CN112202815B - Trusted digital identity offline verification device and method - Google Patents
Trusted digital identity offline verification device and method Download PDFInfo
- Publication number
- CN112202815B CN112202815B CN202011228835.4A CN202011228835A CN112202815B CN 112202815 B CN112202815 B CN 112202815B CN 202011228835 A CN202011228835 A CN 202011228835A CN 112202815 B CN112202815 B CN 112202815B
- Authority
- CN
- China
- Prior art keywords
- data
- ctid
- code
- verification
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 101
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 29
- 238000006243 chemical reaction Methods 0.000 claims abstract description 13
- 238000011960 computer-aided design Methods 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 8
- 230000001105 regulatory effect Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 description 18
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/16—Vocoder architecture
- G10L19/167—Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a trusted digital identity offline verification device and method, comprising an audio receiving module, a data processing module and a data processing module, wherein the audio receiving module receives audio stream data sent by a sending end, converts the audio stream data into binary stream data and then sends the binary stream data to the data processing module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm; the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.
Description
Technical Field
The invention relates to a trusted digital identity offline verification device and method, and belongs to the field of two-dimensional code offline verification.
Background
The trusted digital identity (namely CTID two-dimensional code) in the scheme refers to a network identity authentication credential. The CTID two-dimensional code stores citizen personal identity information and a BID value encrypted by an encryption algorithm (BID is a unique personal identifier) and is used for verifying the personal identity. For example, when a train station enters and exits, the CTID two-dimensional code can replace a resident identification card to realize verification of the identity of the passenger.
The existing two-dimensional code verification mode comprises the following two modes:
firstly, on-line verification is carried out, after the verification equipment finishes code scanning, the to-be-verified information in the two-dimensional code is sent to a server at a network side for verification, and the to-be-verified information of a correct version is stored in the server. However, after the network is interrupted, the verification device cannot send the information to be verified to the server, which results in verification failure.
And secondly, carrying data capable of checking the two-dimension code in the off-line checking, so that the checking equipment does not need to send the scanned two-dimension code to a server on line for checking. Reference may be made to the publication CN108737394B patent "offline authentication system, code scanning device and server".
The invention discloses a system and a method for safely identifying two-dimension codes offline based on a peripheral device of a mobile phone, and discloses a method and a device for completing information interaction between the peripheral device of the mobile phone and external two-dimension code identification equipment, wherein the publication number of the system is CN 106228219A. But the invention still needs to additionally send verification code information for verification.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a trusted digital identity offline verification device and a trusted digital identity offline verification method, which realize the transmission of CTID codes by using sound waves through an audio receiving module and a data processing module, avoid the complicated process of code scanning of users, are convenient and quick, get rid of dependence on a network and realize the offline transmission of CTID codes. Furthermore, the CTID is offline checked through the CTID decoding module, the identity checking module and the acoustic off-line transmission of CTID codes.
The technical scheme of the invention is as follows:
the technical scheme is as follows:
a trusted digital identity offline verification device, comprising:
the audio receiving module is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module;
the CTID decoding module is in communication connection with the identity verification module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.
Further, the specific steps of the data conversion are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
Further, the format of the data frame is: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
Furthermore, the audio receiving module is provided with a PDM interface, and the PDM interface is used for converting the audio stream into a high-frequency data stream in a PDM format and then sending the high-frequency data stream to the data processing module.
Furthermore, the identity verification module is provided with an external communication interface for outputting verification results.
The second technical scheme is as follows:
an off-line verification method for trusted digital identity, comprising the following steps:
s1: the audio receiving module receives data and pre-processes the data: receiving audio stream data sent by a sending end and converting the audio stream data into binary stream data;
s2: the data processing module performs data processing: performing data conversion on the binary stream data to obtain CTID codes;
s3: and the CTID decoding module decodes the CTID code: decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
s4: the identity verification module performs identity verification: encrypting the locally stored BID value through the encryption algorithm to obtain a verification code; and comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully.
Further, the specific steps of the data conversion are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
Further, the format of the data frame is: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
Further, outputting the audio stream as a high frequency data stream in a PDM format; and converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
The invention has the following beneficial effects:
1. the invention realizes the CTID code transmission by using sound waves through the audio receiving module and the data processing module, avoids the complicated process of code scanning of users, is convenient and quick, gets rid of dependence on a network and realizes the off-line CTID code transmission. Furthermore, the CTID is offline checked through the CTID decoding module, the identity checking module and the acoustic off-line transmission of CTID codes. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
2. The invention manages the transmission process of CTID binary stream data by setting the data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Drawings
FIG. 1 is a block diagram of a verification device according to the present invention.
Detailed Description
The invention will now be described in detail with reference to the drawings and to specific embodiments.
Example 1
Referring to fig. 1, an off-line verification device for trusted digital identity, comprising:
the audio receiving module (in the embodiment, the audio receiving module uses a ring MEMS digital microphone array to realize the functions of receiving audio and removing environmental noise) is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module; the data conversion steps are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by the verification device and a transmitting end together;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
Similarly, the transmitting end converts the CTID code into CTID code binary stream data, encapsulates the CTID code binary stream data into a plurality of data frames, and converts the plurality of data frames into binary stream data. And finally, the sending end converts the binary stream data into an audio stream and sends the audio stream to the receiving end.
The CTID decoding module is in communication connection with the identity verification module; and the CTID decoding module decodes the CTID to obtain a verification code, and sends the verification code to the identity verification module, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm. The encryption algorithm part can refer to a two-dimensional code information combination and encryption method and a two-dimensional code encryption machine.
The identity verification module has at least one BID value stored in the identity verification module (in this embodiment, the BID value is stored in an external memory chip rather than in a memory internal to the device). The identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.
The CTID code transmission method has the beneficial effects that the CTID code is transmitted by using sound waves through the audio receiving module, the data processing module and the memory, so that the complicated process of code scanning by a user is avoided, the method is convenient and quick, the dependence on a network is avoided, and the off-line CTID code transmission is realized. Furthermore, the off-line verification of CTID is realized through a CTID decoding module, a sound wave transmission CTID code and a plurality of BID values stored in a memory. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
Example two
Further, the format of the data frame is: a frame header (1B), a frame sequence number (1B), a data segment (3B) and a frame tail (1B);
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
In this embodiment, the first 5 bits of the frame header are fixed to 10101 for identifying the beginning of the data frame; the last 3 bits of the frame header are used to represent the size of the data frame.
The improvement of the embodiment is that the transmission process of CTID code binary stream data is managed by setting a data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Example III
Further, the audio receiving module is provided with a PDM interface, and the PDM interface is used for outputting the audio stream into a high-frequency data stream in a PDM format. The data processing module converts the high-frequency data stream in the PDM format into a data frame in the PCM format according to a PDM2PCM algorithm.
Example IV
Furthermore, the device for verifying the trusted digital identity offline is also provided with an external communication interface (USB port, TTL level serial port and acousto-optic interface) for outputting verification results. In this embodiment, the verification result is output to the audible and visual alarm device through the audible and visual interface, and if the verification fails, the audible and visual alarm device will send out a corresponding prompt.
Example five
A trusted digital identity offline verification method, comprising:
s1: the audio receiving module receives data and pre-processes the data: and receiving the audio stream data sent by the sending end and converting the audio stream data into binary stream data.
S2: the data processing module performs data processing: and carrying out data conversion on the binary stream data to obtain CTID codes. The data conversion steps are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by the verification device and a transmitting end together;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
Similarly, the transmitting end converts the CTID code into CTID code binary stream data, encapsulates the CTID code binary stream data into a plurality of data frames, and converts the plurality of data frames into binary stream data. And finally, the sending end converts the binary stream data into an audio stream and sends the audio stream to the receiving end.
S3: and the CTID decoding module decodes the CTID code: and decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm. The encryption algorithm part can refer to a two-dimensional code information combination and encryption method and a two-dimensional code encryption machine.
S4: the identity verification module performs identity verification: and encrypting the BID value stored locally through the encryption algorithm to obtain the verification code. And comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully.
The CTID code transmission method has the beneficial effects that the CTID code is transmitted by using sound waves through the audio receiving module, the data processing module and the memory, so that the complicated process of code scanning by a user is avoided, the method is convenient and quick, the dependence on a network is avoided, and the off-line CTID code transmission is realized. Furthermore, the off-line verification of CTID is realized through a CTID decoding module, a sound wave transmission CTID code and a plurality of BID values stored in a memory. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
Example six
Further, the format of the data frame is: a frame header (1B), a frame sequence number (1B), a data segment (3B), and a frame trailer (1B).
The data segment comprises part of CTID code binary stream data. The frame header is used to identify the start of a data frame and the size of the data frame. The frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
In this embodiment, the first 5 bits of the frame header are fixed to 10101 for identifying the beginning of the data frame; the last 3 bits of the frame header are used to represent the size of the data frame.
The improvement of the embodiment is that the transmission process of CTID code binary stream data is managed by setting a data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Example seven
Further, in this embodiment, the audio stream is output as a high frequency data stream in PDM format. And converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.
Claims (7)
1. An off-line verification device for trusted digital identity, comprising:
the audio receiving module is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module;
the CTID decoding module is in communication connection with the identity verification module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful;
the specific steps of the data conversion are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
2. The device of claim 1, wherein the data frame is in the format of: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
3. The device according to claim 1, wherein the audio receiving module is provided with a PDM interface, and the PDM interface is configured to convert the audio stream into a high-frequency data stream in a PDM format and send the high-frequency data stream to the data processing module.
4. The device of claim 1, wherein the identity verification module is provided with an external communication interface for outputting verification results.
5. An off-line verification method for trusted digital identity, which is characterized by comprising the following steps:
s1: the audio receiving module receives data and pre-processes the data: receiving audio stream data sent by a sending end and converting the audio stream data into binary stream data;
s2: the data processing module performs data processing: performing data conversion on the binary stream data to obtain CTID codes;
s3: and the CTID decoding module decodes the CTID code: decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
s4: the identity verification module performs identity verification: encrypting the locally stored BID value through the encryption algorithm to obtain a verification code; comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully;
the specific steps of the data conversion are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
6. The method of claim 5, wherein the data frame is in the format of: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
7. The method of claim 5, wherein the audio stream is output as a PDM formatted high frequency data stream; and converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011228835.4A CN112202815B (en) | 2020-11-06 | 2020-11-06 | Trusted digital identity offline verification device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011228835.4A CN112202815B (en) | 2020-11-06 | 2020-11-06 | Trusted digital identity offline verification device and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112202815A CN112202815A (en) | 2021-01-08 |
CN112202815B true CN112202815B (en) | 2023-10-24 |
Family
ID=74033340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011228835.4A Active CN112202815B (en) | 2020-11-06 | 2020-11-06 | Trusted digital identity offline verification device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112202815B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679379A (en) * | 2017-04-18 | 2018-02-09 | 上海擎云物联网股份有限公司 | A kind of Voiceprint Recognition System and recognition methods |
CN108737394A (en) * | 2018-05-08 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Off-line verification system, barcode scanning equipment and server |
CN109446774A (en) * | 2018-09-30 | 2019-03-08 | 山东知味行网络科技有限公司 | A kind of identification application method and system |
CN111768522A (en) * | 2020-06-10 | 2020-10-13 | 福建新大陆通信科技股份有限公司 | CTID-based intelligent door lock unlocking method and system |
CN213754557U (en) * | 2020-11-06 | 2021-07-20 | 新大陆(福建)公共服务有限公司 | Credible digital identity offline verification device |
-
2020
- 2020-11-06 CN CN202011228835.4A patent/CN112202815B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679379A (en) * | 2017-04-18 | 2018-02-09 | 上海擎云物联网股份有限公司 | A kind of Voiceprint Recognition System and recognition methods |
CN108737394A (en) * | 2018-05-08 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Off-line verification system, barcode scanning equipment and server |
CN109446774A (en) * | 2018-09-30 | 2019-03-08 | 山东知味行网络科技有限公司 | A kind of identification application method and system |
CN111768522A (en) * | 2020-06-10 | 2020-10-13 | 福建新大陆通信科技股份有限公司 | CTID-based intelligent door lock unlocking method and system |
CN213754557U (en) * | 2020-11-06 | 2021-07-20 | 新大陆(福建)公共服务有限公司 | Credible digital identity offline verification device |
Also Published As
Publication number | Publication date |
---|---|
CN112202815A (en) | 2021-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101299632B (en) | Synchronization and segment type detection method for data transmission via an audio communication system | |
US9137243B2 (en) | Authentication system and authentication method | |
CN106504745A (en) | A kind of speech verification code system and its implementation method | |
CN104955044B (en) | Target network access and its guidance method and its corresponding terminal | |
CN107733896B (en) | Data safety transmission method based on sound waves | |
CN111669730A (en) | Physical layer key generation method and updating method for one-to-one proximity communication | |
CN109121124A (en) | A kind of client-based bluetooth mesh equipment networking process implementation method | |
US10833762B2 (en) | Information transmission method, information reception method and apparatus | |
CN104780044A (en) | Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method | |
CN112037765A (en) | Method of Bluetooth audio equipment voice recognition system based on BNEP protocol | |
CN103856269B (en) | Information transmitting, read method and device based on sound wave | |
CN213754557U (en) | Credible digital identity offline verification device | |
CN112202815B (en) | Trusted digital identity offline verification device and method | |
CN104869570A (en) | Speaking terminal confirmation method based on language channel | |
EP3910508A1 (en) | System and methods for speaker identification, message compression and/or message replay in a communications environment | |
CN112383400B (en) | Method and equipment for transmitting and verifying trusted digital identity by utilizing sound waves | |
CN112862488A (en) | Data signature method and device, electronic equipment and computer readable storage medium | |
KR20050053704A (en) | Data communication through acoustic channels and compression | |
CN104144051A (en) | Remote voice encryption and decryption method | |
CN108307023B (en) | Encrypted communication method and system based on DTMF technology | |
CN112242977A (en) | Data transmission method and data transmission system | |
CN112738059B (en) | Terminal access validity verification method and device, electronic equipment and storage medium | |
CN100511423C (en) | Data communication through acoustic channels and compression | |
CN111600662A (en) | System and method for verifying and shortening WIFI hotspot information transmitted by sound waves through crc16 | |
CN114826669A (en) | Communication data sending and receiving method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |