CN106850671A - The identity identifying method and its system of a kind of utilization acoustic communication - Google Patents

The identity identifying method and its system of a kind of utilization acoustic communication Download PDF

Info

Publication number
CN106850671A
CN106850671A CN201710126870.7A CN201710126870A CN106850671A CN 106850671 A CN106850671 A CN 106850671A CN 201710126870 A CN201710126870 A CN 201710126870A CN 106850671 A CN106850671 A CN 106850671A
Authority
CN
China
Prior art keywords
time
module
certification
audio
certified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710126870.7A
Other languages
Chinese (zh)
Inventor
徐伟达
李伟铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Poly Kun Networking Technology Co Ltd
Original Assignee
Nanjing Poly Kun Networking Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Poly Kun Networking Technology Co Ltd filed Critical Nanjing Poly Kun Networking Technology Co Ltd
Priority to CN201710126870.7A priority Critical patent/CN106850671A/en
Publication of CN106850671A publication Critical patent/CN106850671A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/02Non-electrical signal transmission systems, e.g. optical systems using infrasonic, sonic or ultrasonic waves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention proposes a kind of sound wave authentication method to make up the deficiencies in the prior art, the technology uses the coding of high frequency sound wave, make full use of the transmittability of high frequency sound wave, in audio stream of the equipment end real-time coding/decoding comprising one time key coding information, in the case where additional communication device need not be installed, the direct transmission of data is realized between authenticating device, certification end is quick and precisely safely completed and is certified the two-way authentication at end.

Description

The identity identifying method and its system of a kind of utilization acoustic communication
Technical field
The present invention relates to a kind of low cost based on acoustic communication, highly reliable authentication information method and system.
Background technology
Authentication techniques conventional at present include traditional Password Input, IC/ID cards are swiped the card or biological characteristic (such as fingerprint, Recognition of face) etc..But these technologies to there is cipher change cost big, hair fastener flow is tediously long or authenticating device is expensive etc. asks Topic.At the same time, with the further popularization of smart mobile phone, mobile communication certification is just being used in more and more existing to be recognized In card system, main mode contains the modes such as Quick Response Code, bluetooth, NFC and WIFI.But it is numerous that these modes there is also operation It is trivial, the problems such as the response time is long.In this context, this patent proposes that a kind of communication using high frequency sound wave realizes mobile phone and equipment room Certification.Be different from existing audio coding control method carries out the lower security of audio coding using to fixing ID or fixed key Property strategy, this programme is using dynamic one time key scheme, even if be replicated can not be by certification, so as to ensure for audio content The security of certification.Further, since the program is without additional hardware equipment, mobile phone just can be carried out using only microphone and microphone Communication.Therefore, it is potential rapid deployment and to promote.
The content of the invention
The present invention proposes a kind of sound wave authentication method to make up the deficiencies in the prior art, and the technology uses the volume of high frequency sound wave Code, makes full use of the transmittability of high frequency sound wave, in sound of the equipment end real-time coding/decoding comprising one time key coding information Frequency flows, and in the case where that need not install additional communication device, the direct transmission of data is realized between authenticating device, quick and precisely It is safely completed certification end and is certified the two-way authentication at end.
In order to meet transmission requirement, the present invention solves its technical problem by the following technical programs.The technical scheme is main Comprising two parts:First, the identity identifying method based on acoustic communication;2nd, authentication of the realization based on acoustic communication is System design.With reference to Fig. 1, one kind utilizes acoustic communication identity authentication method, it is characterised in that methods described is based on acoustic communication The identity identifying method of checking equipment, comprises the following steps:
Step 10, system initialization, certification both sides agreement identifying algorithm initial parameter;
Step 20, the side of being certified send detecting probe information activating and authenticating equipment;
Step 30, authenticating device play the audio signal comprising its equipment unique identifying number;
Step 40, the side of being certified generate one time key by identifying algorithm;
Step 50, the side of being certified are encoded one time key by real-time audio stream;
Step 60, certification end receive real-time audio information, carry out solution code authentication;
Step 70, certification end are processed authentication result.Real-time audio is encoded, is passed to and is certified end;
Step 80, the side of being certified receive the authentication result audio stream of step 7 broadcasting, are decoded and shown authentication result.
Further, the step 10 is comprised the following steps:
Step 11. authenticating party authentication initialization algorithm parameter, the identifying algorithm parameter information comprises at least following information: The shared key and accurate universal time of authenticating party unique identifying number and correspondence authenticating party unique identifying number.
Step 12. side of being certified authentication initialization algorithm parameter, the identifying algorithm parameter information is comprised at least to be believed Breath:The side of being certified has permission the list of certification successful authenticating party unique identifying number, the corresponding shared key list of unique identifying number And accurate universal time.
Further, the step 20 is comprised the following steps:
Step 21, the side of being certified are reached near certification method, apparatus, and in the spherical scope of a diameter of 0.1m~2m, triggering is recognized Card operation;
Step 22, be certified method, apparatus send audio probe signals activating and authenticating method, apparatus.
Further, the side of being certified described in step 21 holds mobile terminal device, smart mobile phone or panel computer and is recognized Card operation;Certification method, apparatus described in step 21 are mobile terminal device, smart mobile phone, panel computer or embedded device.
Further, certification method, apparatus are constantly in audio select state described in step 21.
Further, the step 30 is comprised the following steps:
After step 31. authenticating device receives probe signals, the equipment unique mark coded audio of broadcast playback oneself;
Further, stop after one section of set time of equipment unique mark coded audio of step 31 broadcast playback oneself Only play, energy-conservation can be reached and the purpose of interference is reduced.
Further, the step 40 is comprised the following steps:
Step 41. is certified unique sign number that method, apparatus have correctly received authenticating device, retrieves whether this equipment has this The shared key of authenticating device.If inquiry is present, into step 42, otherwise authentification failure.
Step 42. uses TOTP algorithms (Time-Based One-Time Password Algorithm) and step 10 The parameter and shared key of initialization, generate disposable certification key.TOTP algorithms are existing ripe identifying algorithm, reference can be made to RFC (Request For Comments) document RFC 6238.
The acoustic communication checking equipment includes:Sound wave input module;Sound wave output module;Time synchronized module;Sound wave Encoding and decoding;Identifying algorithm processor module.
Further, the sound wave input module, for by the microphone in equipment or other sound collection equipments, adopting Sound near collection equipment in limited range;
Further, the sound wave output module, for by the loudspeaker in equipment or other audio playing devices, Broadcast encoder or uncoded audio stream information;
Further, the time synchronized module, realizes the time synchronized between multiple equipment, it is ensured that identifying algorithm can Normal accurate work.Time synchronized module is divided into Network Synchronization and offline synchronization both of which;
Further, the time network is synchronous and offline synchronization pattern is:
Network time synchronization module can be by internet, by time synchronized server real-time synchronization UTC (Universal Time Coordinated) carrys out the Coordinated Universal Time(UTC).
Offtime synchronization module carries out offline time timing using real-time clock module, it is ensured that be consistent with UTC.
Further, the sound wave coding/decoding module is to include acoustic coded module harmony wave decoder module, and sound wave is compiled Code module can be encoded into audio stream text message;Sound wave decoder module will can be taken in the audio stream with coding information The information of band is decoded into text message;
Further, the identifying algorithm processor module is to be carried out generating OTP keys and verified close using OTP algorithm The processing module of key.
The advantage of the invention is that:
(1) information transmission is carried out by high frequency sound wave, the existing equipment of user terminal adds branch by module without transformation or newly Hold such communication modes.
(2) high frequency sound wave bidirectional communication protocol is defined, the duplex communication of authenticating party and the side of being certified is realized.
(3) audio stream authentication information is the one time key of real-time coding, even if audio stream information is replicated, cannot also be entered The multiple certification of row, it is ensured that the security of certification.
(4) TOTP verification modes are carried using acoustic communication, safe, application scenarios are wide.
(5) communication distance can play the adjustable communication distance that decibel realizes 0.1m~2m by adjusting audio.
Brief description of the drawings
Fig. 1 is detailed process block diagram of the invention
Fig. 2 is function module design figure of the invention
Fig. 3 is authentication mechanism design drawing of the invention
Specific embodiment
As shown in figure 1, the invention provides a kind of identity identifying method based on sound wave two-way communication, by three part groups Into:Certification both sides (including be singly not limited only to, mobile phone terminal and sound wave access control equipment), and rights management backstage.
With reference to Fig. 1, whole identifying procedure is related to authenticating party and the side of being certified, and the side of being certified can be pre-installed on smart mobile phone Application program;Authenticating party can be both the authentication application program of smart mobile phone, or recognize comprising the customized of each generic module Card equipment (referring to Fig. 2).
Implement scene, sets the owner that the side of being certified is hand-held intelligent mobile phone in detail below;Authenticating party leads to for support sound wave Believe the access controller of certification.Details are as follows for specific implementation method:
Certification both sides holonomic system initialization first, completes the setting of identifying algorithm initial parameter.
The system initialization is the volume solution of burning in the application program and authenticating device processor of prepackage in smart mobile phone Coded program and authentication procedure are consistent.
Time parameter in initial parameter:Mobile phone carries out time synchronized by internet using real-time time synchronization module; Access controller takes Offtime synchronization module mode, it is ensured that the time synchronized with mobile phone.
The algorithm secret key that initialization authority information is included, mobile phone A PP obtains user's quilt by network from certification backstage The permissions list of the equipment of mandate and the corresponding seed key of each authority.
Can be triggered manually when in the range of user's handheld mobile phone equipment arrival access controller equipment nearby 0.1m~2m Authentication operation.The action of triggering manually can be click on the specific button in program, or shake mobile phone triggering.
Handset program after triggering command is received, by mobile phone speaker play encoded probe signals audio stream with Activation access control equipment.
Further, the frequency range of the audio stream of coding is 17kHz~22kHz.
Gate inhibition end is constantly in listening state, after it receives probe signals, plays uniquely marked comprising its equipment immediately Know the audio signal of coding.
As shown in figure 3, after mobile phone has correctly received the unique identifying number of authenticating device, in retrieval local data permissions list Whether the permission grant and corresponding TOPT shared key of the access control equipment is included.
Further, wherein local permissions list is serviced from remote rights management system by way of network is downloaded Device is obtained.Authority relation between user and equipment can be managed and be changed by right management server.
If in permissions list comprising the access control equipment authority, can according to TOTP algorithm combination shared keys and currently Time generates disposable certification key.
Mobile phone terminal is encoded one time key by real-time audio stream.
The one time key of generation is carried out the real-time stream encryption of audio and carries out audio loop play by mobile phone A PP.
Access control equipment is constantly in listening state, receives and verify the coding sound comprising one time key of mobile phone terminal broadcasting Frequency is flowed, and then the audio having correctly received is decoded, and the mobile phone A PP obtained after decoding is transferred to the disposable of access control equipment Key.
The TOTP shared key parameters that access control equipment is locally stored by access control equipment, the output of binding time synchronization module Time, using TOTP algorithms, generate TOTP one time keys, and the key of mobile phone terminal transmission after the key and decoding is compared It is right, if comparison result is consistent, control door-lock opening, certification success.If comparison result is inconsistent, without door lock action, recognize Card failure.
Authentication result is carried out real-time audio stream encryption and played by access control equipment.
Mobile phone terminal receives the authentication result audio stream of access control equipment broadcasting, is decoded and shown authentication result.
After mobile phone A PP correctly receives the authentication result audio stream of step 72 broadcasting, decoded, and on the display device Displaying authentication result.
Mobile phone A PP carries out log recording, and the uploading system central server in the case where there is network to authentication result Put on record.
Certification scene has a many places application scenarios in actual life, such as work attendance, register, be not limited only in the present invention Gate inhibition's scene preferred embodiment.
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the invention, it is all according to the present patent application patent Impartial change, modification and improvement that scope is done etc., all should be within protection scope of the present invention.

Claims (15)

  1. It is 1. a kind of to utilize acoustic communication identity authentication method, it is characterised in that methods described is based on acoustic communication and verifies equipment, Comprise the following steps:
    Step 10, system initialization, certification both sides agreement identifying algorithm initial parameter;
    Step 20, the side of being certified send probe information of acoustic wave activating and authenticating equipment;
    Step 30, authenticating device play the audio signal comprising its equipment unique identifying number;
    Step 40, the side of being certified generate one time key by identifying algorithm and the parameter appointed;
    Step 50, the side of being certified are encoded one time key by real-time audio stream;
    Step 60, certification end receive real-time audio information, carry out solution code authentication;
    Step 70, certification end are processed authentication result.By authentication result real-time audio coding, pass to and be certified end;
    Step 80, the side of being certified receive the authentication result audio stream of step 7 broadcasting, are decoded and shown authentication result.
  2. 2. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 10 Comprise the following steps:
    Step 11. authenticating party authentication initialization algorithm parameter, the identifying algorithm parameter information comprises at least following information:Certification Square unique identifying number, the shared key of correspondence authenticating party unique identifying number and accurate universal time.
    Step 12. side of being certified authentication initialization algorithm parameter, the identifying algorithm parameter information comprises at least following information:Quilt Authenticating party is held, corresponding shared through the unique identifying number list of the authenticating party after purview certification success and the unique identifying number Cipher key list and accurately universal time.
  3. 3. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 20 Comprise the following steps:
    Step 21, the side of being certified are reached near certification method, apparatus, in the spherical scope of a diameter of 0.1m~3m, triggering authentication behaviour Make;
    Step 22, be certified method, apparatus send audio probe signals activating and authenticating method, apparatus.
  4. 4. method according to claim 3, it is characterised in that:The side of being certified described in step 21 hold mobile terminal device, Smart mobile phone or panel computer are authenticated operation;Certification method, apparatus described in step 21 are mobile terminal device, smart mobile phone, put down Plate computer or other embedded devices with microphone and microphone.
  5. 5. method according to claim 3, it is characterised in that:Certification method, apparatus are constantly in audio select described in step 21 State.
  6. 6. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 30 Comprise the following steps:
    After step 31. authenticating device receives probe signals, the coded audio signal comprising oneself equipment unique mark is played.
  7. 7. it is according to claim 6 a kind of using acoustic communication identity authentication method, it is characterised in that the step 31 Stop playing after playing the one section of set time of equipment unique mark coded audio of oneself, energy-conservation can be reached and interference is reduced Purpose.
  8. 8. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 40 Comprise the following steps:
    Step 41. is certified after method, apparatus have correctly received unique sign number of authenticating device, retrieves whether this equipment has this to recognize The shared key of card equipment.If inquiry is present, into step 42, otherwise authentification failure.
    Step 42. is initial using TOTP algorithms (Time-Based One-Time Password Algorithm) and step 10 The parameter and shared key of change, generate disposable certification key.TOTP algorithms are existing ripe identifying algorithm, reference can be made to RFC (Request For Comments) document RFC 6238.
  9. 9. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 50 Comprise the following steps:
    Step 51. is certified the one time key that equipment generates step 42 and carries out the real-time stream encryption of audio and carry out audio circulation Play.
  10. 10. it is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 60 comprise the following steps:
    Step 61. certification method, apparatus are in audio select state, receive the audio that simultaneously checking procedure 51 is played.
    Step 62. certification method, apparatus align 51 audios for really receiving and carry out audio decoder, the side's of the being certified hair obtained after decoding The one time key for sending.
    The parameter that step 63. certification method, apparatus are initialized by step 10, using TOTP algorithms, while it is close to generate disposable certification Key, and the key that the key and step 62 are decoded is compared.
  11. 11. is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 70 comprise the following steps:
    If the comparison result of step 71. step 63 is consistent, certification success.Otherwise authentification failure.
    Authentication result is carried out real-time audio stream encryption by step 72. certification method, apparatus, and plays the audio stream.
  12. 12. is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the step 80 comprise the following steps:
    Step 81. is certified the authentication result audio stream that method, apparatus receive and decoding step 72 is played, while on the display device Displaying authentication result
    Step 82. side of being certified and authenticating party carry out log recording to authentication result, are taken by mobile network's uploading system center Business device is put on record.
  13. 13. is according to claim 1 a kind of using acoustic communication identity authentication method, it is characterised in that the sound wave Authentication equipment includes:Sound wave input module;Sound wave output module;Time synchronized module;Sound wave encoding and decoding;At identifying algorithm Reason device module.
  14. 14. is according to claim 13 a kind of using acoustic communication identity authentication method, it is characterised in that:
    The sound wave input module, for by the microphone in equipment or other sound collection equipments, having near collecting device Sound in the range of limit;
    The sound wave output module, for by the loudspeaker in equipment or other audio playing devices, playing real-time coding Or the audio stream information of precoding;
    The time synchronized module, realizes the time synchronized between multiple equipment, it is ensured that identifying algorithm being capable of normal accurate work. Time synchronized module is divided into Network Synchronization and offline synchronization both of which;
    The sound wave coding/decoding module is to include acoustic coded module harmony wave decoder module, and acoustic coded module can be by text This information is encoded into audio stream;Can be decoded into for the information carried in audio stream with coding information by sound wave decoder module Text message;
    The identifying algorithm processor module is the processing module for using OTP algorithm generate OTP keys and check key.
  15. 15. is according to claim 14 a kind of using acoustic communication identity authentication method, it is characterised in that the time Network Synchronization and offline synchronization pattern are:
    Network time synchronization module can be by internet, by time synchronized server real-time synchronization UTC (Universal Time Coordinated) carry out the Coordinated Universal Time(UTC).
    Offtime synchronization module carries out offline time timing using real-time clock module, it is ensured that be consistent with UTC.
CN201710126870.7A 2017-02-27 2017-02-27 The identity identifying method and its system of a kind of utilization acoustic communication Pending CN106850671A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710126870.7A CN106850671A (en) 2017-02-27 2017-02-27 The identity identifying method and its system of a kind of utilization acoustic communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710126870.7A CN106850671A (en) 2017-02-27 2017-02-27 The identity identifying method and its system of a kind of utilization acoustic communication

Publications (1)

Publication Number Publication Date
CN106850671A true CN106850671A (en) 2017-06-13

Family

ID=59138114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710126870.7A Pending CN106850671A (en) 2017-02-27 2017-02-27 The identity identifying method and its system of a kind of utilization acoustic communication

Country Status (1)

Country Link
CN (1) CN106850671A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107564141A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of ultrasonic wave method for unlocking, first terminal and second terminal
CN109203736A (en) * 2018-09-30 2019-01-15 山东知味行网络科技有限公司 A kind of E-seal and the system and method using E-seal progress identification
CN110545263A (en) * 2019-08-15 2019-12-06 咪咕视讯科技有限公司 Decryption method, encryption method, terminal device, server and readable storage medium
CN112104781A (en) * 2019-06-17 2020-12-18 深圳市同行者科技有限公司 Method and system for carrying out equipment authorization activation through sound waves
CN112672344A (en) * 2019-09-30 2021-04-16 菜鸟智能物流控股有限公司 Data communication method and device between terminals
CN112744180A (en) * 2019-10-29 2021-05-04 现代自动车株式会社 System and method for connected vehicle control

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102820972A (en) * 2012-08-17 2012-12-12 刘欣 Authentication method based on sound wave
CN103297242A (en) * 2013-06-13 2013-09-11 北京车音网科技有限公司 Identity authentication method, device and system and voice server
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN104144058A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Information verification method based on sound wave pairing
CN104159224A (en) * 2014-07-22 2014-11-19 上海众人科技有限公司 Mobile terminal digital certification system and method
CN104301109A (en) * 2014-09-24 2015-01-21 飞天诚信科技股份有限公司 Working method of dynamic voice token
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102820972A (en) * 2012-08-17 2012-12-12 刘欣 Authentication method based on sound wave
CN103297242A (en) * 2013-06-13 2013-09-11 北京车音网科技有限公司 Identity authentication method, device and system and voice server
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN104159224A (en) * 2014-07-22 2014-11-19 上海众人科技有限公司 Mobile terminal digital certification system and method
CN104144058A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Information verification method based on sound wave pairing
CN104301109A (en) * 2014-09-24 2015-01-21 飞天诚信科技股份有限公司 Working method of dynamic voice token
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107564141A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of ultrasonic wave method for unlocking, first terminal and second terminal
CN109203736A (en) * 2018-09-30 2019-01-15 山东知味行网络科技有限公司 A kind of E-seal and the system and method using E-seal progress identification
CN112104781A (en) * 2019-06-17 2020-12-18 深圳市同行者科技有限公司 Method and system for carrying out equipment authorization activation through sound waves
CN110545263A (en) * 2019-08-15 2019-12-06 咪咕视讯科技有限公司 Decryption method, encryption method, terminal device, server and readable storage medium
CN112672344A (en) * 2019-09-30 2021-04-16 菜鸟智能物流控股有限公司 Data communication method and device between terminals
CN112744180A (en) * 2019-10-29 2021-05-04 现代自动车株式会社 System and method for connected vehicle control

Similar Documents

Publication Publication Date Title
CN106100845B (en) Identity authentication method and system using sound wave communication
CN106850671A (en) The identity identifying method and its system of a kind of utilization acoustic communication
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
EP3272101B1 (en) Audiovisual associative authentication method, related system and device
KR101686760B1 (en) Unlocking method of managing permissions and authentication devices, program and recording medium
TWI481774B (en) Method for unlocking door, method for leasing asset and system thereof
CN109493488A (en) Smart card authentication method, smart lock, smart card, system and device
CN105141615A (en) Method and system for opening account remotely, authentication method and system
US20070206838A1 (en) Time synchronous biometric authentication
EP3080743B1 (en) User authentication for mobile devices using behavioral analysis
JP2003051815A (en) Key information issue device, radio operation device and program
KR20050033636A (en) Security system for apparatus in a wireless network
CN106157025A (en) The mobile terminal safety method of payment of identity-based card and system
TW202011273A (en) Electronic Ticket Admission Verification Anti-Counterfeiting System and Method Thereof
KR20160110536A (en) Continuous voice authentication for a mobile device
CN105438900A (en) Mobile phone elevator taking system
CN112750242B (en) Dynamic coded lock unlocking method and system and dynamic coded lock circuit
CN105261100A (en) Entrance guard unlocking method and system
JP2011523726A (en) Method for temporarily personalizing a communication device
CN105279830A (en) Voice frequency access control system based on mobile equipment
CN105279831A (en) Method for controlling locking based on mobile equipment audio coding
KR20180062692A (en) Method, user terminal, door lock device and entry security system for controlling of opening and closing door
KR102054178B1 (en) Method for controlling door-lock and apparatus thereof
CN102945575A (en) Method and system for giving out prompt sound during unlocking
KR100971443B1 (en) Recognition system and method using mobile communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication