Identity authentication method and system by utilizing acoustic communication
A sound wave communication and identity authentication technology, applied in the field of identity authentication information, can solve the problems of complicated operation and long response time, and achieve the effect of wide application scenarios, high security, and ensuring security.
Active Publication Date: 2016-11-09
徐伟达 +2
3 Cites 10 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention provides an identity authentication method by utilizing acoustic communication. The method can be applied to identity authentication control scenarios. The method comprises the steps: (1), a system is initialized, and authentication double parties pre-appoint algorithm seed parameters; (2), an authenticated party sends audio signals including probe information to activate an authentication device; (3), the authentication device plays the audio signal including an unique identification number of the device; (4), the authenticated party generates a disposable key through an authentication algorithm; (5), the authenticated party encodes the disposable key through a real-time audio stream and plays the disposable key; (6), an authentication party receives the real-time audio information and performs decoding and authentication; (7), the authentication party processes an authentication result, encodes the authentication result by utilizing real-time audio, and transmits the authentication result to the authenticated party; and (8), the authenticated party receives the authentication result audio stream played in step (7), and decodes and displays the authentication result. The invention provides a low-cost and high-safety authentication method and system based on the acoustic communication.
Application Domain
Sonic/ultrasonic/infrasonic transmissionUser identity/authority verification
Technology Topic
DecodesAudio signal +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Self-limiting electronic gear shifter
Owner:HANGCHA GRP
Parking braking control device and method
Owner:GREAT WALL MOTOR CO LTD
Large nuclear reactor molten pool natural-convection heat transfer test system and method
Owner:XI AN JIAOTONG UNIV
Method for transmitting and operating application program, system for operating application program, server and terminal
Owner:CHINA MOBILE COMM CO LTD
Classification and recommendation of technical efficacy words
- ensure safety
- improve security
Method for realizing the intelligent tour-inspection of power tower based on miniature multi-rotor unmanned helicopter
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)
High accuracy non-contact tri-dimensional facial type measuring device
Owner:中国人民解放军第二炮兵装备研究院第四研究所
Intelligent charger with output voltage changing function
Owner:SHENZHEN SIECOM COMM TECH DEV CO LTD
Vehicle software updating method and system
Owner:BYD CO LTD