CN115828220A - Method and system for identifying identity of communication receiver - Google Patents

Method and system for identifying identity of communication receiver Download PDF

Info

Publication number
CN115828220A
CN115828220A CN202211732647.4A CN202211732647A CN115828220A CN 115828220 A CN115828220 A CN 115828220A CN 202211732647 A CN202211732647 A CN 202211732647A CN 115828220 A CN115828220 A CN 115828220A
Authority
CN
China
Prior art keywords
communication terminal
identity
content
identification
boundary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211732647.4A
Other languages
Chinese (zh)
Inventor
陈虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Sanyueban Information Technology Co ltd
Original Assignee
Nanjing Sanyueban Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Sanyueban Information Technology Co ltd filed Critical Nanjing Sanyueban Information Technology Co ltd
Priority to CN202211732647.4A priority Critical patent/CN115828220A/en
Publication of CN115828220A publication Critical patent/CN115828220A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of communication, and discloses a method for identifying the identity of a communication receiver, which comprises the following steps: the first communication terminal generates identity recognition information based on the identity content of the receiver, and sends a receiving request containing the identity recognition information to the second communication terminal; the second communication terminal receives a receiving request of the first communication terminal; the second communication terminal analyzes the identity identification information of the first communication terminal for receiving the request to obtain the identity content of the first communication terminal; the second communication terminal matches the identity content of the first communication terminal with the identity content in the recognition base, processes the receiving request of the first communication terminal based on the matching result, the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the recognition base, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal; based on the method, the invention can safely and quickly realize the identity recognition of the receiver.

Description

Method and system for identifying identity of communication receiver
Technical Field
The invention relates to the technical field of communication, in particular to an identity identification method of a communication receiver.
Background
At present, the technology of the internet of things is more and more concerned by people. The essence of the internet of things is that information acquisition is carried out through sensor nodes capable of acquiring object information, information transmission and exchange are carried out through a ubiquitous network, and information processing and decision making are carried out through an information processing system. Malicious users may read data from the sensing node without obtaining the consent of the sensing node user, and the information security is threatened.
Disclosure of Invention
The invention provides an identity recognition method for a communication receiver, which solves the technical problem that the information security of the Internet of things is threatened in the related technology.
According to one aspect of the present invention, there is provided a method for identifying an identity of a communication recipient, comprising the steps of:
step S100, a first communication terminal generates identity recognition information based on identity content of a receiver, and sends a receiving request containing the identity recognition information to a second communication terminal;
step S200, the second communication terminal receives a receiving request of the first communication terminal;
step S300, the second communication terminal analyzes the identification information of the request received by the first communication terminal to obtain the identification content of the first communication terminal;
step S400, the second communication terminal matches the identity content of the first communication terminal with the identity content in the recognition library, and the second communication terminal processes the receiving request of the first communication terminal based on the matching result;
the strategy for the second communication terminal to process the receiving request of the first communication terminal based on the matching result is as follows:
the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the recognition library, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content identical to the identity content of the first communication terminal is not matched in the identification library, and the second communication terminal rejects the receiving request of the first communication terminal.
Further, the request received by the first communication end further includes an ID, each ID in the identification library corresponds to an ID tag, and the policy for the second communication end to process the request received by the first communication end based on the matching result is:
the matching result is that identity content which is the same as the identity content of the first communication terminal is matched in the recognition library, an ID mark of the identity content which is the same as the identity content of the first communication terminal in the recognition library is consistent with the ID of the first communication terminal, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content identical to the identity content of the first communication terminal is not matched in the identification library or the matching result is that the identity content identical to the identity content of the first communication terminal is matched in the identification library, but the ID mark of the identity content identical to the identity content of the first communication terminal in the identification library is not consistent with the ID of the first communication terminal, and the second communication terminal rejects the receiving request of the first communication terminal.
Further, the identification library is stored in a storage unit contained in the cloud platform or the second communication terminal;
the identification base is stored in the cloud platform, the second communication terminal obtains the identity content of the first communication terminal from the identity identification information of the analysis receiving request and sends the identity content to the cloud platform, and the cloud platform matches the identity content of the first communication terminal with the stored identity content.
Further, the method for generating the identification information by the first communication terminal based on the identity content of the receiver is as follows:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting any pixel point on the boundary image as a complex coding starting point to carry out coding again to obtain a complex boundary chain code; packing the identification boundary chain code and the complex coding start point as identity identification information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal is as follows:
and generating a boundary image based on the identified boundary chain code, and recoding the boundary image based on the complex coding starting point to obtain a complex boundary chain code, wherein the digital characters of the complex boundary chain code are also identity content.
Further, the method for generating the identification information by the first communication terminal based on the identity content of the receiver is as follows:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code; using the identification boundary chain code as identity identification information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal comprises the following steps:
generating a boundary image based on the identification boundary chain code, and selecting a complex coding starting point on the boundary image based on a preset strategy to re-code the boundary image to obtain a complex boundary chain code, wherein digital characters of the complex boundary chain code are also identity content;
the preset strategy is a common strategy of the first communication terminal and the second communication terminal and is pre-established in the first communication terminal and the second communication terminal;
the preset strategy can avoid external acquisition, and even if the identification boundary chain code is acquired, the identification information is difficult to recode and acquire.
According to an aspect of the present invention, there is provided a communication recipient identification system, comprising a first communication terminal and a second communication terminal for wireless communication, wherein,
the first communication terminal is used for generating identity recognition information based on the identity content of a receiver and sending a receiving request containing the identity recognition information to the second communication terminal;
the second communication terminal is used for receiving the receiving request of the first communication terminal, analyzing the identity identification information of the receiving request of the first communication terminal to obtain the identity content of the first communication terminal, matching the identity content of the first communication terminal with the identity content in the identification library, and processing the receiving request of the first communication terminal by the second communication terminal based on the matching result.
Further, the first communication terminal includes:
a first storage unit for storing recipient identity content;
an identification information generation unit for generating identification information based on the identity content of the receiver;
the first sending unit is used for sending a receiving request containing the identification information to the second communication terminal;
and the first receiving unit is used for receiving the content sent by the second communication terminal.
Further, the second communication terminal includes:
a second receiving unit for receiving a reception request of the first communication terminal;
the identification information analysis unit is used for analyzing the identification information of the receiving request of the first communication terminal to obtain the identification content of the first communication terminal;
the identity verification unit is used for matching the identity content of the first communication terminal with the identity content in the recognition library to obtain a matching result;
and the request processing unit is used for processing the receiving request of the first communication terminal based on the matching result.
Further, the identification information generation unit of the first communication terminal includes:
a boundary chain code generating unit which generates a recognition boundary chain code based on the digital characters of the identity content;
a first boundary image generating unit for generating a boundary image based on the identified boundary chain code;
the first complex coding unit is used for selecting one pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code; and using the identification boundary chain code as the identification information.
Further, the identification information parsing unit of the second communication terminal includes:
a second boundary image generating unit for generating a boundary image by using the identification boundary chain code of the identification information;
and the second complex coding unit is used for selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code, wherein the complex boundary chain code is the identity content.
The invention has the beneficial effects that:
the invention realizes identity recognition by generating and analyzing identity recognition information and matching identity content in a library, and the identity recognition information generated based on the preset strategy can obtain the identity content only by corresponding analysis, thereby avoiding being tampered and stolen.
Drawings
Fig. 1 is a flowchart of a communication recipient identification method of the present invention;
FIG. 2 is a field structure diagram of the time frequency parameter of the present invention;
fig. 3 is a block diagram of a first communication terminal of the communication recipient identification system of the present invention;
fig. 4 is a block diagram of a second communication terminal of the identification system of a communication receiver according to the present invention;
fig. 5 is a block diagram of an identification information generating unit of a first communication terminal of the communication recipient identification system of the present invention;
fig. 6 is a block diagram of an identification information analysis unit of the second communication terminal of the communication recipient identification system according to the present invention.
In the figure: an element ID field 102, a length field 104, a plurality of allocation fields 106, an allocation control field 112, a BF control field 114, a source AID field 116, a destination AID field 118, an allocation start field 120, an allocation block duration field 122, a number of blocks field 126, an allocation block period field 128, an allocation ID field 132, an allocation type field 134, a semi-static field 136, a truncatable field 138, an extensible field 140, a first storage unit 210, a first transmission unit 220, a first reception unit 230, an identification information generation unit 240, a second reception unit 310, an identification information parsing unit 320, an identity verification unit 330, a request processing unit 340, a boundary chain code generation unit 241, a first boundary image generation unit 242, a first complex encoding unit 243, a second boundary image generation unit 321, a second complex encoding unit 322.
Detailed Description
The subject matter described herein will now be discussed with reference to example embodiments. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and thereby implement the subject matter described herein, and are not intended to limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. For example, the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. In addition, features described with respect to some examples may also be combined in other examples.
In this embodiment, a method for identifying an identity of a communication recipient is provided, as shown in fig. 1, which is a schematic flow chart of the method for identifying an identity of a communication recipient according to the present invention, and the method for identifying an identity of a communication recipient includes the following steps:
step S100, a first communication terminal generates identity recognition information based on identity content of a receiver, and sends a receiving request containing the identity recognition information to a second communication terminal;
step S200, the second communication terminal receives a receiving request of the first communication terminal;
step S300, the second communication terminal analyzes the identification information of the request received by the first communication terminal to obtain the identification content of the first communication terminal;
step S400, the second communication terminal matches the identity content of the first communication terminal with the identity content in the recognition library, and the second communication terminal processes the receiving request of the first communication terminal based on the matching result;
the strategy for the second communication terminal to process the receiving request of the first communication terminal based on the matching result is as follows:
the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the recognition library, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content which is the same as the identity content of the first communication terminal is not matched in the recognition library, and the second communication terminal rejects the receiving request of the first communication terminal;
based on the processing policy, the present invention further provides a processing policy with higher security, specifically, the receiving request of the first communication end further includes an ID, each identity in the identification library corresponds to an ID tag, and the policy for the second communication end to process the receiving request of the first communication end based on the matching result is as follows:
the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the identification library, the ID mark of the identity content which is the same as the identity content of the first communication terminal in the identification library is consistent with the ID of the first communication terminal, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content which is the same as the identity content of the first communication terminal is not matched in the recognition library or the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the recognition library, but the ID mark of the identity content which is the same as the identity content of the first communication terminal in the recognition library is not consistent with the ID of the first communication terminal, and the second communication terminal rejects the receiving request of the first communication terminal;
the identification library is stored in a storage unit contained in the cloud platform or the second communication terminal;
the identification base is stored in the cloud platform, the second communication terminal obtains the identity content of the first communication terminal from the identity identification information of the analysis receiving request and sends the identity content to the cloud platform, and the cloud platform matches the identity content of the first communication terminal with the stored identity content.
The method for generating the identity recognition information by the identity content in the invention comprises the following steps:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting any pixel point on the boundary image as a complex coding starting point to carry out coding again to obtain a complex boundary chain code; packing the recognition boundary chain code and the complex coding starting point as identity recognition information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal comprises the following steps:
generating a boundary image based on the identified boundary chain code, and recoding the boundary image based on the complex coding start point to obtain a complex boundary chain code, wherein the digital characters of the complex boundary chain code are also identity content;
the method solves the problem of low security caused by directly sending the identity identification information, but the similar encryption mode still has the danger of identity content;
in order to solve the above problem, the present invention further provides a method for generating and decrypting identification information with higher security, comprising:
the method for generating the identity recognition information by the identity content comprises the following steps:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code; using the recognition boundary chain code as identity recognition information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal comprises the following steps:
generating a boundary image based on the identification boundary chain code, and selecting a complex coding starting point on the boundary image based on a preset strategy to re-code the boundary image to obtain a complex boundary chain code, wherein digital characters of the complex boundary chain code are also identity content;
the preset strategy is a common strategy of the first communication terminal and the second communication terminal and is preset in the first communication terminal and the second communication terminal;
the preset strategy can avoid being acquired by the outside, and even if the identification boundary chain code is acquired, the identification information is difficult to be obtained by recoding;
the present invention provides a predetermined strategy: taking the 10 th bit and the 11 th bit of the ID of the first communication end as serial numbers, and taking pixel points corresponding to the serial numbers as complex encoding starting points; specifically, a pixel point corresponding to a serial number generated when a boundary image is generated based on the identification of a boundary chain code is a complex coding starting point;
for example, if the serial number of the recognition boundary chain code of 1234567892334621686246 is 12, a 12 th pixel point is generated corresponding to the 11 th bit of the recognition boundary chain code, and the pixel point is used as the starting point of the complex encoding;
for the direction of the complex code, the backward direction is adopted by default, namely the same direction as the direction when the boundary chain code is identified to generate the boundary image;
for the case of wired communication between the first communication terminal and the second communication terminal, the requirement for identity identification is weak because a stable communication line is provided between the whole-course wired communication; the invention only considers the condition of wireless communication between a first communication terminal and a second communication terminal, and the establishment of the wireless communication also needs to be considered for the wireless communication, so the receiving request also comprises a time-frequency parameter which is a field used for scheduling information related to channel time allocation;
as shown in fig. 2, in this embodiment, the time-frequency parameters in the format of ESE of the traditional WiGig at least include: an element ID field 102, a length field 104, and a plurality of allocation fields 106. The element ID field 102 uniquely identifies the legacy ESE. The length field 104 specifies the number of octets (octets) in the multiple allocation field 106.
The allocation field 106 is a field indicating scheduling information related to channel time allocation (channel time allocation). The allocation field 106 includes an allocation control field 112, a BF (beamforming) control field 114, a source AID (association identifier) field 116, a destination AID field 118, an allocation start field 120, an allocation block duration field 122, a number of blocks field 126, and an allocation block period field 128.
The allocation control field 112 has: an allocation ID field 132, an allocation type field 134, a semi-static field 136, a truncatable field 138, an extensible field 140, and the like.
The allocation type field 134 indicates which of CBAP (contention based Access period) or SP (service period) the channel Access mechanism (Access mechanism) at the time of allocation is.
The source AID field 116 specifies the STA that starts channel access at SP or CBAP allocation. Alternatively, in the case of CBAP allocation, if all STAs are permitted to transmit at the time of CBAP allocation, the source AID field 116 is set to a broadcast AID.
The target AID field 118 specifies STAs that are predicted to communicate with the source STA at the time of allocation. Alternatively, the target AID field 118 is set to the broadcast AID in the case where it is predicted at the time of allocation that all STAs communicate with the source STA. When the value is set to a value other than 0, the assignment ID field 132 discriminates the communication time assignment (airtime assignment) from the source AID to the target AID. The allocation ID field 132 is set to 0 when CBAP allocation using the broadcast source AID and the broadcast target AID is used.
Except for the case of CBAP assignments using broadcast source AIDs and broadcast target AIDs, tuples (source AIDs, target AIDs, assignment IDs) uniquely distinguish assignments;
the semi-static field 136 indicates whether the allocation is semi-static (semi-static). The semi-static allocation is repeated for the same duration in the same time offset in several beacon intervals following the last received ESE containing the semi-static allocation. The truncatable field 138 and the extensible field 140 indicate whether the source STA and the target STA can request truncation of the SP (service period) and extension of the SP, respectively.
The allocation start field 120 indicates a timing (timing) at which the SP or CBAP starts. An allocation block duration field 122 indicates a duration of an allocation block for which allocation of an SP or allocation of a CBAP is performed and which does not exceed a boundary of a beacon interval;
the number of blocks field 126 contains the number of time blocks that constitute the allocation. The allocation block period field 128 contains the time between the beginning of 2 consecutive time blocks belonging to the same allocation. The allocation start field 120, the allocation block duration field 122, the number of blocks field 126, and the allocation block duration field 128 cooperatively specify the location of the allocation in the time domain.
As shown in fig. 3-6, based on the above-mentioned method for identifying a communication recipient, the present invention further provides a system for identifying a communication recipient, comprising a first communication end and a second communication end for wireless communication, wherein,
the first communication terminal is used for generating identity recognition information based on the identity content of a receiver and sending a receiving request containing the identity recognition information to the second communication terminal;
the first communication terminal includes:
a first storage unit 210 for storing recipient identity content;
an identification information generating unit 240 for generating identification information based on the recipient identification content;
a first sending unit 220, configured to send a receiving request containing identification information to the second communication terminal;
a first receiving unit 230, configured to receive the content sent by the second communication terminal;
the second communication end is configured to receive the receiving request of the first communication end, analyze the identification information of the receiving request of the first communication end to obtain the identity content of the first communication end, match the identity content of the first communication end with the identity content in the identification library, and process the receiving request of the first communication end based on a matching result, where the second communication end at least includes:
a second receiving unit 310, configured to receive a receiving request of the first communication terminal;
an identification information parsing unit 320, configured to parse identification information of the request received by the first communication end to obtain an identity content of the first communication end;
the identity verification unit 330 is configured to match the identity content of the first communication terminal with the identity content in the recognition library to obtain a matching result;
a request processing unit 340, configured to process the receiving request of the first communication end based on the matching result.
The first communication end and the second communication end of the wireless communication can realize the identity identification of a safe receiver based on the request verification;
the first communication end and the second communication end are not limited to a certain device, for example, one device may include both the first communication end and the second communication end, the first communication end of the device communicates with the second communication end of another device, or one device only includes the first communication end or the second communication end;
based on the above system, the present invention further provides a more secure system, wherein the identification information generating unit 240 of the first communication terminal includes:
a boundary chain code generating unit 241 that generates a recognition boundary chain code based on the numeric characters of the identity content;
a first boundary image generating unit 242 for generating a boundary image based on the identified boundary chain code;
a first complex encoding unit 243, configured to select a pixel point on the boundary image as a complex encoding starting point based on a predetermined policy to perform encoding again to obtain a complex boundary chain code; using the recognition boundary chain code as identity recognition information;
the identification information parsing unit 320 of the second communication terminal includes:
a second boundary image generating unit 321 for generating a boundary image by using the identification boundary chain code of the identification information;
a second complex encoding unit 322, configured to select a pixel point on the boundary image as a complex encoding starting point based on a predetermined policy to perform encoding again to obtain a complex boundary chain code, where the complex boundary chain code is identity content;
the predetermined strategy is burned in the first and second complex encoding units 243 and 322 of the first and second communication terminals, and the predetermined strategy can be prevented from being read and tampered by a burning method.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present embodiment or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (e.g. a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method of the embodiments.
The embodiments of the present invention have been described with reference to the drawings, but the present invention is not limited to the above-mentioned specific embodiments, which are only illustrative and not restrictive, and those skilled in the art can make many forms without departing from the spirit and scope of the present invention and the protection scope of the claims.

Claims (7)

1. A communication receiver identity identification method is characterized by comprising the following steps:
step S100, a first communication terminal generates identity recognition information based on identity content of a receiver, and sends a receiving request containing the identity recognition information to a second communication terminal;
step S200, the second communication terminal receives a receiving request of the first communication terminal;
step S300, the second communication terminal analyzes the identification information of the request received by the first communication terminal to obtain the identification content of the first communication terminal;
step S400, the second communication terminal matches the identity content of the first communication terminal with the identity content in the recognition library, and the second communication terminal processes the receiving request of the first communication terminal based on the matching result;
the strategy for the second communication terminal to process the receiving request of the first communication terminal based on the matching result is as follows:
the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the recognition library, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content which is the same as the identity content of the first communication terminal is not matched in the recognition library, and the second communication terminal rejects the receiving request of the first communication terminal;
the method for generating the identity recognition information by the first communication terminal based on the identity content of the receiver comprises the following steps:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting any pixel point on the boundary image as a complex coding starting point to carry out coding again to obtain a complex boundary chain code; packing the recognition boundary chain code and the complex coding starting point as identity recognition information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal comprises the following steps:
and generating a boundary image based on the identified boundary chain code, and recoding the boundary image based on the complex coding starting point to obtain a complex boundary chain code, wherein the digital characters of the complex boundary chain code are also identity content.
2. The method according to claim 1, wherein the request received by the first communication terminal further includes an ID, each ID in the identification library corresponds to an ID tag, and the policy for the second communication terminal to process the request received by the first communication terminal based on the matching result is:
the matching result is that the identity content which is the same as the identity content of the first communication terminal is matched in the identification library, the ID mark of the identity content which is the same as the identity content of the first communication terminal in the identification library is consistent with the ID of the first communication terminal, and the second communication terminal sends the corresponding content to the first communication terminal based on the receiving request of the first communication terminal;
the matching result is that the identity content identical to the identity content of the first communication terminal is not matched in the identification library or the matching result is that the identity content identical to the identity content of the first communication terminal is matched in the identification library, but the ID mark of the identity content identical to the identity content of the first communication terminal in the identification library is not consistent with the ID of the first communication terminal, and the second communication terminal rejects the receiving request of the first communication terminal.
3. The method according to claim 1, wherein the recognition library is stored in a storage unit included in a cloud platform or a second communication terminal;
the identification base is stored in the cloud platform, the second communication terminal obtains the identity content of the first communication terminal from the identity identification information of the analysis receiving request and sends the identity content to the cloud platform, and the cloud platform matches the identity content of the first communication terminal with the stored identity content.
4. The method for identifying the identity of the communication receiver according to claim 1, wherein the method for generating the identity information by the first communication terminal based on the identity content of the receiver is as follows:
the identity content is a string of digital characters;
generating an identification boundary chain code based on the digital character, generating a boundary image based on the identification boundary chain code, and selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code; using the recognition boundary chain code as identity recognition information;
the method for the second communication terminal to analyze the identification information of the first communication terminal for receiving the request to obtain the identification content of the first communication terminal comprises the following steps:
generating a boundary image based on the identified boundary chain code, and selecting a complex coding starting point on the boundary image based on a preset strategy to re-code the boundary image to obtain a complex boundary chain code, wherein digital characters of the complex boundary chain code are also identity content;
the predetermined policy is a policy common to the first communication terminal and the second communication terminal, and is pre-established in the first communication terminal and the second communication terminal.
5. A communication receiver identification system is characterized by comprising a first communication end and a second communication end for wireless communication, wherein,
the first communication terminal is used for generating identity recognition information based on the identity content of a receiver and sending a receiving request containing the identity recognition information to the second communication terminal;
the second communication terminal is used for receiving the receiving request of the first communication terminal, analyzing the identity identification information of the receiving request of the first communication terminal to obtain the identity content of the first communication terminal, matching the identity content of the first communication terminal with the identity content in the identification library, and processing the receiving request of the first communication terminal by the second communication terminal based on the matching result;
the first communication terminal includes:
a first storage unit for storing recipient identity content;
an identification information generation unit for generating identification information based on the identity content of the receiver;
the first sending unit is used for sending a receiving request containing the identification information to the second communication terminal;
a first receiving unit, configured to receive content sent by a second communication terminal;
the identification information generation unit of the first communication terminal includes:
a boundary chain code generating unit which generates a recognition boundary chain code based on the digital characters of the identity content;
a first boundary image generating unit for generating a boundary image based on the identified boundary chain code;
the first complex coding unit is used for selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code; and using the identification boundary chain code as the identification information.
6. The system of claim 5, wherein the second communication terminal comprises:
a second receiving unit for receiving a receiving request of the first communication terminal;
the identification information analysis unit is used for analyzing the identification information of the receiving request of the first communication terminal to obtain the identification content of the first communication terminal;
the identity verification unit is used for matching the identity content of the first communication terminal with the identity content in the recognition library to obtain a matching result;
and the request processing unit is used for processing the receiving request of the first communication terminal based on the matching result.
7. The system according to claim 6, wherein the identification information parsing unit of the second communication terminal comprises:
a second boundary image generating unit for generating a boundary image by using the identification boundary chain code of the identification information;
and the second complex coding unit is used for selecting a pixel point on the boundary image as a complex coding starting point based on a preset strategy to carry out coding again to obtain a complex boundary chain code, wherein the complex boundary chain code is the identity content.
CN202211732647.4A 2022-12-30 2022-12-30 Method and system for identifying identity of communication receiver Pending CN115828220A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211732647.4A CN115828220A (en) 2022-12-30 2022-12-30 Method and system for identifying identity of communication receiver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211732647.4A CN115828220A (en) 2022-12-30 2022-12-30 Method and system for identifying identity of communication receiver

Publications (1)

Publication Number Publication Date
CN115828220A true CN115828220A (en) 2023-03-21

Family

ID=85519810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211732647.4A Pending CN115828220A (en) 2022-12-30 2022-12-30 Method and system for identifying identity of communication receiver

Country Status (1)

Country Link
CN (1) CN115828220A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204966A (en) * 2016-03-18 2017-09-26 中国移动通信集团终端有限公司 A kind of communication receiver's personal identification method, communication terminal and system
CN112492050A (en) * 2020-12-16 2021-03-12 赵全 Method and system for data transmission between terminals
KR20210039190A (en) * 2019-10-01 2021-04-09 숭실대학교산학협력단 Method for maintaining private information on blockchain network and device thereof
CN112804446A (en) * 2020-12-30 2021-05-14 江苏达科信息科技有限公司 Big data processing method and device based on cloud platform big data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204966A (en) * 2016-03-18 2017-09-26 中国移动通信集团终端有限公司 A kind of communication receiver's personal identification method, communication terminal and system
KR20210039190A (en) * 2019-10-01 2021-04-09 숭실대학교산학협력단 Method for maintaining private information on blockchain network and device thereof
CN112492050A (en) * 2020-12-16 2021-03-12 赵全 Method and system for data transmission between terminals
CN112804446A (en) * 2020-12-30 2021-05-14 江苏达科信息科技有限公司 Big data processing method and device based on cloud platform big data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
和小娟;罗勇;: "边界链码在字母与数字混合识别中的应用", 郑州大学学报(理学版), no. 03 *

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
CN100576844C (en) Be convenient to the content address visual encoding of transfer of data in digital device
US7672662B2 (en) Method and system for multimedia tags
US20180323995A1 (en) Method and apparatus for controlling access of household appliance device to network
KR101031168B1 (en) Information processing device, and access control processing method
US8428064B2 (en) Wireless communication device, mac address management system, wireless communication method, and program
US7979069B2 (en) Mobile device and base station for a communication protocol with normal login and temporary login
RU2683853C1 (en) Method for improving gprs key, sgsn device, user device, hlr / hss and gprs system
CN104602238B (en) A kind of wireless network connecting method, device and system
CN101305539B (en) Method and system for secure communication
US20060242692A1 (en) Systems and methods for dynamic authentication using physical keys
KR101862739B1 (en) Method, device and system for terminal to establish connection
CN1822540A (en) Authentication vector generation device and method, subscriber identity module, wireless communication system and calculation method
EP1439661A1 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
CN108430092A (en) Obtain, provide method, equipment and the medium of wireless access point access information
EP1804415A1 (en) Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key
CN112867005A (en) Control frame processing and generating method, station, access point and storage medium
EP1582052B1 (en) System and method for distributed authorization and deployment of over the air provisioning for a communications device
CN115828220A (en) Method and system for identifying identity of communication receiver
US10285193B2 (en) Wireless communication system and wireless apparatus
CN114390521A (en) Key updating method, device, equipment and storage medium
CN104754576A (en) Equipment verification method, user equipment and network equipment
JP6576129B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
CN113596742B (en) Data transmission method and device
CN110830421B (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination