CN107977562A - Personal identification method, identification terminal and storage medium - Google Patents

Personal identification method, identification terminal and storage medium Download PDF

Info

Publication number
CN107977562A
CN107977562A CN201711255871.8A CN201711255871A CN107977562A CN 107977562 A CN107977562 A CN 107977562A CN 201711255871 A CN201711255871 A CN 201711255871A CN 107977562 A CN107977562 A CN 107977562A
Authority
CN
China
Prior art keywords
coding
identification
key
audio files
frequency range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711255871.8A
Other languages
Chinese (zh)
Other versions
CN107977562B (en
Inventor
郭佳良
孙丽
白金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711255871.8A priority Critical patent/CN107977562B/en
Publication of CN107977562A publication Critical patent/CN107977562A/en
Application granted granted Critical
Publication of CN107977562B publication Critical patent/CN107977562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of personal identification method, the described method includes:Receive and send the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective audio files, user identifier and coding watch key are obtained according to effective audio files;Presetting database is inquired about, obtains the corresponding coding rule of the user identifier, newest coding schedule is obtained with coding rule according to the coding watch key;According to the key message frequency range in the newest coding schedule decoding effectively audio files, identity information is obtained.The invention also discloses a kind of identification terminal and storage medium.User, which need to only use, in the present invention sends terminal transmission ultrasonic signal, you can identification operation is completed, it is easy to operate, and it is simple and practicable, it is favourable to promote.

Description

Personal identification method, identification terminal and storage medium
Technical field
The present invention relates to identity identification technical field, more particularly to a kind of personal identification method, identification terminal and storage to be situated between Matter.
Background technology
With the development of communication network technology, intelligentized identity recognizing technology is urgently further perfect.Existing identity Identification technology application field is extensive, such as gate inhibition's technology, financial payment technical field, web services technologies field.To pay Exemplified by technical field, existing pay is usually that Quick Response Code payment or user are manually entered payment information, and Request Payment side Network service is kept, user's operation is cumbersome, and it is not convenient enough to pay, wherein, it is many to operate actually to realize identification, So user needs to carry out troublesome operation when the troublesome operation of user when paying has reacted identification, this needs user to pay Regular hour cost, and when user's identification terminal does not have network, can not just carry out identification.
Thus, existing personal identification method there are user's operation it is cumbersome, there are networking requirements to ask user's identification terminal Topic.
The content of the invention
It is a primary object of the present invention to provide a kind of personal identification method, it is intended to which the user of solution is carrying out identification When, user's identification terminal needs online and cumbersome user's operation technical problem.
To achieve the above object, the present invention provides a kind of personal identification method, and the personal identification method includes:
Receive and send the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective audio files, User identifier and coding watch key are obtained according to effective audio files;
Presetting database is inquired about, obtains the corresponding coding rule of the user identifier, according to the coding watch key with compiling The code newest coding schedule of Rule;
According to the key message frequency range in the newest coding schedule decoding effectively audio files, identity information is obtained.
Alternatively, described the step of obtaining user identifier and coding watch key according to effective audio files, includes:
The user identifier frequency range and key frequency range in the effectively audio files are obtained, decoding the user identifies frequency range, with Obtain user identifier;
Regular coding table is obtained according to the user identifier, the key frequency range is decoded according to the regular coding table, is obtained Encode watch key.
Alternatively, the key message frequency range in the newest coding schedule decoding effectively audio files, is obtained The step of obtaining identity information includes:
The frequency peak of the key message frequency range in the effectively audio files is obtained, is determined according to the newest coding schedule The corresponding character information of the frequency peak, which is identity information.
Alternatively, the key message frequency range in the newest coding schedule decoding effectively audio files, is obtained The step of obtaining identity information includes:
According to the key message frequency range in the newest coding schedule decoding effectively audio files, primary identity letter is obtained Breath;
Determine whether the key message frequency range in the effectively audio files has according to the user identifier and carry out system volume Code;
If the key message frequency range has carry out scale coding, the corresponding system number of the user identifier is obtained;
The primary identity information is decoded according to the system number, obtains identity information.
Alternatively, the inquiry presetting database includes:
Inquire about the correspondence mapping table of the mark and coding rule in server database.
Alternatively, described receive sends the acoustic signals that terminal is sent, and identify the acoustic signals corresponding has to generate The step of imitating audio files includes:
Receive and send the acoustic signals that terminal is sent, when detecting the origin identification in the acoustic signals, start recording Effective acoustic signals from the origin identification;
The effectively acoustic signals are identified to generate corresponding effective audio files.
Alternatively, the personal identification method further includes:
If identification fails, the prompting message of output identification failure.
Alternatively, described the step of obtaining newest coding schedule with coding rule according to the coding watch key, includes:
The coding watch key is substituted into coding rule function as input parameter, obtains the output knot of coding rule function Fruit;
The output result is newest coding schedule.
To achieve the above object, the present invention also provides a kind of identification terminal, the identification terminal to include:Memory, processing Device and the identification program that can be run on the memory and on the processor is stored in, the identification program quilt The step as described in above-mentioned personal identification method is realized when the processor performs.
In addition, to achieve the above object, the present invention also provides a kind of storage medium, identity is stored with the storage medium Recognizer, realizes the step as described in above-mentioned personal identification method when the identification program is executed by processor.
The user identifier and coding watch key in effective audio files of ultrasound modalities are obtained in the present embodiment, further according to The user identifies the coding rule for obtaining and generating newest coding schedule, and decoding identity is obtained according to the coding rule and coding watch key The newest coding schedule of the key messages such as information, is finally based on newest coding schedule decoding key message, obtains identity information, by using Family identifies and encodes the multiple encodings such as watch key, coding rule, can strengthen the security and accuracy of identification, and ultrasonic wave Strong antijamming capability, can facilitate user to carry out identification in various occasions, in addition, coding rule can be locally stored by sending terminal Then, and encoded, broadcasting/transmission ultrasonic signal, identification can be achieved without networking, expand the embodiment of the present invention The scope of application of scheme, and user need to only use and send terminal transmission ultrasonic signal, you can identification operation is completed, without Various data are inputted, Quick Response Code etc. is directed at without with camera, it is easy to operate, it is simple and practicable, it is favourable to promote.
Brief description of the drawings
Fig. 1 is the identification terminal structure diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the schematic diagram of a scenario of the identification system in the embodiment of the present invention;
Fig. 3 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of personal identification method first embodiment of the present invention;
Fig. 5 is identification failure one schematic diagram of interface shown in personal identification method identification terminal of the present invention;
Fig. 6 is the identification failure another schematic diagram in interface shown in personal identification method identification terminal of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention. In follow-up description, using the suffix of such as " module ", " component " or " unit " for representing element only for being conducive to The explanation of the present invention, itself does not have specific meaning.Therefore, " module ", " component " or " unit " can be used mixedly.
As shown in Figure 1, the identification terminal structural representation for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to Figure.
Identification terminal can be implemented in a variety of manners.For example, identification terminal described in the present invention can be included such as Mobile phone, tablet computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable media player (Portable Media Player, PMP), guider, wearable device are (such as band networking The AR/VR equipment of function), Intelligent bracelet, pedometer, intelligent sound box, the mobile identification terminal such as autonomous driving vehicle, and such as Digital TV, desktop computer, internet of things equipment (the intelligent family of such as intelligent air condition with network savvy, intelligent electric lamp, intelligent power Occupy) etc. fixed identification terminal.Identification terminal can also be the identification terminal that server capability is realized for other identification terminals.
It will be illustrated in subsequent descriptions exemplified by moving identification terminal, it will be appreciated by those skilled in the art that except It is used in particular for outside the element of mobile purpose, construction according to the embodiment of the present invention can also apply to the knowledge of fixed type Other terminal.
Referring to Fig. 1, it is realizes a kind of hardware architecture diagram of mobile identification terminal of each embodiment of the present invention, The movement identification terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio are defeated Go out unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, connect The components such as mouth unit 108, memory 109, processor 110 and power supply 111.The mobile identification terminal can be that cloud moves Identification terminal.Identified it will be understood by those skilled in the art that the mobile identification terminal structure shown in Fig. 1 is not formed to mobile The restriction of terminal, mobile identification terminal can be included than illustrating more or fewer components, either combine some components or not Same component arrangement.
The all parts of mobile identification terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, by the data sending of uplink to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by wireless communication with network and other equipment.Above-mentioned wireless communication can use any communication Standard or agreement, include but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile identification terminal can help user to receive by WiFi module 102 Send e-mails, browse webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although figure 1 shows WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile identification terminal, completely can be with Omitted as needed in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, note in mobile identification terminal 100 Record pattern, speech recognition mode, broadcast reception mode receive radio frequency unit 101 or WiFi module 102 when under isotype Or it is sound that the voice data stored in memory 109, which is converted into audio signal and exports,.Moreover, audio output unit 103 can also provide the relevant audio output of specific function performed with mobile identification terminal 100 (for example, call signal receives Sound, message sink sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input units 104 are used to receive audio or video signal.A/V input units 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile identification terminal 100 further includes at least one sensor 105, for example, optical sensor, motion sensor and its His sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can basis The light and shade of ambient light adjusts the brightness of display panel 1061, and proximity sensor can be moved to ear in mobile identification terminal 100 Bian Shi, closes display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect each side The size of (generally three axis) acceleration upwards, can detect that size and the direction of gravity when static, available for identification mobile phone appearance The application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of state, Vibration identification correlation function (such as pedometer, Tap) etc.;The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, The other sensors such as barometer, hygrometer, thermometer, infrared ray sensor, details are not described herein.
Display unit 106 is used for the information for showing by information input by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce and mobile identification terminal User setting and function control it is related key signals input.Specifically, user input unit 107 may include contact panel 1071 and other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect user on it or neighbouring touch Touch operation (such as user using any suitable object or annex such as finger, stylus on contact panel 1071 or in touch surface Operation near plate 1071), and corresponding attachment device is driven according to formula set in advance.Contact panel 1071 may include to touch Touch two parts of detection device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch The signal brought is operated, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, And contact coordinate is converted into, then processor 110 is given, and the order that processor 110 is sent can be received and performed.This Outside, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be used to realize contact panel 1071.Except touching Panel 1071 is controlled, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 It can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operation One or more in bar etc., do not limit specifically herein.
Further, contact panel 1071 can cover display panel 1061, when contact panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the component independent as two to realize the function that outputs and inputs of mobile identification terminal, but in some embodiments In, contact panel 1071 and display panel 1061 is integrated and the mobile identification terminal of realization it can output and input function, tool Body does not limit herein.
Interface unit 108 is used as at least one external device (ED) and is connected the interface that can pass through with mobile identification terminal 100.Example Such as, external device (ED) can include wired or wireless head-band earphone port, external power supply (or battery charger) port, You Xianhuo Wireless data communications port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and by the input received be transferred to one or more elements in mobile identification terminal 100 or It can be used for transmitting data between mobile identification terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile identification terminal, is identified using various interfaces and connection are entirely mobile The various pieces of terminal, by running or performing the software program and/or module that are stored in memory 109, and call and deposit The data in memory 109 are stored up, the various functions and processing data of mobile identification terminal are performed, so as to mobile identification terminal Carry out integral monitoring.Processor 110 may include one or more processing units;Preferably, processor 110 can be integrated using processing Device and modem processor, wherein, application processor mainly handles operating system, user interface and application program etc., modulation Demodulation processor mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processing In device 110.
In mobile identification terminal, processor 110 is used to perform the identification program stored in memory 109, realizes Following steps:
Receive and send the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective audio files, User identifier and coding watch key are obtained according to effective audio files;
Presetting database is inquired about, obtains the corresponding coding rule of the user identifier, according to the coding watch key with compiling The code newest coding schedule of Rule;
According to the key message frequency range in the newest coding schedule decoding effectively audio files, identity information is obtained.
Described the step of obtaining user identifier and coding watch key according to effective audio files, includes:
The user identifier frequency range and key frequency range in the effectively audio files are obtained, decoding the user identifies frequency range, with Obtain user identifier;
Regular coding table is obtained according to the user identifier, the key frequency range is decoded according to the regular coding table, is obtained Encode watch key.
The key message frequency range in the newest coding schedule decoding effectively audio files, obtains identity letter The step of breath, includes:
The frequency peak of the key message frequency range in the effectively audio files is obtained, is determined according to the newest coding schedule The corresponding character information of the frequency peak, which is identity information.
The key message frequency range in the newest coding schedule decoding effectively audio files, obtains identity letter The step of breath, includes:
According to the key message frequency range in the newest coding schedule decoding effectively audio files, primary identity letter is obtained Breath;
Determine whether the key message frequency range in the effectively audio files has according to the user identifier and carry out system volume Code;
If the key message frequency range has carry out scale coding, the corresponding system number of the user identifier is obtained;
The primary identity information is decoded according to the system number, obtains identity information.
The inquiry presetting database includes:
Inquire about the correspondence mapping table of the mark and coding rule in server database.
Described receive sends the acoustic signals that terminal is sent, and identifies the acoustic signals to generate corresponding effectively source of sound text The step of part, includes:
Receive and send the acoustic signals that terminal is sent, when detecting the origin identification in the acoustic signals, start recording Effective acoustic signals from the origin identification;
The effectively acoustic signals are identified to generate corresponding effective audio files.
The personal identification method further includes:
If identification fails, the prompting message of output identification failure.
Described the step of obtaining newest coding schedule with coding rule according to the coding watch key, includes:
The coding watch key is substituted into coding rule function as input parameter, obtains the output knot of coding rule function Fruit;
The output result is newest coding schedule.
Identification terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, identification terminal 100 can also be including bluetooth module etc., and details are not described herein.
In one embodiment, identification terminal may include central processing module and acoustic signals receiving/recording module, institute It can be equipment independent mutually to state central processing module and acoustic signals receiving/recording module, as shown in Fig. 2, because described Central processing module reception server function, is known as server by the central processing module, by acoustic signals receiving/recording mould Block is known as receiving terminal.
Wherein, the receiving terminal detection sends the ultrasonic signal that terminal is sent, and identifies the acoustic signals to generate Corresponding effective audio files, and the effectively audio files are sent to the terminal device as server.
The transmission terminal can be implemented in a variety of manners.For example, transmission terminal described in the present invention can include Such as mobile phone, tablet computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), wearable device (the AR/VR equipment such as with network savvy), Intelligent bracelet, autonomous driving vehicle know Other terminal, and desktop computer etc. fix identification terminal.Transmission terminal shown in Fig. 2 is by taking smart mobile phone as an example, ability Field technique personnel will be appreciated that except smart mobile phone the transmission terminal in the embodiment of the present invention can also be with other identifications eventually End form is implemented.
For the ease of understanding the embodiment of the present invention, the identification terminal to the present invention and transmission terminal are based on logical below Communication network system is described.
Referring to Fig. 3, Fig. 3 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite includes UE (User Equipment, the use for communicating connection successively for the LTE system of universal mobile communications technology, the LTE system Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned identification terminal 100 and send terminal, identification terminal, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, belong to identification terminal) 20 32, other MME2033, SGW (Serving Gate Way, gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling between EPC203, there is provided carrying and connection management.HSS20 32 carrys out pipe for providing some registers The function of such as attaching position register (not shown) etc is managed, and preserves some in relation to service features, data rate Deng the dedicated information of user.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP address distribution and other functions, PCRF2036 be the strategy and charging control strategy of business data flow and IP bearing resources Decision point, it selects and provide available strategy with charge execution function unit (not shown) for strategy and charging control is determined Plan.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned identification terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
With reference to Fig. 4, in personal identification method first embodiment of the present invention, the personal identification method includes:
Step S10, receives and sends the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective sound Source file, user identifier and coding watch key are obtained according to effective audio files;
Acoustic signals refer to the signal of sound wave form or form of sound, are sent by transmission terminal, and being received by identification terminal should It is that can further carry out effective audio files of information processing by acoustic signals processing after acoustic signals.The acoustic signals For ultrasonic wave, because ultrasonic wave can not be heard by human ear, when the ultrasonic wave audio files play, human ear can't hear any sound, Whole identification procedure is silent.User may like to know that identification when start or whether normally into OK, thus to identification set condition prompting to be conducive to be lifted the usage experience of user, carried for example, being set in identification terminal Show, when detecting the ultrasonic wave audio files of broadcasting, make a sound prompting (such as " ticking " sound) or display reminding message is (such as " identifying ... "), after the completion of identification, also viva voce, display or other forms prompting, if identification A kind of prompting (such as " recognition failures " printed words of screen display red) is unsuccessfully made, if identification success is then done another kind and carried Show (such as " identifying successfully " printed words of screen display green).It can also be prompted sending terminal, commencing play out ultrasonic wave Audio files are played to effective sound source part timesharing, make a sound, and terminate just to stop until playing.Identification terminal or transmission Condition prompting form (auditory tone cues, display reminding etc.) or the condition prompting rule of terminal (export if identification success " identifying successfully " printed words, or " ticking " sound) etc. related set of condition prompting can be that system default is set, or use Family is set according to oneself demand, hobby.
Acoustic signals are loaded with identity information, and identification terminal can detect/receive ultrasonic wave sound source signal in real time, but know Other terminal it is not absolutely required to carry out identification in real time, and there are the interference of other non-ultrasonic waves for identification, because And if detection/reception in real time, can there are the problem of the wasting of resources, if but there is the demand for carrying out identification in real time, example Such as, currently there are many people to be lined up and carry out identification, then detected without closing, identification terminal can be set to be detected in real time, Identification terminal has been saved on the contrary in detection with not detecting the handoff procedure under two states, thus has been needed according to concrete application scene Detection frequency or detection time are configured.
Identification terminal can also artificially open detection/reception, user need carry out identification when, be then turned on identification eventually End, can save operation resource.Can also be after certain condition be met by identification terminal voluntarily open detection, for example, identifying Terminal backstage issues detection instruction when arriving identification terminal, by identification terminal voluntarily open detection;There is thing on inductor is sensed When body is close, start detection (replacing blocking by identification terminal under the scene such as swipe the card).Detection time of the present embodiment to identification terminal Do not limit.
Effective audio files refer to identification is risen practical function, comprising decoded information, identity information, check information etc. Audio files, can be sound waveform simulation drawing, or frequency of sound wave.The ultrasonic wave that identification terminal is detected or obtained The effective information of practical function is not merely played to identification comprising decoding, identity information and check information etc., further includes it He disappears without practical significance or the frequency range unrelated with identification to reduce operation when identification terminal decodes acoustic signals Consumption, identification terminal first screen ultrasonic wave that is detecting or receiving, filter out effective audio files therein Afterwards, which is sent to identification terminal.Screening can be the frequency data for filtering out a certain frequency range, such as The frequency data collection of 2kHz-5kHz is combined into effective audio files.
The information included in effective audio files has:User identifier and coding watch key and identity information, check information Deng key message, above- mentioned information can be encoded into ultrasonic filtered audio signal with set form and permanent order.
User in the present embodiment refers to the object of identification of the present invention.Identification terminal is receiving effective audio files Afterwards, user identifier and coding watch key can be obtained according to effective audio files.Wherein, user identifier refers to user and is obtained ahead of time , the mark of characterization the user's identity, coding watch key refers to and is exclusively used in a string of characters for obtaining newest coding schedule, described most newly organized Code table refers in this identification, decodes the coding schedule of the key message such as identity information, check information in effective audio files.Example Such as, newest coding schedule A is produced by function f, will be encoded watch key c input function f, is obtained newest coding schedule A=f (c).
Because effective audio files each several part information determines, so identification terminal obtains user identifier and coding watch key, can To first pass through definite user identifier and coding the watch key position in effective audio files, then decoding acquisition is carried out to it.
The acquisition of user identifier and coding watch key, is provided to decode identity information in effective audio files, verification letter The key messages such as breath, that is, be provided to obtain the newest coding schedule for decoding the key message.User identifier and identity information are not Together, the identity that user identifier is stated for effective audio files (i.e. state by the ultrasound information:I is XXX), identification terminal need not Determine the statement true and false, need to only be identified according to the user and obtain newest coding schedule, effective source of sound is decoded further according to newest coding schedule Unanimously whether the identity information in file, the identity information for decoding acquisition is contrasted with user identifier, see, if decoding The identity information arrived is consistent with user identifier, then can determine that the user identity currently identified decodes the user identity obtained, instead It, then identification fails.
Step S20, inquires about presetting database, the corresponding coding rule of the user identifier is obtained, according to the coding schedule Key obtains newest coding schedule with coding rule;
Coding rule in the present embodiment, refer in particular in effective audio files except user identifier and coding watch key in addition to, The key messages such as identity information, check information (hereinafter referred key message) are converted to the coding rule of audio, according to the coding Rule can obtain newest coding schedule, and it is each that identification terminal is based on key message frequency range in the effective audio files of newest coding schedule acquisition The implication that frequency refers to, i.e. identification terminal decodes the key message part in effective audio files, hair based on the newest coding schedule End group of making arrangements for his funeral encodes key message in the newest coding schedule.
After obtaining user identifier, inquiry identification terminal can be identified according to the user, is obtained corresponding with the user identifier Coding rule.User will first be registered before identification in the identification terminal of identification system, typing itself letter Breath, identification terminal distribute a coding rule for belonging to the user for it.So after user identifier is determined, you can according to this User identifier inquires about presetting database, obtains the specific coding rule of user identifier.
Different user has different coding rules, this is in order to ensure the security of identification, if because institute is useful There is identical coding rule at family, once then someone records effective audio files, so that it may according to general coding rule Effective audio files are decoded, in other words can be according to coding rule personation.User identifier is corresponding with coding rule to close System can be mapping table, and storage is in the database.
Coding rule, that is, character is converted into the correspondence of ultrasonic frequency, can be diversified forms, can directly with most Newly organized code table overlaps or synthesizes the mode of newest coding schedule.
In one embodiment, coding rule can be a function (being called coding rule function).Then step S20 Middle the step for obtaining newest coding schedule with coding rule according to the coding watch key, can include:
Step S21, substitutes into coding rule function as input parameter using the coding watch key, obtains coding rule function Output result;
Step S22, the output result is newest coding schedule.
Input parameter of the watch key as coding rule function will be encoded, a newest coding is exported based on coding watch key Table.For example, newest coding schedule A is produced by function f, watch key c input function f will be encoded, obtain newest coding schedule A=f (c). The character string that coding watch key is generated at random by transmission terminal, the character string generated at random are joined as the input of coding rule function The output result that number finally obtains is also random, because send terminal all regenerates volume at random in identification each time Code table key, so, the coding watch key in identification each time is all random, is largely known with last identity In not, the coding watch key in pervious identification is all different in other words, it is caused the result is that:Because input parameter (encoding watch key) is different, the output result of coding rule function be also it is different, i.e., newest coding schedule be it is different, so It can ensure in identification each time, key message is different from the conversion of audio.
For example, in n-th identification, the newest coding schedule in part is as follows:
Raw information Respective frequencies
2 1kHz
3 2kHz
4 3kHz
5 4kHz
Then in (n+1) secondary identification, newest coding schedule may be as follows:
Raw information Respective frequencies
2 3kHz
3 2kHz
4 6kHz
5 5kHz
Coding rule function is substituted into by regarding the coding generated at random watch key as input parameter, generates the knowledge of this identity Other newest coding schedule so that can time time more with reference to the newest coding schedule of table as key message audio coding correspondence Change, and replace at random, though someone replicates user for the ultrasonic signal of identification with personation identity, and It is otiose, it greatly ensure that the accuracy of identification and prevent pretending to be mechanism.
In another embodiment, sending the mode that terminal is encoded according to coding rule function can be:By key In each character input coding rule function in information, you can export the corresponding ultrasonic frequency of each character, finally It can determine that the ultrasonic frequency form of key message.In another embodiment, sending terminal can be according to coding rule letter Number obtains newest coding schedule, and the corresponding ultrasonic frequency form of key message, identification terminal are determined further according to the newest coding schedule The decoding of corresponded manner is carried out according to coding rule.
Newest coding schedule refers in this identification, for decoding the coding schedule of key message, in other words by key message The correspondence of audio-frequency information is encoded into reference to table.To ensure the security of identification, for decoding the coding of key message Table is different in identifications different each time.
Presetting database, can be identification terminal local data base, or cloud database, can be server count According to storehouse.The correspondence of user identifier and coding rule is stored with the presetting database, can be by user identifier with compiling The correspondence of code rule, obtains the corresponding coding rule of the user identifier, to determine final newest coding schedule.
If by the storage of the correspondence mapping table of user identifier and coding rule in the server, it can reduce to identification terminal The software and hardware requirement of memory, and then the hardware cost of identification terminal is reduced, be conducive to the popularization of identification terminal.
Step S30, according to the key message frequency range in the newest coding schedule decoding effectively audio files, obtains body Part information.
The key message portion in key message frequency range in the newest coding schedule decoding effectively audio files Point, the identity information in key message can be obtained.
In decoding, the frequency peak of the key message frequency range in the effectively audio files can be obtained first, according to institute State newest coding schedule and determine the corresponding character information of the frequency peak, which is identity information.
Peak value therein can be obtained by audiograph or ultrasonic frequency peak value is determined by ultrasonic frequency peak function, Here identity information need to be only obtained, so key message frequency range part in effective audio files need to be only decoded, according to described newest Coding schedule determines the corresponding character information of the frequency peak, which is identity information, and frequency peak is relatively easy to obtain , either send terminal be audio signal by key message transcoding, or identification terminal reception key message is identified The interference of other frequencies compared with simple realization, can be all excluded, the identity information of acquisition is more accurate.
Further, the step S30 includes:
Step S31, according to the key message frequency range in the newest coding schedule decoding effectively audio files, obtains just Level identity information;
Step S32, according to the user identifier determine the key message frequency range effectively in audio files whether have into Row scale coding;
Step S33, if the key message frequency range has carry out scale coding, obtains the corresponding system of the user identifier Number;
Step S34, decodes the primary identity information according to the system number, obtains identity information.
Coding rule can be the set of multiple encoding rule, i.e. key message can pass through multiple encoding.Specifically, exist In present embodiment, key message can be first passed around to system conversion, then audio will be converted by the key message of system conversion Frequently.System conversion refers to reduces data volume by key message through excessive scale coding, such as by binary number or the decimal system Number transcoding is hexadecimal number or duotricemary notation number, such as 18 identification card numbers 432503199801017734, can be turned The 16 system number 6008f5e645c0580 of 15 are turned to, the 32 system number c04fbpi5o1c0 of 12 can be converted into.According to needing to pass The information content size passed, can be set key message to be transcoded into the transcoding mode of transmission code by identification terminal or program developer, Such as key message data volume is larger, which can be converted into duotricemary notation, the information content of the equal scale of construction corresponds to Transmission number of codes reduce, transferable information increases, is more advantageous to accurately identifying identity;If transmission numeral, can be first by numeral Hexadecimal number is transcoded into, if transmission letter, a letter can change into two hexadecimal characters.
Different user may carry out scale coding, it is also possible to without scale coding, can inquire about data according to user identifier Storehouse, sees and identifies corresponding system number with the presence or absence of the user, if in the presence of illustrating that the key message frequency range has and carry out system volume Code, directly obtains the user and identifies corresponding system number, according in the newest coding schedule decoding effectively audio files Key message frequency range after, the transformed identity information of system can be obtained, i.e., the primary identity information in present embodiment, also needs Further decoding, i.e., further decode primary identity information according to the system number, obtains complete, initial identity information.
Wherein, different user can correspond to different systems, and identification terminal can determine the tool of scale coding according to user identifier Body system number.
Can obtain first according to the key message frequency range in the newest coding schedule decoding effectively audio files The frequency peak of key message frequency range in the effectively audio files, these frequency peaks exist as information carrier, according to The newest coding schedule determines the corresponding character information of the frequency peak, the corresponding character information, that is, identity information.
In the present embodiment, to double by scale coding and audio coding (character is converted into audio by coding rule) The key message of recodification carries out double decoding:Audio decoder is first carried out, i.e., by the key message frequency range solution in ultrasonic signal Code is changed into character information, then by the character information by system, is reduced into original identity, and system conversion can increase ultrasonic wave The total amount of data of transmission, increases the content of its transmission, and because different user is identified with different system numbers, further increases The confidentiality of identity information.
For ease of understanding, a specific example is provided, in this embodiment, shows identification terminal, identification terminal (with identification Exemplified by equipment) and send terminal (by taking user mobile phone as an example) three perform operation.
User identifier, coding watch key and crucial letter are included in effective audio files in a string of ultrasonic wave audio files Breath.Corresponding, the user identifier, encoding watch key and key message has respective encoding and decoding mode:For encoding The coding schedule B of user identifier, for the regular coding Table X of fgs encoder watch key C, the coding rule for encoded key information F, newest coding schedule f.
Wherein, the coding schedule A of user identifier immobilizes with regular coding Table X, and newest coding schedule f is according to coding watch key The change of C and change, coding schedule here is frequency-numeral correspondence.
Identification terminal distributes a unique frequency-numeral correspondence generating function F to each user and (obtains crucial The coding rule of information), which is stored on user mobile phone and identification terminal.String number (coding schedule is inputted to function F Key C), which will export a kind of frequency-numeral correspondence, and (newest coding schedule f, shows as:F (C)=f).
User mobile phone can generate string number at random in identification, that is, watch key C be encoded, by coding watch key C Function F is inputed to, obtains newest coding schedule f, key message is encoded into audio by user mobile phone according to the newest coding schedule f, is used Family mobile phone sends a series of sound:Part I is the handshake of 1kHz, and Part II corresponds to ultrasonic wave for user identifier, the Three parts are the corresponding ultrasonic waves of coding watch key C encoded according to regular coding Table X, and Part IV is according to newest coding schedule The corresponding ultrasonic waves of key message such as the User ID of f codings.
Identification equipment receives ultrasonic signal, effective audio file is passed to identification terminal, identification terminal is first Obtain and user identifier is obtained according to coding schedule B, its corresponding regular coding Table X and the volume of key message are obtained according to user identifier Code rule function F, is decoded by regular coding Table X and obtains coding watch key C, by coding watch key C input functions F, obtained Obtain newest coding schedule f (i.e. F (C)=f).
The user identifier and coding watch key in effective audio files of ultrasound modalities are obtained in the present embodiment, further according to The user identifies the coding rule for obtaining and generating newest coding schedule, and decoding identity is obtained according to the coding rule and coding watch key The newest coding schedule of the key messages such as information, is finally based on newest coding schedule decoding key message, obtains identity information, by using Family identifies and encodes the multiple encodings such as watch key, coding rule, can strengthen the security and accuracy of identification, and ultrasonic wave Strong antijamming capability, can facilitate user to carry out identification in various occasions, in addition, coding rule can be locally stored by sending terminal Then, and encoded, broadcasting/transmission ultrasonic signal, identification can be achieved without networking, expand the embodiment of the present invention The scope of application of scheme, and user need to only use and send terminal transmission ultrasonic signal, you can identification operation is completed, without Various data are inputted, Quick Response Code etc. is directed at without with camera, it is easy to operate, it is simple and practicable, it is favourable to promote.
Further, in personal identification method second embodiment of the present invention, according to effective source of sound described in step S10 The step for file acquisition user identifier and coding watch key, includes:
Step S11, obtains user identifier frequency range and key frequency range in the effectively audio files, decoding the user's mark Frequency range, to obtain user identifier;
User identifier frequency range and key frequency range in effective audio files be probably positioned at specific location frequency range either How frequency range with frequency-specific feature, specifically determine that user identifier frequency range and key frequency range can be by the bodies in identification terminal Part recognition rule determines.In one embodiment, user identifier is in the head position (i.e. forefront) of effective audio files, key Spoon frequency range follows user identifier, user identifier and the character that coding watch key is regular length closely, and identification terminal is directly according to pre- If user identifier and the coding watch key length and position in sound wave, determine to represent user identifier with encoding the frequency of watch key Section.In another embodiment, user identifier and the frequency range of coding watch key have fixed frequecy characteristic, for example, user Frequency range of the frequency range for the regular length of certain specific frequency beginning is identified, which is 1kHz, i.e., user identifier frequency range is to be somebody's turn to do The frequency range of regular length after the frequency of 1kHz.
Obtain in effective audio files after user identifier frequency range and key frequency range, it is necessary to be decoded to it.Decoding is used The decoding rule of family mark frequency range should be the general decoding rule of all users, because identification terminal is obtaining user identifier frequency Section and before parsing the user that the frequency range refers specifically to generation, in this case it is not apparent that the effectively audio files are sent by which user, such as The decoding rule of fruit user identifier frequency range is non-universal, but different user has different decoding rules, then identification terminal never may be used Can decoding.Decoding rule can be fixed decoding table, and identification terminal can decode user identifier frequency range according to the decoding table.
User identifier may be string number, thus the decoding table of user identifier frequency range can be one and contain 32 The table of character ([0-9, a-v]), each character map to frequency meter.Such as 0=2kHz, 1=3kHz, 2=4kHz etc..Decoding table It is two aspects of a things with coding schedule, is encoded user identifier according to coding schedule, it is possible to decoded according to the coding schedule.
When by identification information needed coding transmission, because ultrasonic wave transmission information content is limited, it will first can transmit Identity information carry out scale coding to reduce data volume, i.e., identification information needed is carried out to the coding of high system, such as By binary number, either decimal number transcoding is hexadecimal number or duotricemary notation number.Contained much information according to what need to be transmitted It is small, it can be set by identification terminal or program developer and be transcoded into the transcoding mode of transmission code by information need to be transmitted, such as need to pass Defeated identity information data amount is larger, which can be converted into duotricemary notation, and the information content of the equal scale of construction corresponds to Transmission code reduce, the total amount of data finally transmitted can increase;If transmission numeral, first can be transcoded into hexadecimal number by numeral, If transmission letter, a letter can change into two hexadecimal characters.
Further by taking transmitting cell-phone number as an example:Because cell-phone number is all with 1 beginning, then 1 can not pass, cell-phone number one As with 13,15,18 beginning, so being first mapped as 1,2,33,5,8, then do hexadecimal transcoding again, pass through before transmission turn Code, cell-phone number can be reduced to 9 or 8 by finally optimizing.
Based on various purposes, identification information needed can repeatedly be encoded, above-mentioned scale coding can be first Secondary coding, then be converted into second of coding of audio.Coding schedule may include coding for the first time and encode for second front and rear Correspondence, the coding schedule identification terminal and transmission terminal know, send terminal and are based on the Code table, identification terminal base Decoded in the coding schedule.
Step S12, regular coding table is obtained according to the user identifier, and the key frequency is decoded according to the regular coding table Section, obtains coding watch key.
The above-mentioned part of the present embodiment can be used for decoding user identifier frequency range to obtain user identifier, obtain user identifier Afterwards, you can inquiry presetting database is identified according to the user, the user is obtained and identifies corresponding regular coding table.
Regular coding table is used to decode key frequency range, can be the general regular coding table of all users or not There is different regular coding tables with user.If all users have general regular coding table, identification terminal is obtaining the use After family identifies frequency range and key frequency range, you can while decode and obtain user identifier and decoding key, corresponded to compared to different user Different regular coding tables, identification terminal is using general regular coding table without in addition storing user and pair of regular coding table It should be related to, need not more perform search operation, identification terminal memory source and operation resource can be saved;If different user has different Regular coding table, then for identification terminal after user identifier is determined, inquiry the user identifies corresponding regular coding table, further according to looking into The regular coding table arrived decodes the key frequency range, because the broadcast characteristic of ultrasonic wave, information is transmitted using ultrasonic wave in user When carrying out identification, there may be other people that the ultrasonic wave of the user's broadcast is recorded, to pretend to be the user, if identity is known Each user has general regular coding table when other, then other people can obtain general regular coding table, decodes the effective source of sound text recorded Part can obtain user identifier and coding watch key, only need to obtain coding rule again, it is possible to obtain newest coding schedule, Jin Ershi Now pretend to be purpose, and use the different regular coding table of each user, then other people obtain effective audio files, obtain user identifier Afterwards, also need to obtain the regular coding table that the user identifies uniqueness, also need to obtain the unique coding rule of the user's mark, increase Other people falsely use the difficulty and cost of identity, thus can improve security.
The regular coding table particular content is consistent with above concerning decoding user identifier frequency range part, does not repeat.
Coding watch key refers to a string of characters for obtaining newest coding schedule.
The present embodiment is by decoding user identifier frequency range and key frequency range in the effectively audio files, to obtain user Mark and coding watch key so that next code is regular and the acquisition of newest coding schedule operation is smoothed out;Meanwhile pass through elder generation User identifier is obtained, is identified further according to the user and determines corresponding regular coding table, decoding key frequency range obtains coding watch key, The corresponding different regular coding tables of different user mark, can further enhance the security and accuracy of identification.
Further, received in personal identification method 3rd embodiment of the present invention, described in step S10 and send terminal hair The acoustic signals sent, identify that the step of acoustic signals are to generate corresponding effective audio files includes:
Step S13, receives and sends the acoustic signals that terminal is sent, when detecting the origin identification in the acoustic signals, Effective acoustic signals of the start recording from the origin identification;
Step S14, identifies the effectively acoustic signals to generate corresponding effective audio files.
Effective acoustic signals are the end signal for containing identification required information, identify effective acoustic signals Afterwards, you can obtain effective audio files.The origin identification of origin identification, that is, effective acoustic signals in acoustic signals, can be solid The sound wave of some fixed frequency either fixes the sound wave of a string of frequency values, the sound wave of some frequency is fixed when identification terminal detects When either fixing the sound wave of a string of frequency values, the effective acoustic signals of start recording.For example, set sound of the origin identification as 1kHz Ripple, when identification terminal detects the sound wave of 1kHz, the effective acoustic signals of start recording.Usual one complete sound wave includes 20 A character, origin identification can also be arranged on the foremost of sound wave, can such as be arranged on the front two of sound wave, using " hj ", use To notify identification terminal to start to receive effective acoustic signals of identification terminal transmission.
By setting origin identification in ultrasonic wave audio files, to notify the effective sound wave of identification terminal start recording to believe Number so that identification terminal record is all effective acoustic signals, avoids to receive and further sieves caused by non-effective acoustic signals The process of effective acoustic signals is selected, saves operation resource and memory source;Meanwhile by setting origin identification, it can avoid identifying Identification failure caused by terminal omits effective acoustic signals or identification mistake, need to re-recognize, it is ensured that identification terminal exists Do not occur when obtaining effective acoustic signals data omission, it is ensured that the accuracy and success rate of identification, save operation resource and The time cost of user, lifts user experience.
Further, in personal identification method fourth embodiment of the present invention, the personal identification method further includes:
Step S40, if identification fails, the prompting message of output identification failure.
When identification terminal decodes the key message frequency range in effective audio files according to newest coding schedule, if last obtain Identity information when being mess code or status incongruence corresponding with user identifier, it may be determined that this identification fails, exportable body The prompting message of part recognition failures, to remind user identity identification to fail.In one embodiment, identification terminal can analyze body The reason for part recognition failures, failure cause is output to human-computer interaction interface together, if for example, because identification terminal finally decodes The identity information of acquisition is not corresponding with user identifier, then can export identification failure while, also export identity information with User identifier does not correspond to this reason (such as Fig. 5), if causing identification to fail because effective audio files of reception are imperfect, The output of recognition failures prompt message is as shown in Figure 6.Can preventing identification, state is unknown always, and bring inconvenience user influence, User can be reminded to carry out identification again or abandon identification;Failure cause is exported at the same time, then user can be reminded next It is secondary progress identification when evade can cause identification identify the reason for, increase identification success rate next time.
In addition, the embodiment of the present invention also proposes a kind of storage medium, identification program is stored with the storage medium, The identification program realizes following steps when being executed by processor:
Receive and send the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective audio files, User identifier and coding watch key are obtained according to effective audio files;
Presetting database is inquired about, obtains the corresponding coding rule of the user identifier, according to the coding watch key with compiling The code newest coding schedule of Rule;
According to the key message frequency range in the newest coding schedule decoding effectively audio files, identity information is obtained.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those key elements, and And other elements that are not explicitly listed are further included, or further include as this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there are other identical element in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that an identification terminal equipment (can be solid Identification terminal is determined, such as Internet of Things smart machine, including the intelligent family such as intelligent air condition, intelligent electric lamp, intelligent power, intelligent router Occupy;Can also be identification terminal, including smart mobile phone, wearable networking AR/VR devices, intelligent sound box, autonomous driving vehicle Etc. many networked devices) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made, is directly or indirectly used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of personal identification method, it is characterised in that the personal identification method comprises the following steps:
Receive and send the acoustic signals that terminal is sent, identify the acoustic signals to generate corresponding effective audio files, according to Effective audio files obtain user identifier and coding watch key;
Presetting database is inquired about, obtains the corresponding coding rule of the user identifier, is advised according to the coding watch key with coding Then obtain newest coding schedule;
According to the key message frequency range in the newest coding schedule decoding effectively audio files, identity information is obtained.
2. personal identification method as claimed in claim 1, it is characterised in that described to obtain user according to effective audio files The step of mark and coding watch key, includes:
The user identifier frequency range and key frequency range in the effectively audio files are obtained, decoding the user identifies frequency range, to obtain User identifier;
Regular coding table is obtained according to the user identifier, the key frequency range is decoded according to the regular coding table, is encoded Watch key.
3. personal identification method as claimed in claim 1, it is characterised in that described according to the newest coding schedule decoding The step of key message frequency range in effective audio files, acquisition identity information, includes:
The frequency peak of the key message frequency range in the effectively audio files is obtained, according to determining the newest coding schedule The corresponding character information of frequency peak, the character information are identity information.
4. personal identification method as claimed in claim 1, it is characterised in that described according to the newest coding schedule decoding The step of key message frequency range in effective audio files, acquisition identity information, includes:
According to the key message frequency range in the newest coding schedule decoding effectively audio files, primary identity information is obtained;
Determine whether the key message frequency range in the effectively audio files has carry out scale coding according to the user identifier;
If the key message frequency range has carry out scale coding, the corresponding system number of the user identifier is obtained;
The primary identity information is decoded according to the system number, obtains identity information.
5. personal identification method as claimed in claim 1, it is characterised in that the inquiry presetting database includes:
Inquire about the correspondence mapping table of the user identifier and coding rule in server database.
6. personal identification method as claimed in claim 1, it is characterised in that described receive sends the sound wave letter that terminal is sent Number, identify that the step of acoustic signals are to generate corresponding effective audio files includes:
Receive and send the acoustic signals that terminal is sent, when detecting the origin identification in the acoustic signals, start recording certainly should Effective acoustic signals that origin identification rises;
The effectively acoustic signals are identified to generate corresponding effective audio files.
7. personal identification method as claimed in claim 1, it is characterised in that the personal identification method further includes:
If identification fails, the prompting message of output identification failure.
8. the personal identification method as any one of claim 1 to 7, it is characterised in that described according to the coding schedule The step of key obtains newest coding schedule with coding rule includes:
The coding watch key is substituted into coding rule function as input parameter, obtains the output result of coding rule function;
The output result is newest coding schedule.
9. a kind of identification terminal, it is characterised in that the identification terminal includes:Processor, memory and it is stored in the storage It is real when the identification program is performed by the processor on device and the identification program that can run on the processor Now such as the step of personal identification method described in any item of the claim 1 to 8.
10. a kind of storage medium, it is characterised in that identification program, the identification are stored with the storage medium Realized when program is executed by processor such as the step of personal identification method described in any item of the claim 1 to 8.
CN201711255871.8A 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium Active CN107977562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711255871.8A CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711255871.8A CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Publications (2)

Publication Number Publication Date
CN107977562A true CN107977562A (en) 2018-05-01
CN107977562B CN107977562B (en) 2021-11-02

Family

ID=62008993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711255871.8A Active CN107977562B (en) 2017-11-30 2017-11-30 Identity recognition method, recognition terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107977562B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109285003A (en) * 2018-11-23 2019-01-29 深圳市万通顺达科技股份有限公司 Two dimensional code call-out method based on ultrasound, device, payment system
CN109935232A (en) * 2019-02-19 2019-06-25 浙江工业大学 A kind of acoustics identification code and its code recognition method
CN110109676A (en) * 2019-04-30 2019-08-09 努比亚技术有限公司 Compilation Method, terminal and computer readable storage medium
CN110636119A (en) * 2019-09-05 2019-12-31 北京无限光场科技有限公司 Information pushing method and device based on sound wave identification, electronic equipment and medium
CN113032471A (en) * 2021-03-23 2021-06-25 广东电网有限责任公司 Database processing method and device, electronic equipment and medium
CN113337995A (en) * 2021-06-29 2021-09-03 海信(山东)冰箱有限公司 Clothes information identification method for washing machine and washing machine
CN114884584A (en) * 2022-04-28 2022-08-09 上海小度技术有限公司 Data transmission method, related device and computer program product
CN116017412A (en) * 2022-12-27 2023-04-25 苏州融硅新能源科技有限公司 Gateway equipment, method and system for acquiring equipment information

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5983175A (en) * 1995-11-10 1999-11-09 Sony Corporation Audio coding method
CN101345952B (en) * 2008-09-03 2012-04-04 华为终端有限公司 Data storing and reading method, device and system for client identification card
US20140109211A1 (en) * 2011-06-15 2014-04-17 Information Services International-Dentsu, Ltd. Authentication System and Authentication Method
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN103942691A (en) * 2014-04-23 2014-07-23 王恩惠 Method and system for realizing electronic transaction through sound waves
CN104717601A (en) * 2014-08-22 2015-06-17 深圳市智美达科技有限公司 Wireless network login method and system of wireless monitoring device
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof
CN106533575A (en) * 2015-09-14 2017-03-22 上海默比云网络科技有限公司 Audio signal encoding method, multimedia playing system and playing method
CN105303659B (en) * 2015-10-10 2017-11-10 深圳市雨滴科技有限公司 A kind of gate inhibition's personal identification method and device based on ultrasonic wave

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5983175A (en) * 1995-11-10 1999-11-09 Sony Corporation Audio coding method
CN101345952B (en) * 2008-09-03 2012-04-04 华为终端有限公司 Data storing and reading method, device and system for client identification card
US20140109211A1 (en) * 2011-06-15 2014-04-17 Information Services International-Dentsu, Ltd. Authentication System and Authentication Method
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN103905200A (en) * 2014-03-21 2014-07-02 北京中金国信科技有限公司 Identity authentication method and system based on sound wave communications
CN103942691A (en) * 2014-04-23 2014-07-23 王恩惠 Method and system for realizing electronic transaction through sound waves
CN104717601A (en) * 2014-08-22 2015-06-17 深圳市智美达科技有限公司 Wireless network login method and system of wireless monitoring device
CN106533575A (en) * 2015-09-14 2017-03-22 上海默比云网络科技有限公司 Audio signal encoding method, multimedia playing system and playing method
CN105303659B (en) * 2015-10-10 2017-11-10 深圳市雨滴科技有限公司 A kind of gate inhibition's personal identification method and device based on ultrasonic wave
CN106100845A (en) * 2016-06-06 2016-11-09 徐伟达 A kind of identity identifying method utilizing acoustic communication and system thereof

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109285003A (en) * 2018-11-23 2019-01-29 深圳市万通顺达科技股份有限公司 Two dimensional code call-out method based on ultrasound, device, payment system
CN109935232A (en) * 2019-02-19 2019-06-25 浙江工业大学 A kind of acoustics identification code and its code recognition method
CN110109676B (en) * 2019-04-30 2023-10-17 努比亚技术有限公司 Compiling method, terminal and computer readable storage medium
CN110109676A (en) * 2019-04-30 2019-08-09 努比亚技术有限公司 Compilation Method, terminal and computer readable storage medium
CN110636119A (en) * 2019-09-05 2019-12-31 北京无限光场科技有限公司 Information pushing method and device based on sound wave identification, electronic equipment and medium
CN110636119B (en) * 2019-09-05 2022-09-02 北京无限光场科技有限公司 Information pushing method and device based on sound wave identification, electronic equipment and medium
CN113032471A (en) * 2021-03-23 2021-06-25 广东电网有限责任公司 Database processing method and device, electronic equipment and medium
CN113337995A (en) * 2021-06-29 2021-09-03 海信(山东)冰箱有限公司 Clothes information identification method for washing machine and washing machine
CN113337995B (en) * 2021-06-29 2023-11-03 海信冰箱有限公司 Clothes information identification method for washing machine and washing machine
CN114884584A (en) * 2022-04-28 2022-08-09 上海小度技术有限公司 Data transmission method, related device and computer program product
CN114884584B (en) * 2022-04-28 2023-11-03 上海小度技术有限公司 Data transmission method, related device and computer program product
CN116017412A (en) * 2022-12-27 2023-04-25 苏州融硅新能源科技有限公司 Gateway equipment, method and system for acquiring equipment information
CN116017412B (en) * 2022-12-27 2024-04-16 苏州融硅新能源科技有限公司 Gateway equipment, method and system for acquiring equipment information

Also Published As

Publication number Publication date
CN107977562B (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN107977562A (en) Personal identification method, identification terminal and storage medium
CN103702297B (en) Short message enhancement, apparatus and system
CN107105107A (en) Message display method, mobile terminal and computer-readable recording medium
CN107508892A (en) A kind of page access method, server and computer-readable recording medium
CN107147803A (en) A kind of way of recording, terminal device and computer-readable recording medium
CN109379735A (en) ESIM card operating method, mobile terminal and eSIM card apparatus
CN109981651A (en) Data transmission method, device, mobile terminal and readable storage medium storing program for executing
CN107846503A (en) A kind of display methods of application icon, device, terminal and computer-readable recording medium
CN107967056A (en) Control method, terminal and the computer-readable recording medium of flexible screen
CN109584897A (en) Vedio noise reduction method, mobile terminal and computer readable storage medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium
CN107861824A (en) A kind of text handling method, mobile terminal and computer-readable recording medium
CN107635083A (en) The tinkle of bells method to set up, mobile terminal and readable storage medium storing program for executing
CN107423065A (en) Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else
CN109462684A (en) Calling record processing method, terminal and computer readable storage medium
CN104967637B (en) operation processing method, device and terminal
CN108124055A (en) Prompting message control method, flexible screen terminal and computer readable storage medium
CN107729315A (en) Display methods, terminal and the computer-readable storage medium of audio file
CN107577448A (en) A kind of alarm clock alarming method, equipment and computer-readable recording medium
CN106951300A (en) Replacement method, device and the base computer-readable recording medium of preset application
CN107239690A (en) Unlocking screen method and mobile terminal
CN109257739A (en) ESIM card operating method, mobile terminal and eSIM card apparatus
CN109089258A (en) ESIM card operating method, mobile terminal and eSIM card apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant