CN108537028A - A kind of computer identity identifying system and method - Google Patents
A kind of computer identity identifying system and method Download PDFInfo
- Publication number
- CN108537028A CN108537028A CN201810342986.9A CN201810342986A CN108537028A CN 108537028 A CN108537028 A CN 108537028A CN 201810342986 A CN201810342986 A CN 201810342986A CN 108537028 A CN108537028 A CN 108537028A
- Authority
- CN
- China
- Prior art keywords
- people
- computer
- unit
- fingerprint
- sound
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of computer identity identifying system and methods.The system includes:Registration module, recognition mode selecting module, I log in subsystem, other people log in subsystem and database.The present invention passes through setting login mode and other people two kinds of computer login mode of login mode, other people can be allowed temporarily to enter computer while improving computer security performance and carry out specific operation, when efficiently solving before addressee absent computer but being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain relevant information;It i.e. under my login mode, is verified by multiple matching, while needing just match after decrypting facial image, sound and fingerprint, improve safety;Under other people login mode, the head image information of operator and mobile phone MAC Address are stored in database first, using the evidence checked as the later stage, other people log into thr computer identifications is completed secondly by Quick Response Code and authorization code, improves safety.
Description
Technical field
The present invention relates to identification field, a kind of computer identity identifying system and method are more particularly related to.
Background technology
With the continuous development of computer technology, information security becomes focus of people's attention, especially in airport, silver
The computer information systems field such as row, prison, respective government agencies, military establishment, enterprise, one of the measure as safety precaution,
It is to be verified to the identity of user, usual way is to be arranged and input various forms of passwords on every computer,
Or by other means such as magnetic card, fingerprint, with confirm user identity and its during operation in responsibility, prevent illegal body
The user of part enters computer system using the machine or by the machine.
However, computer identity identifying system in the prior art is typically by various forms of identification methods to me
Identity is verified, and computer security is improved, and in order to improve the security performance of computer, only I can pass through complexity
Identification method identification and can identify successfully, other people can not then carry out identification.But when addressee absent calculates
Before machine but be badly in need of when knowing certain information of computer-internal, then need near computer other people help acquisition, at this moment
Need other people that can also enter computer by identification, however, there is no can both improve computer security performance at present
The technology that other people enter computer can also allow for exist.
Invention content
A kind of computer identity identifying system of offer of the embodiment of the present invention and method, it is existing in the prior art to solve
Problem.
The embodiment of the present invention provides a kind of computer identity identifying system, including:Registration module, recognition mode select mould
Block, I log in subsystem, other people log in subsystem and database, and the registration module, it is described I log in subsystem and
It is described that other people log in subsystem and are connect with the database;
Registration module includes:Essential information registering unit, face image data registering unit, voice data registering unit and
Finger print data registering unit;
The essential information registering unit, in user's registration, filling in the essential information of user;
The face image data registering unit, for the face for obtaining user's different angle of in user's registration, taking pictures
Image, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;
The voice data registering unit, in user's registration, obtaining the sound characteristic information of user and to sound
Characteristic packet is encrypted;
The finger print data registering unit, in user's registration, obtaining the fingerprint feature information of user and to fingerprint
Characteristic packet is encrypted;
The recognition mode selecting module, selected on the graphical interfaces after computer booting my login mode or
Other people login mode;
It is described I log in subsystem include:Acquisition module, characteristic extracting module and match cognization module;
The acquisition module includes:Face image data collecting unit, voice data collecting unit and fingerprint data collection
Unit;
The characteristic extracting module includes:Facial image feature extraction unit, sound characteristic extraction unit and fingerprint characteristic
Extraction unit;
The match cognization module includes:Stochastic problem matching unit, dynamic password matching unit, facial image matching are single
Member, Sound Match unit, fingerprint matching unit and recognition unit;
The stochastic problem matching unit, the essential information for being filled in when question answering interface is replied according to registration carry
The stochastic problem gone out, the successful match if answering correctly, otherwise fails;
The dynamic password matching unit, the basic letter for being filled in when dynamic password input interface is filled according to registration
The dynamic password that the corresponding mobile phone of cell-phone number receives in breath, the successful match if input is correct, otherwise fails;
The facial image matching unit, for again by after the stochastic problem matching unit successful match to image
Characteristic packet is decrypted, and will pass through the face image data collecting unit and the facial image feature extraction unit
Data compareed with the image feature data after decryption, the successful match if the similarity of results of comparison reaches 90%,
Otherwise fail;
The Sound Match unit, for again by after the stochastic problem matching unit successful match to sound characteristic
Data packet is decrypted, and will be by data and the decryption of the voice data collecting unit and the sound characteristic extraction unit
Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;
The fingerprint matching unit, for again by after the stochastic problem matching unit successful match to fingerprint characteristic
Data packet is decrypted, and will be by data and the decryption of the fingerprint data collection unit and the Finger print characteristic abstract unit
Fingerprint characteristic data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;
The recognition unit judges stochastic problem, dynamic password, facial image, sound and fingerprint three times for working as
Within successful match when, then my log into thr computer identification success;
Other people log in subsystem:Authorization code generation module, his human head picture acquisition module, mobile phone connection authentication module,
Two-dimensional code generation module and recognition and verification module;
The authorization code generation module, when selecting other people login mode, computer sends him to the mobile phone of registration user
People logs in authorization code;
His human head picture acquisition module, for acquiring other people head image datas and being stored in the database;
The mobile phone connects authentication module, for currently carrying out what other people logged in by the WIFI module search on computer
Other people mobile phones, obtain the MAC Address of other people mobile phones and are stored in the database;
The two-dimensional code generation module, including:Facial image Quick Response Code generation unit, sound Quick Response Code generation unit and refer to
Line Quick Response Code generation unit;
The facial image Quick Response Code generation unit, for generating people at random according to the frame data in image feature data packet
Face image Quick Response Code;
The sound Quick Response Code generation unit, for generating sound two at random according to the frame data in voice characteristics data packet
Tie up code;
The fingerprint Quick Response Code generation unit, for generating fingerprint two at random according to the frame data in fingerprint characteristic data packet
Tie up code;
The recognition and verification module passes through the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound two dimension
It is one or more in code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, if input
Other people log in authorization code three times within successful match, then other people log into thr computer identifications success.
Further, the essential information includes:Name, cell-phone number, identification card number, QQ number, each stage school title, respectively
Period work unit's title, parent, siblings and good friend's title.
Further, computer identity identifying system provided in an embodiment of the present invention further includes:Alarm module;The report
Alert module is used for when my log into thr computer identification failure or other people log into thr computer identification failures, computer
Send out alarm signal.
Further, it is described other people log in subsystem and further include:Monitoring module;The monitoring module, for stepping at other people
The number before computer is monitored under record pattern, when number is more than for the moment, computer closes display screen.
Further, the monitoring module includes:Infrared surveillance equipment and/or video monitor.
Further, it other people is stated logs in subsystem and further include:Access record generation module;The access record generates mould
Block, for by it is described other people log in the access historical path that subsystem enters after computer and carry out packing note according to the time
Record.
The embodiment of the present invention provides a kind of computer identity recognition methods, including:
In user's registration, obtains the essential information of user, encrypted image characteristic packet, encrypts voice characteristics data packet
With cryptographic fingerprint characteristic packet;
My login mode or other people login mode are selected on graphical interfaces after computer booting;
When selecting my login mode, acquisition face image data, voice data and finger print data, and to facial image
Data, voice data and finger print data carry out feature extraction;
Stochastic problem, dynamic password, facial image, sound and fingerprint are matched;
When judging stochastic problem, dynamic password, facial image, sound and the fingerprint successful match within three times, then
My log into thr computer identification is successful;
When selecting other people login mode, computer sends other people to the mobile phone of registration user and logs in authorization code;
It acquires other people head image datas and is stored in database;
Other people mobile phones that other people logins are currently carried out by the search of WIFI module on computer obtain other people mobile phones
MAC Address is simultaneously stored in database;
It is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code;
By in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of other people mobile phone scanning computer pop-ups
It is one or more, and in pop-up box after scanning input other people log in authorization code, if other people of input log in authorization code three
Successful match within secondary, then other people log into thr computer identifications are successful.
Further, described in user's registration, it obtains the essential information of user, encrypted image characteristic packet, encrypt
Voice characteristics data packet and cryptographic fingerprint characteristic packet, specifically include:
Fill in the essential information of user;
It takes pictures and obtains the face image of user's different angle, according to carrying out feature extraction after area dividing respectively and to image
Characteristic packet is encrypted;
It obtains the sound characteristic information of user and voice characteristics data packet is encrypted;
It obtains the fingerprint feature information of user and fingerprint characteristic data packet is encrypted.
Further, described that stochastic problem, dynamic password, facial image, sound and fingerprint are matched, it is specific to wrap
It includes:
The stochastic problem that the essential information filled in when question answering interface is replied according to registration proposes, if answered correct
Otherwise then successful match fails;
The corresponding mobile phone of cell-phone number receives in the essential information filled in when dynamic password input interface is filled according to registration
Dynamic password, otherwise the successful match if input is correct fails;
Facial image characteristic packet is decrypted after carrying out stochastic problem successful match again, and will be after feature extraction
Face image data compareed with the image feature data after decryption, if the similarity of results of comparison reaches 90%
With success, otherwise fail;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound after feature extraction
Sound data are compareed with the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%,
Otherwise fail;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound after feature extraction
Sound data are compareed with the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%,
Otherwise fail.
Further, the random generation facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code, specifically include:
Facial image Quick Response Code is generated at random according to the frame data in image feature data packet;
Sound Quick Response Code is generated at random according to the frame data in voice characteristics data packet;
Fingerprint Quick Response Code is generated at random according to the frame data in fingerprint characteristic data packet.
In the embodiment of the present invention, a kind of computer identity identifying system and method are provided, it is compared with prior art, beneficial
Effect is as follows:
The present invention can improved by setting login mode and other people two kinds of computer login mode of login mode
Allow other people temporarily to enter computer while computer security performance and carry out specific operation, efficiently solves and work as addressee absent
Before computer but when being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain relevant information.
I.e. under my login mode, pass through stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint
Matching, and within three times when successful match, then my log into thr computer identification success, wherein to facial image matching,
Sound Match and the facial image of fingerprint matching, sound and fingerprint needs be decrypted again by stochastic problem after just can with
Match, stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint matching are combined together, multiple
It with verification, while needing just match after decrypting facial image, sound and fingerprint, to reliably improve computer
Safety.I.e. under other people login mode, first, the head image information of operator and mobile phone MAC Address are stored in database, using as
The evidence that later stage checks;Next, by the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound Quick Response Code, refers to
It is one or more in line Quick Response Code, and in pop-up box after scanning input other people log in authorization code, if input other people
Log in authorization code three times within successful match, then other people log into thr computer identifications success, meter is logged in improve other people
The safety of calculation machine.
Description of the drawings
Fig. 1 is a kind of main functional block diagram of computer identity identifying system provided in an embodiment of the present invention;
Fig. 2 is registration module block diagram provided in an embodiment of the present invention;
Fig. 3 is login subsystem diagram in person provided in an embodiment of the present invention;
Fig. 4 be it is provided in an embodiment of the present invention other people log in subsystem diagram;
Fig. 5 is the main functional block diagram of another computer identity identifying system provided in an embodiment of the present invention;
Fig. 6 is a kind of computer identity recognition methods main flow chart provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of computer identity identifying system provided in an embodiment of the present invention.As shown in Figure 1, the system includes:Note
Volume module 1, recognition mode selecting module 2, I logs in, and subsystem 31, other people log in subsystem 32 and database 4, and register mould
Block 1, I logs in subsystem 31 and other people log in subsystem 32 and are connect with database 4.
Specifically, registration module 1 includes:Essential information registering unit 11, face image data registering unit 12, sound number
According to registering unit 13 and finger print data registering unit 14.
Further, essential information registering unit 11, in user's registration, filling in the essential information of user;This hair
The bright essential information being related to includes:Name, cell-phone number, identification card number, QQ number, each stage school title, each period job note
Position title, parent, siblings and good friend's title etc..
Further, face image data registering unit 12 obtains user's different angle in user's registration, taking pictures
Face image, according to feature extraction is carried out after area dividing respectively and image feature data packet is encrypted.
Further, voice data registering unit 13, in user's registration, obtaining the sound characteristic information of user simultaneously
Voice characteristics data packet is encrypted.
Further, finger print data registering unit 14, in user's registration, obtaining the fingerprint feature information of user simultaneously
Fingerprint characteristic data packet is encrypted.
It should be noted that in order to avoid my face image data, voice data and finger print data are stolen, to
Face image data, voice data and finger print data are encrypted.
Specifically, recognition mode selecting module 2 selects me to log in mould on the graphical interfaces after computer booting
Formula or other people login mode.
Specifically, my login subsystem 31 includes:Acquisition module 311, characteristic extracting module 312 and match cognization module
313。
Further, acquisition module 311 includes:Face image data collecting unit 311-1, voice data collecting unit
311-2 and fingerprint data collection unit 311-3;Characteristic extracting module 312 includes:Facial image feature extraction unit 312-1, sound
Sound feature extraction unit 312-2 and Finger print characteristic abstract unit 312-3;Match cognization module 313 includes:Stochastic problem matching is single
First 313-1, dynamic password matching unit 313-2, facial image matching unit 313-3, Sound Match unit 313-4, fingerprint
With unit 313-5 and recognition unit 313-6.
Wherein, stochastic problem matching unit 313-1, it is basic for being filled in when question answering interface is replied according to registration
The stochastic problem that information proposes, the successful match if answering correctly, otherwise fails.
Wherein, dynamic password matching unit 313-2, for what is filled in when dynamic password input interface is filled according to registration
The dynamic password that the corresponding mobile phone of cell-phone number receives in essential information, the successful match if input is correct, otherwise fails.
Wherein, facial image matching unit 313-3, for again by stochastic problem matching unit 313-1 successful match
Image feature data packet is decrypted afterwards, and will be carried by face image data collecting unit 311-1 and facial image feature
The data of unit 312-1 are taken to be compareed with the image feature data after decryption, if the similarity of results of comparison reaches 90%
Otherwise then successful match fails.
Wherein, Sound Match unit 313-4, for again by right after stochastic problem matching unit 313-1 successful match
Voice characteristics data packet is decrypted, and will be by voice data collecting unit 311-2's and sound feature extraction unit 312-2
Data are compareed with the voice characteristics data after decryption, and the successful match if the similarity of results of comparison reaches 90% is no
Then fail.
Wherein, fingerprint matching unit 313-5, for again by right after stochastic problem matching unit 313-1 successful match
Fingerprint characteristic data packet is decrypted, and will be by fingerprint data collection unit 311-2's and Finger print characteristic abstract unit 312-2
Data are compareed with the fingerprint characteristic data after decryption, and the successful match if the similarity of results of comparison reaches 90% is no
Then fail.
Wherein, recognition unit 313-6 judges that stochastic problem, dynamic password, facial image, sound and fingerprint are equal for working as
Within three times when successful match, then my log into thr computer identification success.
Specifically, other people log in subsystem 32 and include:Authorization code generation module 321, his human head picture acquisition module 322, hand
Machine connects authentication module 323, two-dimensional code generation module 324 and recognition and verification module 325.
Further, authorization code generation module 321, when selecting other people login mode, hand of the computer to registration user
Machine sends other people and logs in authorization code;His human head picture acquisition module 322, for acquiring other people head image datas and being stored in database 4;
Mobile phone connects authentication module 323, other people mobile phones for currently carrying out other people logins by the search of WIFI module on computer,
It obtains the MAC Address of other people mobile phones and is stored in database 4;Two-dimensional code generation module 324, including:Facial image Quick Response Code is given birth to
At unit 324-1, sound Quick Response Code generation unit 324-2 and fingerprint Quick Response Code generation unit 324-3;Recognition and verification module 325,
By one kind in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of the pop-up of other people mobile phone scanning computers or more
Kind, and in pop-up box after scanning input other people log in authorization code, if input other people log in authorization code three times within
With success, then other people log into thr computer identifications are successful.
Wherein, facial image Quick Response Code generation unit 324-1, for random according to the frame data in image feature data packet
Generate facial image Quick Response Code;Sound Quick Response Code generation unit 324-2, for according to the frame data in voice characteristics data packet with
Machine generates sound Quick Response Code;Fingerprint Quick Response Code generation unit 324-3, for random according to the frame data in fingerprint characteristic data packet
Generate fingerprint Quick Response Code.
Preferably, other people log in subsystem 32 further includes:Monitoring module 326;Monitoring module 326, in other people logins
The number before computer is monitored under pattern, when number is more than for the moment, computer closes display screen.Wherein, monitoring module 326 wraps
It includes:Infrared surveillance equipment and/or video monitor.
Preferably, other people log in subsystem 32 further includes:Access record generation module 327;Access record generation module
327, for carrying out packing record according to the time into the access historical path after computer to logging in subsystem 32 by other people.
Preferably, referring to Fig. 5, computer identity identifying system provided in an embodiment of the present invention further includes:Alarm module 5;
Alarm module 5, for when my log into thr computer identification fails or other people log into thr computer identifications fail, counting
Calculation machine sends out alarm signal.
Fig. 6 is a kind of computer identity recognition methods main flow chart provided in an embodiment of the present invention.As shown in fig. 6, the party
Method includes:
Step S1 obtains the essential information of user, encrypted image characteristic packet, encrypts sound spy in user's registration
Levy data packet and cryptographic fingerprint characteristic packet.
It specifically includes:In user's registration, the essential information of user is filled in;It takes pictures and obtains face's figure of user's different angle
Picture, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;Obtain the sound of user
Sound characteristic information is simultaneously encrypted voice characteristics data packet;Obtain the fingerprint feature information of user and to fingerprint characteristic number
It is encrypted according to packet.
Step S2 selects my login mode or other people login mode on the graphical interfaces after computer booting.
When selecting my login mode, including following three steps:
Step S311, acquisition face image data, voice data and finger print data, and to face image data, sound number
Feature extraction is carried out according to finger print data.
Step S312 matches stochastic problem, dynamic password, facial image, sound and fingerprint.
It specifically includes:The stochastic problem that the essential information filled in when question answering interface is replied according to registration proposes, such as
Fruit answers correct then successful match, otherwise fails;The essential information filled in when dynamic password input interface is filled according to registration
The dynamic password that the corresponding mobile phone of middle cell-phone number receives, the successful match if input is correct, otherwise fails;It carries out again random
Facial image characteristic packet is decrypted after problem successful match, and by after feature extraction face image data and decryption
Image feature data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;Again
Carry out stochastic problem successful match after voice characteristics data packet is decrypted, and by after feature extraction voice data and decryption
Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;Again
Carry out stochastic problem successful match after voice characteristics data packet is decrypted, and by after feature extraction voice data and decryption
Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails.
Step S313, when judging that stochastic problem, dynamic password, facial image, sound and fingerprint match within three times
When success, then my log into thr computer identification is successful.
When selecting other people login mode, including following five steps:
Step S321, computer send other people to the mobile phone of registration user and log in authorization code.
Step S322 acquires other people head image datas and is stored in database.
Step S323 is currently carried out other people mobile phones of other people logins by the search of WIFI module on computer, obtains him
The MAC Address of human hand machine is simultaneously stored in database.
Step S324, it is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code.
Step S325 passes through facial image Quick Response Code, sound Quick Response Code, the fingerprint two of other people mobile phone scanning computer pop-ups
Tie up it is one or more in code, and in pop-up box after scanning input other people log in authorization code, if other people logins of input
Authorization code three times within successful match, then other people log into thr computer identifications success.
In conclusion the present invention is by setting login mode and other people two kinds of computer login mode of login mode,
Other people can be allowed temporarily to enter computer while improving computer security performance and carry out specific operation, efficiently solved
Before addressee absent computer but when being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain
Relevant information.I.e. under my login mode, pass through stochastic problem matching, dynamic password matching, facial image matching, sound
Match and fingerprint matching, and within three times when successful match, then my log into thr computer identification success, wherein to face
Images match, Sound Match and the facial image of fingerprint matching, sound and fingerprint needs are decrypted again by stochastic problem
Can just match afterwards, by stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint matching melt for
One, multiple matching verification, while needing just match after decrypting facial image, sound and fingerprint, to reliably carry
The high safety of computer.I.e. under other people login mode, first, the head image information of operator and mobile phone MAC Address are stored in
Database, using the evidence checked as the later stage;Secondly, by the facial image Quick Response Code of other people mobile phone scanning computers pop-up,
It is one or more in sound Quick Response Code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, such as
Fruit input other people log in authorization code three times within successful match, then other people log into thr computer identifications success, to improve
The safeties of other people log into thr computer.
Disclosed above is only several specific embodiments of the present invention, and those skilled in the art can carry out the present invention
Various modification and variations without departing from the spirit and scope of the present invention, if these modifications and changes of the present invention belong to the present invention
Within the scope of claim and its equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of computer identity identifying system, which is characterized in that including:Registration module (1), recognition mode selecting module (2),
I logs in that subsystem (31), other people log in subsystem (32) and database (4), and the registration module (1), described step in person
Record subsystem (31) and it is described other people log in subsystem (32) and connect with the database (4);
Registration module (1) includes:Essential information registering unit (11), face image data registering unit (12), voice data note
Volume unit (13) and finger print data registering unit (14);
The essential information registering unit (11), in user's registration, filling in the essential information of user;
The face image data registering unit (12), for the face for obtaining user's different angle of in user's registration, taking pictures
Image, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;
The voice data registering unit (13), in user's registration, obtaining the sound characteristic information of user and to sound
Characteristic packet is encrypted;
The finger print data registering unit (14), in user's registration, obtaining the fingerprint feature information of user and to fingerprint
Characteristic packet is encrypted;
The recognition mode selecting module (2), selected on the graphical interfaces after computer booting my login mode or
Other people login mode;
It is described I log in subsystem (31) include:Acquisition module (311), characteristic extracting module (312) and match cognization module
(313);
The acquisition module (311) includes:Face image data collecting unit (311-1), voice data collecting unit (311-2)
With fingerprint data collection unit (311-3);
The characteristic extracting module (312) includes:Facial image feature extraction unit (312-1), sound characteristic extraction unit
(312-2) and Finger print characteristic abstract unit (312-3);
The match cognization module (313) includes:Stochastic problem matching unit (313-1), dynamic password matching unit (313-
2), facial image matching unit (313-3), Sound Match unit (313-4), fingerprint matching unit (313-5) and recognition unit
(313-6);
The stochastic problem matching unit (313-1), the basic letter for being filled in when question answering interface is replied according to registration
The stochastic problem proposed is ceased, otherwise the successful match if answering correctly fails;
The dynamic password matching unit (313-2), the base for being filled in when dynamic password input interface is filled according to registration
The dynamic password that the corresponding mobile phone of cell-phone number receives in this information, the successful match if input is correct, otherwise fails;
The facial image matching unit (313-3), for again by the stochastic problem matching unit (313-1) matching at
Image feature data packet is decrypted after work(, and the face image data collecting unit (311-1) and the people will be passed through
The data of face image feature extraction unit (312-1) are compareed with the image feature data after decryption, if results of comparison
Similarity reaches 90% successful match, otherwise fails;
The Sound Match unit (313-4), after again by stochastic problem matching unit (313-1) successful match
Voice characteristics data packet is decrypted, and will be carried by the voice data collecting unit (311-2) and the sound characteristic
The data of unit (312-2) are taken to be compareed with the voice characteristics data after decryption, if the similarity of results of comparison reaches
90% successful match, otherwise fails;
The fingerprint matching unit (313-5), after again by stochastic problem matching unit (313-1) successful match
Fingerprint characteristic data packet is decrypted, and will be carried by the fingerprint data collection unit (311-2) and the fingerprint characteristic
The data of unit (312-2) are taken to be compareed with the fingerprint characteristic data after decryption, if the similarity of results of comparison reaches
90% successful match, otherwise fails;
The recognition unit (313-6) judges stochastic problem, dynamic password, facial image, sound and fingerprint three for working as
Within secondary when successful match, then my log into thr computer identification is successful;
Other people log in subsystem (32):Authorization code generation module (321), his human head picture acquisition module (322), mobile phone connection
Authentication module (323), two-dimensional code generation module (324) and recognition and verification module (325);
The authorization code generation module (321), when selecting other people login mode, computer sends him to the mobile phone of registration user
People logs in authorization code;
His human head picture acquisition module (322), for acquiring other people head image datas and being stored in the database (4);
The mobile phone connection authentication module (323) logs in for currently carrying out other people by the WIFI module search on computer
Other people mobile phones, obtain the MAC Address of other people mobile phones and be stored in the database (4);
The two-dimensional code generation module (324), including:Facial image Quick Response Code generation unit (324-1), sound Quick Response Code generate
Unit (324-2) and fingerprint Quick Response Code generation unit (324-3);
The facial image Quick Response Code generation unit (324-1), for being given birth at random according to the frame data in image feature data packet
At facial image Quick Response Code;
The sound Quick Response Code generation unit (324-2), for according to the generation sound at random of the frame data in voice characteristics data packet
Sound Quick Response Code;
The fingerprint Quick Response Code generation unit (324-3) refers to for being generated at random according to the frame data in fingerprint characteristic data packet
Line Quick Response Code;
The recognition and verification module (325) passes through the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound two dimension
It is one or more in code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, if input
Other people log in authorization code three times within successful match, then other people log into thr computer identifications success.
2. computer identity identifying system as described in claim 1, which is characterized in that the essential information includes:Name, hand
Machine number, identification card number, QQ number, each stage school title, each period work unit title, parent, siblings and good friend's name
Claim.
3. computer identity identifying system as described in claim 1, which is characterized in that further include:Alarm module (5);It is described
Alarm module (5) is used for when my log into thr computer identification failure or other people log into thr computer identification failures,
Computer sends out alarm signal.
4. computer identity identifying system as described in claim 1, which is characterized in that described other people log in subsystem (32) also
Including:Monitoring module (326);The monitoring module (326) is used to monitor the number before computer under other people login mode,
When number is more than for the moment, computer closes display screen.
5. computer identity identifying system as claimed in claim 4, which is characterized in that the monitoring module (326) includes:It is red
Outer monitor and/or video monitor.
6. computer identity identifying system as described in claim 1, which is characterized in that described other people log in subsystem (32) also
Including:Access record generation module (327);Access record generation module (327), for pass through it is described other people log in son
System (32) carries out packing record into the access historical path after computer according to the time.
7. a kind of computer identity recognition methods, which is characterized in that including:
In user's registration, the essential information of user is obtained, encrypted image characteristic packet, voice characteristics data packet is encrypted and adds
Mi Zhiwentezhengshuojubao;
My login mode or other people login mode are selected on graphical interfaces after computer booting;
When selecting my login mode, acquisition face image data, voice data and finger print data, and to facial image number
Feature extraction is carried out according to, voice data and finger print data;
Stochastic problem, dynamic password, facial image, sound and fingerprint are matched;
When judging stochastic problem, dynamic password, facial image, sound and the fingerprint successful match within three times, then I
Log into thr computer identification success;
When selecting other people login mode, computer sends other people to the mobile phone of registration user and logs in authorization code;
It acquires other people head image datas and is stored in database;
Other people mobile phones of other people logins are currently carried out by the search of WIFI module on computer, with obtaining the MAC of other people mobile phones
Location is simultaneously stored in database;
It is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code;
Pass through one kind in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of other people mobile phone scanning computer pop-ups
Or it is a variety of, and in pop-up box after scanning input other people log in authorization code, if other people of input log in authorization code three and take second place
Interior successful match, then other people log into thr computer identifications are successful.
8. computer identity recognition methods as claimed in claim 7, which is characterized in that it is described in user's registration, it obtains and uses
Essential information, encrypted image characteristic packet, encryption voice characteristics data packet and the cryptographic fingerprint characteristic packet at family, it is specific to wrap
It includes:
Fill in the essential information of user;
It takes pictures and obtains the face image of user's different angle, according to carrying out feature extraction after area dividing respectively and to characteristics of image
Data packet is encrypted;
It obtains the sound characteristic information of user and voice characteristics data packet is encrypted;
It obtains the fingerprint feature information of user and fingerprint characteristic data packet is encrypted.
9. computer identity recognition methods as claimed in claim 7, which is characterized in that it is described to stochastic problem, dynamic password,
Facial image, sound and fingerprint are matched, and are specifically included:
The stochastic problem that the essential information filled in proposes when question answering interface is replied according to registration, if answer it is correct if
With success, otherwise fail;
What the corresponding mobile phone of cell-phone number received in the essential information filled in when dynamic password input interface is filled according to registration is dynamic
State password, the successful match if input is correct, otherwise fails;
Facial image characteristic packet is decrypted after carrying out stochastic problem successful match again, and by the people after feature extraction
Face image data with decryption after image feature data compareed, if the similarity of results of comparison reaches 90% matching at
Otherwise work(fails;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound number after feature extraction
It is compareed according to the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, otherwise
Failure;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound number after feature extraction
It is compareed according to the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, otherwise
Failure.
10. computer identity recognition methods as claimed in claim 7, which is characterized in that the random generation facial image two
Code, sound Quick Response Code and fingerprint Quick Response Code are tieed up, is specifically included:
Facial image Quick Response Code is generated at random according to the frame data in image feature data packet;
Sound Quick Response Code is generated at random according to the frame data in voice characteristics data packet;
Fingerprint Quick Response Code is generated at random according to the frame data in fingerprint characteristic data packet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810342986.9A CN108537028A (en) | 2018-04-17 | 2018-04-17 | A kind of computer identity identifying system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810342986.9A CN108537028A (en) | 2018-04-17 | 2018-04-17 | A kind of computer identity identifying system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108537028A true CN108537028A (en) | 2018-09-14 |
Family
ID=63480810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810342986.9A Pending CN108537028A (en) | 2018-04-17 | 2018-04-17 | A kind of computer identity identifying system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537028A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635138A (en) * | 2018-10-30 | 2019-04-16 | 厦门市杜若科技有限公司 | A kind of social networks method for building up and system based on similar appearance |
CN109657442A (en) * | 2018-12-03 | 2019-04-19 | 浙江万里学院 | A kind of computer user's identification system |
CN109726543A (en) * | 2018-12-30 | 2019-05-07 | 北京城市网邻信息技术有限公司 | A kind of login method of application program, device, terminal device and storage medium |
CN110166438A (en) * | 2019-04-19 | 2019-08-23 | 平安科技(深圳)有限公司 | Login method, device, computer equipment and the computer storage medium of account information |
CN110620781A (en) * | 2019-09-27 | 2019-12-27 | 深圳市大头互动文化传播有限公司 | User registration login management system based on game platform |
CN110766841A (en) * | 2019-06-12 | 2020-02-07 | 天津新泰基业电子股份有限公司 | User registration and verification method and device |
CN111859345A (en) * | 2020-07-28 | 2020-10-30 | 郑州奥腾网络科技有限公司 | Computer data safety storage system |
CN112818317A (en) * | 2021-04-19 | 2021-05-18 | 北京远鉴信息技术有限公司 | Browsing process monitoring method, monitoring device and readable storage medium |
CN113127832A (en) * | 2021-04-19 | 2021-07-16 | 东营天润石化科技有限公司 | Computer startup identity authentication system and authentication method thereof |
CN113222798A (en) * | 2021-04-30 | 2021-08-06 | 深圳市展拓电子技术有限公司 | Anti-don-avoid method and system for escort personnel, intelligent terminal and computer readable storage medium |
CN115982687A (en) * | 2023-01-10 | 2023-04-18 | 安徽中杰信息科技有限公司 | User identity verification system for data operation and maintenance management platform |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101241699A (en) * | 2008-03-14 | 2008-08-13 | 北京交通大学 | A speaker identification system for remote Chinese teaching |
US20140279642A1 (en) * | 2013-03-15 | 2014-09-18 | Mitek Systems, Inc. | Systems and methods for enrollment and identity management using mobile imaging |
US20150012988A1 (en) * | 2013-07-05 | 2015-01-08 | National Taiwan University Of Science And Technology | Authentication method and authentication system |
CN104469767A (en) * | 2014-10-28 | 2015-03-25 | 杭州电子科技大学 | Implementation method for integrated security protection subsystem of mobile office system |
CN104883351A (en) * | 2015-03-13 | 2015-09-02 | 小米科技有限责任公司 | Multiple-factor authentication method and device |
CN105453524A (en) * | 2013-05-13 | 2016-03-30 | 霍约什实验室Ip有限公司 | System and method for authorizing access to access-controlled environments |
CN105447364A (en) * | 2015-04-30 | 2016-03-30 | 北京天诚盛业科技有限公司 | Remote biological recognition registering method, device and system |
-
2018
- 2018-04-17 CN CN201810342986.9A patent/CN108537028A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101241699A (en) * | 2008-03-14 | 2008-08-13 | 北京交通大学 | A speaker identification system for remote Chinese teaching |
US20140279642A1 (en) * | 2013-03-15 | 2014-09-18 | Mitek Systems, Inc. | Systems and methods for enrollment and identity management using mobile imaging |
CN105453524A (en) * | 2013-05-13 | 2016-03-30 | 霍约什实验室Ip有限公司 | System and method for authorizing access to access-controlled environments |
US20150012988A1 (en) * | 2013-07-05 | 2015-01-08 | National Taiwan University Of Science And Technology | Authentication method and authentication system |
CN104469767A (en) * | 2014-10-28 | 2015-03-25 | 杭州电子科技大学 | Implementation method for integrated security protection subsystem of mobile office system |
CN104883351A (en) * | 2015-03-13 | 2015-09-02 | 小米科技有限责任公司 | Multiple-factor authentication method and device |
CN105447364A (en) * | 2015-04-30 | 2016-03-30 | 北京天诚盛业科技有限公司 | Remote biological recognition registering method, device and system |
Non-Patent Citations (1)
Title |
---|
陈子富: "Windows指纹登录系统的设计与实现", 《潍坊学院学报》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635138A (en) * | 2018-10-30 | 2019-04-16 | 厦门市杜若科技有限公司 | A kind of social networks method for building up and system based on similar appearance |
CN109657442A (en) * | 2018-12-03 | 2019-04-19 | 浙江万里学院 | A kind of computer user's identification system |
CN109726543B (en) * | 2018-12-30 | 2021-10-08 | 北京城市网邻信息技术有限公司 | Login method and device of application program, terminal equipment and storage medium |
CN109726543A (en) * | 2018-12-30 | 2019-05-07 | 北京城市网邻信息技术有限公司 | A kind of login method of application program, device, terminal device and storage medium |
CN110166438A (en) * | 2019-04-19 | 2019-08-23 | 平安科技(深圳)有限公司 | Login method, device, computer equipment and the computer storage medium of account information |
CN110766841A (en) * | 2019-06-12 | 2020-02-07 | 天津新泰基业电子股份有限公司 | User registration and verification method and device |
CN110620781A (en) * | 2019-09-27 | 2019-12-27 | 深圳市大头互动文化传播有限公司 | User registration login management system based on game platform |
CN111859345A (en) * | 2020-07-28 | 2020-10-30 | 郑州奥腾网络科技有限公司 | Computer data safety storage system |
CN113127832A (en) * | 2021-04-19 | 2021-07-16 | 东营天润石化科技有限公司 | Computer startup identity authentication system and authentication method thereof |
CN112818317A (en) * | 2021-04-19 | 2021-05-18 | 北京远鉴信息技术有限公司 | Browsing process monitoring method, monitoring device and readable storage medium |
CN113222798A (en) * | 2021-04-30 | 2021-08-06 | 深圳市展拓电子技术有限公司 | Anti-don-avoid method and system for escort personnel, intelligent terminal and computer readable storage medium |
CN115982687A (en) * | 2023-01-10 | 2023-04-18 | 安徽中杰信息科技有限公司 | User identity verification system for data operation and maintenance management platform |
CN115982687B (en) * | 2023-01-10 | 2023-07-28 | 安徽中杰信息科技有限公司 | User identity verification system for data operation and maintenance management platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108537028A (en) | A kind of computer identity identifying system and method | |
CN103685311B (en) | A kind of login validation method and equipment | |
US10311223B2 (en) | Virtual reality dynamic authentication | |
CN107251477B (en) | System and method for securely managing biometric data | |
CN106487511B (en) | Identity authentication method and device | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
US10999313B2 (en) | Facilitating network security analysis using virtual reality display devices | |
CN106789922A (en) | Give account number, the method and apparatus of authentication for change | |
US11354397B2 (en) | System and method for augmented reality authentication of a user | |
WO2018083089A1 (en) | Method for securing a transaction performed from a nonsecure terminal | |
CN107209821A (en) | For the method and authentication method being digitally signed to e-file | |
CN107294900A (en) | Identity registration method and apparatus based on biological characteristic | |
CN106326763A (en) | Method and device for obtaining electronic file | |
US11521208B2 (en) | System and method for authenticating transactions from a mobile device | |
JP2006520047A (en) | Method and system for enabling remote message creation | |
CN111143812B (en) | Login authentication method based on graphics | |
CN107872435A (en) | A kind of method and device of safety verification | |
JP2006155547A (en) | Individual authentication system, terminal device and server | |
CN109522694A (en) | A kind of identification system based on computer network | |
CN107994994A (en) | Image authentication code verification method, system, server and terminal | |
CN111583475A (en) | Electronic identity authentication method and system for airport security check | |
WO2023244602A1 (en) | Systems and methods that provide a high level of security for a user | |
CN115906028A (en) | User identity verification method and device and self-service terminal | |
CN107276962B (en) | Dynamic password voice authentication system capable of combining any gesture | |
CN110088758A (en) | Server apparatus, approaches to IM, information processing equipment, information processing method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180914 |