CN105938528A - Control system for computer events - Google Patents
Control system for computer events Download PDFInfo
- Publication number
- CN105938528A CN105938528A CN201610217124.4A CN201610217124A CN105938528A CN 105938528 A CN105938528 A CN 105938528A CN 201610217124 A CN201610217124 A CN 201610217124A CN 105938528 A CN105938528 A CN 105938528A
- Authority
- CN
- China
- Prior art keywords
- event
- module
- control system
- events
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004088 simulation Methods 0.000 claims abstract description 20
- 238000012790 confirmation Methods 0.000 claims abstract description 12
- 238000013507 mapping Methods 0.000 claims description 9
- 238000003384 imaging method Methods 0.000 claims description 5
- 210000003462 vein Anatomy 0.000 claims description 4
- 230000026676 system process Effects 0.000 abstract description 2
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 102000001554 Hemoglobins Human genes 0.000 description 1
- 108010054147 Hemoglobins Proteins 0.000 description 1
- 238000010521 absorption reaction Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a control system for computer events. The control system comprises an association relationship establishment, a man-machine operation module, an identity recognition module, an association event acquisition module, an event simulation module, and an event execution and confirmation module. The control system for computer events has following beneficial effects: based on different identity information, permission settings of association events are achieved so that safety of the system is improved and leakage or loss of information is avoided; each event can be simulated before execution so that misoperation of a user can be avoided to the large extent; at the same time, all confirmed association events can be executed by one click so that the frequency at which the system is connected with a database when the computer system processes the association events is reduced and processing efficiency of the association events can be improved; and system resources are released.
Description
Technical field
The present invention relates to computer realm, be specifically related to the control system of a kind of computer events.
Background technology
Existing computer events performs all to be made without authentication, any can carry out all events per capita
Execution, this can cause undoubtedly the stolen of information or reveal, such as when remotely operating, operator
Can open all of file and check by optional point, it is possible to operate event all of in system, system is pacified
Overall coefficient is extremely low, and the execution of current all computer events is directly execution, is the most all irreversible,
Once operational error, will cause the biggest trouble, and meanwhile, all of event is all single execution, is
System needs take a substantial amount of time and resource.
Summary of the invention
For solving the problems referred to above, the invention provides the control system of a kind of computer events, according to different
Identity information is associated the priority assignation of event, substantially increase the safety of system, it is to avoid information
Revealing or stolen, each event the most all can be simulated, and largely avoids the operation of user
Error, simultaneously can perform the correlating event of all confirmations by a key, decrease computer system processor association
With the connection number of times of data base during event, improve the treatment effeciency to correlating event, release system resource.
For achieving the above object, the technical scheme that the present invention takes is:
A kind of control system of computer events, including
Incidence relation sets up module, for being set up the mapping relations of business and event by encrypting module;
Human-machine operation module, asks and is used for vena metacarpea data and the face number of identification for incoming traffic
According to, and the service request of input is sent to correlating event acquisition module, by vena metacarpea data and the people of input
Face data are sent to identification module;
Identification module, for extracting the biological characteristic in received vena metacarpea data and human face data
Data, and carry out with the biological characteristic model in user registry database according to the biological attribute data extracted
Complete authentication after contrast, and the result of authentication is sent to encrypting module and correlating event acquisition mould
Block;
Correlating event acquisition module, is used for the result according to described service request and authentication from institute
The business the stated institute corresponding with the described business obtained in the mapping relations of event in this user right is relevant
Connection event;
Event simulation module, makees for extracting each event from acquired all of correlating event successively
For corresponding event to be performed, then carry out virtual analog operation by event simulation module and show;
Event performs to confirm module, confirms or negative for carrying out the execution of each event to be performed, thus
Obtain the event set to be performed of all confirmations;
Event execution module, all events corresponding in the event set to be performed of all confirmations.
Wherein, the result of described authentication is the decoding password of encrypting module.
Wherein, to be scanned rear imaging by infrared palm vein scanning recognition device defeated for described vena metacarpea data
Entering, human face data is user is produced human face data and lip moves interval time reading aloud specific authentication text
Data.
Wherein, described human-machine operation module includes picture input module, word input module and phonetic entry mould
Block.
Wherein, described voice input module uses mike.
Wherein, before setting up the business mapping relations with event, need first to carry out user's registration, thus generate correspondence
The biological characteristic model of user's enrollment status mark, and described biological characteristic model is saved in user registers number
According in storehouse.
Wherein, described event performs to confirm the confirmation that module carries out event by signal language.
Wherein, it is provided with simulation playback module, simulation F.F. module in described event simulation module, simulates and fall back
Module, browses for carrying out the playback of event simulation, F.F. and falling back.
The method have the advantages that
It is associated the priority assignation of event according to different identity informations, substantially increases the safety of system
Property, it is to avoid the leakage or stolen of information, each event the most all can be simulated, largely
Avoid the operational error of user, the correlating event of all confirmations can be performed by a key simultaneously, decrease meter
With the connection number of times of data base when calculation machine system processes correlating event, improve the effect of the process to correlating event
Rate, releases system resource.
Accompanying drawing explanation
Fig. 1 is the system block diagram of the control system of a kind of computer events of embodiment.
Detailed description of the invention
In order to make objects and advantages of the present invention clearer, below in conjunction with embodiment, the present invention is carried out
Further describe.Should be appreciated that specific embodiment described herein only in order to explain the present invention,
It is not intended to limit the present invention.
As it is shown in figure 1, embodiments provide the control system of a kind of computer events, including
Incidence relation sets up module, for being set up the mapping relations of business and event by encrypting module;
Human-machine operation module, asks and is used for vena metacarpea data and the face number of identification for incoming traffic
According to, and the service request of input is sent to correlating event acquisition module, by vena metacarpea data and the people of input
Face data are sent to identification module;
Identification module, for extracting the biological characteristic in received vena metacarpea data and human face data
Data, and carry out with the biological characteristic model in user registry database according to the biological attribute data extracted
Complete authentication after contrast, and the result of authentication is sent to encrypting module and correlating event acquisition mould
Block;
Correlating event acquisition module, is used for the result according to described service request and authentication from institute
The business the stated institute corresponding with the described business obtained in the mapping relations of event in this user right is relevant
Connection event;
Event simulation module, makees for extracting each event from acquired all of correlating event successively
For corresponding event to be performed, then carry out virtual analog operation by event simulation module and show;
Event performs to confirm module, confirms or negative for carrying out the execution of each event to be performed, thus
Obtain the event set to be performed of all confirmations;
Event execution module, all events corresponding in the event set to be performed of all confirmations.
The result of described authentication is the decoding password of encrypting module.
Described vena metacarpea data are scanned rear imaging by infrared palm vein scanning recognition device and input, face
Data are user is produced human face data and lip moves data interval time reading aloud specific authentication text.
Described human-machine operation module includes picture input module, word input module and voice input module.
Described voice input module uses mike.
Before setting up the business mapping relations with event, need first to carry out user's registration, thus generate corresponding user's note
The biological characteristic model of volume identity, and described biological characteristic model is saved in user registry database
In.
Described event performs to confirm the confirmation that module carries out event by signal language.
It is provided with simulation playback module, simulation F.F. module in described event simulation module, simulates the module that falls back,
Browse for carrying out the playback of event simulation, F.F. and falling back.
Originally the principle being embodied as vena metacarpea authentication module is:
Palm as live life entity a part of time, the hemoglobin in palm vein can by device launch near
Infrared Absorption, gathers imaging;If human body loses one's life or palm is divided out from human body, palm is just
Become non-living body, it is impossible to gathered imaging by device, then cannot be carried out identification, supporting, this computer
Should be connected with vena metacarpea identification device and mike, also according to needs by vena metacarpea identification device by data wire
It is installed on computer with mike.
The above is only the preferred embodiment of the present invention, it is noted that common for the art
For technical staff, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications,
These improvements and modifications also should be regarded as protection scope of the present invention.
Claims (8)
1. the control system of a computer events, it is characterised in that include
Incidence relation sets up module, for being set up the mapping relations of business and event by encrypting module;
Human-machine operation module, asks and is used for vena metacarpea data and the face number of identification for incoming traffic
According to, and the service request of input is sent to correlating event acquisition module, by vena metacarpea data and the people of input
Face data are sent to identification module;
Identification module, for extracting the biological characteristic in received vena metacarpea data and human face data
Data, and carry out with the biological characteristic model in user registry database according to the biological attribute data extracted
Complete authentication after contrast, and the result of authentication is sent to encrypting module and correlating event acquisition mould
Block;
Correlating event acquisition module, is used for the result according to described service request and authentication from institute
The business the stated institute corresponding with the described business obtained in the mapping relations of event in this user right is relevant
Connection event;
Event simulation module, makees for extracting each event from acquired all of correlating event successively
For corresponding event to be performed, then carry out virtual analog operation by event simulation module and show;
Event performs to confirm module, confirms or negative for carrying out the execution of each event to be performed, thus
Obtain the event set to be performed of all confirmations;
Event execution module, all events corresponding in the event set to be performed of all confirmations.
The control system of a kind of computer events the most according to claim 1, it is characterised in that described
The result of authentication is the decoding password of encrypting module.
The control system of a kind of computer events the most according to claim 1, it is characterised in that described
Vena metacarpea data are scanned rear imaging by infrared palm vein scanning recognition device and input, and human face data is for using
Family is produced human face data and lip moves data interval time reading aloud specific authentication text.
The control system of a kind of computer events the most according to claim 1, it is characterised in that described
Human-machine operation module includes picture input module, word input module and voice input module.
The control system of a kind of computer events the most according to claim 4, it is characterised in that described
Voice input module uses mike.
The control system of a kind of computer events the most according to claim 4, it is characterised in that building
Business of setting up one's own business needs first to carry out user's registration before the mapping relations of event, thus generates corresponding user's enrollment status mark
The biological characteristic model known, and described biological characteristic model is saved in user registry database.
The control system of a kind of computer events the most according to claim 1, it is characterised in that institute
Event of stating performs to confirm the confirmation that module carries out event by signal language.
The control system of a kind of computer events the most according to claim 1, it is characterised in that institute
Be provided with simulation playback module in stating event simulation module, simulation F.F. module, simulation fall back module, be used for into
The playback of row event simulation, F.F. and falling back browses.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610217124.4A CN105938528B (en) | 2016-04-03 | 2016-04-03 | A kind of control system of computer events |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610217124.4A CN105938528B (en) | 2016-04-03 | 2016-04-03 | A kind of control system of computer events |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105938528A true CN105938528A (en) | 2016-09-14 |
CN105938528B CN105938528B (en) | 2019-03-12 |
Family
ID=57151976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610217124.4A Expired - Fee Related CN105938528B (en) | 2016-04-03 | 2016-04-03 | A kind of control system of computer events |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105938528B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321935A (en) * | 2019-06-13 | 2019-10-11 | 上海上湖信息技术有限公司 | Business event relationship determines method and device, computer readable storage medium |
CN112329652A (en) * | 2020-11-09 | 2021-02-05 | 长春工业大学 | Sliding type self-adaptive finger vein recognition device and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018341A (en) * | 2007-02-06 | 2007-08-15 | 浙江大学 | Control device and method of audio and video playing status based on the built-in system |
CN102183923A (en) * | 2011-04-26 | 2011-09-14 | 中国工商银行股份有限公司 | Computer related event executing control method and system |
US20120057763A1 (en) * | 2010-09-03 | 2012-03-08 | Shi-Jinn Horng | method for recognizing the identity of user by biometrics of palm vein |
CN102546665A (en) * | 2012-02-28 | 2012-07-04 | 信雅达系统工程股份有限公司 | Bank service data processing method |
CN103457986A (en) * | 2013-02-06 | 2013-12-18 | 江苏钱旺智能系统有限公司 | Method, server and terminal for pushing task event |
CN104598796A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Method and system for identifying identity |
-
2016
- 2016-04-03 CN CN201610217124.4A patent/CN105938528B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018341A (en) * | 2007-02-06 | 2007-08-15 | 浙江大学 | Control device and method of audio and video playing status based on the built-in system |
US20120057763A1 (en) * | 2010-09-03 | 2012-03-08 | Shi-Jinn Horng | method for recognizing the identity of user by biometrics of palm vein |
CN102183923A (en) * | 2011-04-26 | 2011-09-14 | 中国工商银行股份有限公司 | Computer related event executing control method and system |
CN102546665A (en) * | 2012-02-28 | 2012-07-04 | 信雅达系统工程股份有限公司 | Bank service data processing method |
CN103457986A (en) * | 2013-02-06 | 2013-12-18 | 江苏钱旺智能系统有限公司 | Method, server and terminal for pushing task event |
CN104598796A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Method and system for identifying identity |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321935A (en) * | 2019-06-13 | 2019-10-11 | 上海上湖信息技术有限公司 | Business event relationship determines method and device, computer readable storage medium |
CN110321935B (en) * | 2019-06-13 | 2022-03-15 | 上海上湖信息技术有限公司 | Method and device for determining business event relation and computer readable storage medium |
CN112329652A (en) * | 2020-11-09 | 2021-02-05 | 长春工业大学 | Sliding type self-adaptive finger vein recognition device and method |
Also Published As
Publication number | Publication date |
---|---|
CN105938528B (en) | 2019-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109118616A (en) | access control method and access control device | |
CN110178179B (en) | Voice signature for authenticating to electronic device users | |
CN104158664A (en) | Identity authentication method and system | |
CN105447364B (en) | The method, apparatus and system that remote biometric identification logs in | |
CN103310142A (en) | Man-machine fusion security authentication method based on wearable equipment | |
CN106778208A (en) | The access processing method and device of application program | |
CN106209901A (en) | A kind of intelligent computer remote interactive system | |
CN104537290A (en) | Password system and achievement method based on multi-fingerprint identification | |
CN106204855A (en) | A kind of Application on Voiceprint Recognition automobile accessing method | |
CN104243500A (en) | Intelligent login method and system for users | |
Yıldırım et al. | Android based mobile application development for web login authentication using fingerprint recognition feature | |
CN104392723A (en) | Sharing instrument platform management method based on voiceprint recognition technology | |
US20230353563A1 (en) | Systems and methods for passive continuous session authentication | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN105938528A (en) | Control system for computer events | |
US20120330663A1 (en) | Identity authentication system and method | |
CN110222493A (en) | A kind of computer booting authentication system and method | |
CN104346547A (en) | Intelligent identity identification system | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
WO2016124008A1 (en) | Voice control method, apparatus and system | |
CN106156590A (en) | A kind of computer startup processing method and processing system | |
US9836589B1 (en) | Systems and methods for allowing administrative access | |
CN103995996A (en) | Encryption and decryption method and device based on voice and face biometric feature recognition | |
CN103532956A (en) | Biological information-based authentication method in cloud operation system | |
CN109614804B (en) | Bimodal biological characteristic encryption method, device and storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Lu Huimin Inventor after: Song Jingjing Inventor after: Di Tianyi Inventor after: Fu Shuai Inventor before: Lu Huimin Inventor before: Han Xuming Inventor before: Liu Gang Inventor before: Wang Hongzhi |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190312 |
|
CF01 | Termination of patent right due to non-payment of annual fee |