Identity authentication method and system by utilizing acoustic communication

A sound wave communication and identity authentication technology, applied in the field of identity authentication information, can solve the problems of complicated operation and long response time, and achieve the effect of wide application scenarios, high security, and ensuring security.

Active Publication Date: 2016-11-09
徐伟达 +2
3 Cites 10 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, these methods also have problems such ...
View more


The invention provides an identity authentication method by utilizing acoustic communication. The method can be applied to identity authentication control scenarios. The method comprises the steps: (1), a system is initialized, and authentication double parties pre-appoint algorithm seed parameters; (2), an authenticated party sends audio signals including probe information to activate an authentication device; (3), the authentication device plays the audio signal including an unique identification number of the device; (4), the authenticated party generates a disposable key through an authentication algorithm; (5), the authenticated party encodes the disposable key through a real-time audio stream and plays the disposable key; (6), an authentication party receives the real-time audio information and performs decoding and authentication; (7), the authentication party processes an authentication result, encodes the authentication result by utilizing real-time audio, and transmits the authentication result to the authenticated party; and (8), the authenticated party receives the authentication result audio stream played in step (7), and decodes and displays the authentication result. The invention provides a low-cost and high-safety authentication method and system based on the acoustic communication.

Application Domain

Sonic/ultrasonic/infrasonic transmissionUser identity/authority verification

Technology Topic

DecodesAudio signal +5


  • Identity authentication method and system by utilizing acoustic communication
  • Identity authentication method and system by utilizing acoustic communication
  • Identity authentication method and system by utilizing acoustic communication


  • Experimental program(1)

Example Embodiment

[0059] Such as figure 1 As shown, the present invention provides an identity authentication method based on sonic two-way communication, which is composed of three parts: authentication parties (including but not limited to mobile phones and sonic access control devices), and authority management background.
[0060] reference figure 1 , The entire authentication process involves the authenticating party and the authenticated party. The authenticated party can be a pre-installed application on a smartphone; the authenticating party can be a smartphone authentication application or a customized authentication device containing various modules ( See figure 2 ).
[0061] In the following specific implementation scenarios, it is assumed that the authenticated party is the owner of a handheld smart phone; the authenticating party is an access controller that supports acoustic communication authentication. The specific implementation method is detailed as follows:
[0062] Firstly, the complete system of both parties is initialized and the initial parameters of the authentication algorithm are set.
[0063] The system is initialized so that the application program pre-installed in the smart phone and the codec program and the authentication program burned in the authentication device processor are consistent.
[0064] The time parameters in the initial parameters: the mobile phone uses the real-time time synchronization module to synchronize time through the Internet; the access controller uses the offline time synchronization module to ensure the time synchronization with the mobile phone.
[0065] The algorithm key contained in the authority information is initialized, and the mobile phone APP obtains the authority list of the device authorized by the user and the seed key corresponding to each authority from the authentication background through the network.
[0066] The authentication operation can be manually triggered when the user holds the mobile phone device within 0.1m~2m near the access control device. The manually triggered action can be triggered by clicking a specific button in the program, or by shaking the phone.
[0067] After receiving the trigger instruction, the mobile phone program plays the encoded probe signal audio stream through the mobile phone speaker to activate the access control device.
[0068] Further, the frequency band of the encoded audio stream is 16kHz-22kHz.
[0069] The access control terminal is always in the monitoring state. When it receives the probe signal, it immediately plays the audio signal containing the unique identification code of the device.
[0070] Such as image 3 As shown, after the mobile phone correctly receives the unique identification number of the authentication device, it searches whether the local data permission list contains the permission authorization of the access control device and the corresponding TOPT shared key.
[0071] Further, the local authority list is obtained from the remote authority management system server through network download. The authority relationship between users and devices can be managed and modified through the authority management server.
[0072] If the permission list includes the permission of the access control device, the one-time authentication key can be generated according to the TOTP algorithm in combination with the shared key and the current time.
[0073] The mobile terminal encodes the one-time key through a real-time audio stream.
[0074] The mobile APP encodes the generated one-time key for audio real-time streaming and performs audio loop playback.
[0075] The access control device is always in the monitoring state, receiving and verifying the encoded audio stream containing the one-time key played on the mobile phone, and then decoding the correctly received audio, and the one-time key transmitted to the access control device by the mobile APP after decoding .
[0076] The access control device uses the TOTP shared key parameter stored locally in the access control device, combined with the time output by the time synchronization module, and uses the TOTP algorithm to generate a TOTP one-time key, and compare the key with the key sent by the mobile phone after decoding , If the comparison results are consistent, the control door lock is opened and the authentication is successful. If the comparison results are inconsistent, there is no door lock action and authentication fails.
[0077] The access control device encodes and plays the authentication result in real-time audio stream.
[0078] The mobile APP correctly accepts the authentication result audio stream played by the access control device, decodes it, and displays the authentication result on the display device.
[0079] The mobile APP logs the authentication results, and uploads the system central server for record if there is a network.
[0080] The authentication scenario has many application scenarios in real life, such as attendance, sign-in, etc., which are not limited to the preferred embodiment of the access control scenario in the present invention.
[0081] The foregoing descriptions are only preferred embodiments of the present invention and are not intended to limit the present invention. All equal changes, modifications, and improvements made according to the scope of the patent application of the present invention should fall within the protection scope of the present invention.


no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Self-limiting electronic gear shifter

ActiveCN101922547Aensure safetyIncreased front space and operator comfort

Parking braking control device and method

InactiveCN103496360Aprevent movementensure safety

Classification and recommendation of technical efficacy words

  • ensure safety
  • improve security

High accuracy non-contact tri-dimensional facial type measuring device

InactiveCN101105389Aensure safetylow cost

Intelligent charger with output voltage changing function


Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products