CN108537028A - A kind of computer identity identifying system and method - Google Patents

A kind of computer identity identifying system and method Download PDF

Info

Publication number
CN108537028A
CN108537028A CN201810342986.9A CN201810342986A CN108537028A CN 108537028 A CN108537028 A CN 108537028A CN 201810342986 A CN201810342986 A CN 201810342986A CN 108537028 A CN108537028 A CN 108537028A
Authority
CN
China
Prior art keywords
people
computer
unit
fingerprint
sound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810342986.9A
Other languages
Chinese (zh)
Inventor
杨大泷
陈婧娴
孙龙
陈奋增
缪涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201810342986.9A priority Critical patent/CN108537028A/en
Publication of CN108537028A publication Critical patent/CN108537028A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of computer identity identifying system and methods.The system includes:Registration module, recognition mode selecting module, I log in subsystem, other people log in subsystem and database.The present invention passes through setting login mode and other people two kinds of computer login mode of login mode, other people can be allowed temporarily to enter computer while improving computer security performance and carry out specific operation, when efficiently solving before addressee absent computer but being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain relevant information;It i.e. under my login mode, is verified by multiple matching, while needing just match after decrypting facial image, sound and fingerprint, improve safety;Under other people login mode, the head image information of operator and mobile phone MAC Address are stored in database first, using the evidence checked as the later stage, other people log into thr computer identifications is completed secondly by Quick Response Code and authorization code, improves safety.

Description

A kind of computer identity identifying system and method
Technical field
The present invention relates to identification field, a kind of computer identity identifying system and method are more particularly related to.
Background technology
With the continuous development of computer technology, information security becomes focus of people's attention, especially in airport, silver The computer information systems field such as row, prison, respective government agencies, military establishment, enterprise, one of the measure as safety precaution, It is to be verified to the identity of user, usual way is to be arranged and input various forms of passwords on every computer, Or by other means such as magnetic card, fingerprint, with confirm user identity and its during operation in responsibility, prevent illegal body The user of part enters computer system using the machine or by the machine.
However, computer identity identifying system in the prior art is typically by various forms of identification methods to me Identity is verified, and computer security is improved, and in order to improve the security performance of computer, only I can pass through complexity Identification method identification and can identify successfully, other people can not then carry out identification.But when addressee absent calculates Before machine but be badly in need of when knowing certain information of computer-internal, then need near computer other people help acquisition, at this moment Need other people that can also enter computer by identification, however, there is no can both improve computer security performance at present The technology that other people enter computer can also allow for exist.
Invention content
A kind of computer identity identifying system of offer of the embodiment of the present invention and method, it is existing in the prior art to solve Problem.
The embodiment of the present invention provides a kind of computer identity identifying system, including:Registration module, recognition mode select mould Block, I log in subsystem, other people log in subsystem and database, and the registration module, it is described I log in subsystem and It is described that other people log in subsystem and are connect with the database;
Registration module includes:Essential information registering unit, face image data registering unit, voice data registering unit and Finger print data registering unit;
The essential information registering unit, in user's registration, filling in the essential information of user;
The face image data registering unit, for the face for obtaining user's different angle of in user's registration, taking pictures Image, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;
The voice data registering unit, in user's registration, obtaining the sound characteristic information of user and to sound Characteristic packet is encrypted;
The finger print data registering unit, in user's registration, obtaining the fingerprint feature information of user and to fingerprint Characteristic packet is encrypted;
The recognition mode selecting module, selected on the graphical interfaces after computer booting my login mode or Other people login mode;
It is described I log in subsystem include:Acquisition module, characteristic extracting module and match cognization module;
The acquisition module includes:Face image data collecting unit, voice data collecting unit and fingerprint data collection Unit;
The characteristic extracting module includes:Facial image feature extraction unit, sound characteristic extraction unit and fingerprint characteristic Extraction unit;
The match cognization module includes:Stochastic problem matching unit, dynamic password matching unit, facial image matching are single Member, Sound Match unit, fingerprint matching unit and recognition unit;
The stochastic problem matching unit, the essential information for being filled in when question answering interface is replied according to registration carry The stochastic problem gone out, the successful match if answering correctly, otherwise fails;
The dynamic password matching unit, the basic letter for being filled in when dynamic password input interface is filled according to registration The dynamic password that the corresponding mobile phone of cell-phone number receives in breath, the successful match if input is correct, otherwise fails;
The facial image matching unit, for again by after the stochastic problem matching unit successful match to image Characteristic packet is decrypted, and will pass through the face image data collecting unit and the facial image feature extraction unit Data compareed with the image feature data after decryption, the successful match if the similarity of results of comparison reaches 90%, Otherwise fail;
The Sound Match unit, for again by after the stochastic problem matching unit successful match to sound characteristic Data packet is decrypted, and will be by data and the decryption of the voice data collecting unit and the sound characteristic extraction unit Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;
The fingerprint matching unit, for again by after the stochastic problem matching unit successful match to fingerprint characteristic Data packet is decrypted, and will be by data and the decryption of the fingerprint data collection unit and the Finger print characteristic abstract unit Fingerprint characteristic data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;
The recognition unit judges stochastic problem, dynamic password, facial image, sound and fingerprint three times for working as Within successful match when, then my log into thr computer identification success;
Other people log in subsystem:Authorization code generation module, his human head picture acquisition module, mobile phone connection authentication module, Two-dimensional code generation module and recognition and verification module;
The authorization code generation module, when selecting other people login mode, computer sends him to the mobile phone of registration user People logs in authorization code;
His human head picture acquisition module, for acquiring other people head image datas and being stored in the database;
The mobile phone connects authentication module, for currently carrying out what other people logged in by the WIFI module search on computer Other people mobile phones, obtain the MAC Address of other people mobile phones and are stored in the database;
The two-dimensional code generation module, including:Facial image Quick Response Code generation unit, sound Quick Response Code generation unit and refer to Line Quick Response Code generation unit;
The facial image Quick Response Code generation unit, for generating people at random according to the frame data in image feature data packet Face image Quick Response Code;
The sound Quick Response Code generation unit, for generating sound two at random according to the frame data in voice characteristics data packet Tie up code;
The fingerprint Quick Response Code generation unit, for generating fingerprint two at random according to the frame data in fingerprint characteristic data packet Tie up code;
The recognition and verification module passes through the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound two dimension It is one or more in code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, if input Other people log in authorization code three times within successful match, then other people log into thr computer identifications success.
Further, the essential information includes:Name, cell-phone number, identification card number, QQ number, each stage school title, respectively Period work unit's title, parent, siblings and good friend's title.
Further, computer identity identifying system provided in an embodiment of the present invention further includes:Alarm module;The report Alert module is used for when my log into thr computer identification failure or other people log into thr computer identification failures, computer Send out alarm signal.
Further, it is described other people log in subsystem and further include:Monitoring module;The monitoring module, for stepping at other people The number before computer is monitored under record pattern, when number is more than for the moment, computer closes display screen.
Further, the monitoring module includes:Infrared surveillance equipment and/or video monitor.
Further, it other people is stated logs in subsystem and further include:Access record generation module;The access record generates mould Block, for by it is described other people log in the access historical path that subsystem enters after computer and carry out packing note according to the time Record.
The embodiment of the present invention provides a kind of computer identity recognition methods, including:
In user's registration, obtains the essential information of user, encrypted image characteristic packet, encrypts voice characteristics data packet With cryptographic fingerprint characteristic packet;
My login mode or other people login mode are selected on graphical interfaces after computer booting;
When selecting my login mode, acquisition face image data, voice data and finger print data, and to facial image Data, voice data and finger print data carry out feature extraction;
Stochastic problem, dynamic password, facial image, sound and fingerprint are matched;
When judging stochastic problem, dynamic password, facial image, sound and the fingerprint successful match within three times, then My log into thr computer identification is successful;
When selecting other people login mode, computer sends other people to the mobile phone of registration user and logs in authorization code;
It acquires other people head image datas and is stored in database;
Other people mobile phones that other people logins are currently carried out by the search of WIFI module on computer obtain other people mobile phones MAC Address is simultaneously stored in database;
It is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code;
By in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of other people mobile phone scanning computer pop-ups It is one or more, and in pop-up box after scanning input other people log in authorization code, if other people of input log in authorization code three Successful match within secondary, then other people log into thr computer identifications are successful.
Further, described in user's registration, it obtains the essential information of user, encrypted image characteristic packet, encrypt Voice characteristics data packet and cryptographic fingerprint characteristic packet, specifically include:
Fill in the essential information of user;
It takes pictures and obtains the face image of user's different angle, according to carrying out feature extraction after area dividing respectively and to image Characteristic packet is encrypted;
It obtains the sound characteristic information of user and voice characteristics data packet is encrypted;
It obtains the fingerprint feature information of user and fingerprint characteristic data packet is encrypted.
Further, described that stochastic problem, dynamic password, facial image, sound and fingerprint are matched, it is specific to wrap It includes:
The stochastic problem that the essential information filled in when question answering interface is replied according to registration proposes, if answered correct Otherwise then successful match fails;
The corresponding mobile phone of cell-phone number receives in the essential information filled in when dynamic password input interface is filled according to registration Dynamic password, otherwise the successful match if input is correct fails;
Facial image characteristic packet is decrypted after carrying out stochastic problem successful match again, and will be after feature extraction Face image data compareed with the image feature data after decryption, if the similarity of results of comparison reaches 90% With success, otherwise fail;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound after feature extraction Sound data are compareed with the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, Otherwise fail;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound after feature extraction Sound data are compareed with the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, Otherwise fail.
Further, the random generation facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code, specifically include:
Facial image Quick Response Code is generated at random according to the frame data in image feature data packet;
Sound Quick Response Code is generated at random according to the frame data in voice characteristics data packet;
Fingerprint Quick Response Code is generated at random according to the frame data in fingerprint characteristic data packet.
In the embodiment of the present invention, a kind of computer identity identifying system and method are provided, it is compared with prior art, beneficial Effect is as follows:
The present invention can improved by setting login mode and other people two kinds of computer login mode of login mode Allow other people temporarily to enter computer while computer security performance and carry out specific operation, efficiently solves and work as addressee absent Before computer but when being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain relevant information. I.e. under my login mode, pass through stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint Matching, and within three times when successful match, then my log into thr computer identification success, wherein to facial image matching, Sound Match and the facial image of fingerprint matching, sound and fingerprint needs be decrypted again by stochastic problem after just can with Match, stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint matching are combined together, multiple It with verification, while needing just match after decrypting facial image, sound and fingerprint, to reliably improve computer Safety.I.e. under other people login mode, first, the head image information of operator and mobile phone MAC Address are stored in database, using as The evidence that later stage checks;Next, by the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound Quick Response Code, refers to It is one or more in line Quick Response Code, and in pop-up box after scanning input other people log in authorization code, if input other people Log in authorization code three times within successful match, then other people log into thr computer identifications success, meter is logged in improve other people The safety of calculation machine.
Description of the drawings
Fig. 1 is a kind of main functional block diagram of computer identity identifying system provided in an embodiment of the present invention;
Fig. 2 is registration module block diagram provided in an embodiment of the present invention;
Fig. 3 is login subsystem diagram in person provided in an embodiment of the present invention;
Fig. 4 be it is provided in an embodiment of the present invention other people log in subsystem diagram;
Fig. 5 is the main functional block diagram of another computer identity identifying system provided in an embodiment of the present invention;
Fig. 6 is a kind of computer identity recognition methods main flow chart provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of computer identity identifying system provided in an embodiment of the present invention.As shown in Figure 1, the system includes:Note Volume module 1, recognition mode selecting module 2, I logs in, and subsystem 31, other people log in subsystem 32 and database 4, and register mould Block 1, I logs in subsystem 31 and other people log in subsystem 32 and are connect with database 4.
Specifically, registration module 1 includes:Essential information registering unit 11, face image data registering unit 12, sound number According to registering unit 13 and finger print data registering unit 14.
Further, essential information registering unit 11, in user's registration, filling in the essential information of user;This hair The bright essential information being related to includes:Name, cell-phone number, identification card number, QQ number, each stage school title, each period job note Position title, parent, siblings and good friend's title etc..
Further, face image data registering unit 12 obtains user's different angle in user's registration, taking pictures Face image, according to feature extraction is carried out after area dividing respectively and image feature data packet is encrypted.
Further, voice data registering unit 13, in user's registration, obtaining the sound characteristic information of user simultaneously Voice characteristics data packet is encrypted.
Further, finger print data registering unit 14, in user's registration, obtaining the fingerprint feature information of user simultaneously Fingerprint characteristic data packet is encrypted.
It should be noted that in order to avoid my face image data, voice data and finger print data are stolen, to Face image data, voice data and finger print data are encrypted.
Specifically, recognition mode selecting module 2 selects me to log in mould on the graphical interfaces after computer booting Formula or other people login mode.
Specifically, my login subsystem 31 includes:Acquisition module 311, characteristic extracting module 312 and match cognization module 313。
Further, acquisition module 311 includes:Face image data collecting unit 311-1, voice data collecting unit 311-2 and fingerprint data collection unit 311-3;Characteristic extracting module 312 includes:Facial image feature extraction unit 312-1, sound Sound feature extraction unit 312-2 and Finger print characteristic abstract unit 312-3;Match cognization module 313 includes:Stochastic problem matching is single First 313-1, dynamic password matching unit 313-2, facial image matching unit 313-3, Sound Match unit 313-4, fingerprint With unit 313-5 and recognition unit 313-6.
Wherein, stochastic problem matching unit 313-1, it is basic for being filled in when question answering interface is replied according to registration The stochastic problem that information proposes, the successful match if answering correctly, otherwise fails.
Wherein, dynamic password matching unit 313-2, for what is filled in when dynamic password input interface is filled according to registration The dynamic password that the corresponding mobile phone of cell-phone number receives in essential information, the successful match if input is correct, otherwise fails.
Wherein, facial image matching unit 313-3, for again by stochastic problem matching unit 313-1 successful match Image feature data packet is decrypted afterwards, and will be carried by face image data collecting unit 311-1 and facial image feature The data of unit 312-1 are taken to be compareed with the image feature data after decryption, if the similarity of results of comparison reaches 90% Otherwise then successful match fails.
Wherein, Sound Match unit 313-4, for again by right after stochastic problem matching unit 313-1 successful match Voice characteristics data packet is decrypted, and will be by voice data collecting unit 311-2's and sound feature extraction unit 312-2 Data are compareed with the voice characteristics data after decryption, and the successful match if the similarity of results of comparison reaches 90% is no Then fail.
Wherein, fingerprint matching unit 313-5, for again by right after stochastic problem matching unit 313-1 successful match Fingerprint characteristic data packet is decrypted, and will be by fingerprint data collection unit 311-2's and Finger print characteristic abstract unit 312-2 Data are compareed with the fingerprint characteristic data after decryption, and the successful match if the similarity of results of comparison reaches 90% is no Then fail.
Wherein, recognition unit 313-6 judges that stochastic problem, dynamic password, facial image, sound and fingerprint are equal for working as Within three times when successful match, then my log into thr computer identification success.
Specifically, other people log in subsystem 32 and include:Authorization code generation module 321, his human head picture acquisition module 322, hand Machine connects authentication module 323, two-dimensional code generation module 324 and recognition and verification module 325.
Further, authorization code generation module 321, when selecting other people login mode, hand of the computer to registration user Machine sends other people and logs in authorization code;His human head picture acquisition module 322, for acquiring other people head image datas and being stored in database 4; Mobile phone connects authentication module 323, other people mobile phones for currently carrying out other people logins by the search of WIFI module on computer, It obtains the MAC Address of other people mobile phones and is stored in database 4;Two-dimensional code generation module 324, including:Facial image Quick Response Code is given birth to At unit 324-1, sound Quick Response Code generation unit 324-2 and fingerprint Quick Response Code generation unit 324-3;Recognition and verification module 325, By one kind in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of the pop-up of other people mobile phone scanning computers or more Kind, and in pop-up box after scanning input other people log in authorization code, if input other people log in authorization code three times within With success, then other people log into thr computer identifications are successful.
Wherein, facial image Quick Response Code generation unit 324-1, for random according to the frame data in image feature data packet Generate facial image Quick Response Code;Sound Quick Response Code generation unit 324-2, for according to the frame data in voice characteristics data packet with Machine generates sound Quick Response Code;Fingerprint Quick Response Code generation unit 324-3, for random according to the frame data in fingerprint characteristic data packet Generate fingerprint Quick Response Code.
Preferably, other people log in subsystem 32 further includes:Monitoring module 326;Monitoring module 326, in other people logins The number before computer is monitored under pattern, when number is more than for the moment, computer closes display screen.Wherein, monitoring module 326 wraps It includes:Infrared surveillance equipment and/or video monitor.
Preferably, other people log in subsystem 32 further includes:Access record generation module 327;Access record generation module 327, for carrying out packing record according to the time into the access historical path after computer to logging in subsystem 32 by other people.
Preferably, referring to Fig. 5, computer identity identifying system provided in an embodiment of the present invention further includes:Alarm module 5; Alarm module 5, for when my log into thr computer identification fails or other people log into thr computer identifications fail, counting Calculation machine sends out alarm signal.
Fig. 6 is a kind of computer identity recognition methods main flow chart provided in an embodiment of the present invention.As shown in fig. 6, the party Method includes:
Step S1 obtains the essential information of user, encrypted image characteristic packet, encrypts sound spy in user's registration Levy data packet and cryptographic fingerprint characteristic packet.
It specifically includes:In user's registration, the essential information of user is filled in;It takes pictures and obtains face's figure of user's different angle Picture, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;Obtain the sound of user Sound characteristic information is simultaneously encrypted voice characteristics data packet;Obtain the fingerprint feature information of user and to fingerprint characteristic number It is encrypted according to packet.
Step S2 selects my login mode or other people login mode on the graphical interfaces after computer booting.
When selecting my login mode, including following three steps:
Step S311, acquisition face image data, voice data and finger print data, and to face image data, sound number Feature extraction is carried out according to finger print data.
Step S312 matches stochastic problem, dynamic password, facial image, sound and fingerprint.
It specifically includes:The stochastic problem that the essential information filled in when question answering interface is replied according to registration proposes, such as Fruit answers correct then successful match, otherwise fails;The essential information filled in when dynamic password input interface is filled according to registration The dynamic password that the corresponding mobile phone of middle cell-phone number receives, the successful match if input is correct, otherwise fails;It carries out again random Facial image characteristic packet is decrypted after problem successful match, and by after feature extraction face image data and decryption Image feature data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;Again Carry out stochastic problem successful match after voice characteristics data packet is decrypted, and by after feature extraction voice data and decryption Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails;Again Carry out stochastic problem successful match after voice characteristics data packet is decrypted, and by after feature extraction voice data and decryption Voice characteristics data afterwards is compareed, otherwise the successful match if the similarity of results of comparison reaches 90% fails.
Step S313, when judging that stochastic problem, dynamic password, facial image, sound and fingerprint match within three times When success, then my log into thr computer identification is successful.
When selecting other people login mode, including following five steps:
Step S321, computer send other people to the mobile phone of registration user and log in authorization code.
Step S322 acquires other people head image datas and is stored in database.
Step S323 is currently carried out other people mobile phones of other people logins by the search of WIFI module on computer, obtains him The MAC Address of human hand machine is simultaneously stored in database.
Step S324, it is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code.
Step S325 passes through facial image Quick Response Code, sound Quick Response Code, the fingerprint two of other people mobile phone scanning computer pop-ups Tie up it is one or more in code, and in pop-up box after scanning input other people log in authorization code, if other people logins of input Authorization code three times within successful match, then other people log into thr computer identifications success.
In conclusion the present invention is by setting login mode and other people two kinds of computer login mode of login mode, Other people can be allowed temporarily to enter computer while improving computer security performance and carry out specific operation, efficiently solved Before addressee absent computer but when being badly in need of knowing certain information of computer-internal, other people can enter computer help and obtain Relevant information.I.e. under my login mode, pass through stochastic problem matching, dynamic password matching, facial image matching, sound Match and fingerprint matching, and within three times when successful match, then my log into thr computer identification success, wherein to face Images match, Sound Match and the facial image of fingerprint matching, sound and fingerprint needs are decrypted again by stochastic problem Can just match afterwards, by stochastic problem matching, dynamic password matching, facial image matching, Sound Match and fingerprint matching melt for One, multiple matching verification, while needing just match after decrypting facial image, sound and fingerprint, to reliably carry The high safety of computer.I.e. under other people login mode, first, the head image information of operator and mobile phone MAC Address are stored in Database, using the evidence checked as the later stage;Secondly, by the facial image Quick Response Code of other people mobile phone scanning computers pop-up, It is one or more in sound Quick Response Code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, such as Fruit input other people log in authorization code three times within successful match, then other people log into thr computer identifications success, to improve The safeties of other people log into thr computer.
Disclosed above is only several specific embodiments of the present invention, and those skilled in the art can carry out the present invention Various modification and variations without departing from the spirit and scope of the present invention, if these modifications and changes of the present invention belong to the present invention Within the scope of claim and its equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of computer identity identifying system, which is characterized in that including:Registration module (1), recognition mode selecting module (2), I logs in that subsystem (31), other people log in subsystem (32) and database (4), and the registration module (1), described step in person Record subsystem (31) and it is described other people log in subsystem (32) and connect with the database (4);
Registration module (1) includes:Essential information registering unit (11), face image data registering unit (12), voice data note Volume unit (13) and finger print data registering unit (14);
The essential information registering unit (11), in user's registration, filling in the essential information of user;
The face image data registering unit (12), for the face for obtaining user's different angle of in user's registration, taking pictures Image, according to carrying out feature extraction after area dividing respectively and image feature data packet is encrypted;
The voice data registering unit (13), in user's registration, obtaining the sound characteristic information of user and to sound Characteristic packet is encrypted;
The finger print data registering unit (14), in user's registration, obtaining the fingerprint feature information of user and to fingerprint Characteristic packet is encrypted;
The recognition mode selecting module (2), selected on the graphical interfaces after computer booting my login mode or Other people login mode;
It is described I log in subsystem (31) include:Acquisition module (311), characteristic extracting module (312) and match cognization module (313);
The acquisition module (311) includes:Face image data collecting unit (311-1), voice data collecting unit (311-2) With fingerprint data collection unit (311-3);
The characteristic extracting module (312) includes:Facial image feature extraction unit (312-1), sound characteristic extraction unit (312-2) and Finger print characteristic abstract unit (312-3);
The match cognization module (313) includes:Stochastic problem matching unit (313-1), dynamic password matching unit (313- 2), facial image matching unit (313-3), Sound Match unit (313-4), fingerprint matching unit (313-5) and recognition unit (313-6);
The stochastic problem matching unit (313-1), the basic letter for being filled in when question answering interface is replied according to registration The stochastic problem proposed is ceased, otherwise the successful match if answering correctly fails;
The dynamic password matching unit (313-2), the base for being filled in when dynamic password input interface is filled according to registration The dynamic password that the corresponding mobile phone of cell-phone number receives in this information, the successful match if input is correct, otherwise fails;
The facial image matching unit (313-3), for again by the stochastic problem matching unit (313-1) matching at Image feature data packet is decrypted after work(, and the face image data collecting unit (311-1) and the people will be passed through The data of face image feature extraction unit (312-1) are compareed with the image feature data after decryption, if results of comparison Similarity reaches 90% successful match, otherwise fails;
The Sound Match unit (313-4), after again by stochastic problem matching unit (313-1) successful match Voice characteristics data packet is decrypted, and will be carried by the voice data collecting unit (311-2) and the sound characteristic The data of unit (312-2) are taken to be compareed with the voice characteristics data after decryption, if the similarity of results of comparison reaches 90% successful match, otherwise fails;
The fingerprint matching unit (313-5), after again by stochastic problem matching unit (313-1) successful match Fingerprint characteristic data packet is decrypted, and will be carried by the fingerprint data collection unit (311-2) and the fingerprint characteristic The data of unit (312-2) are taken to be compareed with the fingerprint characteristic data after decryption, if the similarity of results of comparison reaches 90% successful match, otherwise fails;
The recognition unit (313-6) judges stochastic problem, dynamic password, facial image, sound and fingerprint three for working as Within secondary when successful match, then my log into thr computer identification is successful;
Other people log in subsystem (32):Authorization code generation module (321), his human head picture acquisition module (322), mobile phone connection Authentication module (323), two-dimensional code generation module (324) and recognition and verification module (325);
The authorization code generation module (321), when selecting other people login mode, computer sends him to the mobile phone of registration user People logs in authorization code;
His human head picture acquisition module (322), for acquiring other people head image datas and being stored in the database (4);
The mobile phone connection authentication module (323) logs in for currently carrying out other people by the WIFI module search on computer Other people mobile phones, obtain the MAC Address of other people mobile phones and be stored in the database (4);
The two-dimensional code generation module (324), including:Facial image Quick Response Code generation unit (324-1), sound Quick Response Code generate Unit (324-2) and fingerprint Quick Response Code generation unit (324-3);
The facial image Quick Response Code generation unit (324-1), for being given birth at random according to the frame data in image feature data packet At facial image Quick Response Code;
The sound Quick Response Code generation unit (324-2), for according to the generation sound at random of the frame data in voice characteristics data packet Sound Quick Response Code;
The fingerprint Quick Response Code generation unit (324-3) refers to for being generated at random according to the frame data in fingerprint characteristic data packet Line Quick Response Code;
The recognition and verification module (325) passes through the facial image Quick Response Code of other people mobile phone scanning computer pop-ups, sound two dimension It is one or more in code, fingerprint Quick Response Code, and input other people in pop-up box after scanning and log in authorization code, if input Other people log in authorization code three times within successful match, then other people log into thr computer identifications success.
2. computer identity identifying system as described in claim 1, which is characterized in that the essential information includes:Name, hand Machine number, identification card number, QQ number, each stage school title, each period work unit title, parent, siblings and good friend's name Claim.
3. computer identity identifying system as described in claim 1, which is characterized in that further include:Alarm module (5);It is described Alarm module (5) is used for when my log into thr computer identification failure or other people log into thr computer identification failures, Computer sends out alarm signal.
4. computer identity identifying system as described in claim 1, which is characterized in that described other people log in subsystem (32) also Including:Monitoring module (326);The monitoring module (326) is used to monitor the number before computer under other people login mode, When number is more than for the moment, computer closes display screen.
5. computer identity identifying system as claimed in claim 4, which is characterized in that the monitoring module (326) includes:It is red Outer monitor and/or video monitor.
6. computer identity identifying system as described in claim 1, which is characterized in that described other people log in subsystem (32) also Including:Access record generation module (327);Access record generation module (327), for pass through it is described other people log in son System (32) carries out packing record into the access historical path after computer according to the time.
7. a kind of computer identity recognition methods, which is characterized in that including:
In user's registration, the essential information of user is obtained, encrypted image characteristic packet, voice characteristics data packet is encrypted and adds Mi Zhiwentezhengshuojubao;
My login mode or other people login mode are selected on graphical interfaces after computer booting;
When selecting my login mode, acquisition face image data, voice data and finger print data, and to facial image number Feature extraction is carried out according to, voice data and finger print data;
Stochastic problem, dynamic password, facial image, sound and fingerprint are matched;
When judging stochastic problem, dynamic password, facial image, sound and the fingerprint successful match within three times, then I Log into thr computer identification success;
When selecting other people login mode, computer sends other people to the mobile phone of registration user and logs in authorization code;
It acquires other people head image datas and is stored in database;
Other people mobile phones of other people logins are currently carried out by the search of WIFI module on computer, with obtaining the MAC of other people mobile phones Location is simultaneously stored in database;
It is random to generate facial image Quick Response Code, sound Quick Response Code and fingerprint Quick Response Code;
Pass through one kind in the facial image Quick Response Code, sound Quick Response Code, fingerprint Quick Response Code of other people mobile phone scanning computer pop-ups Or it is a variety of, and in pop-up box after scanning input other people log in authorization code, if other people of input log in authorization code three and take second place Interior successful match, then other people log into thr computer identifications are successful.
8. computer identity recognition methods as claimed in claim 7, which is characterized in that it is described in user's registration, it obtains and uses Essential information, encrypted image characteristic packet, encryption voice characteristics data packet and the cryptographic fingerprint characteristic packet at family, it is specific to wrap It includes:
Fill in the essential information of user;
It takes pictures and obtains the face image of user's different angle, according to carrying out feature extraction after area dividing respectively and to characteristics of image Data packet is encrypted;
It obtains the sound characteristic information of user and voice characteristics data packet is encrypted;
It obtains the fingerprint feature information of user and fingerprint characteristic data packet is encrypted.
9. computer identity recognition methods as claimed in claim 7, which is characterized in that it is described to stochastic problem, dynamic password, Facial image, sound and fingerprint are matched, and are specifically included:
The stochastic problem that the essential information filled in proposes when question answering interface is replied according to registration, if answer it is correct if With success, otherwise fail;
What the corresponding mobile phone of cell-phone number received in the essential information filled in when dynamic password input interface is filled according to registration is dynamic State password, the successful match if input is correct, otherwise fails;
Facial image characteristic packet is decrypted after carrying out stochastic problem successful match again, and by the people after feature extraction Face image data with decryption after image feature data compareed, if the similarity of results of comparison reaches 90% matching at Otherwise work(fails;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound number after feature extraction It is compareed according to the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, otherwise Failure;
Voice characteristics data packet is decrypted after carrying out stochastic problem successful match again, and by the sound number after feature extraction It is compareed according to the voice characteristics data after decryption, the successful match if the similarity of results of comparison reaches 90%, otherwise Failure.
10. computer identity recognition methods as claimed in claim 7, which is characterized in that the random generation facial image two Code, sound Quick Response Code and fingerprint Quick Response Code are tieed up, is specifically included:
Facial image Quick Response Code is generated at random according to the frame data in image feature data packet;
Sound Quick Response Code is generated at random according to the frame data in voice characteristics data packet;
Fingerprint Quick Response Code is generated at random according to the frame data in fingerprint characteristic data packet.
CN201810342986.9A 2018-04-17 2018-04-17 A kind of computer identity identifying system and method Pending CN108537028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810342986.9A CN108537028A (en) 2018-04-17 2018-04-17 A kind of computer identity identifying system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810342986.9A CN108537028A (en) 2018-04-17 2018-04-17 A kind of computer identity identifying system and method

Publications (1)

Publication Number Publication Date
CN108537028A true CN108537028A (en) 2018-09-14

Family

ID=63480810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810342986.9A Pending CN108537028A (en) 2018-04-17 2018-04-17 A kind of computer identity identifying system and method

Country Status (1)

Country Link
CN (1) CN108537028A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635138A (en) * 2018-10-30 2019-04-16 厦门市杜若科技有限公司 A kind of social networks method for building up and system based on similar appearance
CN109657442A (en) * 2018-12-03 2019-04-19 浙江万里学院 A kind of computer user's identification system
CN109726543A (en) * 2018-12-30 2019-05-07 北京城市网邻信息技术有限公司 A kind of login method of application program, device, terminal device and storage medium
CN110166438A (en) * 2019-04-19 2019-08-23 平安科技(深圳)有限公司 Login method, device, computer equipment and the computer storage medium of account information
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
CN110766841A (en) * 2019-06-12 2020-02-07 天津新泰基业电子股份有限公司 User registration and verification method and device
CN111859345A (en) * 2020-07-28 2020-10-30 郑州奥腾网络科技有限公司 Computer data safety storage system
CN112818317A (en) * 2021-04-19 2021-05-18 北京远鉴信息技术有限公司 Browsing process monitoring method, monitoring device and readable storage medium
CN113127832A (en) * 2021-04-19 2021-07-16 东营天润石化科技有限公司 Computer startup identity authentication system and authentication method thereof
CN113222798A (en) * 2021-04-30 2021-08-06 深圳市展拓电子技术有限公司 Anti-don-avoid method and system for escort personnel, intelligent terminal and computer readable storage medium
CN115982687A (en) * 2023-01-10 2023-04-18 安徽中杰信息科技有限公司 User identity verification system for data operation and maintenance management platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101241699A (en) * 2008-03-14 2008-08-13 北京交通大学 A speaker identification system for remote Chinese teaching
US20140279642A1 (en) * 2013-03-15 2014-09-18 Mitek Systems, Inc. Systems and methods for enrollment and identity management using mobile imaging
US20150012988A1 (en) * 2013-07-05 2015-01-08 National Taiwan University Of Science And Technology Authentication method and authentication system
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN104883351A (en) * 2015-03-13 2015-09-02 小米科技有限责任公司 Multiple-factor authentication method and device
CN105453524A (en) * 2013-05-13 2016-03-30 霍约什实验室Ip有限公司 System and method for authorizing access to access-controlled environments
CN105447364A (en) * 2015-04-30 2016-03-30 北京天诚盛业科技有限公司 Remote biological recognition registering method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101241699A (en) * 2008-03-14 2008-08-13 北京交通大学 A speaker identification system for remote Chinese teaching
US20140279642A1 (en) * 2013-03-15 2014-09-18 Mitek Systems, Inc. Systems and methods for enrollment and identity management using mobile imaging
CN105453524A (en) * 2013-05-13 2016-03-30 霍约什实验室Ip有限公司 System and method for authorizing access to access-controlled environments
US20150012988A1 (en) * 2013-07-05 2015-01-08 National Taiwan University Of Science And Technology Authentication method and authentication system
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN104883351A (en) * 2015-03-13 2015-09-02 小米科技有限责任公司 Multiple-factor authentication method and device
CN105447364A (en) * 2015-04-30 2016-03-30 北京天诚盛业科技有限公司 Remote biological recognition registering method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈子富: "Windows指纹登录系统的设计与实现", 《潍坊学院学报》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635138A (en) * 2018-10-30 2019-04-16 厦门市杜若科技有限公司 A kind of social networks method for building up and system based on similar appearance
CN109657442A (en) * 2018-12-03 2019-04-19 浙江万里学院 A kind of computer user's identification system
CN109726543B (en) * 2018-12-30 2021-10-08 北京城市网邻信息技术有限公司 Login method and device of application program, terminal equipment and storage medium
CN109726543A (en) * 2018-12-30 2019-05-07 北京城市网邻信息技术有限公司 A kind of login method of application program, device, terminal device and storage medium
CN110166438A (en) * 2019-04-19 2019-08-23 平安科技(深圳)有限公司 Login method, device, computer equipment and the computer storage medium of account information
CN110766841A (en) * 2019-06-12 2020-02-07 天津新泰基业电子股份有限公司 User registration and verification method and device
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
CN111859345A (en) * 2020-07-28 2020-10-30 郑州奥腾网络科技有限公司 Computer data safety storage system
CN113127832A (en) * 2021-04-19 2021-07-16 东营天润石化科技有限公司 Computer startup identity authentication system and authentication method thereof
CN112818317A (en) * 2021-04-19 2021-05-18 北京远鉴信息技术有限公司 Browsing process monitoring method, monitoring device and readable storage medium
CN113222798A (en) * 2021-04-30 2021-08-06 深圳市展拓电子技术有限公司 Anti-don-avoid method and system for escort personnel, intelligent terminal and computer readable storage medium
CN115982687A (en) * 2023-01-10 2023-04-18 安徽中杰信息科技有限公司 User identity verification system for data operation and maintenance management platform
CN115982687B (en) * 2023-01-10 2023-07-28 安徽中杰信息科技有限公司 User identity verification system for data operation and maintenance management platform

Similar Documents

Publication Publication Date Title
CN108537028A (en) A kind of computer identity identifying system and method
CN103685311B (en) A kind of login validation method and equipment
US10311223B2 (en) Virtual reality dynamic authentication
CN107251477B (en) System and method for securely managing biometric data
CN106487511B (en) Identity authentication method and device
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
US10999313B2 (en) Facilitating network security analysis using virtual reality display devices
CN106789922A (en) Give account number, the method and apparatus of authentication for change
US11354397B2 (en) System and method for augmented reality authentication of a user
WO2018083089A1 (en) Method for securing a transaction performed from a nonsecure terminal
CN107209821A (en) For the method and authentication method being digitally signed to e-file
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
CN106326763A (en) Method and device for obtaining electronic file
US11521208B2 (en) System and method for authenticating transactions from a mobile device
JP2006520047A (en) Method and system for enabling remote message creation
CN111143812B (en) Login authentication method based on graphics
CN107872435A (en) A kind of method and device of safety verification
JP2006155547A (en) Individual authentication system, terminal device and server
CN109522694A (en) A kind of identification system based on computer network
CN107994994A (en) Image authentication code verification method, system, server and terminal
CN111583475A (en) Electronic identity authentication method and system for airport security check
WO2023244602A1 (en) Systems and methods that provide a high level of security for a user
CN115906028A (en) User identity verification method and device and self-service terminal
CN107276962B (en) Dynamic password voice authentication system capable of combining any gesture
CN110088758A (en) Server apparatus, approaches to IM, information processing equipment, information processing method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180914