CN114708667B - Security method and system based on multiple biological recognition technology - Google Patents

Security method and system based on multiple biological recognition technology Download PDF

Info

Publication number
CN114708667B
CN114708667B CN202210245471.3A CN202210245471A CN114708667B CN 114708667 B CN114708667 B CN 114708667B CN 202210245471 A CN202210245471 A CN 202210245471A CN 114708667 B CN114708667 B CN 114708667B
Authority
CN
China
Prior art keywords
security
level
verification
authentication
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210245471.3A
Other languages
Chinese (zh)
Other versions
CN114708667A (en
Inventor
蔡旭
李志浩
李九林
王高
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Dongfang Digital System Integration Co ltd
Original Assignee
Jiangsu Dongfang Digital System Integration Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Dongfang Digital System Integration Co ltd filed Critical Jiangsu Dongfang Digital System Integration Co ltd
Priority to CN202210245471.3A priority Critical patent/CN114708667B/en
Publication of CN114708667A publication Critical patent/CN114708667A/en
Application granted granted Critical
Publication of CN114708667B publication Critical patent/CN114708667B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a security method and a security system based on multiple biological recognition technologies, wherein the current security grade information is obtained, and a first security control scheme is obtained; matching the first authentication user according to the first authentication identification information; obtaining a first authority level of a first authentication user according to a first security control scheme; obtaining position authority information of a first position according to a first security and protection control scheme, and obtaining a first authority control level according to the position authority information; when the first authority level is matched with the first authority control level, matching the control schemes of the control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme; and performing security verification of the first authentication user based on a first security verification combination scheme. The method solves the technical problem that security and protection cannot be intelligently adjusted to perform security and protection authentication according to security and protection grades accurately in the security and protection process in the prior art, so that the security and protection are not intelligent and accurate enough.

Description

Security method and system based on multiple biological recognition technology
Technical Field
The invention relates to the related field of security, in particular to a security method and a security system based on multiple biological recognition technologies.
Background
The security protection refers to the process of loss prevention and crime prevention through the modes of entrance guard fire control, entrance and exit control, monitoring and alarming and the like. In the process of security protection, the computer is closely combined with the optical sensor, the acoustic sensor and the biological sensor by combining the biological identification technology, and the inherent physiological characteristics of people are utilized to carry out identity authentication.
However, in the process of implementing the technical scheme of the invention in the application, the technology at least has the following technical problems:
in the prior art, security protection cannot be intelligently adjusted according to security protection grades to perform security protection authentication in the security protection process, so that the security protection is not intelligent and accurate enough.
Disclosure of Invention
The application solves the technical problem that security and protection authentication cannot be carried out by intelligently adjusting security and protection means according to security and protection levels accurately in the security and protection process in the prior art, and further security and protection are not intelligent and accurate enough, achieves intelligent adjustment of security and protection control schemes of corresponding positions according to the security and protection levels, improves security and protection effects based on combination of biological characteristics, and achieves the technical effect of accurate intelligent security and protection.
In view of the above problems, the present application provides a security method and system based on multiple biometric identification technologies.
In a first aspect, the present application provides a security method based on multiple biometric technologies, where the method is applied to a security control system, and the method includes: obtaining current security level information, and obtaining a first security control scheme according to the security level information; acquiring first authentication identification information of a first position, and matching a first authentication user according to the first authentication identification information; obtaining a first authority level of a first authentication user according to the first security control scheme; obtaining position authority information of a first position according to the first security control scheme, and obtaining a first authority control level according to the position authority information; judging whether the first authority level is matched with the first authority control level; when the first authority level is matched with the first authority control level, matching control schemes of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme; and performing security verification of the first authentication user based on the first security verification combination scheme.
On the other hand, this application still provides a security protection system based on multiple biological identification technique, the system includes: the first obtaining unit is used for obtaining the current security grade information and obtaining a first security control scheme according to the security grade information; the second obtaining unit is used for obtaining first authentication identification information of the first position and matching a first authenticated user according to the first authentication identification information; a third obtaining unit, configured to obtain a first permission level of a first authenticated user according to the first security control scheme; the fourth obtaining unit is used for obtaining position authority information of the first position according to the first security control scheme and obtaining a first authority control level according to the position authority information; the first judging unit is used for judging whether the first authority level is matched with the first authority control level; a fifth obtaining unit, configured to, when the first authority level is matched with the first authority control level, perform control scheme matching of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme; a first verification unit configured to perform security verification of the first authenticated user based on the first security verification combination scheme.
In a third aspect, the present invention provides an electronic device, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method according to any one of the first aspect when executing the program.
One or more technical solutions provided in the present application have at least the following technical effects or advantages:
the method comprises the steps of obtaining a current security level, obtaining actual authentication level information of an authentication user by combining authentication user information for performing current position authentication, determining an authority control level of a first position according to the current security level, judging whether the authority control level of the authentication user meets the authority control level of the first position, generating a combined verification scheme of the current position according to the authority control level of the first position and a first security control scheme when the authority control level of the authentication user meets the authority control level of the first position, performing security authentication of the first authentication user based on the combined verification scheme, achieving intelligent adjustment of the security control scheme of the corresponding position according to the security level, improving the security effect based on combination of biological characteristics, and performing accurate intelligent security.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
Fig. 1 is a schematic flow diagram of a security method based on multiple biometric identification technologies according to the present application;
fig. 2 is a schematic flowchart of a security method based on multiple biometric identification technology according to the present application for obtaining the first security verification combination scheme;
FIG. 3 is a schematic flow chart illustrating an alternative verification scheme of a security method based on multiple biometric technologies according to the present application;
FIG. 4 is a schematic view illustrating an image authentication process of a security method based on multiple biometric technologies according to the present application;
FIG. 5 is a schematic structural diagram of a security system based on multiple biometric identification technologies according to the present application;
fig. 6 is a schematic structural diagram of an electronic device according to the present application.
Description of reference numerals: a first obtaining unit 11, a second obtaining unit 12, a third obtaining unit 13, a fourth obtaining unit 14, a first judging unit 15, a fifth obtaining unit 16, a first verifying unit 17, an electronic device 50, a processor 51, a memory 52, an input device 53, and an output device 54.
Detailed Description
The application solves the technical problem that security and protection authentication cannot be carried out by intelligently adjusting security and protection means according to security and protection levels accurately in the security and protection process in the prior art, and further security and protection are not intelligent and accurate enough, achieves intelligent adjustment of security and protection control schemes of corresponding positions according to the security and protection levels, improves security and protection effects based on combination of biological characteristics, and achieves the technical effect of accurate intelligent security and protection. Embodiments of the present application are described below with reference to the accompanying drawings. It can be known to those skilled in the art that with the development of technology and the emergence of new scenes, the technical solutions provided in the present application are also applicable to similar technical problems.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances and are merely descriptive of the manner in which objects of the same nature are distinguished in the embodiments of the application. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of elements is not necessarily limited to those elements, but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Summary of the application
The security protection refers to the process of loss prevention and crime prevention through the modes of entrance guard fire control, entrance and exit control, monitoring and alarming and the like. In the process of security protection, the computer is closely combined with the optical sensor, the acoustic sensor and the biological sensor by combining the biological identification technology, and the inherent physiological characteristics of people are utilized to carry out identity authentication. In the prior art, in the process of security, security authentication cannot be carried out by intelligently adjusting security means according to security grade, and further security is not intelligent and accurate enough.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the application provides a security method based on multiple biological recognition technologies, which is applied to a security control system and comprises the following steps: obtaining current security level information, and obtaining a first security control scheme according to the security level information; acquiring first authentication identification information of a first position, and matching a first authentication user according to the first authentication identification information; obtaining a first authority level of a first authentication user according to the first security control scheme; obtaining position authority information of a first position according to the first security control scheme, and obtaining a first authority control level according to the position authority information; judging whether the first authority level is matched with the first authority control level; when the first authority level is matched with the first authority control level, matching control schemes of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme; and performing security verification of the first authentication user based on the first security verification combination scheme.
Having thus described the general principles of the present application, various non-limiting embodiments thereof will now be described in detail with reference to the accompanying drawings.
Example one
As shown in fig. 1, the present application provides a security method based on multiple biometric technologies, where the method is applied to a security control system, and the method includes:
step S100: obtaining current security level information, and obtaining a first security control scheme according to the security level information;
step S200: acquiring first authentication identification information of a first position, and matching a first authentication user according to the first authentication identification information;
specifically, the security control system is a system for performing security overall control, the security control system is in communication connection with a plurality of security control devices, security control of each security control device can be performed, security levels can be adjusted in real time through the security control system, security schemes in corresponding positions are upgraded or downgraded according to the adjusted security levels, and intelligent security management is achieved. And the current security level information is currently executed security level information, and a corresponding first security control scheme under the current security level is obtained according to the currently executed security level information.
Further, a plurality of security level information are preset in the security control system, and according to different security levels, preset security schemes are corresponding to the security control system. Namely, under different security levels, the security schemes at all positions are adjusted to a certain extent. Furthermore, different biological identification means correspond to own security level scores, and the security requirements are met according to the combination of the biological identification means according to the different security levels of all the positions, so that the security level is adjusted. The first position is a position where the first authentication user currently needs to pass. After the first authentication user reaches a first position, the first position obtains an authentication scheme of the corresponding first position according to the current security level, primary authentication of the first authentication user is carried out based on the first authentication scheme, identity recognition of the first authentication user is carried out based on a primary authentication result, and user information stored in a database is matched according to the identity recognition result. By acquiring the security level information and calling the position security scheme according to the authentication position of the user, data support is provided for subsequent accurate security prevention and control.
Step S300: obtaining a first authority level of a first authentication user according to the first security control scheme;
step S400: obtaining position authority information of a first position according to the first security control scheme, and obtaining a first authority control level according to the position authority information;
specifically, in the process of security control, the security level information of the user is kept unchanged, and the security level information of the security position is adjusted. In the process of constructing the security system, all user characteristic collection is carried out on biological information needed by the security control system, including but not limited to: facial image biometric features, fingerprint features, palm print features, voice features, gait features, retinal features, pressure features, sequence features, and the like. And judging the actual authentication authority level of the first authentication user, namely the first authority level, according to the authentication information of the authentication user needing to pass the first position in the preliminary identification. The authentication authority level of the user and the authority level of the position have a corresponding relation, namely when the authentication authority level of the user is higher than or equal to the authority level of the position, the user has the authority of passing through the current position, otherwise, the user is not allowed to pass through, and the current authority control level of the first position, namely the first authority control level, is obtained according to the first security control scheme. And data support is provided for subsequent accurate user authentication and identification through acquisition of the authority level of the user and the authority control level of the position.
Step S500: judging whether the first authority level is matched with the first authority control level;
step S600: when the first authority level is matched with the first authority control level, matching control schemes of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme;
step S700: and performing security verification of the first authentication user based on the first security verification combination scheme.
Specifically, the process of determining whether the first permission level matches the first permission control level is to determine that the first permission level is greater than or equal to the first permission control level, and when the first permission level is smaller than the first permission control level, an authentication failure instruction is fed back at this time, and the first authenticated user is not allowed to pass through the first position; and when the first authority level is greater than or equal to the first authority control level, the first authority level is considered to be matched with the first authority control level, and at the moment, further identity authentication of the first authenticated user is carried out.
Further, when the first authority level is matched with the first authority control level, matching a control scheme of a control level combination scheme set according to the first authority control level, namely performing scheme combination of multiple biological characteristics according to the level of first authority control of the current position and single characteristic security level scores to obtain a first security verification scheme of the first position, performing security authentication of the first authenticated user through the first security verification scheme to achieve intelligent adjustment of the security control scheme of the corresponding position according to the security level, improving the security effect based on the combination of the biological characteristics, and performing accurate intelligent security.
Further, as shown in fig. 2, step S600 of the present application further includes:
step S610: constructing a single feature set of a security means;
step S620: performing security level scoring on the single feature set to obtain a security level evaluation set;
step S630: performing stability evaluation on the monomer feature set to obtain a stability evaluation set;
step 640: performing combined security scheme matching according to the first authority control level and the security level evaluation set to obtain a first security verification combined scheme set;
step S650: and performing stability sequential sorting on the first security and protection verification combined scheme set according to the stability evaluation set, and obtaining the first security and protection verification combined scheme according to sequential sorting results.
Specifically, the individual feature set is a security protection biological feature set and comprises facial image biological features, fingerprint features, palm print features, voice features, gait features, retina features, pressure features, sequence features and the like, security protection grade grading is carried out on the security degree of each feature in the security protection biological feature set, and the security protection grade evaluation set is obtained, namely that each feature in the individual feature set has a unique corresponding security protection grade. And evaluating the stability of each feature identification in the single feature set, wherein the stability evaluation process refers to the probability of abnormal identification caused by the interference of internal or external environmental factors in the identification process. And the identification stability of different biological characteristics is different, and the stability evaluation set is obtained according to the evaluation result.
Further, based on the first authority control level, selecting security features in the security level evaluation set, and performing feature combination by selecting a plurality of security features to meet the first authority control level, wherein the selection result of the security features is not unique, that is, the security combination scheme includes a plurality of security combination schemes for realizing the first authority control level. And according to the stability scores of all the characteristics in the stability evaluation set, sequentially sorting the stability total scores of the plurality of security combination schemes, and selecting the security combination scheme with the highest stability as the first security verification combination scheme. By acquiring the security level evaluation set and the stability evaluation set, the security level of the first security verification combination scheme is more accurate and stable, the accuracy and the stability of security verification are further improved, and the technical effect of security safety is guaranteed.
Further, as shown in fig. 3, the performing security verification of the first authenticated user based on the first security verification combination scheme further includes, in step S700 of the present application:
step S710: obtaining a first security verification result;
step S720: when the first security and protection verification result is that the verification fails, judging whether a single verification failing result exists in the first security and protection verification result;
step S730: when a single verification failing result exists in the first security and protection verification result, a replacement verification scheme of the single verification failing result is obtained according to the sequence sorting result;
step S740: and performing security protection verification again on the first authentication user based on the replacement verification scheme.
Specifically, in the process of performing security verification of the first user, a first security verification result of the first authenticated user is obtained according to the first security verification combination scheme, when the first security verification result is that verification fails, failure reason analysis is performed on the failed verification result, when the verification fails because multiple items of verification fail, supplementary verification identification is not performed continuously, when the failed verification result is that only a single item of verification fails, judgment on environmental abnormal influence is performed in combination with the current environmental factor, replacement of verification items at the same level is performed in combination with the failed verification items according to the environmental factor, and a first replacement scheme is obtained according to the replacement result.
Further, in the process of replacing the items at the same level, the replacement verification scheme under the current environment is kept more stable than the verification scheme already used on the basis that the stability factor in the sequence sorting result is used as the first reference data and the current environment factor is used as the second reference data. And performing security protection verification again on the first authentication user through an alternative verification scheme. The security protection item replacement under the same level is carried out through the verification result of the single security protection verification failure, the stability of the security protection verification result is improved, and the technical effect of accurately and intelligently carrying out security protection detection is achieved.
Further, as shown in fig. 4, the security control system is in communication connection with the image acquisition module, and step S800 of the present application further includes:
step S810: acquiring an image of the first authenticated user through the image acquisition module according to the first security verification combination scheme to obtain a first image set;
step S820: performing facial feature matching of the first authenticated user according to the first image set to obtain a multi-angle matching result of the first facial feature;
step S830: performing gait feature recognition on the first authenticated user through the first image set to obtain a first step state feature matching result;
step S840: and obtaining a security verification result of the first authenticated user according to the multi-angle matching result of the first facial feature and the first step-state feature matching result.
Specifically, the image acquisition device is the equipment that carries out image acquisition, can be high definition digtal camera equipment, just image acquisition device with security protection control system communication connection can carry out mutual information interaction. When the first security verification combination scheme comprises facial feature and gait feature verification, image acquisition of the first user is carried out through an image acquisition device arranged at the first position, and a first image set is obtained, wherein the first image set comprises the multi-angle facial features of the first authenticated user and further comprises the features for carrying out gait acquisition of the first user. And evaluating the matching degree of the characteristics of the first image set by the characteristic information input by the authenticated user, wherein the matching degree comprises the eyebrow eye position, the distance, the gait characteristics and the like, obtaining the multi-angle evaluation result and the first step state characteristic matching result according to the evaluation result of the matching degree, and obtaining the security verification result of the first authenticated user according to the multi-angle matching result and the first step state characteristic matching result. By carrying out feature matching on the image acquisition equipment and completing feature security verification of the facial features and the gait features based on the feature matching degree, the accuracy of the verified features is ensured, and the technical effect of improving the security effect is achieved.
Further, security protection control system and fingerprint collection module communication connection, this application step S800 still includes:
step S850: acquiring fingerprint information of the first authenticated user through the fingerprint acquisition module to obtain a first fingerprint acquisition result;
step S860: performing fingerprint matching degree authentication according to the first fingerprint acquisition result to obtain a first fingerprint matching degree authentication result;
step S870: performing fingerprint authentication sequence authentication according to the first fingerprint acquisition result to obtain a first fingerprint authentication sequence authentication result;
step S880: performing authentication on the pressing frequency information and the pressing pressure information in the fingerprint authentication process according to the first fingerprint acquisition result to obtain a first fingerprint frequency pressure authentication result;
step S890: and obtaining a security verification result of the first authenticated user according to the first fingerprint matching degree authentication result, the first fingerprint verification sequence authentication result and the first fingerprint frequency pressure authentication result.
Specifically, when a high security level authentication is performed at a certain location, the authentication level can be increased by combining a plurality of features, and the authentication level can be increased by complicating an existing authentication item. For example, in the process of fingerprint authentication, the authentication level can be improved by combining the authentication sequence of a plurality of fingerprints, the pressing frequency of the fingerprints, and the pressure information of the fingerprints according to the matching degree of the fingerprints.
For example, when the authentication process of the first authenticated user includes the fingerprint authentication, the authentication is performed according to the matching degree of the fingerprints, the sequential authentication result of the fingerprints, and the frequency and pressure information authentication result of the fingerprints, and the security verification result of the first authenticated user is obtained based on the authentication result. By processing the combination pressure sequence frequency in the security authentication process, the security of the security authentication is further ensured and improved, and the security detection effect is better.
Further, step S900 of the present application further includes:
step S910: judging whether the security verification result of the first authenticated user passes the authentication;
step S920: and when the security verification result of the first authentication user is that the authentication is passed, updating the biological characteristics of the first authentication user through the first image set and the first fingerprint acquisition result.
Specifically, when the security verification result of the first authenticated user is that the first authenticated user passes the verification, the biometric feature of the first authenticated user needs to be updated according to the collected environment and the collected quality of the collection evaluation of the first authenticated user. That is, the biometric features of the user may change with the age/time of the user, such as fingerprint features, voice features, facial features, etc., and in order to maintain the accuracy of the collected information, it is necessary to continuously perform update iteration of the collected information. And after the user passes the security verification, if the acquired quality meets a preset threshold value and the difference between the currently acquired biological characteristics of the user and the pre-stored biological characteristics exceeds the preset threshold value, updating the biological characteristics of the current user through the newly acquired biological characteristics of the first authentication user. After the authentication is passed, when the difference of the biological characteristics is large and the newly acquired quality is high, the updating iteration of the biological characteristics of the user is continuously carried out at the moment, so that the biological information of the user is updated in time, and more accurate security verification is facilitated.
Further, step S900 of the present application further includes:
step S930: obtaining a first security level adjustment result;
step S940: performing security level adjustment based on the first security control scheme and the security level evaluation set according to the first security level adjustment result to obtain a first security level dynamic adjustment result;
step S950: and performing security verification based on the first security level dynamic adjustment result.
Particularly, in the process of carrying out dynamic security control, meet emergency or non-emergency, can carry out the adjustment of holistic security protection grade, including improving the security protection grade and reducing the security protection grade, can also adjust to the security protection grade of isolated position. When security protection grade adjustment is needed, intelligent upgrade adjustment of the security protection grade is carried out through the security protection control system, and therefore the overall security protection effect can meet the expected threshold value. By dynamically adjusting the security level, the intelligent adjustment of the security control scheme of the corresponding position is performed according to the adjusted security level, the security effect is improved based on the combination of biological characteristics, and the technical effect of accurate intelligent security is achieved.
In summary, the security method and system based on multiple biometric identification technology provided by the present application have the following technical effects:
1. the method comprises the steps of obtaining a current security level, obtaining actual authentication level information of an authentication user by combining authentication user information for performing current position authentication, determining the authority control level of a first position according to the current security level, judging whether the authority control level of the authentication user meets the authority control level of the first position, generating a combined verification scheme of the current position according to the authority control level of the first position and a first security control scheme when the authority control level of the authentication user meets the authority control level of the first position, performing security authentication of the first authentication user based on the combined verification scheme, performing intelligent adjustment on the security control scheme of the corresponding position according to the security level, improving the security effect based on combination of biological characteristics, and performing accurate intelligent security.
2. By acquiring the security level evaluation set and the stability evaluation set, the security level of the first security verification combination scheme is more accurate and stable, the accuracy and the stability of security verification are further improved, and the technical effect of security safety is guaranteed.
3. The security protection item replacement under the same level is carried out through the verification result of the single security protection verification failure, the stability of the security protection verification result is improved, and the technical effect of accurately and intelligently carrying out security protection detection is achieved.
4. By carrying out feature matching on the image acquisition equipment and completing feature security verification of the facial features and the gait features based on the feature matching degree, the accuracy of the verified features is ensured, and the technical effect of improving the security effect is achieved.
5. By processing the combination pressure sequence frequency in the security authentication process, the security of the security authentication is further ensured and improved, and the security detection effect is better.
Example two
Based on the same inventive concept as the security method based on the multiple biometric identification technology in the foregoing embodiment, the present invention further provides a security system based on the multiple biometric identification technology, as shown in fig. 5, the system includes:
the first obtaining unit 11 is configured to obtain current security level information, and obtain a first security control scheme according to the security level information;
a second obtaining unit 12, where the second obtaining unit 12 is configured to obtain first authentication identification information of a first location, and match a first authenticated user according to the first authentication identification information;
a third obtaining unit 13, where the third obtaining unit 13 is configured to obtain a first permission level of a first authenticated user according to the first security control scheme;
a fourth obtaining unit 14, where the fourth obtaining unit 14 is configured to obtain position authority information of a first position according to the first security control scheme, and obtain a first authority control level according to the position authority information;
a first judging unit 15, where the first judging unit 15 is configured to judge whether the first permission level matches the first permission control level;
a fifth obtaining unit 16, where the fifth obtaining unit 16 is configured to, when the first authority level is matched with the first authority control level, perform control scheme matching of a control level combination scheme set according to the first authority control level, and obtain a first security and protection verification combination scheme;
a first verification unit 17, where the first verification unit 17 is configured to perform security verification on the first authenticated user based on the first security verification combination scheme.
Further, the system further comprises:
the first construction unit is used for constructing a single feature set of a security means;
a sixth obtaining unit, configured to perform security level scoring on the individual feature set to obtain a security level evaluation set;
a seventh obtaining unit, configured to perform stability evaluation on the monomer feature set to obtain a stability evaluation set;
an eighth obtaining unit, configured to perform combined security scheme matching according to the first authority control level and the security level evaluation set, to obtain a first security verification combined scheme set;
a ninth obtaining unit, configured to perform stability sequential ordering on the first security and protection verification combination scheme set according to the stability assessment set, and obtain the first security and protection verification combination scheme according to a sequential ordering result.
Further, the system further comprises:
a tenth obtaining unit, configured to obtain a first security verification result;
the second judgment unit is used for judging whether a single verification failing result exists in the first security and protection verification result when the first security and protection verification result is that the verification fails;
an eleventh obtaining unit, configured to, when a single verification failed result exists in the first security verification result, obtain a replacement verification scheme for the single verification failed result according to the sequential ordering result;
and the second verification unit is used for performing security protection verification again on the first authenticated user based on the replacement verification scheme.
Further, the system further comprises:
a twelfth obtaining unit, configured to perform, according to the first security verification combination scheme, image acquisition of the first authenticated user by the image acquisition module, and obtain a first image set;
a thirteenth obtaining unit, configured to perform facial feature matching of the first authenticated user according to the first image set, and obtain a multi-angle matching result of a first facial feature;
a fourteenth obtaining unit, configured to perform gait feature identification of the first authenticated user through the first image set, and obtain a first step feature matching result;
a fifteenth obtaining unit, configured to obtain a security verification result of the first authenticated user according to a multi-angle matching result of the first facial feature and the first step-state feature matching result.
Further, the system further comprises:
a sixteenth obtaining unit, configured to perform, by using the fingerprint acquisition module, fingerprint information acquisition of the first authenticated user to obtain a first fingerprint acquisition result;
a seventeenth obtaining unit, configured to perform fingerprint matching degree authentication according to the first fingerprint acquisition result, to obtain a first fingerprint matching degree authentication result;
an eighteenth obtaining unit, configured to perform fingerprint authentication sequence authentication according to the first fingerprint acquisition result, and obtain a first fingerprint authentication sequence authentication result;
a nineteenth obtaining unit, configured to perform authentication on the pressing frequency information and the pressing pressure information in the fingerprint authentication process according to the first fingerprint acquisition result, and obtain a first fingerprint frequency pressure authentication result;
a twentieth obtaining unit, configured to obtain a security verification result of the first authenticated user according to the first fingerprint matching degree authentication result, the first fingerprint verification sequence authentication result, and the first fingerprint frequency pressure authentication result.
Further, the system further comprises:
the third judging unit is used for judging whether the security verification result of the first authenticated user is authenticated;
and the first updating unit is used for updating the biological characteristics of the first authenticated user through the first image set and the first fingerprint acquisition result when the security verification result of the first authenticated user is that the authentication is passed.
Further, the system further comprises:
a twenty-first obtaining unit, configured to obtain a first security level adjustment result;
a twenty-second obtaining unit, configured to perform security level adjustment based on the first security control scheme and the security level assessment set according to the first security level adjustment result, and obtain a first security level dynamic adjustment result;
a twenty-third obtaining unit, configured to perform security verification based on the first security level dynamic adjustment result.
Various changes and specific examples of the security method based on multiple biometric technologies in the first embodiment of fig. 1 are also applicable to the security system based on multiple biometric technologies in the present embodiment, and through the foregoing detailed description of the security method based on multiple biometric technologies, those skilled in the art can clearly know the implementation method of the security system based on multiple biometric technologies in the present embodiment, so for the brevity of the description, detailed descriptions are omitted here.
Exemplary electronic device
The electronic device of the present application is described below with reference to fig. 6.
Fig. 6 illustrates a schematic structural diagram of an electronic device according to the present application.
Based on the inventive concept of a security method based on multiple biometric technologies in the foregoing embodiments, the present invention further provides an electronic device, and the electronic device according to the present application is described below with reference to fig. 6. The electronic device may be a removable device itself or a stand-alone device independent thereof, on which a computer program is stored which, when being executed by a processor, carries out the steps of any of the methods as described hereinbefore.
As shown in fig. 6, the electronic device 50 includes one or more processors 51 and a memory 52.
The processor 51 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 50 to perform desired functions.
The memory 52 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer-readable storage medium and executed by the processor 51 to implement the methods of the various embodiments of the application described above and/or other desired functions.
In one example, the electronic device 50 may further include: an input device 53 and an output device 54, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The embodiment of the invention provides a security method based on multiple biological identification technologies, which is applied to a security control system and comprises the following steps: obtaining current security level information, and obtaining a first security control scheme according to the security level information; acquiring first authentication identification information of a first position, and matching a first authentication user according to the first authentication identification information; obtaining a first authority level of a first authentication user according to the first security control scheme; obtaining position authority information of a first position according to the first security and protection control scheme, and obtaining a first authority control level according to the position authority information; judging whether the first authority level is matched with the first authority control level; when the first authority level is matched with the first authority control level, matching control schemes of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme; and performing security verification of the first authenticated user based on the first security verification combination scheme. The technical problem that security and protection authentication cannot be performed by intelligently adjusting security and protection means accurately according to security and protection grades in the security and protection process in the prior art is solved, and further security and protection are not intelligent and accurate enough is solved, intelligent adjustment of security and protection control schemes of corresponding positions is performed according to the security and protection grades, security and protection effects are improved based on combination of biological characteristics, and accurate intelligent security and protection are performed.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present application can be implemented by software plus necessary general-purpose hardware, and certainly can also be implemented by special-purpose hardware including special-purpose integrated circuits, special-purpose CPUs, special-purpose memories, special-purpose components and the like. Generally, functions performed by computer programs can be easily implemented by corresponding hardware, and specific hardware structures for implementing the same functions may be various, such as analog circuits, digital circuits, or dedicated circuits. However, for the present application, the implementation of a software program is more preferable. Based on such understanding, the technical solutions of the present application may be substantially embodied in the form of a software product, which is stored in a readable storage medium, such as a floppy disk, a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk of a computer, and includes several instructions for causing a computer device to execute the method according to the embodiments of the present application.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on or transferred from a computer-readable storage medium to another computer-readable storage medium, which may be magnetic (e.g., floppy disks, hard disks, tapes), optical (e.g., DVDs), or semiconductor (e.g., solid State Disks (SSDs)), among others.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the inherent logic, and should not constitute any limitation to the implementation process of the present application.
Additionally, the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that in this application, "B corresponding to A" means that B is associated with A, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also be determined from a and/or other information.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (8)

1. A security method based on multiple biological recognition technologies is characterized in that the method is applied to a security control system, and the method comprises the following steps:
obtaining current security level information, and obtaining a first security control scheme according to the security level information;
acquiring first authentication identification information of a first position, and matching a first authentication user according to the first authentication identification information;
obtaining a first authority level of a first authentication user according to the first security control scheme;
obtaining position authority information of a first position according to the first security control scheme, and obtaining a first authority control level according to the position authority information;
judging whether the first authority level is matched with the first authority control level;
when the first authority level is matched with the first authority control level, matching control schemes of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme;
performing security verification of the first authenticated user based on the first security verification combination scheme;
constructing a single feature set of a security means;
performing security level scoring on the single feature set to obtain a security level evaluation set;
performing stability evaluation on the monomer feature set to obtain a stability evaluation set;
performing combined security scheme matching according to the first authority control level and the security level evaluation set to obtain a first security verification combined scheme set;
and performing stability sequential sorting on the first security and protection verification combined scheme set according to the stability evaluation set, and obtaining the first security and protection verification combined scheme according to sequential sorting results.
2. The method of claim 1, wherein the performing the security verification of the first authenticated user based on the first security verification combination scheme further comprises:
obtaining a first security and protection verification result;
when the first security and protection verification result is that the verification fails, judging whether a single verification failing result exists in the first security and protection verification result;
when a single verification failing result exists in the first security verification result, obtaining a replacement verification scheme of the single verification failing result according to the sequence sorting result;
and performing security protection verification again on the first authentication user based on the replacement verification scheme.
3. The method of claim 1, wherein the security control system is communicatively coupled to an image acquisition module, the method comprising:
acquiring an image of the first authenticated user through the image acquisition module according to the first security verification combination scheme to obtain a first image set;
performing facial feature matching of the first authenticated user according to the first image set to obtain a multi-angle matching result of the first facial feature;
performing gait feature recognition of the first authenticated user through the first image set to obtain a first step feature matching result;
and obtaining a security verification result of the first authenticated user according to the multi-angle matching result of the first facial feature and the first step-state feature matching result.
4. The method of claim 3, wherein the security control system is communicatively coupled to a fingerprint acquisition module, the method further comprising:
acquiring fingerprint information of the first authenticated user through the fingerprint acquisition module to obtain a first fingerprint acquisition result;
performing fingerprint matching degree authentication according to the first fingerprint acquisition result to obtain a first fingerprint matching degree authentication result;
performing fingerprint authentication sequence authentication according to the first fingerprint acquisition result to obtain a first fingerprint authentication sequence authentication result;
performing the authentication of the pressing frequency information and the pressing pressure information in the fingerprint authentication process according to the first fingerprint acquisition result to obtain a first fingerprint frequency pressure authentication result;
and obtaining a security verification result of the first authenticated user according to the first fingerprint matching degree authentication result, the first fingerprint verification sequence authentication result and the first fingerprint frequency pressure authentication result.
5. The method of claim 4, wherein the method comprises:
judging whether the security verification result of the first authenticated user passes the authentication;
and when the security verification result of the first authentication user is that the authentication is passed, updating the biological characteristics of the first authentication user through the first image set and the first fingerprint acquisition result.
6. The method of claim 1, wherein the method comprises:
obtaining a first security level adjustment result;
performing security level adjustment based on the first security control scheme and the security level evaluation set according to the first security level adjustment result to obtain a first security level dynamic adjustment result;
and performing security verification based on the first security level dynamic adjustment result.
7. A security system based on multiple biometric identification technologies, the system comprising:
the first obtaining unit is used for obtaining current security level information and obtaining a first security control scheme according to the security level information;
the second obtaining unit is used for obtaining first authentication identification information of the first position and matching a first authenticated user according to the first authentication identification information;
a third obtaining unit, configured to obtain a first permission level of a first authenticated user according to the first security control scheme;
the fourth obtaining unit is used for obtaining position authority information of the first position according to the first security control scheme and obtaining a first authority control level according to the position authority information;
the first judging unit is used for judging whether the first authority level is matched with the first authority control level;
a fifth obtaining unit, configured to, when the first authority level is matched with the first authority control level, perform control scheme matching of a control level combination scheme set according to the first authority control level to obtain a first security and protection verification combination scheme;
a first verification unit, configured to perform security verification of the first authenticated user based on the first security verification combination scheme;
the first construction unit is used for constructing a single feature set of the security means;
a sixth obtaining unit, configured to perform security level scoring on the monomer feature set to obtain a security level evaluation set;
a seventh obtaining unit, configured to perform stability evaluation on the monomer feature set to obtain a stability evaluation set;
an eighth obtaining unit, configured to perform combined security scheme matching according to the first authority control level and the security level evaluation set, and obtain a first security verification combined scheme set;
a ninth obtaining unit, configured to perform stability sequential ordering on the first security and protection verification combination scheme set according to the stability assessment set, and obtain the first security and protection verification combination scheme according to a sequential ordering result.
8. An electronic device comprising a processor and a memory; the memory is used for storing; the processor is used for executing the method of any one of claims 1 to 6 through calling.
CN202210245471.3A 2022-03-14 2022-03-14 Security method and system based on multiple biological recognition technology Active CN114708667B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210245471.3A CN114708667B (en) 2022-03-14 2022-03-14 Security method and system based on multiple biological recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210245471.3A CN114708667B (en) 2022-03-14 2022-03-14 Security method and system based on multiple biological recognition technology

Publications (2)

Publication Number Publication Date
CN114708667A CN114708667A (en) 2022-07-05
CN114708667B true CN114708667B (en) 2023-04-07

Family

ID=82168042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210245471.3A Active CN114708667B (en) 2022-03-14 2022-03-14 Security method and system based on multiple biological recognition technology

Country Status (1)

Country Link
CN (1) CN114708667B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115564205A (en) * 2022-09-26 2023-01-03 重庆大学 Intelligent warehouse management method and system for power transformation operation and maintenance
CN115796899B (en) * 2022-11-17 2024-03-12 宋舒涵 Regional product supply bar code management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303725A (en) * 2008-04-30 2008-11-12 浙江大学 Method for generating and authenticating frailty watermark based on error correction encoding
CN106022218A (en) * 2016-05-06 2016-10-12 浙江工业大学 Palm print palm vein image layer fusion method based on wavelet transformation and Gabor filter
CN106296185A (en) * 2015-05-12 2017-01-04 湖南人文科技学院 A kind of high-security mobile payment terminal being combined circumstantial evidence based on biological characteristic

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006251932A (en) * 2005-03-08 2006-09-21 Canon Inc Security management method and apparatus and program for security management
CN100583765C (en) * 2006-10-30 2010-01-20 华为技术有限公司 Biological safety level model and its setting method and device
EP3376464A1 (en) * 2017-03-14 2018-09-19 Electronics and Telecommunications Research Institute Trust-based resource sharing method and system
CN106778189A (en) * 2017-03-23 2017-05-31 浙江宏森科技有限公司 A kind of method and apparatus for the control that conducted interviews to terminal
CN109389703A (en) * 2017-08-04 2019-02-26 福州百益百利自动化科技有限公司 A kind of intelligent door lock control system and its control method based on social networks
CN109086582B (en) * 2018-06-15 2022-12-13 华云数智科技(深圳)有限公司 Fingerprint authentication method, terminal and computer readable storage medium
CN110059465B (en) * 2019-04-24 2023-07-25 腾讯科技(深圳)有限公司 Identity verification method, device and equipment
CN110059671A (en) * 2019-04-29 2019-07-26 深圳市轱辘汽车维修技术有限公司 A kind of safety inspection method, system, device and computer readable storage medium
CN110266738A (en) * 2019-07-31 2019-09-20 中国工商银行股份有限公司 Identification authentication method and device based on multi-biological characteristic
CN111414601B (en) * 2020-03-27 2023-10-03 中国人民解放军国防科技大学 Continuous identity authentication method, system and medium for kylin mobile operation system
CN112132157A (en) * 2020-08-26 2020-12-25 浙江工业大学 Raspberry pie-based gait face fusion recognition method
US11978294B2 (en) * 2020-12-29 2024-05-07 Nanjing Easthouse Electrical Co., Ltd. Multi-factor authentication electronic lock systems and methods of using the same
CN112581103A (en) * 2020-12-31 2021-03-30 苏州盛德隆智能科技有限公司 Safety online conference management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303725A (en) * 2008-04-30 2008-11-12 浙江大学 Method for generating and authenticating frailty watermark based on error correction encoding
CN106296185A (en) * 2015-05-12 2017-01-04 湖南人文科技学院 A kind of high-security mobile payment terminal being combined circumstantial evidence based on biological characteristic
CN106022218A (en) * 2016-05-06 2016-10-12 浙江工业大学 Palm print palm vein image layer fusion method based on wavelet transformation and Gabor filter

Also Published As

Publication number Publication date
CN114708667A (en) 2022-07-05

Similar Documents

Publication Publication Date Title
CN114708667B (en) Security method and system based on multiple biological recognition technology
KR102455633B1 (en) Liveness test method and apparatus
US10169561B2 (en) Biometric interface system and method
CN106326327B (en) Method and apparatus for updating user authentication data
EP2523149B1 (en) A method and system for association and decision fusion of multimodal inputs
US7788101B2 (en) Adaptation method for inter-person biometrics variability
US20100268537A1 (en) Speaker verification system
US20070237367A1 (en) Person verification apparatus and person verification method
US10878071B2 (en) Biometric authentication anomaly detection
JP2006285205A (en) Speech biometrics system, method, and computer program for determining whether to accept or reject subject for enrollment
US20100302000A1 (en) Biometric identify verification including stress state evaluation
WO2007075982A1 (en) Method and apparatus for multi-model hybrid comparison system
US11062120B2 (en) High speed reference point independent database filtering for fingerprint identification
CN106888204B (en) Implicit identity authentication method based on natural interaction
US20200151308A1 (en) Brain activity-based authentication
JP2017016646A (en) Methods and apparatuses for updating data for user authentication
KR102261833B1 (en) Method and apparatus for authentication, and method and apparatus for learning recognizer
CN110765850A (en) Alarm method and device based on residual error network, computer equipment and storage medium
US10970573B2 (en) Method and system for free text keystroke biometric authentication
US20070233667A1 (en) Method and apparatus for sample categorization
CN114519898A (en) Biological characteristic multi-mode fusion recognition method and device, storage medium and equipment
CN111063359A (en) Telephone return visit validity judging method, device, computer equipment and medium
US20200320181A1 (en) Adjusting Biometric Detection Thresholds Based on Recorded Behavior
US7162641B1 (en) Weight based background discriminant functions in authentication systems
JP2003044858A (en) Device and method for personal identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant