CN106850667A - It is a kind of to continue certification security protection system and its method - Google Patents

It is a kind of to continue certification security protection system and its method Download PDF

Info

Publication number
CN106850667A
CN106850667A CN201710122165.XA CN201710122165A CN106850667A CN 106850667 A CN106850667 A CN 106850667A CN 201710122165 A CN201710122165 A CN 201710122165A CN 106850667 A CN106850667 A CN 106850667A
Authority
CN
China
Prior art keywords
face
user
certification
client
subsystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710122165.XA
Other languages
Chinese (zh)
Inventor
曹耀和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Wisdom Mdt Infotech Ltd
Original Assignee
Hangzhou Wisdom Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Wisdom Mdt Infotech Ltd filed Critical Hangzhou Wisdom Mdt Infotech Ltd
Priority to CN201710122165.XA priority Critical patent/CN106850667A/en
Publication of CN106850667A publication Critical patent/CN106850667A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

Continue certification security protection system and its method the present invention relates to a kind of, obtain subsystem, recognition of face subsystem, face in real time including facial image to continue recognition subsystem and continue authority executive subsystem, user carries out face login authentication process by facial image real-time acquisition system and face identification system.Face continues recognition subsystem and is automatically continued for user's face Real time identification certification in setting time interval;If face authentication success, continue the right to use that authority executive subsystem distributes client to user;If face authentication fails, and unsuccessfully exceedes predetermined time interval, then persistently authority executive subsystem does not distribute the right to use of client to user, and user can not normally use client.Face continues recognition subsystem and is automatically continued for user's face Real time identification certification in setting time interval.The present invention is capable of the security of sustainable protection client data, is with a wide range of applications.

Description

It is a kind of to continue certification security protection system and its method
Technical field
The present invention relates to technical fields such as information security and security protections, more particularly to it is a kind of continue certification security protection system and Its method.
Background technology
With the development of computer network and the communication technology, the network information security, intellectual property protection and authentication etc. Problem turns into an important and urgent research topic.In the prior art, common data security protecting technology is mainly and passes through Password and external key(Such as:USB flash disk, softdog etc.)Enciphering/deciphering is carried out to electronic information data.In the protection mechanism using password In, the secrecy effect to data is limited, and the probability that the password for being used is cracked is very high, and is not easy to memory;Using outer It is that external key replaces cipher memory as identity documents by the use of material object, although be difficult to crack in putting the protection mechanism of key, Without memory, but once the external key is lost or is stolen, user will seem at a loss what to do, once while authority quilt It is granted by, is difficult to be cancelled or interrupt during the use of system or software, once ciphertext is decrypted, is difficult to allow in plain text Revert to ciphertext.
In order to solve the problems, such as above two protection mechanism, prior art is also provided one kind and is carried out using face characteristic The scheme of data protection.Because face characteristic information has uniqueness, without deliberately carrying, will not lose, it is difficult to forge and steal The advantages of taking, the program is deposited in a computer by by the template data of password and face characteristic, when user uses the meter When calculation machine carries out data enciphering/deciphering, the legitimacy of user can be checked by using the face characteristic of person, so as to reach number According to the purpose of protection.Identity identifying method based on face recognition technology, overcomes the disadvantage that traditional identity identifying method is present End, possesses security higher, reliability and validity, is increasingly valued by people, and it is raw to progress into society Every field living.
But, the current identity identifying method based on face recognition technology is normally only applied to user's registration and user steps on In the record stage, disposable mode is taken to carry out user identity identification and certification, as the certification after User logs in but without reference to giving Network hacker leaves opportunity, and very big hidden danger is brought to the data information security of user.Prior art has much room for improvement and carries It is high.
The content of the invention
The technical problems to be solved by the invention are, there is provided a kind of to continue certification security protection system and its method, hold The safety of continuation of insurance shield user terminal, resource and information, improves the security of client terminal, resource and data.
The present invention is achieved in that offer is a kind of and continues certification security protection system, installs on the client, including people Face image obtains subsystem, recognition of face subsystem, face and continues recognition subsystem and continue authority executive subsystem in real time, tool Body includes following content:
User carries out face login authentication process by the facial image real-time acquisition system and face identification system;If stepped on Record authentication result is that successfully, the face continues Verification System and really starts, and user obtains the right to use of client protected object Or control, and perform the lasting recognition subsystem of face;It is failure if logged on authentication result, then repeats face login and recognize Card process.
The lasting recognition subsystem of the face is automatically continued for user's face in setting time interval to be known in real time Not certification;It is described to continue the visitor that authority executive subsystem distributes certain period of time to user if face authentication result is successfully The right to use of family end protected object, protected object can be used normally;If face authentication result is failure, and is unsuccessfully surpassed Cross predetermined time interval, then it is described to continue the use that authority executive subsystem was not assigned to and cancelled the protected object of user Power, the right to use of user customer protected object is temporarily interrupted, and user can not normally using protected in client Object;In this process, the lasting certification of face is not interrupted, and also in being continued for, distribution and/or cancellation authority are to quilt The state of the object of protection is directly affected without any.
Wherein, the lasting recognition subsystem of the face is automatically continued for user's face reality in setting time interval When recognize certification, no matter certification success or authentification failure, certification is all underway.
Further, the certification security protection system that continues also includes that face learns and training subsystem, the face Study and training subsystem are that, by the face video and/or facial image and/or face photograph of user, collection uses client The facial image raw information of user, and the required training material of user's human face recognition model training is produced on this basis, By training program, the face characteristic of user is extracted, form the human face recognition model of user, so that face continues recognition subsystem Carry out face and persistently recognize certification.
Further, the facial image is obtained subsystem and is obtained in real time by the picture pick-up device installed in client in real time The face video of user, provides for user's face registration, the login authentication of user's face and user's face continue recognition subsystem Suitable facial image;The recognition of face subsystem obtains the face of the user of subsystem acquisition in real time from facial image automatically The facial image that is best suitable for is captured in video and is identified, known to provide facial image in user's registration and User logs in stage Not certification, and feed back and display recognition result.
Further, the face continues recognition subsystem also includes that the Face datection of completion real-time continuous, key point are fixed Position, facial image pretreatment, recognition of face and certification, the function course of face tracking, also including providing use for safety officer The operate interface of family management, log audit and security parameter configuration;The face continues recognition subsystem using acquisition in real time User's facial image carry out identifying user and whether watching client end interface still to leave unused client.
Further, the authority executive subsystem that continues includes that completing real-time continuous authority performs and access control function Process, also including providing the operate interface that resource is configured using management, log audit and security parameter for safety officer; The authority executive subsystem that continues continues the identification authentication result of recognition subsystem in time to client user according to face Access right is reallocated.
Further, it is described to client user's access right carry out reallocation include face authentication successfully authority distribution with And face authentication failure authority distribution;It is described to continue authority executive subsystem according to face authentication result in success authority and failure Seamless automatic switchover in the two states of authority, protected object will not occur to malfunction and/or exit because of this switching Problem.The reallocation that carried out to client user's access right for continuing authority executive subsystem includes whether that limitation user visits Client, resource, software and information are asked, and whether is limited using client access server and its service and software and data Base resource.
Further, it is described to client user's access right carry out reallocation content including but not limited to keyboard cannot/ Can use, screen display mess code/correct, software/service cannot/can use, sensitive information encryption and decryption failure/success, plus Ciphertext part/directories/files system/Fixed disk/mobile hard disk/cannot/can use, firewall rule open/close, USB/ Wifi/ network interface cards cannot/can using and printer print incorrect/correct.
The present invention is achieved in that and also provide a kind of lasting certification safety protecting method, including facial image is obtained in real time Take method, face identification method, face to continue recognition methods and continue authority execution method, specifically include following steps:
Step one, user carries out face login authentication by the facial image real time acquiring method and face identification method Journey;It is that successfully, the face continues Verification System and really starts, and user obtains client protected object if logged on authentication result The right to use or control, and enter next step;It is failure if logged on authentication result, then repeats face login authentication Process.
Step 2, client continues recognition methods and constantly enters in setting time interval, automatically using the face Row user's face Real time identification certification;If face authentication result is successfully, method is performed to user according to the authority that continues The right to use of client protected object is distributed, protected object can be used normally;If face authentication result is failure, and Failure exceedes predetermined time interval, then described to continue the use that authority performs the protected object for being not assigned to and cancelling user Power, the right to use of user customer is temporarily interrupted, and user can not normally use the protected object of client;In this mistake Cheng Zhong, face continues certification not to interrupt, and also in being continued for, distribution and/or cancellation authority are to protected object State is directly affected without any.Wherein, the lasting recognition methods of the face is automatically continued in setting time interval User's face Real time identification certification, no matter certification succeeds or authentification failure, and certification is all underway.
Further, the certification safety protecting method that continues also includes face study and training method, the face Practise and training method includes that, by the face video and/or facial image and/or face photograph of user, collection is used using client The facial image raw information at family, and the required training material of user's human face recognition model training is produced on this basis, lead to Training program is crossed, the face characteristic of user is extracted, the human face recognition model of user is formed, carried out so that face continues recognition methods Face persistently recognizes certification.
Further, the face continue recognition methods using in real time acquisition user's facial image come identifying user whether Watch client end interface and still leave unused client;The authority that continues performs method according to the lasting side of identification of face The identification authentication result of method is reallocated and/or is adjusted to client user's access right in time.The authority that continues is held The reassignment method that carried out to client user's access right of row method includes whether that restricting user access client is protected right The method of elephant, and whether limit the method using client access server, database resource and its service.
Further, it is described to client user's access right carry out reallocation include face authentication successfully authority distribution with And face authentication failure authority distribution;The lasting authority execution method is according to face authentication result is in success authority and unsuccessfully weighs Seamless automatic switchover in the two states of limit, protected system, subsystem and/or related software, hardware will not be because of this Switch and error occurs and/or problem is exited, system, subsystem and related software, hardware error are not caused and/or is exited.
Further, it is described to client user's access right carry out reallocation content including but not limited to keyboard cannot/ Can use, screen display mess code/correct, software/service cannot/can use, sensitive information encryption and decryption failure/success, plus Ciphertext part/directories/files system/Fixed disk/mobile hard disk/cannot/can use, firewall rule open/close, USB/ Wifi/ network interface cards cannot/can using and printer print incorrect/correct.
The present invention is achieved in that and also provides a kind of application for continuing certification security protection system as the aforementioned, and this is held Continuous certification security protection system promotes the use of the occasion of other lasting authentications and rights management, and these applications are included but not It is limited to bluetooth equipment, point-to-point Wifi equipment, point-to-point sound device, NFC device, IC-card equipment, fingerprint equipment and the 3rd Square network continues authentication service to replace face function in systems.
Compared with prior art, lasting certification security protection system and its method of the invention, real-time by facial image Obtain subsystem, recognition of face subsystem, face to continue recognition subsystem and continue authority executive subsystem, provide clients with Continue identity identifying and authenticating, no matter user is not use client the short time, or temporarily away from client, as long as user does not exist Before client, the present invention can carry out authority distribution to client-side information and data at once, to client resource and information Protected, other people cannot know the interface information and internal data of client.Before only waiting user to come back to client, And recognition subsystem Real time identification is continued by face arrive, the authority of client seamless switching immediately, user normally uses client, So as to the security of sustainable protection client data.
Brief description of the drawings
Fig. 1 is the principle schematic for continuing the preferred embodiment of certification security protection system one of the invention.
Specific embodiment
In order that the technical problems to be solved by the invention, technical scheme and beneficial effect become more apparent, below tie Drawings and Examples are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only It is used to explain the present invention, is not intended to limit the present invention.
Refer to shown in Fig. 1, it is of the invention to continue certification security protection system preferred embodiment.The lasting certification is anti-safely Protecting system is installed on the client, including facial image to obtain subsystem S10, recognition of face subsystem S30, face in real time lasting Recognition subsystem S50, lasting authority executive subsystem S70 and face study and training subsystem S20, specifically include in following Hold:
User carries out face login authentication process by the facial image real-time acquisition system and face identification system;If stepped on Record authentication result S40 is that successfully, user obtains the right to use or control of client protected object, then perform face and persistently know Small pin for the case system S50;It is failure if logged on authentication result S40, then repeats face login authentication process.
It is real-time that the lasting recognition subsystem S50 of the face is automatically continued for user's face in setting time interval Identification certification;If face authentication result S60 is successfully, the authority executive subsystem S70 that continues distributes client to user The right to use of protected object, the right to use of user customer continues to continue, and does not influence user normally to use;If face is recognized Card result S60 is failure, and unsuccessfully exceedes predetermined time interval, then described to continue authority executive subsystem S70 not to user Distribution and the right to use of cancellation pause client, the right to use of user customer are interrupted, and user can not normally use client Hold protected object.Wherein, the lasting recognition subsystem S50 of the face is automatically continued in setting time interval User's face Real time identification certification.
The facial image obtains subsystem S10 by the picture pick-up device user in real installed in client in real time Face video, provides suitable for user's face registration, the login authentication of user's face and user's face continue recognition subsystem S50 Facial image.The recognition of face subsystem S30 obtains the people of the user of subsystem S10 acquisitions in real time from facial image automatically The facial image that is best suitable for is captured in face video and is identified, to provide facial image in user's registration and User logs in stage Identification certification, and feed back and display recognition result.
The face continues recognition subsystem S50 also to be included completing the Face datection of real-time continuous, crucial point location, face Image preprocessing, recognition of face and certification, the function course of face tracking, also including for safety officer provide user management, Log audit and the operate interface of security parameter configuration.The face continues recognition subsystem S50 using the use for obtaining in real time Whether family facial image carrys out identifying user is watching client end interface is still left unused client.Face persistently recognizes son System S50 in setting time interval repeatedly, constantly automatic, be automatically performed user's face Real time identification certification.This sets Fixed time interval user can arbitrarily be set with situation in client.Setting time interval is usually set to 1 second ~ 10 minutes.
The lasting authority executive subsystem S70 is timely according to the identification authentication result that face continues recognition subsystem S50 Ground is reallocated to client user's access right, and client resource and information are protected, and is continued for client is provided Property ground security protection.Continue recognition subsystem S50 in face and predetermined time interval is unsuccessfully exceeded to user's face identification Afterwards, client automatic and the lasting authority executive subsystem S70 of execution, protect to client data.The regulation when Between interval user can arbitrarily be set in client with situation.The predetermined time interval is usually set to 3 seconds ~ 5 minutes.The regulation Time interval it is slightly more longer than the setting time interval that above-mentioned face continues recognition subsystem S50 automatics.
It is described reallocation is carried out to client user's access right to include that face authentication successfully recognize by authority distribution and face Card failure authority distribution;The lasting authority executive subsystem S70 is according to face authentication result S60 is in success authority and unsuccessfully weighs Seamless automatic switchover in the two states of limit.By protection client resource according to real-time authentication result can in two states nothing Seaming and cutting are changed, and situation about using is not led to not.Protected system, subsystem and/or related software, hardware will not be because of this Switch and error occurs and/or problem is exited, system, subsystem and related software, hardware error are not caused and/or is exited.
The authority executive subsystem S70 that continues includes completing the mistake of the execution of real-time continuous authority and access control function Journey, also including providing the operate interface that resource is configured using management, log audit and security parameter for safety officer.It is described Continue reallocation is carried out to client user's access right including whether restricting user access client for authority executive subsystem S70 End resource and information, and whether limit using client access server and database resource.
It is described to client user's access right carry out reallocation content including but not limited to keyboard cannot/can use, Screen display mess code/correct, software/service cannot/can use, sensitive information encryption and decryption failure/success, encryption file/mesh Record/file system/Fixed disk/mobile hard disk/cannot/can use, firewall rule open/close, USB/Wifi/ network interface cards Cannot/can print incorrect/correct using with printer, these authorities are we term it protected object.If face is recognized Card result S60 is that successfully then user's access right can be used including keyboard, screen display is correct, software can be used, sensitive The success of information encryption and decryption, encryption file/directory can be used, USB/Wifi/ network interface cards can be used and printer printing is correct, etc. Deng.If face authentication result S60 is failure, user's access right cannot be used including keyboard, screen display mess code, software Cannot use, sensitive information encryption and decryption fails, file/directory cannot be used, USB/Wifi/ network interface cards cannot be used, printed for encryption Machine prints incorrect, etc..
The face study and training subsystem S20 are by the face video and/or facial image and/or face of user Photograph, collects using the facial image raw information of client user, and produces user's human face recognition model instruction on this basis Training material required for practicing, by training program, extracts the face characteristic of user, forms the human face recognition model of user, with The lasting recognition subsystem S50 of person who happens to be on hand for an errand's face carries out face and persistently recognizes certification.User is carried out under various use states in client Face characteristic obtains and the user's face characteristic information for getting is stored in database.
The present invention also provides a kind of lasting certification safety protecting method, including facial image real time acquiring method, face are known Other method, face continue recognition methods, continue authority execution method and face study and training method, specifically include following step Suddenly:
Step one, user carries out face login authentication by the facial image real time acquiring method and face identification method Journey;It is that successfully, user obtains the right to use or control of client, then into next step if logged on authentication result S40;Such as Fruit login authentication result S40 is failure, then repeat face login authentication process.
Step 2, client continues recognition methods and constantly enters in setting time interval, automatically using the face Row user's face Real time identification certification;If face authentication result S60 is successfully, method is performed to use according to the authority that continues The right to use of client protected object is distributed at family, and protected object can use normally, the right to use of user customer after Renew continuous, do not influence user normally to use;If face authentication result S60 is failure, and unsuccessfully exceedes predetermined time interval, Then the authority that continues performs method, does not reallocate, cancels and suspend the use for being granted to subscription client protected object Power, the right to use of user customer is interrupted, and user can not normally use the protected object of client.In this process In, face continues certification not to interrupt, also in being continued for.Wherein, the lasting recognition methods of the face is automatically setting Fix time and user's face Real time identification certification is continued in being spaced, no matter certification succeeds or authentification failure, and certification all exists In carrying out, distribution and/or cancellation authority are directly affected to the state of protected object without any.
The facial image real time acquiring method is included by the picture pick-up device user in real installed in client Face video, suitable people is provided for user's face registration, the login authentication of user's face and user's face continue recognition methods The process of face image.
The face identification method includes that the face of the automatic user for obtaining subsystem S10 acquisitions in real time from facial image is regarded The facial image that is best suitable for is captured in frequency and is identified, recognized to provide facial image in user's registration and User logs in stage Certification, and feed back and show the process of recognition result.
It is real-time including being automatically continued for user's face in setting time interval that the face continues recognition methods Identification certification, is still left not using the real-time user's facial image for obtaining come whether identifying user is watching client end interface Use client.
The authority execution method that continues includes that system is right in time according to the identification authentication result that face continues recognition methods Client user's access right carries out reassignment method, and client resource and information are protected, and continues for client is provided Property ground security protection.
The face study and training method are included by the face video and/or facial image and/or face phase of user Piece, collects using the facial image raw information of client user, and produces the training of user's human face recognition model on this basis Required training material, by training program, extracts the face characteristic of user, forms the human face recognition model of user, so as to The lasting recognition methods of face carries out face and persistently recognizes certification.
The face continues whether recognition methods is being watched using the real-time user's facial image for obtaining come identifying user Client end interface still leaves unused client;The authority that continues performs the identification that method continues recognition methods according to face Authentication result is reallocated to client user's access right in time.The authority that continues performs using client for method Whether family access right carries out the method that reassignment method includes whether restricting user access client resource and information, and limit System is using client access server and the method for database resource.
It is described reallocation is carried out to client user's access right to include that face authentication successfully recognize by authority distribution and face Card failure authority distribution;The authority that continues performs method according to face authentication result S60 in success authority and the authority that fails Seamless automatic switchover in two states.
It is described to client user's access right carry out reallocation content including but not limited to keyboard cannot/can use, Screen display mess code/correct, software/service cannot/can use, sensitive information encryption and decryption failure/success, encryption file/mesh Record/file system/Fixed disk/mobile hard disk/cannot/can use, firewall rule open/close, USB/Wifi/ network interface cards Cannot/can print incorrect/correct using with printer.
The present invention also provides a kind of popularization and application for continuing certification security protection system as the aforementioned, the lasting certification safety Guard system promotes the use of the occasion of other lasting authentications and rights management, and these applications include but is not limited to use bluetooth Equipment, point-to-point Wifi equipment, point-to-point sound device, NFC device, IC-card equipment, fingerprint equipment and third party's network continue Authentication service replaces face function in systems.The present invention has a good application prospect.
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the invention, it is all in essence of the invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (13)

1. it is a kind of to continue certification security protection system, install on the client, it is characterised in that obtained in real time including facial image Subsystem, recognition of face subsystem, face continue recognition subsystem and continue authority executive subsystem, specifically include in following Hold:
User carries out face login authentication process by the facial image real-time acquisition system and face identification system;If stepped on Record authentication result is that successfully, the face continues Verification System and really starts, and user obtains the right to use of client protected object Or control, and perform the lasting recognition subsystem of face;It is failure if logged on authentication result, then repeats face automatically and step on Record verification process;
The lasting recognition subsystem of the face is automatically continued for user's face Real time identification in setting time interval to be recognized Card;It is described to continue the client that authority executive subsystem distributes certain period of time to user if face authentication result is successfully The right to use of protected object, protected object can be used normally;If face authentication result is failure, and unsuccessfully exceedes rule Fixed time interval, then it is described to continue the right to use that authority executive subsystem was not assigned to and cancelled the protected object of user, User can not normally use protected object in client;In this process, the lasting certification of face is not interrupted, and is also being held Carry out continuously in, distribution and/or cancellation authority are directly affected to the state of protected object without any;
Wherein, the face continues recognition subsystem and is automatically continued for user's face and knows in real time in setting time interval Not certification, no matter certification succeeds or authentification failure, and certification is all underway.
2. certification security protection system is continued as claimed in claim 1, it is characterised in that described to continue certification security protection system System also includes that face learns and training subsystem, face study and training subsystem be by the face video of user and/ Or facial image and/or face photograph, collect using the facial image raw information of client user, and produce on this basis Training material required for the training of user's human face recognition model, by training program, extracts the face characteristic of user, forms user Human face recognition model, carry out face and persistently recognize certification so that face continues recognition subsystem.
3. certification security protection system is continued as claimed in claim 1, it is characterised in that the facial image obtains son in real time The face video that system passes through the picture pick-up device user in real installed in client, is user's face registration, user's face Login authentication and user's face continue recognition subsystem and provide suitable facial image;The recognition of face subsystem it is automatic from Facial image to obtain and capture the facial image that is best suitable in the face video of the user of subsystem acquisition and be identified in real time, is Facial image identification certification is provided in user's registration and User logs in stage, and is fed back and display recognition result.
4. certification security protection system is continued as claimed in claim 1, it is characterised in that the face continues recognition subsystem Also include completing the Face datection of real-time continuous, crucial point location, facial image pretreatment, recognition of face and certification, face with The function course of track, the operation also including providing the configuration of user management, log audit and security parameter for safety officer connects Mouthful;The face continues whether recognition subsystem watches client using the real-time user's facial image for obtaining come identifying user Still unused client is left in end interface.
5. certification security protection system is continued as claimed in claim 4, it is characterised in that described to continue authority executive subsystem Process including completing the execution of real-time continuous authority and access control function, also including using pipe for safety officer provides resource The operate interface of reason, log audit and security parameter configuration;The authority executive subsystem that continues persistently is recognized according to face The identification authentication result of subsystem is reallocated to client user's access right in time.
6. certification security protection system is continued as claimed in claim 5, it is characterised in that described to client user's right to use Limit carries out reallocation includes face authentication success authority distribution and face authentication failure authority distribution;The authority that continues is performed Subsystem is protected right according to the seamless automatic switchover in the two states of success authority and failure authority of face authentication result As that will not occur to malfunction and/or exit problem because of this switching.
7. certification security protection system is continued as claimed in claim 6, it is characterised in that described to client user's right to use Limit carry out reallocation content including but not limited to keyboard cannot/can use, screen display mess code/correct, software/service without Method/can use, sensitive information encryption and decryption failure/success, encryption file/directory/file system/Fixed disk/mobile hard disk/ Cannot/can use, firewall rule is opened/closed, USB/Wifi/ network interface cards cannot/can use and printer is printed not just Really/correct.
8. it is a kind of to continue certification safety protecting method, it is characterised in that including facial image real time acquiring method, recognition of face side Method, face continue recognition methods and continue authority execution method, specifically include following steps:
Step one, user carries out face login authentication by the facial image real time acquiring method and face identification method Journey;It is that successfully, the face continues Verification System and really starts, and user obtains client protected object if logged on authentication result The right to use or control, and enter next step;It is failure if logged on authentication result, then repeats face login authentication Process;
Step 2, client continues recognition methods and is continued for using in setting time interval, automatically using the face Family face Real time identification certification;If face authentication result is successfully, distributed to user according to the authority execution method that continues The right to use of client protected object, protected object can be used normally;If face authentication result is failure, and failure It is more than predetermined time interval, then described to continue the use that authority execution method was not assigned to and cancelled the protected object of user Power, user can not normally use the protected object of client;In this process, the lasting certification of face is not interrupted, and is also existed In being continued for, distribution and/or cancellation authority are directly affected to the state of protected object without any;
Wherein, the lasting recognition methods of the face is automatically continued for user's face Real time identification in setting time interval Certification, no matter certification succeeds or authentification failure, and certification is all underway.
9. certification safety protecting method is continued as claimed in claim 8, it is characterised in that described to continue certification security protection side Method also includes face study and training method, face study and training method include by the face video of user and/or Facial image and/or face photograph, collect using the facial image raw information of client user, and produce use on this basis Training material required for the human face recognition model training of family, by training program, extracts the face characteristic of user, forms user's Human face recognition model, certification is persistently recognized so that the lasting recognition methods of face carries out face.
10. face as claimed in claim 8 continues the means of defence of certification safety, it is characterised in that the face is persistently known Other method is not made using the real-time user's facial image for obtaining come whether identifying user is being watched client end interface and still left Use client;The authority that continues performs identification authentication result of the method according to the lasting recognition methods of face in time to client User's access right is reallocated and/or is adjusted.
11. faces as claimed in claim 10 continue the means of defence of certification safety, it is characterised in that described that client is used Family access right carries out reallocation includes face authentication success authority distribution and face authentication failure authority distribution;It is described lasting Authority performs method according to the seamless automatic switchover in the two states of success authority and failure authority of face authentication result, is protected The object of shield will not occur to malfunction and/or exit problem because of this switching.
12. face as described in right wants 11 continues the means of defence of certification safety, it is characterised in that described to client user Access right carry out reallocation content including but not limited to keyboard cannot// correct, software/clothes can be used, screen display mess code Business cannot/can use, sensitive information encryption and decryption failure/success, encryption file/directory/file system/Fixed disk/movement Hard disk/cannot/can use, firewall rule open/close, USB/Wifi/ network interface cards cannot/can use and printer printing It is incorrect/correct.
The application of the lasting certification security protection system in a kind of 13. 1-7 such as claim as described in any one, its feature exists In the lasting certification security protection system promotes the use of the occasion of other lasting authentications and rights management, these applications Including but not limited to set with bluetooth equipment, point-to-point Wifi equipment, point-to-point sound device, NFC device, IC-card equipment, fingerprint Standby and third party's network continues authentication service and replaces face function in systems.
CN201710122165.XA 2017-03-03 2017-03-03 It is a kind of to continue certification security protection system and its method Pending CN106850667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710122165.XA CN106850667A (en) 2017-03-03 2017-03-03 It is a kind of to continue certification security protection system and its method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710122165.XA CN106850667A (en) 2017-03-03 2017-03-03 It is a kind of to continue certification security protection system and its method

Publications (1)

Publication Number Publication Date
CN106850667A true CN106850667A (en) 2017-06-13

Family

ID=59137883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710122165.XA Pending CN106850667A (en) 2017-03-03 2017-03-03 It is a kind of to continue certification security protection system and its method

Country Status (1)

Country Link
CN (1) CN106850667A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992336A (en) * 2017-11-28 2018-05-04 深圳市筑泰防务智能科技有限公司 A kind of dual system switching method of enterprises mobile terminal
CN108038363A (en) * 2017-12-05 2018-05-15 吕庆祥 Improve the method and device of Terminal security
CN110427788A (en) * 2019-06-18 2019-11-08 特斯联(北京)科技有限公司 Display control method, device, equipment and the storage medium of data
CN110730169A (en) * 2019-09-29 2020-01-24 北京东软望海科技有限公司 Processing method, device and system for guaranteeing account security
CN111046361A (en) * 2019-11-20 2020-04-21 深圳安泰创新科技股份有限公司 Online diagnosis and treatment identity confirmation method, terminal and computer readable storage medium
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN112507308A (en) * 2020-10-20 2021-03-16 麒麟软件有限公司 Identity recognition and authentication method
WO2021092769A1 (en) * 2019-11-12 2021-05-20 深圳市欢太科技有限公司 Security protection method and device, mobile terminal, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902880A (en) * 2012-08-29 2013-01-30 四三九九网络股份有限公司 Anti-addict system and anti-addict method of game
CN103778360A (en) * 2012-10-26 2014-05-07 华为技术有限公司 Face unlocking method and device based on motion analysis
CN104102868A (en) * 2014-07-31 2014-10-15 中山市品汇创新专利技术开发有限公司 Multi-modal USB key authentication method based on face recognition technology
CN104143083A (en) * 2014-07-11 2014-11-12 北京神州智联科技有限公司 Face recognition system based on process management
CN105139311A (en) * 2015-07-31 2015-12-09 谭瑞玲 Intelligent terminal based English teaching system
CN105528578A (en) * 2015-12-04 2016-04-27 国家电网公司 Online training monitoring method based on sound image process tracking

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902880A (en) * 2012-08-29 2013-01-30 四三九九网络股份有限公司 Anti-addict system and anti-addict method of game
CN103778360A (en) * 2012-10-26 2014-05-07 华为技术有限公司 Face unlocking method and device based on motion analysis
CN104143083A (en) * 2014-07-11 2014-11-12 北京神州智联科技有限公司 Face recognition system based on process management
CN104102868A (en) * 2014-07-31 2014-10-15 中山市品汇创新专利技术开发有限公司 Multi-modal USB key authentication method based on face recognition technology
CN105139311A (en) * 2015-07-31 2015-12-09 谭瑞玲 Intelligent terminal based English teaching system
CN105528578A (en) * 2015-12-04 2016-04-27 国家电网公司 Online training monitoring method based on sound image process tracking

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992336A (en) * 2017-11-28 2018-05-04 深圳市筑泰防务智能科技有限公司 A kind of dual system switching method of enterprises mobile terminal
CN108038363A (en) * 2017-12-05 2018-05-15 吕庆祥 Improve the method and device of Terminal security
CN110427788A (en) * 2019-06-18 2019-11-08 特斯联(北京)科技有限公司 Display control method, device, equipment and the storage medium of data
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN110730169A (en) * 2019-09-29 2020-01-24 北京东软望海科技有限公司 Processing method, device and system for guaranteeing account security
WO2021092769A1 (en) * 2019-11-12 2021-05-20 深圳市欢太科技有限公司 Security protection method and device, mobile terminal, and storage medium
CN111046361A (en) * 2019-11-20 2020-04-21 深圳安泰创新科技股份有限公司 Online diagnosis and treatment identity confirmation method, terminal and computer readable storage medium
CN112507308A (en) * 2020-10-20 2021-03-16 麒麟软件有限公司 Identity recognition and authentication method

Similar Documents

Publication Publication Date Title
CN106850667A (en) It is a kind of to continue certification security protection system and its method
KR101680525B1 (en) app forgery detection, 2-channel certification agency system and method thereof
US9301140B1 (en) Behavioral authentication system using a secure element, a behaviometric server and cryptographic servers to authenticate users
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
US8799670B2 (en) Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
CN105429761B (en) A kind of key generation method and device
US20150358317A1 (en) Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
JP5167835B2 (en) User authentication system, method, program, and medium
CN101174948A (en) Network login system and method with face authentication
CN109334283B (en) Anti-counterfeiting method and device for seal and intelligent seal
EA036443B1 (en) System and method for communicating credentials
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
CN108768991B (en) Real person authentication method and system
CN102609656A (en) USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification
CN111131202A (en) Identity authentication method and system based on multiple information authentication
US11444784B2 (en) System and method for generation and verification of a subject's identity based on the subject's association with an organization
CN110402440A (en) Segment key Verification System
JP4135151B2 (en) Method and system for single sign-on using RFID
Gentles et al. Application of biometrics in mobile voting
CN104811312A (en) Terminal course identity authentication method based on center authorization
CN112329004A (en) Method and device for face recognition and face password
CN110995661A (en) Network card platform
CN111181895A (en) Identity authentication method
US20230394179A1 (en) Information processing apparatus, information processing method, and non-transitory computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310053 Room B2090, 2nd floor, 368 Liuhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Zhejiang Zhibei Information Technology Co., Ltd.

Address before: 310053 Room B2090, 2nd floor, 368 Liuhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou wisdom Mdt InfoTech Ltd

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication