CN105938528B - A kind of control system of computer events - Google Patents

A kind of control system of computer events Download PDF

Info

Publication number
CN105938528B
CN105938528B CN201610217124.4A CN201610217124A CN105938528B CN 105938528 B CN105938528 B CN 105938528B CN 201610217124 A CN201610217124 A CN 201610217124A CN 105938528 B CN105938528 B CN 105938528B
Authority
CN
China
Prior art keywords
module
event
control system
data
correlating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610217124.4A
Other languages
Chinese (zh)
Other versions
CN105938528A (en
Inventor
鲁慧民
宋静静
狄天
狄天一
付帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University of Technology
Original Assignee
Changchun University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University of Technology filed Critical Changchun University of Technology
Priority to CN201610217124.4A priority Critical patent/CN105938528B/en
Publication of CN105938528A publication Critical patent/CN105938528A/en
Application granted granted Critical
Publication of CN105938528B publication Critical patent/CN105938528B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses a kind of control systems of computer events, including incidence relation to establish module, human-machine operation module, identification module, correlating event acquisition module, event simulation module, event execution confirmation module and event execution module.The present invention is associated the priority assignation of event according to different identity informations, substantially increase the safety of system, avoid the leakage or stolen of information, each event can be simulated before execution, the operation error of user is largely avoided, while the correlating event of all confirmations can be executed with a key, when reducing computer system processor correlating event and the connection number of database, the treatment effeciency to correlating event is improved, system resource is released.

Description

A kind of control system of computer events
Technical field
The present invention relates to computer fields, and in particular to a kind of control system of computer events.
Background technique
Existing computer events execution does not need to carry out authentication, any to carry out holding for all events per capita Row, this undoubtedly will cause the stolen of information or leakage, such as when being remotely operated, operator can optional point open it is all File is checked, can also be operated to event all in system, and system safety coefficient is extremely low, current all computer things The execution of part is directly to execute, and is all much irreversible, once operation error, will cause very big trouble, meanwhile, All events all individually execute, and system needs take a substantial amount of time and resource.
Summary of the invention
To solve the above problems, being believed the present invention provides a kind of control system of computer events according to different identity Breath is associated the priority assignation of event, substantially increases the safety of system, avoids the leakage or stolen of information, each thing Part can be simulated before execution, largely avoid the operation error of user, while can execute with a key all true The correlating event recognized, when reducing computer system processor correlating event and the connection number of database, improve to association thing The treatment effeciency of part, releases system resource.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of control system of computer events, including
Incidence relation establishes module, for establishing the mapping relations of business and event by encrypting module;
Human-machine operation module, for incoming traffic request and for the vena metacarpea data and human face data of identification, and Correlating event is sent by the service request of input and obtains module, sends identity for the vena metacarpea data and human face data of input Identification module;
Identification module, for extracting the biological attribute data in received vena metacarpea data and human face data, And identity is completed after comparing according to the biological characteristic model in extracted biological attribute data and user registry database Certification, and encrypting module and correlating event acquisition module are sent by the result of authentication;
Correlating event obtains module, for according to the result of the service request and authentication from the business All correlating events corresponding with the business of the acquisition in the user right in the mapping relations of event;
Event simulation module, for successively extracting each event as corresponding from acquired all correlating events Then event to be executed carries out virtual analog operation by event simulation module and shows;
Event executes confirmation module, and the execution for carrying out each event to be executed confirms or negative, to obtain all The event set to be executed of confirmation;
Event execution module, for all events corresponding in the event set to be executed of all confirmations.
Wherein, the result of the authentication is the decoding password of encrypting module.
Wherein, input, face are imaged after the vena metacarpea data are scanned by infrared vena metacarpea scanning recognition device Data are that generated human face data and lip move interval time data reading aloud specific authentication text for user.
Wherein, the human-machine operation module includes picture input module, text input module and voice input module.
Wherein, the voice input module uses microphone.
Wherein, it needs first to carry out user's registration before the mapping relations of business of establishing and event, to generate corresponding user's note The biological characteristic model of volume identity, and the biological characteristic model is saved in user registry database.
Wherein, the event executes the confirmation that confirmation module carries out event by signal language.
Wherein, it is equipped with simulation playback module in the event simulation module, simulation F.F. module, simulates and falls back module, uses In the playback, F.F. and retroversion browsing that carry out event simulation.
The invention has the following advantages:
It is associated the priority assignation of event according to different identity informations, substantially increases the safety of system, avoids The leakage of information or stolen, each event can be simulated before execution, and the operation for largely avoiding user is lost Accidentally, while the correlating event of all confirmations can be executed with a key, when reducing computer system processor correlating event and database Connection number, improve the treatment effeciency to correlating event, release system resource.
Detailed description of the invention
Fig. 1 is a kind of system block diagram of the control system of computer events of embodiment.
Specific embodiment
In order to which objects and advantages of the present invention are more clearly understood, the present invention is carried out with reference to embodiments further It is described in detail.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair It is bright.
As shown in Figure 1, the embodiment of the invention provides a kind of control systems of computer events, including
Incidence relation establishes module, for establishing the mapping relations of business and event by encrypting module;
Human-machine operation module, for incoming traffic request and for the vena metacarpea data and human face data of identification, and Correlating event is sent by the service request of input and obtains module, sends identity for the vena metacarpea data and human face data of input Identification module;
Identification module, for extracting the biological attribute data in received vena metacarpea data and human face data, And identity is completed after comparing according to the biological characteristic model in extracted biological attribute data and user registry database Certification, and encrypting module and correlating event acquisition module are sent by the result of authentication;
Correlating event obtains module, for according to the result of the service request and authentication from the business All correlating events corresponding with the business of the acquisition in the user right in the mapping relations of event;
Event simulation module, for successively extracting each event as corresponding from acquired all correlating events Then event to be executed carries out virtual analog operation by event simulation module and shows;
Event executes confirmation module, and the execution for carrying out each event to be executed confirms or negative, to obtain all The event set to be executed of confirmation;
Event execution module, for all events corresponding in the event set to be executed of all confirmations.
The result of the authentication is the decoding password of encrypting module.
Input is imaged after being scanned by infrared vena metacarpea scanning recognition device in the vena metacarpea data, and human face data is User is that generated human face data and lip move interval time data reading aloud specific authentication text.
The human-machine operation module includes picture input module, text input module and voice input module.
The voice input module uses microphone.
It needs first to carry out user's registration before the mapping relations of business of establishing and event, to generate corresponding user's registration identity The biological characteristic model of mark, and the biological characteristic model is saved in user registry database.
The event executes the confirmation that confirmation module carries out event by signal language.
It is equipped with simulation playback module in the event simulation module, simulation F.F. module, simulates and falls back module, for carrying out Playback, F.F. and the retroversion browsing of event simulation.
The principle of this specific implementation vena metacarpea authentication module are as follows:
When a part as life entity living of palm, near infrared light that the hemoglobin in palm vein can be emitted by device It absorbs, acquisition imaging;It is divided and comes out from human body if human body loses life or palm, palm becomes as non-living body, cannot be by Device acquisition imaging, then can not carry out identification, matched, this computer should by data line and vena metacarpea identification device and Microphone is connected, and also vena metacarpea identification device and microphone are installed on computer as needed.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (8)

1. a kind of control system of computer events, which is characterized in that including
Incidence relation establishes module, for establishing the mapping relations of business and event by encrypting module;
Human-machine operation module, for incoming traffic request and for the vena metacarpea data and human face data of identification, and will be defeated The service request entered is sent to correlating event and obtains module, sends identification for the vena metacarpea data and human face data of input Module;
Identification module, for extracting the biological attribute data in received vena metacarpea data and human face data, and root Authentication is completed after comparing according to the biological characteristic model in extracted biological attribute data and user registry database, And encrypting module and correlating event acquisition module are sent by the result of authentication;
Correlating event obtains module, for according to the result of the service request and authentication from the business and thing The corresponding all correlating events of the business in user right are obtained in the mapping relations of part;
Event simulation module to be held for successively extracting each event as corresponding from acquired all correlating events Part is acted, virtual analog operation is then carried out and shows;
Event executes confirmation module, and the execution for carrying out each event to be executed confirms or negative, to obtain all confirmations Event set to be executed;
Event execution module, corresponding all events in the event set to be executed for executing all confirmations.
2. a kind of control system of computer events according to claim 1, which is characterized in that the knot of the authentication Fruit is the decoding password of encrypting module.
3. a kind of control system of computer events according to claim 1, which is characterized in that the vena metacarpea data are logical It crosses and input is imaged after infrared vena metacarpea scanning recognition device is scanned, human face data is user when reading aloud specific authentication text Generated human face data and lip move interval time data.
4. a kind of control system of computer events according to claim 1, which is characterized in that the human-machine operation module Including picture input module, text input module and voice input module.
5. a kind of control system of computer events according to claim 4, which is characterized in that the voice input module Using microphone.
6. a kind of control system of computer events according to claim 4, which is characterized in that establishing business and event Mapping relations before need first to carry out user's registration, to generate the biological characteristic model of corresponding user's registration identity, and will The biological characteristic model is saved in user registry database.
7. a kind of control system of computer events according to claim 1, which is characterized in that the event executes confirmation Module carries out the confirmation of event by signal language.
8. a kind of control system of computer events according to claim 1, which is characterized in that the event simulation module It is interior be equipped with simulation playback module, simulation F.F. module, simulation fall back module, for carrying out the playback of event simulation, F.F. and falling Move back browsing.
CN201610217124.4A 2016-04-03 2016-04-03 A kind of control system of computer events Expired - Fee Related CN105938528B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610217124.4A CN105938528B (en) 2016-04-03 2016-04-03 A kind of control system of computer events

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610217124.4A CN105938528B (en) 2016-04-03 2016-04-03 A kind of control system of computer events

Publications (2)

Publication Number Publication Date
CN105938528A CN105938528A (en) 2016-09-14
CN105938528B true CN105938528B (en) 2019-03-12

Family

ID=57151976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610217124.4A Expired - Fee Related CN105938528B (en) 2016-04-03 2016-04-03 A kind of control system of computer events

Country Status (1)

Country Link
CN (1) CN105938528B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321935B (en) * 2019-06-13 2022-03-15 上海上湖信息技术有限公司 Method and device for determining business event relation and computer readable storage medium
CN112329652A (en) * 2020-11-09 2021-02-05 长春工业大学 Sliding type self-adaptive finger vein recognition device and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018341A (en) * 2007-02-06 2007-08-15 浙江大学 Control device and method of audio and video playing status based on the built-in system
CN102183923A (en) * 2011-04-26 2011-09-14 中国工商银行股份有限公司 Computer related event executing control method and system
CN102546665A (en) * 2012-02-28 2012-07-04 信雅达系统工程股份有限公司 Bank service data processing method
CN103457986A (en) * 2013-02-06 2013-12-18 江苏钱旺智能系统有限公司 Method, server and terminal for pushing task event
CN104598796A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Method and system for identifying identity

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI434220B (en) * 2010-09-03 2014-04-11 Univ Nat Taiwan Science Tech A method for recognizing the identity of user by palm vein biometric

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018341A (en) * 2007-02-06 2007-08-15 浙江大学 Control device and method of audio and video playing status based on the built-in system
CN102183923A (en) * 2011-04-26 2011-09-14 中国工商银行股份有限公司 Computer related event executing control method and system
CN102546665A (en) * 2012-02-28 2012-07-04 信雅达系统工程股份有限公司 Bank service data processing method
CN103457986A (en) * 2013-02-06 2013-12-18 江苏钱旺智能系统有限公司 Method, server and terminal for pushing task event
CN104598796A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Method and system for identifying identity

Also Published As

Publication number Publication date
CN105938528A (en) 2016-09-14

Similar Documents

Publication Publication Date Title
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
US10114935B2 (en) Technologies for login pattern based multi-factor authentication
CN109118616A (en) access control method and access control device
JP6900955B2 (en) Personal authentication device, personal authentication method and personal authentication program
US20150049922A1 (en) Method for logging a user in to a mobile device
Alsaadi Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review
CN103310142A (en) Man-machine fusion security authentication method based on wearable equipment
CN104123556A (en) Examinee authentication system and method based on image recognition
CN106296017A (en) Management method that a kind of guest room is moved in and device
CN105938528B (en) A kind of control system of computer events
CN108773743A (en) Authorization method, device, equipment and the storage medium of building hoist
Yıldırım et al. Android based mobile application development for web login authentication using fingerprint recognition feature
CN104392723A (en) Sharing instrument platform management method based on voiceprint recognition technology
CN105574491A (en) Iris recognition based examinee identity recognition device and examinee identity recognition method
CN110162942A (en) Auth method, device, equipment and storage medium based on timestamp
WO2016124008A1 (en) Voice control method, apparatus and system
CN113591051A (en) Electronic file full life cycle information security system and method
Carrillo Continuous biometric authentication for authorized aircraft personnel: A proposed design
CN110516426A (en) Identity identifying method, certification terminal, device and readable storage medium storing program for executing
CN106790237A (en) A kind of authentication device and method based on living things feature recognition
CN103532956A (en) Biological information-based authentication method in cloud operation system
CN103700151A (en) Morning run check-in method
CN107992825A (en) A kind of method and system of the recognition of face based on augmented reality
CN109461237A (en) A kind of intelligent door lock equipment and its method for carrying out message prompting
CN109614804B (en) Bimodal biological characteristic encryption method, device and storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Lu Huimin

Inventor after: Song Jingjing

Inventor after: Di Tianyi

Inventor after: Fu Shuai

Inventor before: Lu Huimin

Inventor before: Han Xuming

Inventor before: Liu Gang

Inventor before: Wang Hongzhi

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190312