CN112202815B - Trusted digital identity offline verification device and method - Google Patents

Trusted digital identity offline verification device and method Download PDF

Info

Publication number
CN112202815B
CN112202815B CN202011228835.4A CN202011228835A CN112202815B CN 112202815 B CN112202815 B CN 112202815B CN 202011228835 A CN202011228835 A CN 202011228835A CN 112202815 B CN112202815 B CN 112202815B
Authority
CN
China
Prior art keywords
data
ctid
code
verification
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011228835.4A
Other languages
Chinese (zh)
Other versions
CN112202815A (en
Inventor
林龙
林海堤
谢承运
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Newland Fujian Public Service Co ltd
Original Assignee
Newland Fujian Public Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newland Fujian Public Service Co ltd filed Critical Newland Fujian Public Service Co ltd
Priority to CN202011228835.4A priority Critical patent/CN112202815B/en
Publication of CN112202815A publication Critical patent/CN112202815A/en
Application granted granted Critical
Publication of CN112202815B publication Critical patent/CN112202815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/16Vocoder architecture
    • G10L19/167Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a trusted digital identity offline verification device and method, comprising an audio receiving module, a data processing module and a data processing module, wherein the audio receiving module receives audio stream data sent by a sending end, converts the audio stream data into binary stream data and then sends the binary stream data to the data processing module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm; the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.

Description

Trusted digital identity offline verification device and method
Technical Field
The invention relates to a trusted digital identity offline verification device and method, and belongs to the field of two-dimensional code offline verification.
Background
The trusted digital identity (namely CTID two-dimensional code) in the scheme refers to a network identity authentication credential. The CTID two-dimensional code stores citizen personal identity information and a BID value encrypted by an encryption algorithm (BID is a unique personal identifier) and is used for verifying the personal identity. For example, when a train station enters and exits, the CTID two-dimensional code can replace a resident identification card to realize verification of the identity of the passenger.
The existing two-dimensional code verification mode comprises the following two modes:
firstly, on-line verification is carried out, after the verification equipment finishes code scanning, the to-be-verified information in the two-dimensional code is sent to a server at a network side for verification, and the to-be-verified information of a correct version is stored in the server. However, after the network is interrupted, the verification device cannot send the information to be verified to the server, which results in verification failure.
And secondly, carrying data capable of checking the two-dimension code in the off-line checking, so that the checking equipment does not need to send the scanned two-dimension code to a server on line for checking. Reference may be made to the publication CN108737394B patent "offline authentication system, code scanning device and server".
The invention discloses a system and a method for safely identifying two-dimension codes offline based on a peripheral device of a mobile phone, and discloses a method and a device for completing information interaction between the peripheral device of the mobile phone and external two-dimension code identification equipment, wherein the publication number of the system is CN 106228219A. But the invention still needs to additionally send verification code information for verification.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a trusted digital identity offline verification device and a trusted digital identity offline verification method, which realize the transmission of CTID codes by using sound waves through an audio receiving module and a data processing module, avoid the complicated process of code scanning of users, are convenient and quick, get rid of dependence on a network and realize the offline transmission of CTID codes. Furthermore, the CTID is offline checked through the CTID decoding module, the identity checking module and the acoustic off-line transmission of CTID codes.
The technical scheme of the invention is as follows:
the technical scheme is as follows:
a trusted digital identity offline verification device, comprising:
the audio receiving module is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module;
the CTID decoding module is in communication connection with the identity verification module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.
Further, the specific steps of the data conversion are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
Further, the format of the data frame is: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
Furthermore, the audio receiving module is provided with a PDM interface, and the PDM interface is used for converting the audio stream into a high-frequency data stream in a PDM format and then sending the high-frequency data stream to the data processing module.
Furthermore, the identity verification module is provided with an external communication interface for outputting verification results.
The second technical scheme is as follows:
an off-line verification method for trusted digital identity, comprising the following steps:
s1: the audio receiving module receives data and pre-processes the data: receiving audio stream data sent by a sending end and converting the audio stream data into binary stream data;
s2: the data processing module performs data processing: performing data conversion on the binary stream data to obtain CTID codes;
s3: and the CTID decoding module decodes the CTID code: decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
s4: the identity verification module performs identity verification: encrypting the locally stored BID value through the encryption algorithm to obtain a verification code; and comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully.
Further, the specific steps of the data conversion are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
Further, the format of the data frame is: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
Further, outputting the audio stream as a high frequency data stream in a PDM format; and converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
The invention has the following beneficial effects:
1. the invention realizes the CTID code transmission by using sound waves through the audio receiving module and the data processing module, avoids the complicated process of code scanning of users, is convenient and quick, gets rid of dependence on a network and realizes the off-line CTID code transmission. Furthermore, the CTID is offline checked through the CTID decoding module, the identity checking module and the acoustic off-line transmission of CTID codes. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
2. The invention manages the transmission process of CTID binary stream data by setting the data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Drawings
FIG. 1 is a block diagram of a verification device according to the present invention.
Detailed Description
The invention will now be described in detail with reference to the drawings and to specific embodiments.
Example 1
Referring to fig. 1, an off-line verification device for trusted digital identity, comprising:
the audio receiving module (in the embodiment, the audio receiving module uses a ring MEMS digital microphone array to realize the functions of receiving audio and removing environmental noise) is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module; the data conversion steps are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by the verification device and a transmitting end together;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
Similarly, the transmitting end converts the CTID code into CTID code binary stream data, encapsulates the CTID code binary stream data into a plurality of data frames, and converts the plurality of data frames into binary stream data. And finally, the sending end converts the binary stream data into an audio stream and sends the audio stream to the receiving end.
The CTID decoding module is in communication connection with the identity verification module; and the CTID decoding module decodes the CTID to obtain a verification code, and sends the verification code to the identity verification module, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm. The encryption algorithm part can refer to a two-dimensional code information combination and encryption method and a two-dimensional code encryption machine.
The identity verification module has at least one BID value stored in the identity verification module (in this embodiment, the BID value is stored in an external memory chip rather than in a memory internal to the device). The identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful.
The CTID code transmission method has the beneficial effects that the CTID code is transmitted by using sound waves through the audio receiving module, the data processing module and the memory, so that the complicated process of code scanning by a user is avoided, the method is convenient and quick, the dependence on a network is avoided, and the off-line CTID code transmission is realized. Furthermore, the off-line verification of CTID is realized through a CTID decoding module, a sound wave transmission CTID code and a plurality of BID values stored in a memory. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
Example two
Further, the format of the data frame is: a frame header (1B), a frame sequence number (1B), a data segment (3B) and a frame tail (1B);
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
In this embodiment, the first 5 bits of the frame header are fixed to 10101 for identifying the beginning of the data frame; the last 3 bits of the frame header are used to represent the size of the data frame.
The improvement of the embodiment is that the transmission process of CTID code binary stream data is managed by setting a data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Example III
Further, the audio receiving module is provided with a PDM interface, and the PDM interface is used for outputting the audio stream into a high-frequency data stream in a PDM format. The data processing module converts the high-frequency data stream in the PDM format into a data frame in the PCM format according to a PDM2PCM algorithm.
Example IV
Furthermore, the device for verifying the trusted digital identity offline is also provided with an external communication interface (USB port, TTL level serial port and acousto-optic interface) for outputting verification results. In this embodiment, the verification result is output to the audible and visual alarm device through the audible and visual interface, and if the verification fails, the audible and visual alarm device will send out a corresponding prompt.
Example five
A trusted digital identity offline verification method, comprising:
s1: the audio receiving module receives data and pre-processes the data: and receiving the audio stream data sent by the sending end and converting the audio stream data into binary stream data.
S2: the data processing module performs data processing: and carrying out data conversion on the binary stream data to obtain CTID codes. The data conversion steps are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by the verification device and a transmitting end together;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
Similarly, the transmitting end converts the CTID code into CTID code binary stream data, encapsulates the CTID code binary stream data into a plurality of data frames, and converts the plurality of data frames into binary stream data. And finally, the sending end converts the binary stream data into an audio stream and sends the audio stream to the receiving end.
S3: and the CTID decoding module decodes the CTID code: and decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm. The encryption algorithm part can refer to a two-dimensional code information combination and encryption method and a two-dimensional code encryption machine.
S4: the identity verification module performs identity verification: and encrypting the BID value stored locally through the encryption algorithm to obtain the verification code. And comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully.
The CTID code transmission method has the beneficial effects that the CTID code is transmitted by using sound waves through the audio receiving module, the data processing module and the memory, so that the complicated process of code scanning by a user is avoided, the method is convenient and quick, the dependence on a network is avoided, and the off-line CTID code transmission is realized. Furthermore, the off-line verification of CTID is realized through a CTID decoding module, a sound wave transmission CTID code and a plurality of BID values stored in a memory. Compared with the prior art, the method and the device have the characteristics of being capable of being used as an identity mark, small in data size and the like by combining with BID, and have the advantages of being simple and practical, high in verification speed, good in user experience and the like.
Example six
Further, the format of the data frame is: a frame header (1B), a frame sequence number (1B), a data segment (3B), and a frame trailer (1B).
The data segment comprises part of CTID code binary stream data. The frame header is used to identify the start of a data frame and the size of the data frame. The frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
In this embodiment, the first 5 bits of the frame header are fixed to 10101 for identifying the beginning of the data frame; the last 3 bits of the frame header are used to represent the size of the data frame.
The improvement of the embodiment is that the transmission process of CTID code binary stream data is managed by setting a data frame, so that a receiver can quickly find lost data in data transmission, and the communication efficiency between a sending end and a verification device is improved.
Example seven
Further, in this embodiment, the audio stream is output as a high frequency data stream in PDM format. And converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (7)

1. An off-line verification device for trusted digital identity, comprising:
the audio receiving module is in communication connection with the data processing module; the audio receiving module receives the audio stream data sent by the sending end, converts the audio stream data into binary stream data and sends the binary stream data to the data processing module;
the data processing module is in communication connection with the CTID decoding module; the data processing module performs data conversion on the binary stream data to obtain a CTID (computer-aided design) code, and sends the CTID code to a CTID decoding module;
the CTID decoding module is in communication connection with the identity verification module; the CTID decoding module decodes the CTID to obtain a check code, and sends the check code to the identity check module, wherein the check code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
the identity verification module is stored with at least one BID value; the identity verification module encrypts the BID value stored locally through the encryption algorithm to obtain a verification code; the identity verification module compares the verification code with the verification code, and if the comparison result is consistent, the verification is successful;
the specific steps of the data conversion are as follows:
a1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
a2, decapsulating the plurality of data frames into CTID code binary stream data;
a3, generating CTID codes according to the CTID code binary stream data.
2. The device of claim 1, wherein the data frame is in the format of: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
3. The device according to claim 1, wherein the audio receiving module is provided with a PDM interface, and the PDM interface is configured to convert the audio stream into a high-frequency data stream in a PDM format and send the high-frequency data stream to the data processing module.
4. The device of claim 1, wherein the identity verification module is provided with an external communication interface for outputting verification results.
5. An off-line verification method for trusted digital identity, which is characterized by comprising the following steps:
s1: the audio receiving module receives data and pre-processes the data: receiving audio stream data sent by a sending end and converting the audio stream data into binary stream data;
s2: the data processing module performs data processing: performing data conversion on the binary stream data to obtain CTID codes;
s3: and the CTID decoding module decodes the CTID code: decoding the CTID code to obtain a verification code, wherein the verification code is a section of ciphertext generated by encrypting the BID value through an encryption algorithm;
s4: the identity verification module performs identity verification: encrypting the locally stored BID value through the encryption algorithm to obtain a verification code; comparing the verification code with the verification code, and if the comparison result is consistent, verifying successfully;
the specific steps of the data conversion are as follows:
b1, converting binary stream data into a plurality of data frames, wherein the format of the data frames is regulated by a verification device and a transmitting end;
b2, decapsulating the plurality of data frames into CTID code binary stream data;
and B3, generating CTID codes according to the CTID code binary stream data.
6. The method of claim 5, wherein the data frame is in the format of: frame header, frame sequence number, data segment and frame tail;
the data segment comprises partial CTID code binary stream data; the frame header is used for identifying the start of a data frame and the size of the data frame; the frame sequence numbers are used for identifying the front-to-back sequence among the data frames; the end of frame is used to identify the end of the data frame.
7. The method of claim 5, wherein the audio stream is output as a PDM formatted high frequency data stream; and converting the high-frequency data stream in the PDM format into a plurality of data frames in the PCM format according to a PDM2PCM algorithm.
CN202011228835.4A 2020-11-06 2020-11-06 Trusted digital identity offline verification device and method Active CN112202815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011228835.4A CN112202815B (en) 2020-11-06 2020-11-06 Trusted digital identity offline verification device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011228835.4A CN112202815B (en) 2020-11-06 2020-11-06 Trusted digital identity offline verification device and method

Publications (2)

Publication Number Publication Date
CN112202815A CN112202815A (en) 2021-01-08
CN112202815B true CN112202815B (en) 2023-10-24

Family

ID=74033340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011228835.4A Active CN112202815B (en) 2020-11-06 2020-11-06 Trusted digital identity offline verification device and method

Country Status (1)

Country Link
CN (1) CN112202815B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679379A (en) * 2017-04-18 2018-02-09 上海擎云物联网股份有限公司 A kind of Voiceprint Recognition System and recognition methods
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server
CN109446774A (en) * 2018-09-30 2019-03-08 山东知味行网络科技有限公司 A kind of identification application method and system
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system
CN213754557U (en) * 2020-11-06 2021-07-20 新大陆(福建)公共服务有限公司 Credible digital identity offline verification device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679379A (en) * 2017-04-18 2018-02-09 上海擎云物联网股份有限公司 A kind of Voiceprint Recognition System and recognition methods
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server
CN109446774A (en) * 2018-09-30 2019-03-08 山东知味行网络科技有限公司 A kind of identification application method and system
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system
CN213754557U (en) * 2020-11-06 2021-07-20 新大陆(福建)公共服务有限公司 Credible digital identity offline verification device

Also Published As

Publication number Publication date
CN112202815A (en) 2021-01-08

Similar Documents

Publication Publication Date Title
CN101299632B (en) Synchronization and segment type detection method for data transmission via an audio communication system
US9137243B2 (en) Authentication system and authentication method
CN106504745A (en) A kind of speech verification code system and its implementation method
CN104955044B (en) Target network access and its guidance method and its corresponding terminal
CN107733896B (en) Data safety transmission method based on sound waves
CN111669730A (en) Physical layer key generation method and updating method for one-to-one proximity communication
CN109121124A (en) A kind of client-based bluetooth mesh equipment networking process implementation method
US10833762B2 (en) Information transmission method, information reception method and apparatus
CN104780044A (en) Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method
CN112037765A (en) Method of Bluetooth audio equipment voice recognition system based on BNEP protocol
CN103856269B (en) Information transmitting, read method and device based on sound wave
CN213754557U (en) Credible digital identity offline verification device
CN112202815B (en) Trusted digital identity offline verification device and method
CN104869570A (en) Speaking terminal confirmation method based on language channel
EP3910508A1 (en) System and methods for speaker identification, message compression and/or message replay in a communications environment
CN112383400B (en) Method and equipment for transmitting and verifying trusted digital identity by utilizing sound waves
CN112862488A (en) Data signature method and device, electronic equipment and computer readable storage medium
KR20050053704A (en) Data communication through acoustic channels and compression
CN104144051A (en) Remote voice encryption and decryption method
CN108307023B (en) Encrypted communication method and system based on DTMF technology
CN112242977A (en) Data transmission method and data transmission system
CN112738059B (en) Terminal access validity verification method and device, electronic equipment and storage medium
CN100511423C (en) Data communication through acoustic channels and compression
CN111600662A (en) System and method for verifying and shortening WIFI hotspot information transmitted by sound waves through crc16
CN114826669A (en) Communication data sending and receiving method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant