a camera, and is simple and convenient to operate, simple and easy to implement and favorable for popularization.
Drawings
Fig. 1 is a schematic diagram of a recognition terminal of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a scenario of an identity recognition system according to an embodiment of the present invention;
fig. 3 is a communication network system architecture diagram according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a first embodiment of an identity recognition method according to the present invention;
FIG. 5 is a schematic diagram of an identity recognition failure interface shown in the identity recognition terminal according to the identity recognition method of the present invention;
fig. 6 is another schematic diagram of an identity recognition failure interface shown in the identity recognition terminal according to the identity recognition method of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
As shown in fig. 1, fig. 1 is a schematic structural diagram of an identification terminal of a hardware operating environment according to an embodiment of the present invention.
The identification terminal may be implemented in various forms. For example, the identification terminal described in the present invention may include mobile identification terminals such as a mobile phone, a tablet computer, a notebook computer, a palm top computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device (e.g., an AR/VR device with a networking function), a smart band, a pedometer, a smart speaker, an auto-driving car, and fixed identification terminals such as a Digital TV, a desktop computer, and an internet of things device (e.g., a smart home with a networking function, a smart air conditioner, a smart electric lamp, and a smart power supply). The identification terminal may also be an identification terminal that implements a server function for other identification terminals.
In the following description, a mobile identification terminal will be exemplified, and it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type identification terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile identification terminal for implementing various embodiments of the present invention, the mobile identification terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. The mobile identification terminal can be a cloud mobile identification terminal. It will be understood by those skilled in the art that the mobile identification terminal structure shown in fig. 1 does not constitute a limitation of the mobile identification terminal, and that the mobile identification terminal may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile identification terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile identification terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile identification terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile recognition terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile identification terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile identification terminal 100 further includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile recognition terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile recognition terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile identification terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile identification terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile identification terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile identification terminal 100 or may be used to transmit data between the mobile identification terminal 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile identification terminal, connects various parts of the entire mobile identification terminal using various interfaces and lines, and performs various functions of the mobile identification terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile identification terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
In the mobile identification terminal, the processor 110 is configured to execute the identification program stored in the memory 109, and implement the following steps:
receiving a sound wave signal sent by a sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identifier and a coding table key according to the effective sound source file;
inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule;
and decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information.
The step of obtaining the user identification and the coding table key according to the effective sound source file comprises the following steps:
acquiring a user identification frequency band and a key frequency band in the effective sound source file, and decoding the user identification frequency band to acquire a user identification;
and acquiring a fixed code table according to the user identification, and decoding the key frequency band according to the fixed code table to acquire a code table key.
The step of decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain the identity information comprises the following steps:
and acquiring a frequency peak value of a key information frequency band in the effective sound source file, and determining character information corresponding to the frequency peak value according to the latest coding table, wherein the character information is identity information.
The step of decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain the identity information comprises the following steps:
decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain primary identity information;
determining whether the key information frequency band in the effective sound source file is subjected to binary coding according to the user identification;
if the key information frequency band is subjected to the binary coding, acquiring a binary number corresponding to the user identification;
and decoding the primary identity information according to the binary number to obtain identity information.
The querying the preset database includes:
and inquiring a mapping table of the correspondence between the identification and the coding rule in the server database.
The step of receiving the sound wave signal sent by the sending terminal and identifying the sound wave signal to generate a corresponding effective sound source file comprises the following steps:
receiving a sound wave signal sent by a sending terminal, and starting to record an effective sound wave signal from an initial identifier when the initial identifier in the sound wave signal is detected;
and identifying the effective sound wave signals to generate corresponding effective sound source files.
The identity recognition method further comprises the following steps:
and if the identity recognition fails, outputting a prompt message of the identity recognition failure.
The step of obtaining the latest coding table according to the coding table key and the coding rule comprises the following steps:
substituting the coding table key as an input parameter into a coding rule function to obtain an output result of the coding rule function;
and the output result is the latest coding table.
The identification terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
Although not shown in fig. 1, the identification terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In one embodiment, the identification terminal may include a central processing module and an acoustic wave signal receiving/recording module, which may be independent devices, as shown in fig. 2, because the central processing module assumes a server function, the central processing module is referred to as a server, and the acoustic wave signal receiving/recording module is referred to as a receiving terminal.
The receiving terminal detects the ultrasonic signals sent by the sending terminal, identifies the sound wave signals to generate corresponding effective sound source files, and sends the effective sound source files to the terminal equipment serving as the server.
The transmitting terminal may be implemented in various forms. For example, the sending terminal described in the present invention may include an identification terminal such as a mobile phone, a tablet computer, a notebook computer, a palm computer, a Personal Digital Assistant (PDA), a wearable device (e.g., an AR/VR device with a networking function), a smart band, an auto-driving automobile, and a fixed identification terminal such as a desktop computer. The transmitting terminal shown in fig. 2 is a smart phone as an example, and those skilled in the art will understand that the transmitting terminal in the embodiment of the present invention may be implemented in other forms of identification terminals besides a smart phone.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the identification terminal and the transmission terminal of the present invention are based will be described below.
Referring to fig. 3, fig. 3 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the above-mentioned identification terminal 100, sending terminal, and identification terminal, which are not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 20 thirty-two, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. The HSS20 is used to provide registers to manage functions such as a home location register (not shown) and holds subscriber-specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above-mentioned identification terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
Referring to fig. 4, in a first embodiment of the identity recognition method of the present invention, the identity recognition method includes:
step S10, receiving the sound wave signal sent by the sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identification and a coding table key according to the effective sound source file;
the sound wave signal refers to a signal in a sound wave form or a sound form, is sent out by the sending terminal, and is processed into an effective sound source file capable of further information processing after being received by the identification terminal. The sound wave signal is ultrasonic wave, and the ultrasonic wave cannot be heard by human ears, so that when the ultrasonic wave sound source file is played, the human ears cannot hear any sound, and the whole identity identification process is silent. The user may wish to know when the identification is started or is normally performed, and therefore, it is advantageous to set a status prompt for the identification to enhance the user experience, for example, to set a prompt at the identification terminal, to sound a prompt (e.g., "click" or display a prompt message (e.g., "while identification") when the playing ultrasound source file is detected, to sound, display or otherwise prompt the user when the identification is completed, to prompt the user when the identification fails (e.g., a red word "failed identification" is displayed on the screen), or to prompt the user when the identification is successful (e.g., a green word "successful identification" is displayed on the screen). Or prompting at the sending terminal, and making a sound when the ultrasonic sound source file begins to be played or the effective sound source part is played, wherein the sound is not stopped until the playing is finished. The relevant settings of the status prompt, such as the status prompt form (voice prompt, display prompt, etc.) of the identification terminal or the sending terminal, the status prompt rule (if the identification is successful, the word "successful identification" is output, or the word "tic" is output), and the like, can be set as default settings of the system, or can be set by the user according to the needs and hobbies of the user.
The sound wave signal is loaded with identity information, the identification terminal can detect/receive the ultrasonic sound source signal in real time, but the identification terminal does not necessarily need to perform identity identification in real time, and other ultrasonic interference which is not used for identity identification exists, so that if the real-time detection/reception is performed, the problem of resource waste exists, but if the real-time identity identification needs to be performed, for example, if a plurality of people queue up for identity identification at present, the detection does not need to be closed, the identification terminal can be set for real-time detection, instead, the switching process of the identification terminal in two states of detection and non-detection is saved, and therefore the detection frequency or the detection time needs to be set according to a specific application scene.
The identification terminal can also be manually started for detection/reception, and when the user needs to identify the identity, the identification terminal is started again, so that the running resources can be saved. The identification terminal can automatically start detection after certain conditions are met, for example, when a detection instruction is issued to the identification terminal in a background of the identification terminal, the identification terminal automatically starts detection; when an object approaching the sensor is sensed, detection is started (the card is replaced by the identification terminal in scenes such as card swiping and the like). The detection time of the identification terminal is not limited in this embodiment.
The valid sound source file is a sound source file which plays a practical role in identity recognition and contains decoding information, identity information, verification information and the like, and can be a sound waveform simulation diagram or sound wave frequency. The ultrasonic waves detected or obtained by the identification terminal do not only contain effective information which plays a practical role in identity identification, such as decoding, identity information, verification information and the like, but also comprise other frequency bands which have no practical significance or are irrelevant to the identity identification, and in order to reduce the operation consumption of the identification terminal in decoding sound wave signals, the identification terminal firstly screens the detected or received ultrasonic waves, screens effective sound source files in the ultrasonic waves, and then sends the effective sound source files to the identification terminal. The filtering may be to filter out frequency data in a certain frequency range, for example, a set of frequency data from 2kHz to 5kHz as a valid audio source file.
The information contained in the valid sound source file includes: key information such as user identification and coding table keys, identity information, verification information and the like can be coded into ultrasonic audio signals in a fixed format and a fixed sequence.
The user in this embodiment refers to an object of the present invention for identification. After receiving the effective sound source file, the identification terminal can acquire the user identification and the coding table key according to the effective sound source file. The user identification refers to an identification which is obtained by a user in advance and represents the user identity, the coding table key refers to a string of characters which are specially used for obtaining the latest coding table, and the latest coding table refers to a coding table for decoding key information such as identity information and verification information in an effective sound source file in the identification. For example, the latest code table a is generated by the function f, and the key c is input to the function f, so that the latest code table a is obtained as f (c).
Because each part of information of the effective sound source file is determined, the identification terminal acquires the user identification and the coding table key, and the user identification and the coding table key can be obtained by determining the positions of the user identification and the coding table key in the effective sound source file and then decoding the user identification and the coding table key.
The user identification and the key of the coding table are obtained for decoding key information such as identity information and verification information in the effective sound source file, namely for obtaining the latest coding table for decoding the key information. The user identification is different from the identity information, the user identification is the identity of the valid sound source file declaration (namely the ultrasonic information declaration: my is XXX), the identification terminal does not need to determine the truth of the declaration, only needs to obtain the latest coding table according to the user identification, then decodes the identity information in the valid sound source file according to the latest coding table, compares the identity information obtained by decoding with the user identification to see whether the identity information is consistent with the user identification, if the identity information obtained by decoding is consistent with the user identification, the user identification which is currently identified can be determined, namely the user identity obtained by decoding, and otherwise, the identity identification fails.
Step S20, inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule;
the encoding rule in this embodiment refers to an encoding rule in which key information (hereinafter referred to as key information for short) such as identity information and verification information, excluding a user identifier and a key of an encoding table, in an effective sound source file is converted into audio, a latest encoding table can be obtained according to the encoding rule, and the identification terminal obtains meanings of frequency references of key information frequency bands in the effective sound source file based on the latest encoding table, that is, the identification terminal decodes key information portions in the effective sound source file based on the latest encoding table, and the sending terminal encodes the key information based on the latest encoding table.
After the user identification is obtained, the identification terminal can be inquired according to the user identification, and the coding rule corresponding to the user identification is obtained. Before the identity of a user is identified, the user firstly needs to register in an identification terminal of an identity identification system, the information of the user is input, and the identification terminal distributes a coding rule belonging to the user for the user. Therefore, after the user identifier is determined, the preset database can be queried according to the user identifier to obtain the specific coding rule of the user identifier.
Different users have different coding rules, which is to ensure the safety of identity identification, because if all users have the same coding rule, once someone records the valid audio source file, the valid audio source file can be decoded according to the general coding rule, or can impersonate others according to the coding rule. The correspondence between the user identifier and the encoding rule may be a mapping table, and stored in a database.
The encoding rule, i.e. the correspondence relationship of converting characters into ultrasonic frequencies, can be in various forms, can be directly superposed with the latest encoding table, and can also be a mode of synthesizing the latest encoding table.
In one embodiment, the encoding rule may be a function (referred to as an encoding rule function). The step of obtaining the latest code table according to the code table key and the code rule in step S20 may include:
step S21, substituting the encoding table key as an input parameter into an encoding rule function to obtain an output result of the encoding rule function;
and step S22, the output result is the latest coding table.
And taking the encoding table key as an input parameter of the encoding rule function, and outputting a latest encoding table based on the encoding table key. For example, the latest code table a is generated by the function f, and the key c is input to the function f, so that the latest code table a is obtained as f (c). The code table key is a character string randomly generated by the sending terminal, and the output result finally obtained by using the randomly generated character string as the input parameter of the coding rule function is also random, because the sending terminal randomly regenerates the code table key in each identification, the code table key in each identification is random, and is different from the code table key in the last identification or the previous identification to a great extent, and the result is that: because the input parameters (namely the key of the coding table) are different, the output result of the coding rule function is also different, namely the latest coding table is different, so that the key information and the audio conversion are different in each identification.
For example, in the nth identification, the partial latest code table is as follows:
original information Corresponding frequency
2 1kHz
3 2kHz
4 3kHz
5 4kHz
Then in the (n +1) th identification, the latest encoding table may be as follows:
original information Corresponding frequency
2 3kHz
3 2kHz
4 6kHz
5 5kHz
The latest coding table of the identification is generated by substituting the randomly generated coding table key as an input parameter into the coding rule function, so that the latest coding table as the key information audio coding corresponding relation reference table can be replaced for the next time, and the latest coding table is replaced randomly, even if a person copies an ultrasonic signal used for identification by a user to impersonate the identity of other people, the latest coding table is useless, and the accuracy of the identification and an anti-counterfeiting mechanism are greatly ensured.
In another embodiment, the method for the transmitting terminal to perform encoding according to the encoding rule function may be: and inputting each character in the key information into the coding rule function, namely outputting the ultrasonic frequency corresponding to each character, and finally determining the ultrasonic frequency form of the key information. In another embodiment, the sending terminal may obtain a latest coding table according to a coding rule function, determine an ultrasonic frequency form corresponding to the key information according to the latest coding table, and perform decoding of a corresponding mode according to the coding rule by the identification terminal.
The latest coding table refers to a coding table for decoding key information or a corresponding relation reference table for coding the key information into audio information in the current identification. In order to ensure the safety of identification, the coding table for decoding the key information is different in each different identification.
The preset database can be a local database of the identification terminal, can also be a cloud database, and can be a server database. The preset database stores the corresponding relation between the user identification and the coding rule, and the coding rule corresponding to the user identification can be obtained through the corresponding relation between the user identification and the coding rule so as to determine a final latest coding table.
If the mapping table of the correspondence between the user identifier and the coding rule is stored in the server, the software and hardware requirements on the memory of the identification terminal can be reduced, the hardware cost of the identification terminal is further reduced, and the popularization of the identification terminal is facilitated.
And step S30, decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information.
And decoding the key information part in the key information frequency band in the effective sound source file according to the latest coding table to obtain the identity information in the key information.
When decoding, the frequency peak of the key information frequency band in the valid sound source file can be obtained first, and the character information corresponding to the frequency peak is determined according to the latest coding table, wherein the character information is identity information.
The peak value can be obtained through the sound wave image or the ultrasonic frequency peak value is determined through the ultrasonic frequency peak value function, only identity information needs to be obtained, so that only a key information frequency band part in an effective sound source file needs to be decoded, character information corresponding to the frequency peak value is determined according to the latest coding table, the character information is identity information, the frequency peak value is easy to obtain, the key information can be simply transcoded into an audio signal by a sending terminal, or the key information is received by an identification terminal for identification, interference of other frequencies can be eliminated, and the obtained identity information is more accurate.
Further, the step S30 includes:
step S31, decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain primary identity information;
step S32, determining whether the key information frequency band in the effective sound source file has the binary coding according to the user identification;
step S33, if the key information frequency band has the carry-on carry-on, obtain the carry-on, carry on the corresponding to carry on the number while being stated user identification while being stated;
and step S34, decoding the primary identity information according to the binary number to obtain identity information.
The encoding rule may be a set of multiple encoding rules, i.e. the key information may be multiple encoded. Specifically, in this embodiment, the key information may be first subjected to the binary conversion, and then the key information subjected to the binary conversion may be converted into the audio. The binary conversion refers to the high-level coding of key information to reduce the data size, for example, the binary number or decimal number is transcoded into hexadecimal number or thirty-binary number, such as an 18-bit identity card number 432503199801017734, the 16-bit 6008f5e645c0580 is converted into 15-bit, and the 32-bit c04fbpi5o1c0 is converted into 12-bit. According to the amount of information to be transmitted, a transcoding mode for transcoding key information into transmission codes can be set by an identification terminal or a program developer, for example, the amount of key information data is large, the key information can be converted into a thirty-two system, the number of the transmission codes corresponding to the information content with the same amount is reduced, the amount of transmittable information is increased, and the identity can be more favorably and accurately identified; if a number is transmitted, the number may be transcoded into a hexadecimal number, and if a letter is transmitted, one letter may be converted into two hexadecimal characters.
Different users may or may not perform the binary coding, and may query the database according to the user identifier to see whether there is a binary number corresponding to the user identifier, if so, it indicates that there is the binary coding in the key information frequency band, and directly obtain the binary number corresponding to the user identifier, and after decoding the key information frequency band in the valid sound source file according to the latest coding table, obtain the identity information after the binary conversion, that is, the primary identity information in the embodiment, and further decode the primary identity information, that is, further decode the primary identity information according to the binary number, and obtain the complete and initial identity information.
Different users can correspond to different systems, and the identification terminal can determine the specific system number of the system code according to the user identification.
Decoding the key information frequency band in the valid audio source file according to the latest coding table, which may be to first obtain frequency peaks of the key information frequency band in the valid audio source file, where the frequency peaks exist as information carriers, and determine character information corresponding to the frequency peaks according to the latest coding table, where the corresponding character information is identity information.
In this embodiment, the key information that is doubly encoded by the binary encoding and the audio encoding (i.e., the characters are converted into the audio by the encoding rule) is doubly decoded: the method comprises the steps of firstly decoding audio, namely decoding a key information frequency band in the ultrasonic signal into character information, then carrying out system conversion on the character information to restore the character information into an original identity, wherein the system conversion can increase the total data amount of ultrasonic transmission and increase the transmission content of the ultrasonic transmission, and the confidentiality of the identity information is further increased because different user identifications have different system numbers.
To facilitate understanding, a specific example is given, and in this embodiment, operations performed by the identification terminal, the identification terminal (taking the identification device as an example), and the sending terminal (taking the user's handset as an example) are illustrated.
The effective sound source files in a string of ultrasonic sound source files comprise user identification, coding table keys and key information. Correspondingly, the user identification, the key of the code table and the key information have respective coding and decoding modes: the key comprises a code table B for coding user identification, a fixed code table X for coding a code table key C, a code rule F for coding key information and a latest code table F.
The encoding table A of the user identification is fixed with the fixed encoding table X, the latest encoding table f is changed according to the change of the encoding table key C, and the encoding table is in a frequency-number corresponding relation.
The identification terminal allocates a unique frequency-digital correspondence generation function F (namely an encoding rule for acquiring key information) to each user, and the function is stored in the mobile phone of the user and the identification terminal. A series of numbers (code table key C) is input to the function F, and the function outputs a frequency-number correspondence (the latest code table F, which is expressed as F (C) ═ F).
The user mobile phone randomly generates a string of numbers, namely a code table key C, when the user mobile phone identifies, the code table key C is input to a function F to obtain a latest code table F, the user mobile phone codes key information into audio according to the latest code table F, and the user mobile phone sends a series of sounds: the first part is a handshake signal of 1kHz, the second part is ultrasonic waves corresponding to user identification, the third part is ultrasonic waves corresponding to a code table key C coded according to a fixed code table X, and the fourth part is ultrasonic waves corresponding to key information such as user ID coded according to a latest code table f.
The identification equipment receives the ultrasonic signal and transmits an effective audio file to the identification terminal, the identification terminal firstly obtains a user identifier according to the code table B, obtains a corresponding fixed code table X and a code rule function F of key information according to the user identifier, obtains a code table key C by decoding the fixed code table X, and inputs the code table key C into the function F to obtain a latest code table F (namely F (C) ═ F).
In the embodiment, the user identification and the coding table key in the effective sound source file in the form of ultrasonic waves are obtained, the coding rule for generating the latest coding table is obtained according to the user identification, the latest coding table for decoding key information such as identity information is obtained according to the coding rule and the coding table key, finally the key information is decoded based on the latest coding table to obtain the identity information, the safety and the accuracy of identity identification can be enhanced through multiple coding of the user identification, the coding table key, the coding rule and the like, the anti-interference capability of the ultrasonic waves is strong, the identity identification can be conveniently carried out by a user in various occasions, in addition, the sending terminal can locally store the coding rule and carry out coding, the ultrasonic wave signals are played/sent, the identity identification can be realized without networking, the application range of the scheme of the embodiment of the invention is expanded, and the user only needs to use the sending terminal to send the ultrasonic wave signals, the method can complete the identification operation without inputting various data or aligning the two-dimensional code by using a camera, and is simple and convenient to operate, simple and easy to implement and favorable for popularization.
Further, in the second embodiment of the identity recognition method of the present invention, the step of obtaining the user id and the key of the code table according to the valid sound source file in step S10 includes:
step S11, obtaining the user identification frequency band and the key frequency band in the effective sound source file, decoding the user identification frequency band to obtain the user identification;
the user identification frequency band and the key frequency band in the valid sound source file may be frequency bands located at specific positions or frequency bands with specific frequency characteristics, and how to determine the user identification frequency band and the key frequency band may be determined by an identity recognition rule in the recognition terminal. In one embodiment, the user identifier is located at the head position (i.e. the front most position) of the valid sound source file, the frequency band of the key follows the user identifier, the user identifier and the encoding table key are both characters with fixed lengths, and the identification terminal determines the frequency band representing the user identifier and the encoding table key directly according to the preset lengths of the user identifier and the encoding table key and the position of the user identifier and the encoding table key in the sound wave. In another embodiment, the frequency band of the user id and code table key has a fixed frequency characteristic, for example, the user id frequency band is a fixed-length frequency band at the beginning of a specific frequency, the specific frequency is 1kHz, that is, the user id frequency band is a fixed-length frequency band after the frequency of 1 kHz.
After the user identification frequency band and the key frequency band in the effective sound source file are obtained, the user identification frequency band and the key frequency band need to be decoded. The decoding rule for decoding the user identification frequency band should be a decoding rule common to all users, because the identification terminal does not know which user the valid sound source file is sent by before acquiring the user identification frequency band and analyzing the user specifically referred to by the frequency band, if the decoding rule of the user identification frequency band is not common, but different users have different decoding rules, the identification terminal can never decode. The decoding rule may be a fixed decoding table according to which the identification terminal may decode the user identification band.
The subscriber identity may be a string of numbers and the decoding table for the subscriber identity band may be a table of thirty-two characters ([0-9, a-v ]), each of which may be mapped to a frequency table. Such as 0-2 kHz, 1-3 kHz, 2-4 kHz, etc. The decoding table and the encoding table are two aspects of one thing, and the user identification is encoded according to the encoding table, so that the user identification can be decoded according to the encoding table.
When the information needed for identification is coded and transmitted, because the amount of the transmitted information of the ultrasonic wave is limited, the information needed for identification can be firstly coded in a binary mode to reduce the data size, that is, the information needed for identification is coded in a high-level mode, for example, a binary number or a decimal number is transcoded into a hexadecimal number or a thirty-binary number. According to the size of the information quantity to be transmitted, a transcoding mode of transcoding the information to be transmitted into a transmission code can be set by an identification terminal or a program developer, for example, the data quantity of the identity information to be transmitted is large, the identity information can be converted into a thirty-two system, the transmission codes corresponding to the same amount of information content are reduced, and the total data quantity to be transmitted finally can be increased; if a number is transmitted, the number may be transcoded into a hexadecimal number, and if a letter is transmitted, one letter may be converted into two hexadecimal characters.
Further taking the transmission of the mobile phone number as an example: because the mobile phone numbers start with 1, 1 can not be transmitted, and the mobile phone numbers generally start with 13, 15 and 18, 3, 5 and 8 are firstly mapped into 1, 2 and 3, then hexadecimal transcoding is carried out, and finally the mobile phone numbers can be reduced to 9 bits or 8 bits by optimizing the transcoding before transmission.
The information required for identification can be encoded for multiple times for various purposes, and the above-mentioned binary code can be the first encoding and then the second encoding which is converted into audio. The coding table may include a front-back correspondence of the first coding and the second coding, the coding table identifies that both the terminal and the transmitting terminal know, the transmitting terminal codes based on the coding table, and the identifying terminal decodes based on the coding table.
And step S12, acquiring a fixed code table according to the user identification, decoding the key frequency band according to the fixed code table, and acquiring a code table key.
The above part of this embodiment may be used to decode the user identifier frequency band to obtain the user identifier, and after obtaining the user identifier, the preset database may be queried according to the user identifier to obtain the fixed code table corresponding to the user identifier.
The fixed code table is used for decoding the key frequency band, and can be a fixed code table common to all users or different fixed code tables for different users. If all users have a common fixed coding table, the identification terminal can simultaneously decode to obtain the user identification and the decoding key after acquiring the user identification frequency band and the key frequency band, and compared with the situation that different users correspond to different fixed coding tables, the identification terminal uses the common fixed coding table without additionally storing the corresponding relation between the users and the fixed coding table, and further without executing search operation, so that the memory resource and the operation resource of the identification terminal can be saved; if different users have different fixed code tables, the identification terminal inquires the fixed code table corresponding to the user identification after determining the user identification, and then decodes the key frequency band according to the inquired fixed code table, because of the broadcasting characteristic of ultrasonic wave, when the user uses the ultrasonic wave transmission information to identify, other people may record the ultrasonic wave broadcasted by the user to impersonate the user, if each user has a general fixed code table during the identification, other people can obtain the general fixed code table, the user identification and the key of the code table can be obtained by decoding the recorded effective sound source file, only the coding rule needs to be obtained again, the latest code table can be obtained, and the impersonation purpose is realized, and if different fixed code tables of each user are used, other people obtain the effective sound source file, and after obtaining the user identification, the fixed code table unique to the user identification needs to be obtained, and a coding rule unique to the user identification is required to be obtained, so that the difficulty and cost of identity impersonation by other people are increased, and the safety can be improved.
The specific content of the fixed code table is consistent with the above-mentioned part related to the frequency band of the decoded user identifier, and is not repeated.
The code table key refers to a string of characters used to obtain the latest code table.
In this embodiment, the user identifier and the key in the valid sound source file are obtained by decoding the user identifier frequency band and the key frequency band, so that the subsequent operation of obtaining the encoding rule and the latest encoding table is performed smoothly; meanwhile, the user identification is obtained firstly, the corresponding fixed coding table is determined according to the user identification, the key frequency band is decoded to obtain the coding table key, and different user identifications correspond to different fixed coding tables, so that the safety and the accuracy of identity identification can be further enhanced.
Further, in the third embodiment of the identity recognition method of the present invention, in step S10, the step of receiving the sound wave signal sent by the sending terminal, and the step of recognizing the sound wave signal to generate the corresponding valid sound source file includes:
step S13, receiving the sound wave signal sent by the sending terminal, and when detecting the initial mark in the sound wave signal, starting to record the effective sound wave signal from the initial mark;
and step S14, recognizing the effective sound wave signals to generate corresponding effective sound source files.
The effective sound wave signal is a signal at one end containing information required by identity recognition, and after the effective sound wave signal is recognized, an effective sound source file can be obtained. The start mark in the sound wave signal, that is, the start mark of the effective sound wave signal, may be a sound wave with a fixed certain frequency or a sound wave with a fixed string of frequency values, and when the identification terminal detects the sound wave with the fixed certain frequency or the sound wave with the fixed string of frequency values, the effective sound wave signal starts to be recorded. For example, a sound wave with a start flag of 1kHz is set, and when the recognition terminal detects a sound wave of 1kHz, recording of a valid sound wave signal is started. Usually, a complete sound wave contains 20 characters, and the start mark can also be arranged at the forefront of the sound wave, such as the first two digits of the sound wave, and the start mark "hj" is used to inform the identification terminal to start receiving the effective sound wave signal sent by the identification terminal.
The starting identifier is set in the ultrasonic sound source file to inform the identification terminal to start recording effective sound wave signals, so that all the effective sound wave signals recorded by the identification terminal are effective sound wave signals, the process of further screening the effective sound wave signals due to receiving non-effective sound wave signals is avoided, and operating resources and memory resources are saved; meanwhile, by setting the starting identifier, the failure or the error of identification of identity recognition caused by the omission of the effective sound wave signal of the identification terminal can be avoided, the identification terminal needs to be identified again, the data omission is avoided when the effective sound wave signal is obtained, the accuracy and the success rate of the identity recognition are ensured, the time cost of running resources and a user is saved, and the user experience is improved.
Further, in a fourth embodiment of the identity recognition method of the present invention, the identity recognition method further includes:
and step S40, if the identification fails, outputting a prompt message of the failure of the identification.
When the identification terminal decodes the key information frequency band in the effective sound source file according to the latest coding table, if the finally obtained identity information is a messy code or does not accord with the identity corresponding to the user identification, the identity identification failure can be determined, and a prompt message of the identity identification failure can be output to remind the user of the identity identification failure. In an embodiment, the recognition terminal may analyze the reason of the identity recognition failure and output the failure reason to the human-computer interaction interface, for example, if the identity information obtained by the final decoding of the recognition terminal does not correspond to the user identifier, the recognition terminal may output the reason that the identity information does not correspond to the user identifier while outputting the identity recognition failure (as shown in fig. 5), and if the received valid sound source file is incomplete and the identity recognition fails, the recognition failure prompt information is output as shown in fig. 6. The method can prevent the condition of the identity recognition from being unknown all the time, and can remind the user to perform the identity recognition again or abandon the identity recognition; meanwhile, the reason of failure is output, so that the user can be reminded to avoid the reason of identification when the user identifies the next time, and the success rate of identification of the next time is increased.
In addition, an embodiment of the present invention further provides a storage medium, where an identity recognition program is stored on the storage medium, and the identity recognition program, when executed by a processor, implements the following steps:
receiving a sound wave signal sent by a sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identifier and a coding table key according to the effective sound source file;
inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule;
and decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention or a part contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk) as described above, and includes a plurality of instructions for enabling an identification terminal device (which may be a fixed identification terminal, such as an internet-of-things smart device, including smart homes such as a smart air conditioner, a smart electric lamp, a smart power supply, and a smart router, or an identification terminal, including a smart phone, a wearable networking AR/VR device, a smart sound box, and a network device such as an auto-pilot vehicle) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. An identity recognition method, characterized in that the identity recognition method comprises the steps of:
receiving a sound wave signal sent by a sending terminal, identifying the sound wave signal to generate a corresponding effective sound source file, and acquiring a user identifier and a coding table key according to the effective sound source file;
inquiring a preset database, acquiring a coding rule corresponding to the user identification, and acquiring a latest coding table according to the coding table key and the coding rule;
decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain identity information;
the step of obtaining the user identification and the coding table key according to the effective sound source file comprises the following steps:
acquiring a user identification frequency band and a key frequency band in the effective sound source file, and decoding the user identification frequency band to acquire a user identification;
and acquiring a fixed code table according to the user identification, and decoding the key frequency band according to the fixed code table to acquire a code table key.
2. The method as claimed in claim 1, wherein the step of decoding the key information bands in the valid audio source file according to the latest encoding table to obtain the identity information comprises:
and acquiring a frequency peak value of a key information frequency band in the effective sound source file, and determining character information corresponding to the frequency peak value according to the latest coding table, wherein the character information is identity information.
3. The method as claimed in claim 1, wherein the step of decoding the key information bands in the valid audio source file according to the latest encoding table to obtain the identity information comprises:
decoding the key information frequency band in the effective sound source file according to the latest coding table to obtain primary identity information;
determining whether the key information frequency band in the effective sound source file is subjected to binary coding according to the user identification;
if the key information frequency band is subjected to the binary coding, acquiring a binary number corresponding to the user identification;
and decoding the primary identity information according to the binary number to obtain identity information.
4. The identification method of claim 1, wherein querying the pre-provisioned database comprises:
and inquiring a mapping table of the corresponding relation between the user identification and the coding rule in the server database.
5. The identity recognition method of claim 1, wherein the step of receiving the sound wave signal transmitted by the transmitting terminal and recognizing the sound wave signal to generate the corresponding valid sound source file comprises:
receiving a sound wave signal sent by a sending terminal, and starting to record an effective sound wave signal from an initial identifier when the initial identifier in the sound wave signal is detected;
and identifying the effective sound wave signals to generate corresponding effective sound source files.
6. The identification method of claim 1, wherein the identification method further comprises:
and if the identity recognition fails, outputting a prompt message of the identity recognition failure.
7. The identity recognition method of any one of claims 1 to 6, wherein the step of obtaining the latest code table according to the code table key and the code rule comprises:
substituting the coding table key as an input parameter into a coding rule function to obtain an output result of the coding rule function;
and the output result is the latest coding table.
8. An identification terminal, characterized in that the identification terminal comprises: a processor, a memory and an identification program stored on the memory and executable on the processor, the identification program when executed by the processor implementing the steps of the identification method according to any of claims 1 to 7.
9. A storage medium, characterized in that the storage medium has stored thereon an identification program which, when executed by a processor, implements the steps of the identification method according to any one of claims 1 to 7.
CN201711255871.8A 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium Active CN107977562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711255871.8A CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711255871.8A CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Publications (2)

Publication Number Publication Date
CN107977562A CN107977562A (en) 2018-05-01
CN107977562B true CN107977562B (en) 2021-11-02

Family

ID=62008993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711255871.8A Active CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107977562B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109285003A (en) * 2018-11-23 2019-01-29 深圳市万通顺达科技股份有限公司 Two dimensional code call-out method based on ultrasound, device, payment system
CN109935232A (en) * 2019-02-19 2019-06-25 浙江工业大学 A kind of acoustics identification code and its code recognition method
CN110109676B (en) * 2019-04-30 2023-10-17 努比亚技术有限公司 Compiling method, terminal and computer readable storage medium
CN110636119B (en) * 2019-09-05 2022-09-02 北京无限光场科技有限公司 Information pushing method and device based on sound wave identification, electronic equipment and medium
CN113032471A (en) * 2021-03-23 2021-06-25 广东电网有限责任公司 Database processing method and device, electronic equipment and medium
CN113337995B (en) * 2021-06-29 2023-11-03 海信冰箱有限公司 Clothes information identification method for washing machine and washing machine
CN114884584B (en) * 2022-04-28 2023-11-03 上海小度技术有限公司 Data transmission method, related device and computer program product
CN116017412B (en) * 2022-12-27 2024-04-16 苏州融硅新能源科技有限公司 Gateway equipment, method and system for acquiring equipment information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345952B (en) * 2008-09-03 2012-04-04 华为终端有限公司 Data storing and reading method, device and system for client identification card
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof
CN106533575A (en) * 2015-09-14 2017-03-22 上海默比云网络科技有限公司 Audio signal encoding method, multimedia playing system and playing method
CN105303659B (en) * 2015-10-10 2017-11-10 深圳市雨滴科技有限公司 A kind of gate inhibition's personal identification method and device based on ultrasonic wave

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3475985B2 (en) * 1995-11-10 2003-12-10 ソニー株式会社 Information encoding apparatus and method, information decoding apparatus and method
JP5994136B2 (en) * 2011-06-15 2016-09-21 株式会社フィールドシステム Authentication system and authentication method
CN103905474B (en) * 2012-12-25 2017-09-26 腾讯数码(天津)有限公司 A kind of information sharing method, terminal, server and system
CN103942691A (en) * 2014-04-23 2014-07-23 王恩惠 Method and system for realizing electronic transaction through sound waves
CN104717601B (en) * 2014-08-22 2018-10-23 深圳市智美达科技有限公司 Wireless monitoring equipment logs in the method and system of wireless network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345952B (en) * 2008-09-03 2012-04-04 华为终端有限公司 Data storing and reading method, device and system for client identification card
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN106533575A (en) * 2015-09-14 2017-03-22 上海默比云网络科技有限公司 Audio signal encoding method, multimedia playing system and playing method
CN105303659B (en) * 2015-10-10 2017-11-10 深圳市雨滴科技有限公司 A kind of gate inhibition's personal identification method and device based on ultrasonic wave
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof

Also Published As

Publication number Publication date
CN107977562A (en) 2018-05-01

Similar Documents

Publication Publication Date Title
CN107977562B (en) Identity recognition method, recognition terminal and storage medium
CN108289244B (en) Video subtitle processing method, mobile terminal and computer readable storage medium
CN108572764B (en) Character input control method and device and computer readable storage medium
CN107967322B (en) File classification display method, mobile terminal and computer readable storage medium
CN111708503B (en) Screen projection control method, device and computer readable storage medium
CN107731199B (en) Screen color temperature adjusting method, terminal and computer readable storage medium
CN108055491B (en) Screen recording method, terminal and storage medium
CN107786427B (en) Information interaction method, terminal and computer readable storage medium
CN110187808B (en) Dynamic wallpaper setting method and device and computer-readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN109710159B (en) Flexible screen response method and device and computer readable storage medium
CN109063444B (en) Mobile terminal screen unlocking method, mobile terminal and computer readable storage medium
CN112437472B (en) Network switching method, equipment and computer readable storage medium
CN113176869A (en) Screen-projecting audio time delay control method and device and computer readable storage medium
CN109561221B (en) Call control method, device and computer readable storage medium
CN111931155A (en) Verification code input method, verification code input equipment and storage medium
CN109889665B (en) Volume adjusting method, mobile terminal and storage medium
CN109089258B (en) eSIM card operation method, mobile terminal and eSIM card device
CN109669616B (en) Side screen interaction control method and device and computer readable storage medium
CN109257739B (en) eSIM card operation method, mobile terminal and eSIM card device
CN109219039B (en) eSIM card operation method, mobile terminal and eSIM card device
CN107222933B (en) Communication method, terminal and computer readable storage medium
CN107734147B (en) Step recording method, mobile terminal and computer readable storage medium
CN109656658B (en) Editing object processing method and device and computer readable storage medium
CN108549648B (en) Character picture processing method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant