CN106603563A - Information safety realization method and system based on biometric features identification - Google Patents
Information safety realization method and system based on biometric features identification Download PDFInfo
- Publication number
- CN106603563A CN106603563A CN201611262952.6A CN201611262952A CN106603563A CN 106603563 A CN106603563 A CN 106603563A CN 201611262952 A CN201611262952 A CN 201611262952A CN 106603563 A CN106603563 A CN 106603563A
- Authority
- CN
- China
- Prior art keywords
- certification
- user
- information
- account
- user profile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The present invention provides an information safety realization method and system based on biometric features identification. The method comprises: collecting user information, performing pre-collection and encryption of the user information to store the user information to the user information in an assigned server for comparison, and completing an authentication registration process; and monitoring and detecting the condition of a limited area in real time, and ensuring that an information safety terminal is specially used by the users passing the authentication. Through adoption of the scheme, the problem is improved that the current information terminal cannot rapidly ensure that the terminal is specially used by the users passing authentication in real time.
Description
Technical field
The application is related to information security field, especially, is related to the information security implementation method based on living things feature recognition
And system.
Background technology
Develop rapidly with informationalized, the powerful information terminal of various functions is widely used in all trades and professions.User
By various network information terminals, vivid to know from experience the high speed that the information age brings convenient.But informationization technology give we with
While coming various convenient, information system and information terminal safety problem also gradually come out:The leakage event of important information
Happen occasionally, the loss for causing can not be estimated so that the security situation faced by various information terminals allows of no optimist.To solve letter
The safety problem of breath terminal, various terminals security management system system are arisen at the historic moment.
Biometrics identification technology is the technology for comparing popular and relative maturity in recent years, by automatic identification or confirmation people
Physiological feature(Such as fingerprint, palmmprint, iris, face etc.)And behavior characteristicss(Such as sound, paces etc.)To carry out authentication, and
The technology has been widely used in various terminals security system, one of major way logged in as terminal remote certification.
Existing information terminal, is the uncertainty for solving user identity, more using the account and password and biology of user
Authentication mode of the combination of certification technology of identification as Telnet, but lay particular emphasis on single authentication or multiple authenticating party more
Formula, can not easily guarantee user after certification completes to log in real time, and information terminal is made by the user for passing through certification is single-minded
With.
The content of the invention
The application provides information security method and system based on living things feature recognition, for solve prior art without
Method easily guarantees information terminal by by the single-minded problem for using of user of certification in real time.
Information security implementation method based on living things feature recognition disclosed in the present application, executive agent are information security end
End, including:
Collection user profile, the user profile that will be stored after the user profile and pre-acquired encryption in specified server
Compare, complete certification login process;Wherein, the user profile includes account and encrypted message, finger print information and/or people
Face image information;
Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the single-minded use of user of certification.
Described information security terminal is provided with wide-angle camera;The monitor in real time detects the situation of limited area, it is ensured that
Information security terminal by by the single-minded use of user of certification, including:Automatic region detection, gathers according to wide-angle camera
Data, monitor in real time detect limited area situation;As target, real-time tracking is positioned face with user:
Other the not clear mobile objects outside the target are such as detected, then starts early warning mechanism;
Such as detect the target and leave limited area, then lock automatically or limit access rights.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described
Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment;Pre-acquired user profile and after encrypting storage to specifying
In server, including:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described
Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived
The server specified.
Described information security terminal is provided with wide-angle camera;After pre-acquired user profile encryption, storage is to the clothes specified
In business device, including:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated,
The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
The collection user profile, the user profile is stored in specified server with pre-acquired and after encrypting
User profile is compared, and completes certification login process, including:
Access appointed website, the account and encrypted message of receiving user's input, with the account of the user of server storage and
Encrypted message carries out matching certification, and certification is by then completing certification login process;Do not pass through then to need again the letter of receives input
Breath is authenticated, and multiple authentification failure locks the account;
The finger print information of collection user, carries out matching certification with the finger print information of the user of server storage, and certification passes through
Certification login process is completed then;Not by then needing to resurvey certification, multiple authentification failure locks the account;And/or,
The human face image information of collection user, carries out matching certification with the human face image information of the user of server storage,
Certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure locks the account.
Information safety system based on living things feature recognition disclosed in the present application, the system include information security terminal and
Server, described information security terminal include:
Authentication module, for gathering user profile, the user profile is stored to the service specified with pre-acquired and after encrypting
User profile in device is compared, and completes certification login process;Wherein, the user profile include account and encrypted message,
Finger print information and/or human face image information;
Region detection module, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by by certification
The single-minded use of user.
Described information security terminal is provided with wide-angle camera;The region detection module includes:
Target positioning unit:For automatic region detection, according to the data of wide-angle camera collection, monitor in real time test limit
Determine the situation in region;As target, real-time tracking is positioned face with user:
Prewarning unit, during for other not clear mobile objects outside the target is detected, starts early warning mechanism;
Authority limits unit, for when detecting the target and leaving limited area, locking or limits access rights automatically.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described
Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment;After the authentication module pre-acquired user profile encryption
The method stored in specified server includes:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described
Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived
The server specified.
Described information security terminal is provided with wide-angle camera;Deposit after the authentication module pre-acquired user profile encryption
The method stored up in specified server includes:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated,
The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
The authentication module includes account and encrypted message authentication ' unit, finger print information authentication ' unit and/or facial image
Authentification of message unit;Wherein:
Account and encrypted message authentication ' unit, for accessing appointed website, the account and encrypted message of receiving user's input, with clothes
The account and encrypted message of the user of business device storage carries out matching certification, and certification is by then completing certification login process;No
It is authenticated by the information for then needing again receives input, multiple authentification failure locks the account;
Finger print information authentication ' unit, the finger print information for gathering the finger print information of user, with the user of server storage
Matching certification is carried out, certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure
Lock the account;And/or,
Human face image information authentication ' unit, for gathering the human face image information of user, with the user's of server storage
Human face image information carries out matching certification, and certification is by then completing certification login process;Not by then needing to resurvey certification,
Repeatedly authentification failure locks the account.
Compared with prior art, the application has advantages below:
With reference to the account and password of user, fingerprint bio feature, face biological characteristic as authentication mode, using wide-angle camera
Collection human face image information can monitor in real time information security terminal limited area while login, it is ensured that information security terminal is by leading to
Cross the single-minded use of user that certification completes to log in.First, this programme is with the account and password of user, and/or supports In vivo detection
The somatic fingerprint identification of function, facial image are recognized as login mode;Secondly, recognized as login mode using facial image
When, it is analyzed according to the video of wide-angle camera Real-time Collection, it is ensured that the complicated back of the body while face recognition accuracy, can be supported
The Face datection identification of multi-angle multi-pose, real-time monitoring terminal limited area, it is ensured that only one of which face during login, row under scape
Except the probability that common photo is logged in;Finally, user is limited by wide-angle camera real-time monitoring after certification completes to log in
Active situation in region, such as finds that foreign object invasion just starts early warning mechanism;As found to lock automatically or restriction if user leaves
Access rights, such as closing information safe terminal system.Scheme is efficient, convenient, safety, simple to operate.
Description of the drawings
Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as the restriction to the application.And whole
In individual accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is flow chart of the embodiment of the present application based on the information security implementation method of living things feature recognition;
Fig. 2 is flow process of the embodiment of the present application based on the information security implementation method pre-acquired user profile of living things feature recognition
Figure;
Fig. 3 is flow chart of the embodiment of the present application based on the information security implementation method certification login process of living things feature recognition;
Fig. 4 is structural representation of the embodiment of the present application based on information security terminal in the information safety system of living things feature recognition
Figure.
Specific embodiment
It is understandable to enable the above-mentioned purpose of the application, feature and advantage to become apparent from, it is below in conjunction with the accompanying drawings and concrete real
Apply mode to be described in further detail the application.
In the description of the present application, it is to be understood that term " including ", "comprising" and similar terms should be understood that
Open term, i.e., " include/including but not limited to ".Term " embodiment " expression " at least one embodiment ".Other
The related definition of term is given in will be described below.
With reference to Fig. 1, flow chart of the embodiment of the present application based on the information security implementation method of living things feature recognition is shown,
Executive agent is information security terminal.This method for optimizing embodiment is comprised the following steps:
Step S101:Collection user profile, the user profile is stored in specified server with pre-acquired and after encrypting
User profile compare, complete certification login process;Wherein, the user profile includes account and encrypted message, fingerprint
Information and/or human face image information.
When implementing, including:
First, pre-acquired user profile, wherein, user profile includes account and encrypted message, finger print information and/or facial image
Information.The account and encrypted message register software distribution by the user profile that information security terminal is arranged;The fingerprint letter
The fingerprint collecting equipment collection arranged by information security terminal is ceased, while obtaining only a series of numbers of fingerprint collecting equipment;Institute
State human face image information and face characteristic is monitored by the wide-angle camera that information security terminal is arranged, and generate corresponding face figure
As information.
Secondly, the user profile is stored in specified server, wherein, the finger print information, the fingerprint are adopted
Only a series of numbers of collection equipment and/or human face image information after the AES encryption that system pre-sets storage to specifying
Server.
Finally, user passes through account in information security terminal and encrypted message, finger print information and/or human face image information are complete
Into certification login process.
By above-mentioned steps, server preserves the finger print information and human face image information through AES encryption, effectively
The privacy of protection user, it is ensured that the safety of user profile and privacy, realizes user in the convenient peace of information security terminal
Log in entirely.
Step S102:Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the user of certification
Single-minded use.
Described information security terminal is provided with wide-angle camera.User by certification complete log in after, information security terminal
According to the data of wide-angle camera collection, automatic region detection, monitor in real time detect the situation of limited area.With by recognizing
It is QED into log in user face be target, real-time tracking positioning:Other not clear movements outside the target are detected such as
Object, such as face etc., then start early warning mechanism;Such as detect the target and leave limited area, then locking or restriction automatically
The access rights of information security terminal.
Above-mentioned steps realize information security terminal and make different treatment mechanisms for limited area situation in time, it is ensured that
The single-minded use of user for logging in is completed by by certification, the safety of information security terminal is substantially increased, is protected user to exist
The information security of information security terminal.And the wide-angle camera of information security terminal connection, equipment cost is low, using based on depth
The neutral net detection recognizer identification face of learning art, can support the face of multi-angle under complex background, multi-pose
Detection, recognition accuracy is high, real-time is good.
The application supports multiple information security terminals telnet server simultaneously, while operation, monitor in real time.The letter
Breath security terminal is convenient using flow process, can be widely used in public security, procuratorate, law court, finance etc. various to information security requirement
High department.
With reference to Fig. 2, show that information security implementation method pre-acquired of the embodiment of the present application based on living things feature recognition is used
The flow chart of family information.This method for optimizing embodiment is comprised the following steps:
Step S201:Distribute account and encrypted message for user.
User account and encrypted message are collective's batch registration, registers software as user's distribution account and close by user profile
Code information.
Step S202:The account and encrypted message are sent to the server specified.
Step S203:Collection finger print information, while obtaining only a series of numbers of fingerprint collecting equipment.
Finger print information is gathered by fingerprint collecting equipment, the fingerprint collecting equipment is using 32 safety chips as master control
Chip, specifies planar face formula fingerprint sensor using financial rank, takes reflective measuring method, gathering algorithm to pass through public security
Portion is detected, safe and reliable.And each fingerprint collecting equipment gathers the same of finger print information with the unique series number in 64 whole world
When can obtain only a series of numbers of the fingerprint collecting equipment, strengthen security performance.
The AES pre-set by system is only a series of to the finger print information and the fingerprint collecting equipment
Number it is encrypted, it is ensured that the safety of user profile and privacy.
Step S204:Only a series of numbers of the finger print information and the fingerprint collecting equipment are sent to the service specified
Device.
Step S205:Collection human face image information.
Characteristic information collection is carried out by wide-angle camera to face, corresponding human face image information is generated.The Radix Rumiciss
Photographic head carries out Face datection using the neural network algorithm based on deep learning, can support multi-angle multi-pose under complex background
Face characteristic information collection, and carry out face alignment using active shape model alignment schemes, normalization, feature extraction are special
Dimensionality reduction is levied, is compressed, is then generated corresponding human face image information.Picking rate is fast, and recognition accuracy is high, excellent in efficiency.
The human face image information is encrypted by the AES that system pre-sets, it is ensured that the peace of user profile
Full property and privacy.
Step S206:The human face image information is sent to the server specified.
Step S207:Server stores the user profile of reception to the server database specified.
Server stores the user profile for receiving to the server database specified, so that user is at information security end
End completes to use during certification login process.
With reference to Fig. 3, show that information security implementation method certification of the embodiment of the present application based on living things feature recognition is logged in
The flow chart of process.This method for optimizing embodiment is comprised the following steps:
Step S301:Access appointed website.
Step S302:Judge whether that first time uses the appointed website, if using for the first time, need according to instruction peace
Fill corresponding plug-in unit;Otherwise, go to step S303.
Step S303:The account and encrypted message of receiving user's input.
Step S304:Carry out matching certification with the account and encrypted message of the user of server storage, if by recognizing
Card, goes to step S305;Otherwise, go to step S303.
Repeatedly authentification failure then locks the account.
Step S305:Collection finger print information.
Finger print information is gathered by fingerprint collecting equipment, the fingerprint collecting equipment supports In vivo detection function.
Step S306:Matching certification is carried out with the finger print information of the corresponding account of server storage, if by certification, going to
Step S307;Otherwise, go to step S305.
According to the finger of finger print information and the corresponding account of server storage of the collection of information security terminal fingerprint collecting equipment
Stricture of vagina information carries out matching certification, confirms the identity of user, and program fingerprint matching algorithm degree of accuracy is high, and safety is good.Repeatedly recognize
Card failure then locks the account.
Step S307:Collection human face image information.
Characteristic information collection is carried out by wide-angle camera to face, corresponding human face image information is generated.
Step S308:Matching certification is carried out with the human face image information of the corresponding account of server storage, if by certification,
Complete certification login process;Otherwise, go to step S307.
Account and encrypted message and finger print information carry out human face image information matching certification after the match is successful.Information is pacified
, by wide-angle camera Real-time Collection monitor video, the neutral net monitoring recognizer based on deep learning can for full terminal
Suppress wide-angle distortion, detect the face characteristic of multi-angle and different attitudes, generate corresponding human face image information, deposit with server
The human face image information of the corresponding account of storage carries out matching certification.Reminder dialog frame is ejected if there is plurality of human faces in video,
And prevent information security terminal from completing login process, prevent information leakage.If not authenticated, user can suitably change face angle
The re-authentications such as degree, attitude, prevent photo from logging in.
Repeatedly authentification failure locks the account.
From the above, it can be seen that in an embodiment of the present invention, there is provided it is a kind of have In vivo detection finger print identifying,
Living body faces monitor certification as login authentication mode, and the information security implementation method of monitor in real time limited area, maximum
Feature is the neutral net detection recognizer based on deep learning, using wide-angle camera gathered data, overcomes photographic head abnormal
In the case of change, energy multi-angle, multi-pose detection face, at the same time, can wider monitor in real time information security terminal limit
Determine region, different treatment mechanisms are made for areas case in time.What the server was preserved is encrypted through AES
Finger print information and human face image information, can effective protection user privacy, it is safe;The connection of described information security terminal
Fingerprint collecting equipment with In vivo detection function and wide-angle camera, equipment cost are low, and the wide-angle camera is using based on deep
The neutral net detection recognizer of degree learning art, can support multi-angle, complex background detection, and recognition accuracy is high, real
When property is good;Flow process is easy to use, can be widely used in that public security, procuratorate, law court, finance etc. are various to be had high demands to information security
Department.
It is for aforesaid each method embodiment, simple in order to describe, therefore which is all expressed as a series of combination of actions, but
It is that those skilled in the art should know, the application is not limited by described sequence of movement, because according to the application,
Some steps can be serially or simultaneously performed using other;Secondly, those skilled in the art should also know, said method is implemented
Example belongs to preferred embodiment, necessary to involved action and module not necessarily the application.
With reference to Fig. 4, show the embodiment of the present application based on information security end in the information safety system of living things feature recognition
The structural representation at end, including:
Authentication module 41, for gathering user profile, the user profile is stored to the clothes specified with pre-acquired and after encrypting
User profile in business device is compared, and completes certification login process;Wherein, the user profile includes account and message in cipher
Breath, finger print information and/or human face image information.
Region detection module 42, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by passing through
The single-minded use of user of certification.
Described information security terminal is provided with wide-angle camera, and the region detection module 42 includes target positioning unit
421st, prewarning unit 422 and authority limit unit 423, after user completes certification Successful login:
Target positioning unit 421, for automatic region detection, monitor in real time detects the situation of limited area.With what is logged in
The face of user be target, real-time tracking positioning:
Prewarning unit 422, for other the not clear mobile objects outside the target is detected, such as face etc., then startup is pre-
Alert mechanism;
Authority limits unit 423, for leaving limited area when detecting the target, then locking or restricted information peace automatically
The access rights of full terminal.
Described information security terminal arranges the user profile registration software of promising user's distribution account and encrypted message, described
Account and encrypted message are stored to the server specified.
Described information security terminal is provided with fingerprint collecting equipment, and 41 pre-acquired user profile of the authentication module is simultaneously encrypted
The method for being stored in specified server afterwards includes:Finger print information is gathered by fingerprint collecting equipment, while obtaining the finger
Only a series of numbers of stricture of vagina collecting device, it is pre- by system by only a series of numbers of the finger print information and the fingerprint collecting equipment
The AES encryption for first arranging, and store to the server specified.
Described information security terminal is provided with wide-angle camera, after 41 pre-acquired user profile of the authentication module encryption
The method stored in specified server includes:Multi-angle multi-pose characteristic information is carried out by wide-angle camera to adopt to face
Collection, generates corresponding human face image information, and the human face image information is encrypted by the AES that system pre-sets, and
Store the server specified.
The authentication module 41 include account and encrypted message authentication ' unit 411, finger print information authentication ' unit 412 and/or
Human face image information authentication ' unit 413;Wherein:
Account and encrypted message authentication ' unit 411, for accessing appointed website, the account and password of receiving user's input, with clothes
The account and encrypted message of the user of business device storage carries out matching certification, and certification is by going to next authentication ' unit;It is obstructed
Cross, need again the information of receives input to be authenticated, multiple authentification failure locks the account;
Finger print information authentication ' unit 412, for gathering the finger print information of user, is believed with the fingerprint of the user of server storage
Breath carries out matching certification, and certification is by then going to next authentication ' unit;Not by then needing to resurvey certification, multiple certification is lost
Lose and lock the account;And/or,
Human face image information authentication ' unit 413, the user for gathering the human face image information of user, with server storage
Human face image information carry out matching certification, certification is by then completing certification login process;Not by then needing to resurvey to recognize
Card, multiple authentification failure lock the account.
It should be noted that information security terminal embodiment belongs to preferred embodiment, involved unit in said system
With necessary to module not necessarily the application.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with
The difference of other embodiment, between each embodiment identical similar part mutually referring to.For the application it is
For system embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part is referring to method reality
Apply the part explanation of example.
Above to the information security method and system based on living things feature recognition provided herein, carry out in detail
Thin to introduce, specific case used herein is set forth to the principle and embodiment of the application, and above example is said
It is bright to be only intended to help and understand the present processes and its core concept;Simultaneously for one of ordinary skill in the art, foundation
The thought of the application, will change in specific embodiments and applications, and in sum, this specification content is not
It is interpreted as the restriction to the application.
Claims (12)
1. the information security implementation method based on living things feature recognition, it is characterised in that the executive agent of methods described is information
Security terminal, methods described include:
Collection user profile, the user profile that will be stored after the user profile and pre-acquired encryption in specified server
Compare, complete certification login process;Wherein, the user profile includes account and encrypted message, finger print information and/or people
Face image information;
Monitor in real time detects the situation of limited area, it is ensured that information security terminal is by by the single-minded use of user of certification.
2. method according to claim 1, it is characterised in that described information security terminal is provided with wide-angle camera;Institute
State the situation that monitor in real time detects limited area, it is ensured that information security terminal by by the single-minded use of user of certification, including:From
Dynamic starting region detection, according to the data of wide-angle camera collection, monitor in real time detects the situation of limited area;With the people of user
Face is target, real-time tracking positioning:
Other the not clear mobile objects outside the target are such as detected, then starts early warning mechanism;
Such as detect the target and leave limited area, then lock automatically or limit access rights.
3. method according to claim 1, it is characterised in that described information security terminal arranges promising user and distributes account
Software is registered with the user profile of encrypted message, the account and encrypted message are stored to the server specified.
4. method according to claim 1, it is characterised in that described information security terminal is provided with fingerprint collecting equipment;
Store in specified server after pre-acquired user profile encryption, including:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described
Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived
The server specified.
5. method according to claim 1, it is characterised in that described information security terminal is provided with wide-angle camera;In advance
Store in specified server after collection user profile encryption, including:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated,
The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
6. method according to claim 1, it is characterised in that the collection user profile, by the user profile with it is pre-
The user profile for gathering and storing after encrypting in specified server is compared, and completes certification login process, including:
Access appointed website, the account and encrypted message of receiving user's input, with the account of the user of server storage and
Encrypted message carries out matching certification, and certification is by then completing certification login process;Do not pass through then to need again the letter of receives input
Breath is authenticated, and multiple authentification failure locks the account;
The finger print information of collection user, carries out matching certification with the finger print information of the user of server storage, and certification passes through
Certification login process is completed then;Not by then needing to resurvey certification, multiple authentification failure locks the account;And/or,
The human face image information of collection user, carries out matching certification with the human face image information of the user of server storage,
Certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure locks the account.
7. the information safety system based on living things feature recognition, it is characterised in that the system includes information security terminal kimonos
Business device, described information security terminal include:
Authentication module, for gathering user profile, the user profile is stored to the service specified with pre-acquired and after encrypting
User profile in device is compared, and completes certification login process;Wherein, the user profile include account and encrypted message,
Finger print information and/or human face image information;
Region detection module, detects the situation of limited area for monitor in real time, it is ensured that information security terminal is by by certification
The single-minded use of user.
8. system according to claim 7, it is characterised in that described information security terminal is provided with wide-angle camera;Institute
Stating region detection module includes:
Target positioning unit, for automatic region detection, according to the data of wide-angle camera collection, monitor in real time test limit
Determine the situation in region;As target, real-time tracking is positioned face with user:
Prewarning unit, during for other not clear mobile objects outside the target is detected, starts early warning mechanism;
Authority limits unit, for when detecting the target and leaving limited area, locking or limits access rights automatically.
9. system according to claim 7, it is characterised in that described information security terminal arranges promising user and distributes account
Software is registered with the user profile of encrypted message, the account and encrypted message are stored to the server specified.
10. system according to claim 7, it is characterised in that described information security terminal is provided with fingerprint collecting equipment;
The method stored in specified server after the authentication module pre-acquired user profile encryption includes:
Finger print information is gathered by fingerprint collecting equipment, while only a series of numbers of the fingerprint collecting equipment are obtained, will be described
Only a series of numbers of finger print information and the fingerprint collecting equipment are encrypted by the AES that system pre-sets, and storage is arrived
The server specified.
11. systems according to claim 7, it is characterised in that described information security terminal is provided with wide-angle camera;Institute
The method stated authentication module pre-acquired user profile and store in specified server after encrypting includes:
The collection of multi-angle multi-pose characteristic information is carried out by wide-angle camera to face, corresponding human face image information is generated,
The human face image information is encrypted by the AES that system pre-sets, and is stored to the server specified.
12. systems according to claim 7, it is characterised in that the authentication module includes account and encrypted message certification
Unit, finger print information authentication ' unit and/or human face image information authentication ' unit;Wherein:
Account and encrypted message authentication ' unit, for accessing appointed website, the account and encrypted message of receiving user's input, with clothes
The account and encrypted message of the user of business device storage carries out matching certification, and certification is by then completing certification login process;No
It is authenticated by the information for then needing again receives input, multiple authentification failure locks the account;
Finger print information authentication ' unit, the finger print information for gathering the finger print information of user, with the user of server storage
Matching certification is carried out, certification is by then completing certification login process;Not by then needing to resurvey certification, multiple authentification failure
Lock the account;And/or,
Human face image information authentication ' unit, for gathering the human face image information of user, with the user's of server storage
Human face image information carries out matching certification, and certification is by then completing certification login process;Not by then needing to resurvey certification,
Repeatedly authentification failure locks the account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611262952.6A CN106603563A (en) | 2016-12-30 | 2016-12-30 | Information safety realization method and system based on biometric features identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611262952.6A CN106603563A (en) | 2016-12-30 | 2016-12-30 | Information safety realization method and system based on biometric features identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106603563A true CN106603563A (en) | 2017-04-26 |
Family
ID=58581485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611262952.6A Pending CN106603563A (en) | 2016-12-30 | 2016-12-30 | Information safety realization method and system based on biometric features identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603563A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107181766A (en) * | 2017-07-25 | 2017-09-19 | 湖南中迪科技有限公司 | The management-control method and device of log-on message |
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
CN107749837A (en) * | 2017-09-26 | 2018-03-02 | 甘肃万维信息技术有限责任公司 | A kind of E-Government Resource Security guard system and its method |
CN108564040A (en) * | 2018-04-17 | 2018-09-21 | 杭州景联文科技有限公司 | A kind of fingerprint activity test method based on depth convolution feature |
CN109145560A (en) * | 2018-08-08 | 2019-01-04 | 北京小米移动软件有限公司 | The method and device of accessing monitoring equipment |
CN109657536A (en) * | 2018-10-30 | 2019-04-19 | 国网安徽省电力有限公司信息通信分公司 | A kind of identity identifying method and system merging bio-identification and cryptographic technique |
CN109711126A (en) * | 2019-01-03 | 2019-05-03 | 黄河科技学院 | A kind of computer information safe management system and method |
CN109703571A (en) * | 2018-12-24 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | A kind of vehicle entertainment system login system and login method based on recognition of face |
CN110298233A (en) * | 2019-05-15 | 2019-10-01 | 平安科技(深圳)有限公司 | Palm grain identification method, device, computer equipment and storage medium |
CN110730169A (en) * | 2019-09-29 | 2020-01-24 | 北京东软望海科技有限公司 | Processing method, device and system for guaranteeing account security |
CN111062025A (en) * | 2019-12-09 | 2020-04-24 | Oppo广东移动通信有限公司 | Application data processing method and related device |
CN111092731A (en) * | 2019-11-04 | 2020-05-01 | 西安万像电子科技有限公司 | Authentication method and server |
CN111131202A (en) * | 2019-12-12 | 2020-05-08 | 厦门市美亚柏科信息股份有限公司 | Identity authentication method and system based on multiple information authentication |
CN112084948A (en) * | 2020-09-10 | 2020-12-15 | 深圳市迈航信息技术有限公司 | Method and system for improving security check safety by adopting human face data mode |
CN112732527A (en) * | 2021-01-08 | 2021-04-30 | 国网安徽省电力有限公司信息通信分公司 | Electric power system information safety monitoring method and system |
CN115220665A (en) * | 2022-09-14 | 2022-10-21 | 深圳市木浪云科技有限公司 | Access method and system of distributed storage system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101266704A (en) * | 2008-04-24 | 2008-09-17 | 张宏志 | ATM secure authentication and pre-alarming method based on face recognition |
CN101330386A (en) * | 2008-05-19 | 2008-12-24 | 刘洪利 | Authentication system based on biological characteristics and identification authentication method thereof |
CN101833842A (en) * | 2009-03-13 | 2010-09-15 | 新奥特硅谷视频技术有限责任公司 | Method for monitoring monitored personnel |
CN104951680A (en) * | 2014-03-27 | 2015-09-30 | 阿里巴巴集团控股有限公司 | Biological characteristic information processing method, storage method and device |
CN105530267A (en) * | 2016-02-15 | 2016-04-27 | 上海斐讯数据通信技术有限公司 | Software login method, terminal, server and system based biological characteristics |
CN106101135A (en) * | 2016-07-22 | 2016-11-09 | 福州大学 | A kind of account login system based on face and fingerprint recognition and its implementation |
CN106101136A (en) * | 2016-07-22 | 2016-11-09 | 飞天诚信科技股份有限公司 | The authentication method of a kind of biological characteristic contrast and system |
CN106254539A (en) * | 2016-09-23 | 2016-12-21 | 捷开通讯(深圳)有限公司 | Mobile device and used time monitoring system based on living things feature recognition, method |
-
2016
- 2016-12-30 CN CN201611262952.6A patent/CN106603563A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101266704A (en) * | 2008-04-24 | 2008-09-17 | 张宏志 | ATM secure authentication and pre-alarming method based on face recognition |
CN101330386A (en) * | 2008-05-19 | 2008-12-24 | 刘洪利 | Authentication system based on biological characteristics and identification authentication method thereof |
CN101833842A (en) * | 2009-03-13 | 2010-09-15 | 新奥特硅谷视频技术有限责任公司 | Method for monitoring monitored personnel |
CN104951680A (en) * | 2014-03-27 | 2015-09-30 | 阿里巴巴集团控股有限公司 | Biological characteristic information processing method, storage method and device |
CN105530267A (en) * | 2016-02-15 | 2016-04-27 | 上海斐讯数据通信技术有限公司 | Software login method, terminal, server and system based biological characteristics |
CN106101135A (en) * | 2016-07-22 | 2016-11-09 | 福州大学 | A kind of account login system based on face and fingerprint recognition and its implementation |
CN106101136A (en) * | 2016-07-22 | 2016-11-09 | 飞天诚信科技股份有限公司 | The authentication method of a kind of biological characteristic contrast and system |
CN106254539A (en) * | 2016-09-23 | 2016-12-21 | 捷开通讯(深圳)有限公司 | Mobile device and used time monitoring system based on living things feature recognition, method |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
CN107181766A (en) * | 2017-07-25 | 2017-09-19 | 湖南中迪科技有限公司 | The management-control method and device of log-on message |
CN107749837A (en) * | 2017-09-26 | 2018-03-02 | 甘肃万维信息技术有限责任公司 | A kind of E-Government Resource Security guard system and its method |
CN108564040A (en) * | 2018-04-17 | 2018-09-21 | 杭州景联文科技有限公司 | A kind of fingerprint activity test method based on depth convolution feature |
CN109145560B (en) * | 2018-08-08 | 2022-03-25 | 北京小米移动软件有限公司 | Method and device for accessing monitoring equipment |
CN109145560A (en) * | 2018-08-08 | 2019-01-04 | 北京小米移动软件有限公司 | The method and device of accessing monitoring equipment |
CN109657536A (en) * | 2018-10-30 | 2019-04-19 | 国网安徽省电力有限公司信息通信分公司 | A kind of identity identifying method and system merging bio-identification and cryptographic technique |
CN109703571A (en) * | 2018-12-24 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | A kind of vehicle entertainment system login system and login method based on recognition of face |
CN109711126A (en) * | 2019-01-03 | 2019-05-03 | 黄河科技学院 | A kind of computer information safe management system and method |
CN110298233A (en) * | 2019-05-15 | 2019-10-01 | 平安科技(深圳)有限公司 | Palm grain identification method, device, computer equipment and storage medium |
CN110298233B (en) * | 2019-05-15 | 2024-04-09 | 平安科技(深圳)有限公司 | Palmprint recognition method, palmprint recognition device, computer equipment and storage medium |
CN110730169A (en) * | 2019-09-29 | 2020-01-24 | 北京东软望海科技有限公司 | Processing method, device and system for guaranteeing account security |
CN111092731A (en) * | 2019-11-04 | 2020-05-01 | 西安万像电子科技有限公司 | Authentication method and server |
CN111062025A (en) * | 2019-12-09 | 2020-04-24 | Oppo广东移动通信有限公司 | Application data processing method and related device |
CN111131202A (en) * | 2019-12-12 | 2020-05-08 | 厦门市美亚柏科信息股份有限公司 | Identity authentication method and system based on multiple information authentication |
CN112084948A (en) * | 2020-09-10 | 2020-12-15 | 深圳市迈航信息技术有限公司 | Method and system for improving security check safety by adopting human face data mode |
CN112732527A (en) * | 2021-01-08 | 2021-04-30 | 国网安徽省电力有限公司信息通信分公司 | Electric power system information safety monitoring method and system |
CN115220665A (en) * | 2022-09-14 | 2022-10-21 | 深圳市木浪云科技有限公司 | Access method and system of distributed storage system |
CN115220665B (en) * | 2022-09-14 | 2022-12-20 | 深圳市木浪云科技有限公司 | Access method and system of distributed storage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106603563A (en) | Information safety realization method and system based on biometric features identification | |
US10068076B1 (en) | Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior | |
Li et al. | Unobservable re-authentication for smartphones. | |
US9704051B2 (en) | Method and system for verifying identities | |
US20200004939A1 (en) | Biometric authentication | |
US20210089635A1 (en) | Biometric identity verification and protection software solution | |
US20050188213A1 (en) | System for personal identity verification | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN108171137B (en) | Face recognition method and system | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
US11496471B2 (en) | Mobile enrollment using a known biometric | |
US9202035B1 (en) | User authentication based on biometric handwriting aspects of a handwritten code | |
US20170352037A1 (en) | Identification and Payment Method Using Biometric Characteristics | |
CN103646200B (en) | The coding encrypting of a kind of face information and application process | |
Buriro et al. | Evaluation of motion-based touch-typing biometrics for online banking | |
Agidi | Biometrics: the future of banking and financial service industry in Nigeria | |
US11954188B1 (en) | Systems and methods for dynamic bio-behavioral authentication | |
Shrestha et al. | Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics | |
JP5903257B2 (en) | Authentication system, registration device, and authentication device | |
Parusheva | A comparative study on the application of biometric technologies for authentication in online banking. | |
Goel et al. | Securing biometric framework with cryptanalysis | |
EP3217593A1 (en) | Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system | |
CN111478875A (en) | Block chain-based biological sign mixed mode authentication method and system | |
Lala et al. | Towards A secured financial transaction: A multi-factor authentication model | |
Vorobyeva et al. | Benefits and issues of biometric technologies. Are biometrics worth using? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |