CN109446774B - Identity recognition application method and system - Google Patents

Identity recognition application method and system Download PDF

Info

Publication number
CN109446774B
CN109446774B CN201811154602.7A CN201811154602A CN109446774B CN 109446774 B CN109446774 B CN 109446774B CN 201811154602 A CN201811154602 A CN 201811154602A CN 109446774 B CN109446774 B CN 109446774B
Authority
CN
China
Prior art keywords
audio
information
verification
segment
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811154602.7A
Other languages
Chinese (zh)
Other versions
CN109446774A (en
Inventor
李少波
王怀辰
黄以承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Zhiweixing Network Technology Co ltd
Original Assignee
Shandong Zhiweixing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Zhiweixing Network Technology Co ltd filed Critical Shandong Zhiweixing Network Technology Co ltd
Priority to CN201811154602.7A priority Critical patent/CN109446774B/en
Publication of CN109446774A publication Critical patent/CN109446774A/en
Application granted granted Critical
Publication of CN109446774B publication Critical patent/CN109446774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an identity recognition application method and system, which comprises the steps of obtaining audio information, decoding the audio information to obtain an identity key, wherein the identity key at least comprises a timestamp and ID information; reading the current time and verifying whether the current time is in the range of the timestamp, and if so, verifying the ID information through a first preset rule; and if the ID information passes the verification, the result of successful verification is transmitted. The application replaces the use of physical cards; and the problem that temporary identity recognition is needed to be handled when people live and work such as temporary living or business trips is solved.

Description

Identity recognition application method and system
The technical field is as follows:
the invention relates to an identity recognition application method and system.
Background art:
with the rapid development of society, social management awareness is always strengthened, and a management mode based on card utilization tends to be spread. Bar code cards, magnetic stripe cards, contact ID cards, and the like, perform their unique functions outside of smart cell management as forms of patrol, access control, cost, parking, and club management. However, many inconveniences exist in many cases, for example, the cards are lost, damaged and the like each time and need to be reprocessed, which takes time and energy and causes some environmental protection problems; at present, the society develops rapidly, the temporary identification condition often exists in fast-paced life, and the trouble in card making and recycling is increased by making temporary cards each time.
The CN106506442B discloses an intelligent household multi-user identity recognition and authority management system thereof, wherein an identity information recognition module acquires position information, image information and sound information of a person and transmits the information to a local processing module; the information input module is used for inputting the user identity information into the management system and endowing the user identity with corresponding management authority after the user matches the user information comprising the account number and the password; the server module is used for recording the user identity information at the cloud end, and the user identity information can be called and compared by the local processing module at any time; and the authority distribution module is used for matching the user identity with the authority and dynamically organizing and distributing the management authority of all the intelligent homes. Although the application can solve the problem of complex scenes such as restriction of children by a visitor, a visitor and a parent at home by using authority management, the application is complex in operation and inconvenient to use, and identity recognition cannot be realized by using a mobile phone which is carried about.
CN108446674A discloses an electronic device, an identity recognition method based on face images and voiceprint information, and a storage medium, where the identity recognition method based on face images and voiceprint information includes: sending an instruction for acquiring the voiceprint information of the user and shooting a face image to a terminal; processing the voiceprint information and the face image returned by the terminal to obtain a first feature vector; analyzing the similarity between the obtained first feature vector and a pre-stored second feature vector, wherein the second feature vector is a pre-stored standard sample vector of the user; and if the similarity obtained by analysis is smaller than or equal to a preset similarity threshold, determining that the identity recognition of the user passes, and if the similarity obtained by analysis is larger than the preset similarity threshold, determining that the identity recognition of the user does not pass. The face image and the voiceprint information can be identified at the same time, and the accuracy of identity identification is improved while the identity identification efficiency is ensured. The application document solves the problems of efficiency and accuracy of identity recognition and does not solve the problem of temporary identity recognition.
The prior art methods for identification all use the unique physiological characteristics of the user for verification, such as: the security of the voice, the fingerprint, the facial features and the like can be guaranteed when the voice, the fingerprint, the facial features and the like do not need to be coordinated with other people, but when the voice, the fingerprint, the facial features and the like need to be coordinated with other people, the physiological features cannot leave the human body and exist, so that the scenes of using the physiological features are limited, and other people cannot be made a proxy for the holder of the physiological features. The prior art has no solution to this problem.
The invention content is as follows:
the invention aims to provide an identity recognition application method and system aiming at the defects in the prior art, and solves the problem that no effective and reasonable identity recognition method without physiological characteristics exists in the prior art.
In order to solve the technical problem, the technical scheme of the application is as follows:
on one hand, the identity identification application method comprises the steps of obtaining audio information, decoding the audio information to obtain an identity key, wherein the identity key at least comprises a timestamp and ID information; reading the current time and verifying whether the current time is in the range of the timestamp, and if so, verifying the ID information through a first preset rule; and if the ID information passes the verification, the result of successful verification is transmitted. The time stamp indicates effective start and stop time in the present application, for example, when a temporary identity identification is to be applied, the time required for the application is 1 month, then the time stamp is set to be one month, in this month, the identity identification can be successfully completed, and if the identity time is not within the time stamp, the identity identification cannot be successfully completed. The advantage of this arrangement is that it provides convenience for people living or traveling for a short period of time, without taking time and effort to handle a physical card for a short period of stay, and without the trouble of losing the card for leaving. The ID information is mainly used for matching the user with the use area, and the specific user can only complete identity recognition in the limited area, so that on one hand, the ID information is set to achieve the purpose of achieving the recognition work more quickly and accurately, and on the other hand, the security of the identity recognition can be improved.
Preferably, the ID information includes user identification information and location information of a use area.
Preferably, the first preset rule is that identity information is verified, after the identity information is verified, the position information is continuously verified, and after the position information is verified, the result of successful verification is transmitted. The identity recognition process of the application is as follows: firstly, verifying a time stamp, reading the current time and verifying whether the current time is within the range of the time stamp, if so, verifying the identity information of a user, and finally, verifying the position information, and if all three kinds of information are successfully verified, finishing the identity identification and transmitting the result of successful verification. If one of the items is not successfully verified, the identification work is terminated. The setting improves the working efficiency of the identity recognition on one hand and improves the safety of the identity recognition on the other hand.
In another aspect, an identification system includes: the audio acquisition module is used for acquiring audio information and decoding the audio information to obtain an identity key, wherein the identity key at least comprises a timestamp and ID information; the information processing module is used for reading the current time and verifying whether the current time is within the range of the timestamp, and if so, verifying the ID information through a first preset rule; and the transmission module is used for transmitting a result of successful verification if the ID information passes the verification.
Preferably, the system further comprises a key module, wherein the key module is used for acquiring the user information, the time node and the use area, and uploading the user information, the time node and the use area to the key management platform; the key management platform obtains a primary key according to the user information and the time node, obtains a receiving key according to the using area, sequentially arranges the receiving key and the primary key to obtain a secondary key, and transmits the secondary key to the information processing module and the audio acquisition module; and the audio acquisition module generates audio information according to the secondary key.
Preferably, the frequency of the information audio is not lower than 20kHz or 18-20kHz, and preferably, the frequency of the information audio is 19-20 kHz. The ultrasonic wave can noise pollution abatement, and the audio verification process can not cause the influence to external environment. However, one problem with ultrasonic waves is that equipment for emitting and receiving sound suitable for ultrasonic waves needs to be provided, which increases the difficulty of application. Due to the problem of human ear acutance, experiments prove that about 60 percent of people basically cannot hear the sound at 18-20kHz, and about 80 percent of people basically cannot hear the sound at 19-20kHz, but the possibility of processing by adopting the existing equipment can be ensured in the frequency space, so that the cost of the application to the practical scene is greatly reduced.
Preferably, the device further comprises an acousto-optic module, and the acousto-optic module is used for starting the indicator light after receiving the result of successful verification. At present, identity recognition systems such as entrance guard or elevator control in a plurality of areas all add acousto-optic functions, and the identity recognition system of the application adds an acousto-optic module and is more convenient for identity recognition.
Preferably, the audio information includes at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying the identity key information; the received segment includes a first matching audio and the verification segment includes a second matching audio paired with the first matching audio.
Preferably, the verification segment comprises at least a first verification segment and a second verification segment, the frequency of the second verification segment being a random multiple of the frequency of the first verification segment greater than or equal to 1; the receiving section is a fixed frequency audio, and the receiving section contains the following information: presetting a first key and/or verifying frequency information of the segment audio.
Preferably, the verification process includes firstly acquiring all original audios within a set time, then decomposing the original audios into a plurality of decomposed audios according to frequency, and giving a time anchor point according to the initial time of the acquired original audios, firstly verifying that each decomposed audio contains a receiving segment, if the decomposed audio contains the receiving segment, performing next processing, and if not, directly skipping the decomposed audio; for the decomposed audio containing the receiving segment, continuously analyzing the first verification segment of the decomposed audio, and obtaining the audio frequency of the first verification segment, if the decomposed audio obtained within the set time has the first verification segment with the same audio frequency, automatically obtaining the second verification segment of the decomposed audio with the later time anchor point, and extracting data of the second verification segment to obtain ID information; and if the decomposed audio obtained in the set time does not have other first verification sections with the same audio frequency, performing data extraction on the first verification sections to obtain ID information.
Compared with the prior art, the invention has the advantages that:
1. replaces the use of physical cards; and the problem that temporary identity recognition is needed to be handled when people live and work such as temporary living or business trips is solved.
2. The efficiency of the identity recognition work is improved;
3. the problem that others cannot perform agency work for the holder of the physiological characteristics due to the fact that the physiological characteristics of the persons are used as identity recognition is solved.
Description of the drawings:
fig. 1 is a flowchart of an identity recognition method according to an embodiment of the present invention;
fig. 2 is a flowchart of another identity recognition method according to an embodiment of the present invention;
fig. 3 is a flowchart of another identity recognition method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an identification system according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of another identification system according to an embodiment of the present invention;
FIG. 6 is a schematic diagram illustrating a method for verifying audio information according to an embodiment of the present invention;
fig. 7 is a method for simultaneously verifying a plurality of audio information according to an embodiment of the present invention.
The specific implementation mode is as follows:
in order to clearly explain the technical features of the present invention, the following detailed description of the present invention is provided with reference to the accompanying drawings.
Fig. 1 is a flowchart of an identity recognition method according to an embodiment of the present invention.
S101, obtaining the audio information, and decoding the audio information to obtain an identity key.
Specifically, in the process of identity identification, firstly, audio information is acquired, and an identity key is obtained by decoding the audio information, wherein the identity key at least comprises a timestamp and ID information.
The audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying an identity key. The verification segment includes at least a first verification segment and a second verification segment, the frequency of the second verification segment being a fixed multiple of the frequency of the first verification segment. The receiving section is a fixed frequency audio, and the receiving section contains the following information: presetting a first key and/or verifying frequency information of the segment audio.
S102, reading the current time and verifying that the current time is in the range of the timestamp;
specifically, the time stamp can be flexibly set according to the requirement of a user, and if the user uses the owner of the artificial house or lives for a long time, the time stamp can be set to be unlimited in use time; if identification is temporarily required by a person who temporarily lives or goes on a business trip, the time stamp is set to a start-stop time, identification can be normally performed within the time stamp range, and if the time stamp is not within the time stamp range, identification cannot be performed. On one hand, the arrangement is that rapid screening can be carried out for identity recognition work, so that the working efficiency is improved; on the other hand, the safety of identity recognition by using the invention is improved.
S103, the ID information is verified through a first preset rule.
Specifically, the first preset rule is to verify identity information, after the identity information passes verification, the location information is continuously verified, and after the location information passes verification, the location information is externally transmitted to a result of successful verification. The time stamp, the identity information of the user and the position information of the use area are mutually corresponding through the setting, namely the user must perform identity verification within the time range set by the time stamp, and the legal user and the user can only complete identity identification of the designated area, and the three kinds of information are all absent. For example, the entrance guard is changed into the identity recognition mode of the invention for identity recognition in a cell, and a user must enter the door at the right time, in a legal user and in a right use area, so that the accuracy and the safety of identity recognition can be improved.
And S104, transmitting the result of successful verification.
Specifically, if the identification is successfully completed, the result is successfully uploaded. For example, when the access control is replaced by the method, the door can be opened after the identity authentication is completed; the elevator control card is replaced by the elevator control card, and the corresponding floor can be reached after the identity authentication is completed; the method and the device are used for replacing patrol personnel to sign in, and the sign-in work of the corresponding patrol area is completed after the identity verification is completed, so that the efficiency of the patrol work can be greatly improved.
Fig. 2 is a flowchart of another identity recognition method according to an embodiment of the present invention.
S201, obtaining the audio information, and decoding the audio information to obtain the identity key.
Specifically, in the process of identity identification, firstly, audio information is obtained, and an identity key is obtained by decoding the audio information, wherein the identity key at least comprises a timestamp and ID information, and the ID information comprises identity information of a user and position information of a use area.
The audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying an identity key. The verification segment includes at least a first verification segment and a second verification segment, the frequency of the second verification segment being a fixed multiple of the frequency of the first verification segment. The receiving section is a fixed frequency audio, and the receiving section contains the following information: presetting a first key and/or verifying frequency information of the segment audio.
S202, reading the current time and verifying whether the current time is in the range of the time stamp.
Specifically, the time stamp can be flexibly set according to the requirements of users, identity recognition can be normally carried out within the time stamp range, and if the time stamp is not within the time range, identity recognition cannot be carried out. On one hand, the arrangement is that rapid screening can be carried out for identity recognition work, so that the working efficiency is improved; on the other hand, the safety of identity recognition by using the invention is improved.
And S203, if the current time is within the range of the timestamp, further verifying whether the identity information is matched through a first preset rule.
Specifically, when the user performs identity verification, after the timestamp verification is successful, the identity information of the user is verified next, and the user can be quickly found through the identity information including identity card information, contact information and the like.
And S204, if the current time is read and verified to be out of the range of the time stamp, terminating verification.
Specifically, if the time of use is not within the range of the time stamp at the time of authentication, the authentication is terminated.
And S205, if the identity information is matched, further verifying whether the position information is matched through a first preset rule.
Specifically, after the timestamp verification is successful, and the identity information verification is also successful, the position information is further verified, and the position information includes the building number of the community, the number of floors of an office building, the position of a patrol point and the like, so that the identity verification can be successfully completed only in a specified area.
And S206, if the identity information is not matched, terminating the verification.
Specifically, if the timestamp is successfully verified and further identity information is not successfully verified, the verification is also terminated. This is provided to improve security and the identification must be done by a legitimate user.
And S207, if the position information is matched, the result of successful verification is transmitted.
Specifically, if the location information is also successfully verified, the result of the successful verification is uploaded. The system can smoothly enter a house, an office, complete check-in of patrol points and the like.
And S208, if the position information does not match, terminating the verification.
Specifically, if the position information of the last step of the identity recognition cannot be successfully verified, the identity recognition is terminated, and the accuracy and the safety of the recognition are further improved.
Fig. 3 is a flowchart of another identity recognition method according to an embodiment of the present invention.
S301, receiving and verifying whether the audio information is correct.
Obtaining a primary key according to the user information and the time node, obtaining a receiving key according to the using area, sequentially arranging the receiving key and the primary key to obtain a secondary key, and generating audio information according to the secondary key;
the identity key is obtained by verifying the audio information, the audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying the identity key. The verification segment includes at least a first verification segment and a second verification segment, the frequency of the second verification segment being a fixed multiple of the frequency of the first verification segment. The receiving section is a fixed frequency audio, and the receiving section contains the following information: presetting a first key and/or verifying frequency information of the segment audio.
S302, if the audio information is correct, an identity key is obtained.
The identity key at least comprises a time stamp and ID information, wherein the ID information comprises identity information of a user and position information of a use area.
S303, if the audio information is incorrect, the verification is terminated.
When the identity recognition is carried out, if the input audio signals are not matched, the identity key cannot be obtained for further verification.
S304, after obtaining the identity key, verifying whether the current time is in the range of the timestamp.
And after obtaining the identity key, starting to verify whether the timestamp in the key information is matched with the current time.
S305, if the current time is within the range of the time stamp, further verifying whether the identity information is matched.
And after the timestamp signal is verified, further verifying the identity information of the user.
And S306, if the current time is not in the range of the time stamp, terminating the verification.
And if the time stamp is not matched with the current time, the next identity authentication cannot be carried out.
S307, if the identity information is successfully verified, further verifying whether the position information is matched.
And if the identity information is successfully verified, further verifying the used position information.
S308, if the identity information is not verified successfully, the verification is terminated.
If the user is not a legal user, the next authentication cannot be continued.
And S309, if the position information is successfully verified, the result of successful verification is transmitted out.
And if the position information is verified, successfully finishing the identity recognition and transmitting the result of successful verification.
And S310, if the position information is not verified successfully, terminating the verification.
If the verified area is not within the predetermined area, the verification of the position information cannot be successfully passed, and the next operation cannot be continued.
The embodiment encrypts the identity key, the identity key can be obtained through the verification of the audio information, the information in the identity key is gradually verified, the timestamp, the user identity information and the position information are sequentially verified, only if the three information are gradually verified successfully, the result is successfully uploaded and responded, such as door opening, elevator floor opening, patrol card punching and the like, and if one information does not pass the verification, the verification is terminated. The identity authentication is more accurate and safer due to the arrangement.
Fig. 4 is a schematic diagram of an identity recognition system according to an embodiment of the present invention.
The system is composed of an audio acquisition module 401, an information processing module 402 and a transmission module 403.
The audio obtaining module 401 is configured to obtain audio information, and decode the audio information to obtain an identity key, where the identity key at least includes a timestamp and ID information;
an information processing module 402, configured to read a current time and verify whether the current time is within a range of the timestamp, and if so, verify the ID information according to a first preset rule;
if the ID information passes the verification, the transmission module 403 transmits a result of the successful verification to the outside.
Fig. 5 is a schematic diagram of another identification system according to an embodiment of the present invention.
The system consists of a key module 501, a key management platform key module 502, an audio acquisition module 503, an information processing module 504, a transmission module 505 and an acousto-optic module 506.
The key module 501 is configured to obtain user information, time nodes, and a use area, and upload the user information, the time nodes, and the use area to the key management platform 502; the key management platform 502 obtains a primary key according to the user information and the time node, obtains a receiving key according to the use area, sequentially arranges the receiving key and the primary key to obtain a secondary key, and transmits the secondary key to the information processing module 504 and the audio acquisition module 503; the audio obtaining module 503 generates audio information according to the secondary key;
an information processing module 504, configured to read a current time and verify whether the current time is within a range of the timestamp, and if so, verify the ID information according to a first preset rule;
if the ID information passes the verification, the transmission module 505 transmits a result of the successful verification to the outside.
The acousto-optic module 506 is used for starting the indicator light after receiving the result of successful verification. At present, indicating lamps are installed in many places needing identity recognition, such as entrance guard of a community, elevator control of office places and the like, so that the acousto-optic module 506 is added to adapt to identity recognition work in the places, and the identity recognition efficiency is improved.
The following describes the audio information verification method according to an embodiment of the present invention in detail, with only one verification segment, taking the scenario shown in fig. 3 as an example, as shown in fig. 6.
S701, after receiving a primary audio frequency, an audio frequency acquisition module firstly performs frequency division processing according to the frequency of the primary audio frequency to obtain a plurality of sections of audio frequencies to be verified;
s702, extracting a second matching audio from the audio to be verified, and then inquiring whether a first matching audio matched with the second matching audio exists in the obtained audio to be verified, and if the first matching audio matched with the second matching audio does not exist, ignoring the audio information; the matching audio can be matched in a mode of numbers or notes;
s703, acquiring all audio information with receiving segments from S702, including the receiving segments and the verification segments, and extracting information of the verification segments;
s704, in the frequency division process, the frequencies of the audios with relatively similar frequencies are poor in frequency division effect and possibly interfere with each other, so that the precision of the verification level cannot be achieved, the audios with the similar frequencies obtained in the S703 are automatically stopped to be verified at the late time anchor point, the verification fails, and a fan of the equipment corresponding to the information video needs to be pressed again for verification;
s705, after eliminating the relevant interference, verifying all the audio information obtained by the frequency division processing and acquired within all the predetermined time, and if the audio information is passed, sending a pass indication, and if the audio information is not passed, sending a fail indication.
The following describes in detail how the audio information of the embodiment of the present invention tests the simultaneous verification of multiple audio information, as shown in fig. 7, in the case where there are two or more verification segments, taking the scenario shown in fig. 3 as an example.
S801, after receiving a primary audio frequency, an audio frequency acquisition module firstly performs frequency division processing according to the frequency of the primary audio frequency to obtain a plurality of sections of audio frequencies to be verified;
s802, extracting a second matching audio from the audio to be verified, and then inquiring whether a first matching audio matched with the second matching audio exists in the obtained audio to be verified, if the first matching audio matched with the second matching audio does not exist, ignoring the audio information; the matching audio can be matched in a mode of numbers or notes;
s803, acquiring all audio information with receiving segments from S802, including the receiving segments and the verification segments, and extracting information from the verification segments;
s804, because in the frequency division process, the audio frequencies with relatively similar frequencies have poor frequency division effects and can interfere with each other, so that the accuracy of the verification level can not be achieved, the audio frequencies with similar frequencies obtained in S803 automatically obtain a second verification section from the audio frequency with late time anchor point, and then the frequencies of the second verification section are set in the same way to ensure that the audio frequencies can not be interfered;
s805, after eliminating the relevant interference, verifying all the first verification sections of the audio information obtained in the preset time through frequency division processing, if the first verification sections pass, sending a pass indication, and if the first verification sections do not pass, sending a fail indication;
s806, if the audio information of the first verification section is eliminated, the second verification section and even the third verification section are verified, if the audio information is passed, a pass indication is sent, and if the audio information is not passed, a fail indication is sent.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. An identity recognition application method, characterized by:
acquiring audio information, and decoding the audio information to obtain an identity key, wherein the identity key at least comprises a timestamp and ID information;
the audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying an identity key; the verification segment comprises at least a first verification segment and a second verification segment, the frequency of the second verification segment is a fixed multiple of the frequency of the first verification segment; the receiving section is fixed frequency audio;
the ID information comprises identity information of a user and position information of a use area, and the identity information of the user is matched with the use area;
reading the current time and verifying whether the current time is in the range of the timestamp, and if so, verifying the ID information through a first preset rule; the first preset rule is that identity information is verified, after the identity information is verified, the position information is continuously verified, and after the position information is verified, the result of successful verification is transmitted;
if the ID information passes the verification, the result of successful verification is transmitted;
the verifying the ID information by the first preset rule specifically includes:
firstly, acquiring all original audio within set time, then decomposing the original audio into a plurality of decomposed audio according to frequency, endowing a time anchor point according to the initial time of the acquired original audio, firstly verifying that each decomposed audio contains a receiving section, if the decomposed audio contains the receiving section, carrying out next processing, and if not, directly skipping the decomposed audio; for the decomposed audio containing the receiving segment, continuously analyzing the first verification segment of the decomposed audio, and obtaining the audio frequency of the first verification segment, if the decomposed audio obtained within the set time has the first verification segment with the same audio frequency, automatically obtaining the second verification segment of the decomposed audio with the later time anchor point, and extracting data of the second verification segment to obtain ID information; and if the decomposed audio obtained in the set time does not have other first verification sections with the same audio frequency, performing data extraction on the first verification sections to obtain ID information.
2. An identity recognition application method as claimed in claim 1, characterized in that: the frequency of the audio information is not lower than 20kHz or 18-20 kHz.
3. The method as claimed in claim 1, wherein the audio information has a frequency of 19-20 kHz.
4. An identification system, characterized by: the method comprises the following steps:
the audio acquisition module is used for acquiring audio information and decoding the audio information to obtain an identity key, wherein the identity key at least comprises a timestamp and ID information;
the audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying an identity key; the verification segment comprises at least a first verification segment and a second verification segment, the frequency of the second verification segment is a fixed multiple of the frequency of the first verification segment; the receiving section is fixed frequency audio; the ID information comprises identity information of a user and position information of a use area, and the identity information of the user is matched with the use area;
the information processing module is used for reading the current time and verifying whether the current time is within the range of the timestamp, and if so, verifying the ID information through a first preset rule; the first preset rule is that identity information is verified, after the identity information is verified, the position information is continuously verified, and after the position information is verified, the result of successful verification is transmitted;
the transmission module is used for transmitting a result of successful verification if the ID information passes the verification;
the verifying the ID information by the first preset rule specifically includes:
firstly, acquiring all original audio within set time, then decomposing the original audio into a plurality of decomposed audio according to frequency, endowing a time anchor point according to the initial time of the acquired original audio, firstly verifying that each decomposed audio contains a receiving section, if the decomposed audio contains the receiving section, carrying out next processing, and if not, directly skipping the decomposed audio; for the decomposed audio containing the receiving segment, continuously analyzing a first verification segment of the decomposed audio, and obtaining the audio frequency of the first verification segment, if the decomposed audio obtained within the set time has the first verification segment with the same audio frequency, automatically obtaining a second verification segment of the decomposed audio with a later time anchor point, and extracting data of the second verification segment to obtain ID information; and if the decomposed audio obtained in the set time does not have other first verification sections with the same audio frequency, performing data extraction on the first verification sections to obtain ID information.
5. An identification system as claimed in claim 4, wherein: the system also comprises a key module, wherein the key module is used for acquiring user information, time nodes and a use area and uploading the user information, the time nodes and the use area to a key management platform;
the key management platform obtains a primary key according to the user information and the time node, obtains a receiving key according to the using area, sequentially arranges the receiving key and the primary key to obtain a secondary key, and transmits the secondary key to the information processing module and the audio acquisition module;
and the audio acquisition module generates audio information according to the secondary key.
6. An identification system as claimed in claim 4, wherein: the system also comprises an acousto-optic module, wherein the acousto-optic module is used for starting the indicator light after receiving the result of successful verification.
7. An identification system as claimed in claim 4, wherein: the audio information comprises at least one receiving segment and at least one verifying segment, the receiving segment is used for the server to determine whether the received audio is the audio information and the analysis mode of the audio information, and the verifying segment is used for carrying identity key information; the received segment includes a first matching audio and the verification segment includes a second matching audio paired with the first matching audio.
8. An identification system as claimed in claim 5, wherein: the verification segment comprises at least a first verification segment and a second verification segment, the frequency of the second verification segment is a random multiple of the first verification segment frequency greater than or equal to 1; the receiving section is a fixed frequency audio, and the receiving section contains the following information: presetting a first key and/or verifying frequency information of the segment audio.
CN201811154602.7A 2018-09-30 2018-09-30 Identity recognition application method and system Active CN109446774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811154602.7A CN109446774B (en) 2018-09-30 2018-09-30 Identity recognition application method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811154602.7A CN109446774B (en) 2018-09-30 2018-09-30 Identity recognition application method and system

Publications (2)

Publication Number Publication Date
CN109446774A CN109446774A (en) 2019-03-08
CN109446774B true CN109446774B (en) 2021-11-30

Family

ID=65546124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811154602.7A Active CN109446774B (en) 2018-09-30 2018-09-30 Identity recognition application method and system

Country Status (1)

Country Link
CN (1) CN109446774B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202815B (en) * 2020-11-06 2023-10-24 新大陆(福建)公共服务有限公司 Trusted digital identity offline verification device and method
CN112863025A (en) * 2021-01-11 2021-05-28 宁波大学 Access control method and system based on audio key identification
CN113256851A (en) * 2021-04-30 2021-08-13 深圳市展拓电子技术有限公司 Verification method and verification system for security cabinet of bank system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021472A (en) * 2014-05-30 2014-09-03 中国工商银行股份有限公司 Identity verification method and system
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN108305633A (en) * 2018-01-16 2018-07-20 平安科技(深圳)有限公司 Speech verification method, apparatus, computer equipment and computer readable storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8166562B2 (en) * 2002-05-31 2012-04-24 Peoplechart Corporation Method and system for protecting information on a computer system
US20040003260A1 (en) * 2002-06-27 2004-01-01 Philip Hawkes System and method for audio tickets
CN101014028B (en) * 2007-01-12 2010-05-26 鼎芯通讯(上海)有限公司 Frequency coarse synchronizing method of using property of phase reference code element
CN103841132B (en) * 2012-11-21 2015-08-19 腾讯科技(深圳)有限公司 Information pushing, reception and exchange method, server, client and interactive device
US9495967B2 (en) * 2013-08-20 2016-11-15 Intel Corporation Collaborative audio conversation attestation
CN104333662A (en) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 Mobile terminal and encrypting method and device for telephone answering of mobile terminal
US9652913B2 (en) * 2015-06-05 2017-05-16 Brivo Systems, Llc Geo-location estimate (GLE) sensitive physical access control apparatus, system, and method of operation
CN106130956A (en) * 2016-06-03 2016-11-16 谢渤 A kind of telephone authentication method and apparatus
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN106778179B (en) * 2017-01-05 2021-07-09 南京大学 Identity authentication method based on ultrasonic lip language identification
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021472A (en) * 2014-05-30 2014-09-03 中国工商银行股份有限公司 Identity verification method and system
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN108305633A (en) * 2018-01-16 2018-07-20 平安科技(深圳)有限公司 Speech verification method, apparatus, computer equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN109446774A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN110365996B (en) Live broadcast management method, live broadcast management platform, electronic device and storage medium
CN109086669B (en) Face recognition identity verification method and device and electronic equipment
CN109446774B (en) Identity recognition application method and system
US10176654B2 (en) Suspicious person detection system, suspicious person detection method
US20120023169A1 (en) Portable terminal and method for providing social network service using human body communication
CN104504767A (en) Check-in information verification method and system
CN103841108A (en) Authentication method and system of biological characteristics of user
CN108933656A (en) Online works voting method and device, computer equipment, readable storage medium storing program for executing
CN104346548A (en) Wearable equipment and authentication method thereof
KR20210047350A (en) Attendance management system, method and electronic device
KR20140070220A (en) Commute management method with beacon
CN113536261A (en) Authority management method, device, computer device and storage medium
KR20140116295A (en) method of entrance control through instant QR code
CN109543078A (en) Social relationships determine method, apparatus, equipment and computer readable storage medium
CN105574967A (en) Intelligent access control system and operation method thereof
CN104299303A (en) Intelligent access control system and implementation method of intelligent access control system
CN111083096A (en) Method and system for securely distributing content in an examination
CN107464328A (en) Unlocking method, device, storage medium and the smart lock of smart lock
CN112509586A (en) Method and device for recognizing voice print of telephone channel
CN106782498A (en) Voice messaging player method, device and terminal
CN107294981B (en) Authentication method and equipment
CN214752023U (en) Fingerprint acquisition device and fingerprint management system
CN114415908A (en) Display method, display device, electronic equipment and storage medium
CN213601611U (en) Law enforcement appearance with voiceprint recognition function
CN113938827A (en) Method, device, equipment and storage medium for verifying communication number user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant