Method and device for identifying user and device identity security based on sound waves

A device identity and sound wave technology, applied in the computer field, can solve problems such as lack, and achieve the effect of safe identification and guaranteed reliability

Active Publication Date: 2021-07-02
SHANGHAI LONGCHEER TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a lack of a general-purpose technology that is simple to establish, has a high level of security, and can provide a secure environment for applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying user and device identity security based on sound waves
  • Method and device for identifying user and device identity security based on sound waves
  • Method and device for identifying user and device identity security based on sound waves

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0031] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0032] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0033] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static rando...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of the present invention is to provide a method and device for identifying user and device identity security based on sound waves. This application collects the input first voice password through the microphone of the source device, and saves it as a key password in the TrustZone security area after processing, which is convenient for follow-up The comparison of the input second voice password accurately identifies whether the identity of the user inputting the second voice password is legal. In addition, the source device matches the second voice password with the key password in the security area of ​​the memory, accurately identifies whether the identity of the user entering the second voice password is legal, and then encodes the voice password, and will include The source device identity information and the sound wave password using the source device's user identity information are sent to the target device, indicating the source device identity and the user's identity using the source device. The target device can use the microphone to receive the sound wave password, demodulate the source device identity information and user identity information, so as to safely identify the user and source device identity.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method for identifying user and device identity security based on sound waves. Background technique [0002] Due to the popularity of smart devices and the era of Internet of Everything (IoT), the protection of personal characteristics (fingerprint, iris, voice) is very important. With the popularization of community culture, more devices related to social identity will be interconnected, and security will be the most critical part. [0003] Device-to-device information exchange is inseparable from the confirmation of identity information, and even the safety of the user who uses the device and the device, as well as the safety of the behavior of using the device is becoming more and more important. When we want to exchange information with another device, we must establish a secure information channel. The prerequisite for establishing a secure information channel is to provide a sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L15/22G10L15/08G10L17/00G06F21/32
Inventor 周丹杜军红汤肖迅
Owner SHANGHAI LONGCHEER TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products