CN106603563A - Information safety realization method and system based on biometric features identification - Google Patents

Information safety realization method and system based on biometric features identification Download PDF

Info

Publication number
CN106603563A
CN106603563A CN201611262952.6A CN201611262952A CN106603563A CN 106603563 A CN106603563 A CN 106603563A CN 201611262952 A CN201611262952 A CN 201611262952A CN 106603563 A CN106603563 A CN 106603563A
Authority
CN
China
Prior art keywords
certification
user
information
account
user profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611262952.6A
Other languages
Chinese (zh)
Inventor
杨培德
高志鹏
申强
姚灿荣
郭小强
尤俊生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201611262952.6A priority Critical patent/CN106603563A/en
Publication of CN106603563A publication Critical patent/CN106603563A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present invention provides an information safety realization method and system based on biometric features identification. The method comprises: collecting user information, performing pre-collection and encryption of the user information to store the user information to the user information in an assigned server for comparison, and completing an authentication registration process; and monitoring and detecting the condition of a limited area in real time, and ensuring that an information safety terminal is specially used by the users passing the authentication. Through adoption of the scheme, the problem is improved that the current information terminal cannot rapidly ensure that the terminal is specially used by the users passing authentication in real time.

Description

Information security method and system based on living things feature recognition
Technical field
The application is related to information security field, especially, is related to the information security implementation method based on living things feature recognition And system.
Background technology
Develop rapidly with informationalized, the powerful information terminal of various functions is widely used in all trades and professions.User By various network information terminals, vivid to know from experience the high speed that the information age brings convenient.But informationization technology give we with While coming various convenient, information system and information terminal safety problem also gradually come out:The leakage event of important information Happen occasionally, the loss for causing can not be estimated so that the security situation faced by various information terminals allows of no optimist.To solve letter The safety problem of breath terminal, various terminals security management system system are arisen at the historic moment.
Biometrics identification technology is the technology for comparing popular and relative maturity in recent years, by automatic identification or confirmation people Physiological feature(Such as fingerprint, palmmprint, iris, face etc.)And behavior characteristicss(Such as sound, paces etc.)To carry out authentication, and The technology has been widely used in various terminals security system, one of major way logged in as terminal remote certification.
Existing information terminal, is the uncertainty for solving user identity, more using the account and password and biology of user Authentication mode of the combination of certification technology of identification as Telnet, but lay particular emphasis on single authentication or multiple authenticating party more Formula, can not easily guarantee user after certification completes to log in real time, and information terminal is made by the user for passing through certification is single-minded With.
The content of the invention
The application provides information security method and system based on living things feature recognition, for solve prior art without Method easily guarantees information terminal by by the single-minded problem for using of user of certification in real time.
Information security implementation method based on living things feature recognition disclosed in the present application, executive agent are information security end End, including:
Collection user profile, the user profile that will be stored after the user profile and pre-acquired encryption in specified server Compare, complete certification login process;Wherein, the user profile includes account and encrypted message, finger print information and/or people Face image information;
Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the single-minded use of user of certification.
Described information security terminal is provided with wide-angle camera;The monitor in real time detects the situation of limited area, it is ensured that Information security terminal by by the single-minded use of user of certification, including:Automatic region detection, gathers according to wide-angle camera Data, monitor in real time detect limited area situation;As target, real-time tracking is positioned face with user:
Other the not clear mobile objects outside the target are such as detected, then starts early warning mechanism;
Such as detect the target and leave limited area, then lock automatically or limit access rights.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment;Pre-acquired user profile and after encrypting storage to specifying In server, including:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived The server specified.
Described information security terminal is provided with wide-angle camera;After pre-acquired user profile encryption, storage is to the clothes specified In business device, including:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated, The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
The collection user profile, the user profile is stored in specified server with pre-acquired and after encrypting User profile is compared, and completes certification login process, including:
Access appointed website, the account and encrypted message of receiving user's input, with the account of the user of server storage and Encrypted message carries out matching certification, and certification is by then completing certification login process;Do not pass through then to need again the letter of receives input Breath is authenticated, and multiple authentification failure locks the account;
The finger print information of collection user, carries out matching certification with the finger print information of the user of server storage, and certification passes through Certification login process is completed then;Not by then needing to resurvey certification, multiple authentification failure locks the account;And/or,
The human face image information of collection user, carries out matching certification with the human face image information of the user of server storage, Certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure locks the account.
Information safety system based on living things feature recognition disclosed in the present application, the system include information security terminal and Server, described information security terminal include:
Authentication module, for gathering user profile, the user profile is stored to the service specified with pre-acquired and after encrypting User profile in device is compared, and completes certification login process;Wherein, the user profile include account and encrypted message, Finger print information and/or human face image information;
Region detection module, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by by certification The single-minded use of user.
Described information security terminal is provided with wide-angle camera;The region detection module includes:
Target positioning unit:For automatic region detection, according to the data of wide-angle camera collection, monitor in real time test limit Determine the situation in region;As target, real-time tracking is positioned face with user:
Prewarning unit, during for other not clear mobile objects outside the target is detected, starts early warning mechanism;
Authority limits unit, for when detecting the target and leaving limited area, locking or limits access rights automatically.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment;After the authentication module pre-acquired user profile encryption The method stored in specified server includes:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived The server specified.
Described information security terminal is provided with wide-angle camera;Deposit after the authentication module pre-acquired user profile encryption The method stored up in specified server includes:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated, The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
The authentication module includes account and encrypted message authentication ' unit, finger print information authentication ' unit and/or facial image Authentification of message unit;Wherein:
Account and encrypted message authentication ' unit, for accessing appointed website, the account and encrypted message of receiving user's input, with clothes The account and encrypted message of the user of business device storage carries out matching certification, and certification is by then completing certification login process;No It is authenticated by the information for then needing again receives input, multiple authentification failure locks the account;
Finger print information authentication ' unit, the finger print information for gathering the finger print information of user, with the user of server storage Matching certification is carried out, certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure Lock the account;And/or,
Human face image information authentication ' unit, for gathering the human face image information of user, with the user's of server storage Human face image information carries out matching certification, and certification is by then completing certification login process;Not by then needing to resurvey certification, Repeatedly authentification failure locks the account.
Compared with prior art, the application has advantages below:
With reference to the account and password of user, fingerprint bio feature, face biological characteristic as authentication mode, using wide-angle camera Collection human face image information can monitor in real time information security terminal limited area while login, it is ensured that information security terminal is by leading to Cross the single-minded use of user that certification completes to log in.First, this programme is with the account and password of user, and/or supports In vivo detection The somatic fingerprint identification of function, facial image are recognized as login mode;Secondly, recognized as login mode using facial image When, it is analyzed according to the video of wide-angle camera Real-time Collection, it is ensured that the complicated back of the body while face recognition accuracy, can be supported The Face datection identification of multi-angle multi-pose, real-time monitoring terminal limited area, it is ensured that only one of which face during login, row under scape Except the probability that common photo is logged in;Finally, user is limited by wide-angle camera real-time monitoring after certification completes to log in Active situation in region, such as finds that foreign object invasion just starts early warning mechanism;As found to lock automatically or restriction if user leaves Access rights, such as closing information safe terminal system.Scheme is efficient, convenient, safety, simple to operate.
Description of the drawings
Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as the restriction to the application.And whole In individual accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is flow chart of the embodiment of the present application based on the information security implementation method of living things feature recognition;
Fig. 2 is flow process of the embodiment of the present application based on the information security implementation method pre-acquired user profile of living things feature recognition Figure;
Fig. 3 is flow chart of the embodiment of the present application based on the information security implementation method certification login process of living things feature recognition;
Fig. 4 is structural representation of the embodiment of the present application based on information security terminal in the information safety system of living things feature recognition Figure.
Specific embodiment
It is understandable to enable the above-mentioned purpose of the application, feature and advantage to become apparent from, it is below in conjunction with the accompanying drawings and concrete real Apply mode to be described in further detail the application.
In the description of the present application, it is to be understood that term " including ", "comprising" and similar terms should be understood that Open term, i.e., " include/including but not limited to ".Term " embodiment " expression " at least one embodiment ".Other The related definition of term is given in will be described below.
With reference to Fig. 1, flow chart of the embodiment of the present application based on the information security implementation method of living things feature recognition is shown, Executive agent is information security terminal.This method for optimizing embodiment is comprised the following steps:
Step S101:Collection user profile, the user profile is stored in specified server with pre-acquired and after encrypting User profile compare, complete certification login process;Wherein, the user profile includes account and encrypted message, fingerprint Information and/or human face image information.
When implementing, including:
First, pre-acquired user profile, wherein, user profile includes account and encrypted message, finger print information and/or facial image Information.The account and encrypted message register software distribution by the user profile that information security terminal is arranged;The fingerprint letter The fingerprint collecting equipment collection arranged by information security terminal is ceased, while obtaining only a series of numbers of fingerprint collecting equipment;Institute State human face image information and face characteristic is monitored by the wide-angle camera that information security terminal is arranged, and generate corresponding face figure As information.
Secondly, the user profile is stored in specified server, wherein, the finger print information, the fingerprint are adopted Only a series of numbers of collection equipment and/or human face image information after the AES encryption that system pre-sets storage to specifying Server.
Finally, user passes through account in information security terminal and encrypted message, finger print information and/or human face image information are complete Into certification login process.
By above-mentioned steps, server preserves the finger print information and human face image information through AES encryption, effectively The privacy of protection user, it is ensured that the safety of user profile and privacy, realizes user in the convenient peace of information security terminal Log in entirely.
Step S102:Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the user of certification Single-minded use.
Described information security terminal is provided with wide-angle camera.User by certification complete log in after, information security terminal According to the data of wide-angle camera collection, automatic region detection, monitor in real time detect the situation of limited area.With by recognizing It is QED into log in user face be target, real-time tracking positioning:Other not clear movements outside the target are detected such as Object, such as face etc., then start early warning mechanism;Such as detect the target and leave limited area, then locking or restriction automatically The access rights of information security terminal.
Above-mentioned steps realize information security terminal and make different treatment mechanisms for limited area situation in time, it is ensured that The single-minded use of user for logging in is completed by by certification, the safety of information security terminal is substantially increased, is protected user to exist The information security of information security terminal.And the wide-angle camera of information security terminal connection, equipment cost is low, using based on depth The neutral net detection recognizer identification face of learning art, can support the face of multi-angle under complex background, multi-pose Detection, recognition accuracy is high, real-time is good.
The application supports multiple information security terminals telnet server simultaneously, while operation, monitor in real time.The letter Breath security terminal is convenient using flow process, can be widely used in public security, procuratorate, law court, finance etc. various to information security requirement High department.
With reference to Fig. 2, show that information security implementation method pre-acquired of the embodiment of the present application based on living things feature recognition is used The flow chart of family information.This method for optimizing embodiment is comprised the following steps:
Step S201:Distribute account and encrypted message for user.
User account and encrypted message are collective's batch registration, registers software as user's distribution account and close by user profile Code information.
Step S202:The account and encrypted message are sent to the server specified.
Step S203:Collection finger print information, while obtaining only a series of numbers of fingerprint collecting equipment.
Finger print information is gathered by fingerprint collecting equipment, the fingerprint collecting equipment is using 32 safety chips as master control Chip, specifies planar face formula fingerprint sensor using financial rank, takes reflective measuring method, gathering algorithm to pass through public security Portion is detected, safe and reliable.And each fingerprint collecting equipment gathers the same of finger print information with the unique series number in 64 whole world When can obtain only a series of numbers of the fingerprint collecting equipment, strengthen security performance.
The AES pre-set by system is only a series of to the finger print information and the fingerprint collecting equipment Number it is encrypted, it is ensured that the safety of user profile and privacy.
Step S204:Only a series of numbers of the finger print information and the fingerprint collecting equipment are sent to the service specified Device.
Step S205:Collection human face image information.
Characteristic information collection is carried out by wide-angle camera to face, corresponding human face image information is generated.The Radix Rumiciss Photographic head carries out Face datection using the neural network algorithm based on deep learning, can support multi-angle multi-pose under complex background Face characteristic information collection, and carry out face alignment using active shape model alignment schemes, normalization, feature extraction are special Dimensionality reduction is levied, is compressed, is then generated corresponding human face image information.Picking rate is fast, and recognition accuracy is high, excellent in efficiency.
The human face image information is encrypted by the AES that system pre-sets, it is ensured that the peace of user profile Full property and privacy.
Step S206:The human face image information is sent to the server specified.
Step S207:Server stores the user profile of reception to the server database specified.
Server stores the user profile for receiving to the server database specified, so that user is at information security end End completes to use during certification login process.
With reference to Fig. 3, show that information security implementation method certification of the embodiment of the present application based on living things feature recognition is logged in The flow chart of process.This method for optimizing embodiment is comprised the following steps:
Step S301:Access appointed website.
Step S302:Judge whether that first time uses the appointed website, if using for the first time, need according to instruction peace Fill corresponding plug-in unit;Otherwise, go to step S303.
Step S303:The account and encrypted message of receiving user's input.
Step S304:Carry out matching certification with the account and encrypted message of the user of server storage, if by recognizing Card, goes to step S305;Otherwise, go to step S303.
Repeatedly authentification failure then locks the account.
Step S305:Collection finger print information.
Finger print information is gathered by fingerprint collecting equipment, the fingerprint collecting equipment supports In vivo detection function.
Step S306:Matching certification is carried out with the finger print information of the corresponding account of server storage, if by certification, going to Step S307;Otherwise, go to step S305.
According to the finger of finger print information and the corresponding account of server storage of the collection of information security terminal fingerprint collecting equipment Stricture of vagina information carries out matching certification, confirms the identity of user, and program fingerprint matching algorithm degree of accuracy is high, and safety is good.Repeatedly recognize Card failure then locks the account.
Step S307:Collection human face image information.
Characteristic information collection is carried out by wide-angle camera to face, corresponding human face image information is generated.
Step S308:Matching certification is carried out with the human face image information of the corresponding account of server storage, if by certification, Complete certification login process;Otherwise, go to step S307.
Account and encrypted message and finger print information carry out human face image information matching certification after the match is successful.Information is pacified , by wide-angle camera Real-time Collection monitor video, the neutral net monitoring recognizer based on deep learning can for full terminal Suppress wide-angle distortion, detect the face characteristic of multi-angle and different attitudes, generate corresponding human face image information, deposit with server The human face image information of the corresponding account of storage carries out matching certification.Reminder dialog frame is ejected if there is plurality of human faces in video, And prevent information security terminal from completing login process, prevent information leakage.If not authenticated, user can suitably change face angle The re-authentications such as degree, attitude, prevent photo from logging in.
Repeatedly authentification failure locks the account.
From the above, it can be seen that in an embodiment of the present invention, there is provided it is a kind of have In vivo detection finger print identifying, Living body faces monitor certification as login authentication mode, and the information security implementation method of monitor in real time limited area, maximum Feature is the neutral net detection recognizer based on deep learning, using wide-angle camera gathered data, overcomes photographic head abnormal In the case of change, energy multi-angle, multi-pose detection face, at the same time, can wider monitor in real time information security terminal limit Determine region, different treatment mechanisms are made for areas case in time.What the server was preserved is encrypted through AES Finger print information and human face image information, can effective protection user privacy, it is safe;The connection of described information security terminal Fingerprint collecting equipment with In vivo detection function and wide-angle camera, equipment cost are low, and the wide-angle camera is using based on deep The neutral net detection recognizer of degree learning art, can support multi-angle, complex background detection, and recognition accuracy is high, real When property is good;Flow process is easy to use, can be widely used in that public security, procuratorate, law court, finance etc. are various to be had high demands to information security Department.
It is for aforesaid each method embodiment, simple in order to describe, therefore which is all expressed as a series of combination of actions, but It is that those skilled in the art should know, the application is not limited by described sequence of movement, because according to the application, Some steps can be serially or simultaneously performed using other;Secondly, those skilled in the art should also know, said method is implemented Example belongs to preferred embodiment, necessary to involved action and module not necessarily the application.
With reference to Fig. 4, show the embodiment of the present application based on information security end in the information safety system of living things feature recognition The structural representation at end, including:
Authentication module 41, for gathering user profile, the user profile is stored to the clothes specified with pre-acquired and after encrypting User profile in business device is compared, and completes certification login process;Wherein, the user profile includes account and message in cipher Breath, finger print information and/or human face image information.
Region detection module 42, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by passing through The single-minded use of user of certification.
Described information security terminal is provided with wide-angle camera, and the region detection module 42 includes target positioning unit 421st, prewarning unit 422 and authority limit unit 423, after user completes certification Successful login:
Target positioning unit 421, for automatic region detection, monitor in real time detects the situation of limited area.With what is logged in The face of user be target, real-time tracking positioning:
Prewarning unit 422, for other the not clear mobile objects outside the target is detected, such as face etc., then startup is pre- Alert mechanism;
Authority limits unit 423, for leaving limited area when detecting the target, then locking or restricted information peace automatically The access rights of full terminal.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment, and 41 pre-acquired user profile of the authentication module is simultaneously encrypted The method for being stored in specified server afterwards includes:Finger print information is gathered by fingerprint collecting equipment, while obtaining the finger Only a series of numbers of stricture of vagina collecting device, it is pre- by system by only a series of numbers of the finger print information and the fingerprint collecting equipment The AES encryption for first arranging, and store to the server specified.
Described information security terminal is provided with wide-angle camera, after 41 pre-acquired user profile of the authentication module encryption The method stored in specified server includes:Multi-angle multi-pose characteristic information is carried out by wide-angle camera to adopt to face Collection, generates corresponding human face image information, and the human face image information is encrypted by the AES that system pre-sets, and Store the server specified.
The authentication module 41 include account and encrypted message authentication ' unit 411, finger print information authentication ' unit 412 and/or Human face image information authentication ' unit 413;Wherein:
Account and encrypted message authentication ' unit 411, for accessing appointed website, the account and password of receiving user's input, with clothes The account and encrypted message of the user of business device storage carries out matching certification, and certification is by going to next authentication ' unit;It is obstructed Cross, need again the information of receives input to be authenticated, multiple authentification failure locks the account;
Finger print information authentication ' unit 412, for gathering the finger print information of user, is believed with the fingerprint of the user of server storage Breath carries out matching certification, and certification is by then going to next authentication ' unit;Not by then needing to resurvey certification, multiple certification is lost Lose and lock the account;And/or,
Human face image information authentication ' unit 413, the user for gathering the human face image information of user, with server storage Human face image information carry out matching certification, certification is by then completing certification login process;Not by then needing to resurvey to recognize Card, multiple authentification failure lock the account.
It should be noted that information security terminal embodiment belongs to preferred embodiment, involved unit in said system With necessary to module not necessarily the application.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.For the application it is For system embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part is referring to method reality Apply the part explanation of example.
Above to the information security method and system based on living things feature recognition provided herein, carry out in detail Thin to introduce, specific case used herein is set forth to the principle and embodiment of the application, and above example is said It is bright to be only intended to help and understand the present processes and its core concept;Simultaneously for one of ordinary skill in the art, foundation The thought of the application, will change in specific embodiments and applications, and in sum, this specification content is not It is interpreted as the restriction to the application.

Claims (12)

1. the information security implementation method based on living things feature recognition, it is characterised in that the executive agent of methods described is information Security terminal, methods described include:
Collection user profile, the user profile that will be stored after the user profile and pre-acquired encryption in specified server Compare, complete certification login process;Wherein, the user profile includes account and encrypted message, finger print information and/or people Face image information;
Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the single-minded use of user of certification.
2. method according to claim 1, it is characterised in that described information security terminal is provided with wide-angle camera;Institute State the situation that monitor in real time detects limited area, it is ensured that information security terminal by by the single-minded use of user of certification, including:From Dynamic starting region detection, according to the data of wide-angle camera collection, monitor in real time detects the situation of limited area;With the people of user Face is target, real-time tracking positioning:
Other the not clear mobile objects outside the target are such as detected, then starts early warning mechanism;
Such as detect the target and leave limited area, then lock automatically or limit access rights.
3. method according to claim 1, it is characterised in that described information security terminal arranges promising user and distributes account Software is registered with the user profile of encrypted message, the account and encrypted message are stored to the server specified.
4. method according to claim 1, it is characterised in that described information security terminal is provided with fingerprint collecting equipment; Store in specified server after pre-acquired user profile encryption, including:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived The server specified.
5. method according to claim 1, it is characterised in that described information security terminal is provided with wide-angle camera;In advance Store in specified server after collection user profile encryption, including:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated, The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
6. method according to claim 1, it is characterised in that the collection user profile, by the user profile with it is pre- The user profile for gathering and storing after encrypting in specified server is compared, and completes certification login process, including:
Access appointed website, the account and encrypted message of receiving user's input, with the account of the user of server storage and Encrypted message carries out matching certification, and certification is by then completing certification login process;Do not pass through then to need again the letter of receives input Breath is authenticated, and multiple authentification failure locks the account;
The finger print information of collection user, carries out matching certification with the finger print information of the user of server storage, and certification passes through Certification login process is completed then;Not by then needing to resurvey certification, multiple authentification failure locks the account;And/or,
The human face image information of collection user, carries out matching certification with the human face image information of the user of server storage, Certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure locks the account.
7. the information safety system based on living things feature recognition, it is characterised in that the system includes information security terminal kimonos Business device, described information security terminal include:
Authentication module, for gathering user profile, the user profile is stored to the service specified with pre-acquired and after encrypting User profile in device is compared, and completes certification login process;Wherein, the user profile include account and encrypted message, Finger print information and/or human face image information;
Region detection module, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by by certification The single-minded use of user.
8. system according to claim 7, it is characterised in that described information security terminal is provided with wide-angle camera;Institute Stating region detection module includes:
Target positioning unit, for automatic region detection, according to the data of wide-angle camera collection, monitor in real time test limit Determine the situation in region;As target, real-time tracking is positioned face with user:
Prewarning unit, during for other not clear mobile objects outside the target is detected, starts early warning mechanism;
Authority limits unit, for when detecting the target and leaving limited area, locking or limits access rights automatically.
9. system according to claim 7, it is characterised in that described information security terminal arranges promising user and distributes account Software is registered with the user profile of encrypted message, the account and encrypted message are stored to the server specified.
10. system according to claim 7, it is characterised in that described information security terminal is provided with fingerprint collecting equipment; The method stored in specified server after the authentication module pre-acquired user profile encryption includes:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived The server specified.
11. systems according to claim 7, it is characterised in that described information security terminal is provided with wide-angle camera;Institute The method stated authentication module pre-acquired user profile and store in specified server after encrypting includes:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated, The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
12. systems according to claim 7, it is characterised in that the authentication module includes account and encrypted message certification Unit, finger print information authentication ' unit and/or human face image information authentication ' unit;Wherein:
Account and encrypted message authentication ' unit, for accessing appointed website, the account and encrypted message of receiving user's input, with clothes The account and encrypted message of the user of business device storage carries out matching certification, and certification is by then completing certification login process;No It is authenticated by the information for then needing again receives input, multiple authentification failure locks the account;
Finger print information authentication ' unit, the finger print information for gathering the finger print information of user, with the user of server storage Matching certification is carried out, certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure Lock the account;And/or,
Human face image information authentication ' unit, for gathering the human face image information of user, with the user's of server storage Human face image information carries out matching certification, and certification is by then completing certification login process;Not by then needing to resurvey certification, Repeatedly authentification failure locks the account.
CN201611262952.6A 2016-12-30 2016-12-30 Information safety realization method and system based on biometric features identification Pending CN106603563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611262952.6A CN106603563A (en) 2016-12-30 2016-12-30 Information safety realization method and system based on biometric features identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611262952.6A CN106603563A (en) 2016-12-30 2016-12-30 Information safety realization method and system based on biometric features identification

Publications (1)

Publication Number Publication Date
CN106603563A true CN106603563A (en) 2017-04-26

Family

ID=58581485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611262952.6A Pending CN106603563A (en) 2016-12-30 2016-12-30 Information safety realization method and system based on biometric features identification

Country Status (1)

Country Link
CN (1) CN106603563A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181766A (en) * 2017-07-25 2017-09-19 湖南中迪科技有限公司 The management-control method and device of log-on message
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device
CN107749837A (en) * 2017-09-26 2018-03-02 甘肃万维信息技术有限责任公司 A kind of E-Government Resource Security guard system and its method
CN108564040A (en) * 2018-04-17 2018-09-21 杭州景联文科技有限公司 A kind of fingerprint activity test method based on depth convolution feature
CN109145560A (en) * 2018-08-08 2019-01-04 北京小米移动软件有限公司 The method and device of accessing monitoring equipment
CN109657536A (en) * 2018-10-30 2019-04-19 国网安徽省电力有限公司信息通信分公司 A kind of identity identifying method and system merging bio-identification and cryptographic technique
CN109711126A (en) * 2019-01-03 2019-05-03 黄河科技学院 A kind of computer information safe management system and method
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN110298233A (en) * 2019-05-15 2019-10-01 平安科技(深圳)有限公司 Palm grain identification method, device, computer equipment and storage medium
CN110730169A (en) * 2019-09-29 2020-01-24 北京东软望海科技有限公司 Processing method, device and system for guaranteeing account security
CN111062025A (en) * 2019-12-09 2020-04-24 Oppo广东移动通信有限公司 Application data processing method and related device
CN111092731A (en) * 2019-11-04 2020-05-01 西安万像电子科技有限公司 Authentication method and server
CN111131202A (en) * 2019-12-12 2020-05-08 厦门市美亚柏科信息股份有限公司 Identity authentication method and system based on multiple information authentication
CN112084948A (en) * 2020-09-10 2020-12-15 深圳市迈航信息技术有限公司 Method and system for improving security check safety by adopting human face data mode
CN112732527A (en) * 2021-01-08 2021-04-30 国网安徽省电力有限公司信息通信分公司 Electric power system information safety monitoring method and system
CN115220665A (en) * 2022-09-14 2022-10-21 深圳市木浪云科技有限公司 Access method and system of distributed storage system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101266704A (en) * 2008-04-24 2008-09-17 张宏志 ATM secure authentication and pre-alarming method based on face recognition
CN101330386A (en) * 2008-05-19 2008-12-24 刘洪利 Authentication system based on biological characteristics and identification authentication method thereof
CN101833842A (en) * 2009-03-13 2010-09-15 新奥特硅谷视频技术有限责任公司 Method for monitoring monitored personnel
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device
CN105530267A (en) * 2016-02-15 2016-04-27 上海斐讯数据通信技术有限公司 Software login method, terminal, server and system based biological characteristics
CN106101135A (en) * 2016-07-22 2016-11-09 福州大学 A kind of account login system based on face and fingerprint recognition and its implementation
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system
CN106254539A (en) * 2016-09-23 2016-12-21 捷开通讯(深圳)有限公司 Mobile device and used time monitoring system based on living things feature recognition, method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101266704A (en) * 2008-04-24 2008-09-17 张宏志 ATM secure authentication and pre-alarming method based on face recognition
CN101330386A (en) * 2008-05-19 2008-12-24 刘洪利 Authentication system based on biological characteristics and identification authentication method thereof
CN101833842A (en) * 2009-03-13 2010-09-15 新奥特硅谷视频技术有限责任公司 Method for monitoring monitored personnel
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device
CN105530267A (en) * 2016-02-15 2016-04-27 上海斐讯数据通信技术有限公司 Software login method, terminal, server and system based biological characteristics
CN106101135A (en) * 2016-07-22 2016-11-09 福州大学 A kind of account login system based on face and fingerprint recognition and its implementation
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system
CN106254539A (en) * 2016-09-23 2016-12-21 捷开通讯(深圳)有限公司 Mobile device and used time monitoring system based on living things feature recognition, method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device
CN107181766A (en) * 2017-07-25 2017-09-19 湖南中迪科技有限公司 The management-control method and device of log-on message
CN107749837A (en) * 2017-09-26 2018-03-02 甘肃万维信息技术有限责任公司 A kind of E-Government Resource Security guard system and its method
CN108564040A (en) * 2018-04-17 2018-09-21 杭州景联文科技有限公司 A kind of fingerprint activity test method based on depth convolution feature
CN109145560B (en) * 2018-08-08 2022-03-25 北京小米移动软件有限公司 Method and device for accessing monitoring equipment
CN109145560A (en) * 2018-08-08 2019-01-04 北京小米移动软件有限公司 The method and device of accessing monitoring equipment
CN109657536A (en) * 2018-10-30 2019-04-19 国网安徽省电力有限公司信息通信分公司 A kind of identity identifying method and system merging bio-identification and cryptographic technique
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN109711126A (en) * 2019-01-03 2019-05-03 黄河科技学院 A kind of computer information safe management system and method
CN110298233A (en) * 2019-05-15 2019-10-01 平安科技(深圳)有限公司 Palm grain identification method, device, computer equipment and storage medium
CN110298233B (en) * 2019-05-15 2024-04-09 平安科技(深圳)有限公司 Palmprint recognition method, palmprint recognition device, computer equipment and storage medium
CN110730169A (en) * 2019-09-29 2020-01-24 北京东软望海科技有限公司 Processing method, device and system for guaranteeing account security
CN111092731A (en) * 2019-11-04 2020-05-01 西安万像电子科技有限公司 Authentication method and server
CN111062025A (en) * 2019-12-09 2020-04-24 Oppo广东移动通信有限公司 Application data processing method and related device
CN111131202A (en) * 2019-12-12 2020-05-08 厦门市美亚柏科信息股份有限公司 Identity authentication method and system based on multiple information authentication
CN112084948A (en) * 2020-09-10 2020-12-15 深圳市迈航信息技术有限公司 Method and system for improving security check safety by adopting human face data mode
CN112732527A (en) * 2021-01-08 2021-04-30 国网安徽省电力有限公司信息通信分公司 Electric power system information safety monitoring method and system
CN115220665A (en) * 2022-09-14 2022-10-21 深圳市木浪云科技有限公司 Access method and system of distributed storage system
CN115220665B (en) * 2022-09-14 2022-12-20 深圳市木浪云科技有限公司 Access method and system of distributed storage system

Similar Documents

Publication Publication Date Title
CN106603563A (en) Information safety realization method and system based on biometric features identification
US10068076B1 (en) Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior
Li et al. Unobservable re-authentication for smartphones.
US9704051B2 (en) Method and system for verifying identities
US20200004939A1 (en) Biometric authentication
US20210089635A1 (en) Biometric identity verification and protection software solution
US20050188213A1 (en) System for personal identity verification
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN108171137B (en) Face recognition method and system
CN103646201A (en) Verification method achieved by combining human faces with identities
US11496471B2 (en) Mobile enrollment using a known biometric
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
US20170352037A1 (en) Identification and Payment Method Using Biometric Characteristics
CN103646200B (en) The coding encrypting of a kind of face information and application process
Buriro et al. Evaluation of motion-based touch-typing biometrics for online banking
Agidi Biometrics: the future of banking and financial service industry in Nigeria
US11954188B1 (en) Systems and methods for dynamic bio-behavioral authentication
Shrestha et al. Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics
JP5903257B2 (en) Authentication system, registration device, and authentication device
Parusheva A comparative study on the application of biometric technologies for authentication in online banking.
Goel et al. Securing biometric framework with cryptanalysis
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
CN111478875A (en) Block chain-based biological sign mixed mode authentication method and system
Lala et al. Towards A secured financial transaction: A multi-factor authentication model
Vorobyeva et al. Benefits and issues of biometric technologies. Are biometrics worth using?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426