CN107277046A - Coerce-proof password management-control method and device - Google Patents

Coerce-proof password management-control method and device Download PDF

Info

Publication number
CN107277046A
CN107277046A CN201710610218.2A CN201710610218A CN107277046A CN 107277046 A CN107277046 A CN 107277046A CN 201710610218 A CN201710610218 A CN 201710610218A CN 107277046 A CN107277046 A CN 107277046A
Authority
CN
China
Prior art keywords
user
face feature
password management
feature data
active user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710610218.2A
Other languages
Chinese (zh)
Other versions
CN107277046B (en
Inventor
陶利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Yundi Biological Identification Technology Co Ltd
Original Assignee
Hunan Yundi Biological Identification Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Yundi Biological Identification Technology Co Ltd filed Critical Hunan Yundi Biological Identification Technology Co Ltd
Priority to CN201710610218.2A priority Critical patent/CN107277046B/en
Publication of CN107277046A publication Critical patent/CN107277046A/en
Application granted granted Critical
Publication of CN107277046B publication Critical patent/CN107277046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of coerce-proof password management-control method and device;Wherein, this method is performed by password management and control device;This method includes:Receive the stress signal that validated user is sent;Wherein, stress signal includes the trigger signal that validated user is sent by password management and control device, or, the face feature signal of the validated user obtained by camera device;Release the binding relationship of the face feature data of user cipher and validated user, the access rights of open user cipher;During access rights opening, the behavioural information of active user is monitored;Wherein, behavior information includes the view data for the active user that the service provider in running status in the terminal that active user triggers, the corresponding user cipher of service provider extracted and camera device are obtained;Record snoop results.The present invention improves the coerce-proof of Password Management mode, and then improves the security of Password Management.

Description

Coerce-proof password management-control method and device
Technical field
The present invention relates to password management and control technical field, more particularly, to a kind of coerce-proof password management-control method and device.
Background technology
With the fast development of information technology, increasing website or application software greatly facilitate people life and Work, however, the Password Management of each website or application software and memory but become a cumbersome task;For the ease of note Recall, different websites or application software are set to same password by certain customers, undoubtedly the property safety to user causes one Fixed hidden danger.
Existing Password Management mode is main in the way of record, for example, the password of each website or application software is remembered Record on a paper document, or, the password of each website or application software is recorded in terminal, is stored in and locally or remotely takes Business device;When user is coerced by criminal, these above-mentioned Password Management modes due to lack anti-coercive cause security compared with Difference.
For above-mentioned Password Management mode security it is poor the problem of, not yet propose effective solution.
The content of the invention
In view of this, it is an object of the invention to provide a kind of coerce-proof password management-control method and device, to improve password The coerce-proof of way to manage, and then improve the security of Password Management.
In a first aspect, the embodiments of the invention provide a kind of coerce-proof password management-control method, this method is by password management and control device Perform, the face feature data of validated user, and one bound with face feature data are previously stored with password management and control device The user cipher of individual or multiple service providers;Password management and control device is connected with outside terminal communication;This method includes:Receive and close The stress signal that method user sends;Wherein, stress signal includes the trigger signal that validated user is sent by password management and control device, or Person, the face feature signal of the validated user obtained by camera device;Release the face feature of user cipher and validated user The binding relationship of data, the access rights of open user cipher;During access rights opening, the behavior of active user is monitored Information;Wherein, behavioural information includes the service provider in running status in the terminal that active user triggers, the service extracted The view data for the active user that the corresponding user cipher of provider and camera device are obtained;Service provider includes application Program and/or website;Record snoop results.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the first of first aspect, wherein, on Stating method also includes:Snoop results are sent to the server of distal end, to trigger server generation warning message.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of second of first aspect, wherein, on The behavioural information step for monitoring active user is stated, including:Gather the reflected signal of active user face;Reflected signal is carried out special Extraction is levied, the face feature data of active user are generated;Judge active user face feature data whether with validated user Face feature data match;If not, the view data of record active user.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the third of first aspect Possible embodiment, wherein, the behavioural information step of above-mentioned monitoring active user, in addition to:Exist when listening in terminal During service provider in running status, the corresponding user cipher of service provider is extracted;Mark service provider and user Password.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the 4th of first aspect kind, wherein, on State before receiving the stress signal that validated user is sent, method also includes:When receiving enabled instruction, active user's face is obtained The reflected signal in portion;Judge reflected signal whether the face feature data match with validated user;If it is, determining current use The identity information at family is validated user;If not, locking password management and control device.
With reference to the 4th kind of possible embodiment of first aspect, the embodiments of the invention provide the 5th of first aspect kind Possible embodiment, wherein, it is above-mentioned judge reflected signal whether the face feature data match with validated user, including: Feature extraction processing is carried out to reflected signal, the face feature data of active user are generated;By the face feature number of active user It is compared according to the face feature data with validated user, obtains comparison result;Judge whether comparison result reaches default With threshold value;If it is, determining that the characteristic of validated user of the reflected signal with prestoring matches;If not, determining anti- The characteristic for the validated user penetrated signal and prestored is mismatched.
Second aspect, the embodiments of the invention provide a kind of coerce-proof password control device, the device is arranged at password pipe Control the face feature data that validated user is previously stored with device, password management and control device, and one bound with face feature data The user cipher of individual or multiple service providers;Password management and control device is connected with outside terminal communication;The device includes:Signal connects Module is received, for receiving the stress signal that validated user is sent;Wherein, stress signal passes through password management and control device including validated user The trigger signal of transmission, or, the face feature signal of the validated user obtained by camera device;Module is released, for solving Except user cipher and the binding relationship of the face feature data of validated user, the access rights of open user cipher;Monitor module, During being opened in access rights, the behavioural information of active user is monitored;Wherein, behavioural information is triggered including active user Terminal in running status service provider, extract the corresponding user cipher of service provider and camera device The view data of the active user of acquisition;Service provider includes application program and/or website;Logging modle, for recording prison Listen result.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, on Stating device also includes sending module, for snoop results to be sent to the server of distal end, to trigger server generation alarm signal Breath.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of second of second aspect, wherein, on Monitoring module is stated, including:Signal gathering unit, the reflected signal for gathering active user face;Feature extraction unit, is used for Feature extraction is carried out to reflected signal, the face feature data of active user are generated;Interpretation unit, for judging active user's Face feature data whether the face feature data match with validated user;Recording unit, if the face for active user The face feature data match of portion's characteristic not with validated user, records the view data of active user.
With reference to second of possible embodiment of second aspect, the embodiments of the invention provide the third of second aspect Possible embodiment, wherein, above-mentioned monitoring module, in addition to:, there is place in terminal for working as to listen in code extraction module When the service provider of running status, the corresponding user cipher of service provider is extracted;Mark module, for marking service to carry Supplier and user cipher.
The embodiment of the present invention brings following beneficial effect:
A kind of coerce-proof password management-control method and device provided in an embodiment of the present invention, wherein, this method is by password management and control Device is performed, and is previously stored with the face feature data of validated user on password management and control device, and bound with face feature data The user cipher of one or more service providers;Triggered when receiving validated user by password management and control device or camera device After the stress signal of acquisition, the binding relationship of the face feature data of user cipher and validated user, open user cipher are released Access rights, while listening for the behavioural information of active user, and record snoop results;Which can coerced user In the case of, it is ensured that the encrypted message being related in stress procedure is recorded while personal safety, Password Management mode is improved Coerce-proof, and then improve the security of Password Management.
Other features and advantages of the present invention will be illustrated in the following description, also, partly be become from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and obtained in accompanying drawing.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art The accompanying drawing used required in embodiment or description of the prior art is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the first coerce-proof password management-control method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of second of coerce-proof password management-control method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of the third coerce-proof password management-control method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of coerce-proof password control device provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of password management and control device provided in an embodiment of the present invention;
Fig. 6 is a kind of concrete structure schematic diagram of password management and control device provided in an embodiment of the present invention.
Icon:500- Password Management devices;502- camera devices;504- display screens;506- communicators;Outside 600- main bodys Shell;602- start buttons;604- password confirming buttons;606- support frames.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention Technical scheme be clearly and completely described, it is clear that described embodiment is a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
In view of existing Password Management mode security it is poor the problem of, the embodiments of the invention provide a kind of coerce-proof Password management-control method and device;The technology can apply to a variety of applications or the unified storage of website password, extract and management Among;The technology can be realized using related software and hardware, be described below by embodiment.
Embodiment one:
The flow chart of the first coerce-proof password management-control method shown in Figure 1, this method is performed by password management and control device, Be previously stored with the face feature data of validated user on the password management and control device, and bound with face feature data one or The user cipher of multiple service providers;The password management and control device is connected with outside terminal communication;The above method includes following step Suddenly:
Step S102, receives the stress signal that validated user is sent;Wherein, the stress signal passes through close including validated user The trigger signal that code management and control device is sent, or, the face feature signal of the validated user obtained by camera device;
Specifically, can be by such as when validated user extracts password by illegal molecule stress using the password management and control device Lower two ways obtains the signal that validated user is coerced:
Mode one:The more concealed or button through camouflage is set on password management and control device, it is close when user presses the button Code management and control device receives above-mentioned stress signal;User can press the button by a variety of default forms, for example, long-press, for several times Continuous short-press or long-press and short-press are according to certain rules alternately etc.;Which can obtain relatively stable accurate stress Signal;
Mode two:The reflection that the camera device connected by password management and control device or terminal obtains the face of validated user is believed Number, after processing, obtain corresponding face feature signal;The face feature signal contains default either statically or dynamically expression letter Breath;For example, static expression information can be singly to close one's eyes and closing lightly mouth expression, dynamic expression information can move for continuous lip Work, regular blink etc.;Which can without extra operation by human hand in the case of quick obtaining stress signal.
Step S104, releases the binding relationship of the face feature data of user cipher and validated user, open user cipher Access rights;
When validated user is coerced by illegal molecule, on the one hand need to coordinate the requirement of illegal molecule, protected with maximum possible Hinder the personal safety of validated user, on the one hand also need to the process that as far as possible many record validated users are coerced, while collecting phase Evidence is closed, so as to subsequently help the police to solve a case, the loss of validated user is retrieved.For the foregoing reasons, user cipher is released with closing The binding relationship of the face feature data of method user, to avoid password management and control device from obtaining the face feature data less than validated user The personal safety of validated user is threatened after Shi Jinhang lockings.
Step S106, during access rights opening, monitors the behavioural information of active user;Wherein, behavior information The service provider in running status, the corresponding user of service provider extracted are close in the terminal triggered including active user The view data for the active user that code and camera device are obtained;Service provider includes application program and/or website;
Step S108, records snoop results.
A kind of coerce-proof password management-control method provided in an embodiment of the present invention, this method is performed by password management and control device, password The face feature data of validated user, and the one or more clothes bound with face feature data are previously stored with management and control device The user cipher of business provider;Believe when receiving the stress that validated user is triggered by password management and control device or camera device is obtained After number, the binding relationship of the face feature data of user cipher and validated user is released, the access rights of user cipher are opened, together When monitor the behavioural information of active user, and record snoop results;Which can make user in the case of by stress, it is ensured that The encrypted message being related in stress procedure is recorded while personal safety, the coerce-proof of Password Management mode is improved, enters And improve the security of Password Management.
Embodiment two:
The flow chart of second of coerce-proof password management-control method shown in Figure 2, this method is provided in embodiment one Coerce-proof password management-control method on the basis of realize, this method comprises the following steps:
Step S202, receives the stress signal that validated user is sent;
Step S204, releases the binding relationship of the face feature data of user cipher and validated user, open user cipher Access rights;
When password management and control device opens the access rights of user cipher due to being forced signal, password management and control device is usual Need to gather all operation of active user (including the validated user coerced and disabled user) (including to password management and control device Operation and the operation to terminal) and disabled user view data;It is non-first to judge to obtain in the embodiment The view data of method user, then the service provider run that triggers of active user is obtained, and enter exemplified by corresponding password Row explanation.
Step S206, during access rights opening, the reflected signal of collection active user face;
Step S208, feature extraction is carried out to reflected signal, generates the face feature data of active user;
Step S210, judge active user face feature data whether the face feature data phase with validated user Match somebody with somebody;If it is, performing step S214;If not, performing step S212;
Step S212, records the view data of active user, preserves into snoop results.
When actually realizing, the face of disabled user is likely to appear in the image pickup scope of camera device, it is also possible to no Occur;Preferably, bidirectional camera shooting head can be provided with password management and control device, to obtain compared with ground picture number in the range of ringoid border According to, it is particularly possible to increase obtains the possibility of disabled user's face data.
Step S214, when listening to the service provider for existing in terminal and being in running status, extracts service provider Corresponding user cipher;
In step S214, there is the service provider in running status in monitor terminal, there may be two kinds of situations, Including:There is the application program in foreground state of activation or background operation state in monitor terminal;Or;In monitor terminal Browser is in foreground state of activation or background operation state, and recognizes the website that opening is in browser.
Step S216, mark service provider and user cipher, the service provider and user cipher are preserved to monitoring As a result in.
So that illegal molecule stress validated user login website of bank is transferred accounts as an example, when password management and control device listens to terminal On browser be active, and browser in opening website be A banks Web bank, password management and control Device extract the Web bank for user cipher, while the Web bank and the user cipher are marked, to confirm the user Password has been revealed.
Step S218, snoop results are sent to the server of distal end, to trigger server generation warning message.
A kind of coerce-proof password management-control method provided in an embodiment of the present invention, when password management and control device is due to being forced signal And when opening the access rights of user cipher, by gathering and extracting the reflected signal of active user face, can obtain illegal The view data of molecule;By in monitor terminal be in running status service provider, and mark the service provider and Corresponding user cipher, can confirm that the associated cryptographic information revealed;Which can make user in the case of by stress, The encrypted message being related in stress procedure is recorded while ensuring personal safety, the coerce-proof of Password Management mode is improved Property, and then improve the security of Password Management.
Embodiment three:
The flow chart of the third coerce-proof password management-control method shown in Figure 3, this method is provided in embodiment one Coerce-proof password management-control method on the basis of realize, this method comprises the following steps:
Step S302, when receiving enabled instruction, obtains the reflected signal of active user face;
Specifically, the enabled instruction can be the instruction for opening password management and control device, after the password management and control device is opened, actively obtain Take the reflected signal of active user face;The enabled instruction can also be the instruction of the startup authenticating identity of user's input, for example, User starts the instruction by the button set on password management and control device, receives after the instruction, obtains the anti-of active user face Penetrate signal.
After the reflected signal of active user face is got, it is necessary to judge above-mentioned reflected signal whether with validated user Face feature data match, is comprised the following steps that:
Step S304, feature extraction processing is carried out to reflected signal, generates the face feature data of active user;
Step S306, the face feature data of the face feature data of active user and validated user are compared, obtained Obtain comparison result;
Step S308, judges whether comparison result reaches default matching threshold;If it is, performing step S312;If It is no, perform step S310;
Generally, the characteristic obtained by various features extracting mode or extraction algorithm is included in above-mentioned face feature data According to, in addition to same validated user, the characteristic of multiple face's angles;During actual match, the reality of validated user Border facial characteristics may due to making up, wearing glasses, expression shape change, the reason such as distance, distance in face of camera device occurs A certain degree of change, thus, the actual reflected signal obtained may not all with the feature of the validated user prestored Data are identical;Based on the reason, matching threshold is set in the present embodiment, the face feature data of active user and validated user When the comparison result of face feature data is more than the matching threshold, it is determined that active user is validated user.
Further, it is contemplated that the characteristic that various features extracting mode or extraction algorithm are obtained can reflect facial spy The ability levied is different, and different threshold values can be set to different characteristics;For example, setting higher to important characteristic Threshold value, when only the important characteristic matching degree is higher, can just assert active user be validated user;For another example, it is right The corresponding characteristic of positive angle sets higher threshold value, and the only corresponding characteristic matching degree of the positive angle is higher When, it is validated user that can just assert active user.
By above-mentioned steps S304 to step S308, quickly and accurately active user can be identified, and then ensured The security of password management and control device.
Step S310, the characteristic for the validated user for determining reflected signal and prestoring is mismatched;Lock password pipe Control device.
Step S312, determines that the characteristic of validated user of the reflected signal with prestoring matches;It is determined that current use The identity information at family is validated user;
For example, password management and control device is generally disposed in face of active user, when password management and control device receive external trigger or After the enabled instruction that outside is sent, the reflected signal of active user face is obtained by signal acquisition device;The reflection of the face Signal can be optical signalling, or ultrasonic signal;Password management and control device judges whether above-mentioned reflected signal is used with legal The face feature data match at family, if it does, then extracting and exporting user cipher corresponding with the face feature data;Such as Fruit mismatches, then locks the password management and control device.
When actually realizing, when the face feature data of reflected signal and validated user are mismatched, then active user is judged For disabled user, in order to ensure the security of data in password management and control device, the password management and control device is locked first;Password after locking Management and control device no longer receives or sent any instruction or data in certain period of time.
If validated user opens password management and control device by stress, it can be connect during above-mentioned steps S302 to S312 is performed The stress signal that validated user is sent is received, no matter in this case, the characteristic of reflected signal and the validated user prestored Whether match, password management and control device will not be locked.In the embodiment, to determine the identity information of active user as validated user Afterwards, then receive and illustrate exemplified by the stress signal that validated user is sent.
Step S314, receives the stress signal that validated user is sent;
Step S316, releases the binding relationship of the face feature data of user cipher and validated user, open user cipher Access rights;
Step S318, during access rights opening, monitors the behavioural information of active user;
Step S320, records snoop results.
In addition, what is prestored in password management and control device has the face feature data of validated user, and it is special with the face The user cipher of one or more service providers of data binding is levied, can be obtained by following manner:
The identity of user and the reflected signal of specified user face are specified in step (1), collection;
This specifies the user or holder that user can be password management and control device;Specifying the quantity of user can also may be used for one Think multiple;The identity information of user can be specified for this by specifying the identity of user, or this specifies user's correspondence Accounts information.
Step (2), feature extraction is carried out to above-mentioned reflected signal, generates face corresponding with the identity of specified user Characteristic;
When actually realizing, the actual characteristic data of target identification object can be obtained using various features extracting mode; Specifically, when above-mentioned reflected signal is optical signalling, features described above extracting mode can include statistical nature method of identification, geometry Feature recognition method or based on connection mechanism method of identification etc.;When above-mentioned reflected signal is ultrasonic signal, features described above extraction side Formula includes calculating the bin value number of reflection echo, the gross energy of echo, the distance of starting point to the first peak value, the amplitude of the first peak value Or average sound area etc..
Step (3), sets and specifies user to be validated user, by the corresponding face of identity and identity of specified user Portion's characteristic is preserved.
Above-mentioned steps (1) make password management and control device obtain the face feature data of validated user in advance, after being to step (3) The matching of continuous face feature data provides data basis.
Step (4), receives the password of validated user input;
When actually realizing, validated user can by diversified forms to password management and control device input password;For example, password pipe Button or keyboard are provided with outside control device, or password management and control device can be with external connection keyboard, and then by button or keyboard to password pipe Control device input password;For another example, password management and control device can connect external processing apparatus in a wireless or wired way, for example, calculating Machine, password is inputted by external processing apparatus to password management and control device.
Step (5), using the face feature data of the validated user as encryption key, above-mentioned password is encrypted;
The basic process of data encryption is exactly, to being that the file or data of plaintext are handled by certain algorithm originally, to make it As one section of unreadable code, commonly referred to as " ciphertext ", it is set can just to show this after corresponding key is inputted Carry out content, the purpose for protecting data not stolen, read by juridical-person is reached by such approach.The inverse process of the process is Decryption, will the coding information be converted into the processes of its original data.
Thus, above-mentioned steps (5) are when actually realizing, in order to improve the security of storage password, can be by the legal use The all or part of face feature data of the validated user after all or part of face feature data at family, or processing As encryption key, above-mentioned password is encrypted.
Step (6), binding preservation is carried out by the identity of the password after encryption and validated user.
Can be close according to the identity of validated user when password management and control device is that two or more validated users are shared Memory space in code management and control device is divided, and forms relatively independent memory space, and be identified by identity.
Above-mentioned steps (4) using the face feature data of validated user as encryption key, make encryption key to step (6) It is with uniqueness and preferably private, compared with being encrypted using the outside key for providing or generating at random, further carry The high security of password.
In order to further improve the security of password management and control device, the storage device in the password management and control device can pass through encryption USB flash disk is realized;The encrypted U disk refers to the USB flash disk to having encryption and decryption defencive function in USB flash disk;Embedded transfinite of encrypted U disk locks and transfinited Function is destroyed, as long as the equal mistake of recognition of face of the active user in preset times, the USB flash disk immediately enters lock-out state, and on The face photograph of active user is passed, hereafter, encrypted U disk will destroy the data of storage;The encrypted U disk is formatting or destroyed (bag Include volume production) when, a new sensitive data encryption key can be created at random using chip automatically, make USB flash disk can not recover to obtain lattice Significant data before formula or destruction;The encrypted U disk uses independent dedicated file system (being realized by safety container principle), can Effectively to prevent the malicious codes such as virus, wooden horse from attacking, the approach that virus is infected and propagated by USB flash disk is fundamentally cut off.Should Encrypted U disk uses advanced technologies, SPA/DPA, probe/FIB (focused ion beam) can be detected, cut open piece, critical low-voltage etc. Physical attacks carry out security protection, prevent safe U disc from revealing sensitive data.Data in the encrypted U disk are by meeting the close money of state The hardware encryption chip encryption of matter, is stored on USB flash disk with encrypted test mode, and data are carried out with high intensity protection, and non-holder accesses When USB flash disk can be automatically locked there is provided data self-destroying function, can effectively prevent password attempt and Brute Force.
Example IV:
Corresponding to above method embodiment, a kind of structural representation of coerce-proof password control device shown in Figure 4, The device is arranged at password management and control device, and the face feature data of validated user, Yi Jiyu are previously stored with the password management and control device The user cipher of one or more service providers of face feature data binding;Password management and control device connects with outside terminal communication Connect;The device includes:
Signal receiving module 40, for receiving the stress signal that validated user is sent;Wherein, stress signal includes legal use The trigger signal that family is sent by password management and control device, or, the face feature signal of the validated user obtained by camera device;
Module 41 is released, the binding relationship of the face feature data for releasing user cipher and validated user is open to use The access rights of family password;
Module 42 is monitored, during being opened in access rights, the behavioural information of active user is monitored;Wherein, behavior Information includes the corresponding use of the service provider in running status in the terminal that active user triggers, the service provider extracted The view data for the active user that family password and camera device are obtained;Service provider includes application program and/or website;
Logging modle 43, for recording snoop results.
Further, said apparatus also includes sending module, for snoop results to be sent to the server of distal end, to touch Send out server generation warning message.
Further, above-mentioned monitoring module, including:Signal gathering unit, the reflection for gathering active user face is believed Number;Feature extraction unit, for carrying out feature extraction to reflected signal, generates the face feature data of active user;Interpretation list Member, for judge active user face feature data whether the face feature data match with validated user;Recording unit, If the face feature data match of face feature data not with validated user for active user, record active user's View data.
Further, above-mentioned monitoring module, in addition to:Code extraction module, is in for working as to listen to exist in terminal During the service provider of running status, the corresponding user cipher of service provider is extracted;Mark module, for marking service to provide Side and user cipher.
A kind of coerce-proof password control device provided in an embodiment of the present invention, this is arranged at password management and control device, password management and control The face feature data of validated user are previously stored with device, and the one or more services bound with face feature data are carried The user cipher of supplier;When receive validated user by password management and control device trigger or camera device obtain stress signal Afterwards, the binding relationship of the face feature data of user cipher and validated user is released, the access rights of user cipher are opened, simultaneously The behavioural information of active user is monitored, and records snoop results;Which can make user in the case of by stress, it is ensured that people The encrypted message being related in stress procedure is recorded while body is safe, the coerce-proof of Password Management mode is improved, and then Improve the security of Password Management.
Embodiment five:
A kind of structural representation of password management and control device shown in Figure 5;The password management and control device includes above-mentioned Password Management Device 500, in addition to camera device 502, display screen 504 and the communicator 506 being connected respectively with Password Management device.
When actually realizing, above-mentioned communicator 506 can be used for password management and control device and lead to outside cryptography requirements terminal Letter, can be used for password management and control device and the server communication of distal end;It is appreciated that be additionally provided with the password management and control device with it is upper State the storage device of Password Management device connection.
A kind of concrete structure schematic diagram of password management and control device shown in Figure 6;The password management and control device also includes outside main body Shell 600;Camera device 502 and display screen 504 are arranged on main body cover;Start button 602 is additionally provided with outside main body cover 600 With password confirming button 604;The back side of main body cover 600 is additionally provided with support frame 606.
Above-mentioned camera device 502 can be realized by Near-infrared Double camera.
A kind of coerce-proof password management-control method and the computer program product of device that the embodiment of the present invention is provided, including The computer-readable recording medium of program code is stored, the instruction that described program code includes can be used for performing previous methods reality The method described in example is applied, implements and can be found in embodiment of the method, will not be repeated here.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description And/or the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, be will not be repeated here.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected to by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
In the description of the invention, it is necessary to explanation, term " " center ", " on ", " under ", "left", "right", " vertical ", The orientation or position relationship of the instruction such as " level ", " interior ", " outer " be based on orientation shown in the drawings or position relationship, merely to Be easy to the description present invention and simplify description, rather than indicate or imply signified device or element must have specific orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ", " the 3rd " is only used for describing purpose, and it is not intended that indicating or implying relative importance.
Finally it should be noted that:Embodiment described above, is only the embodiment of the present invention, to illustrate the present invention Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of coerce-proof password management-control method, it is characterised in that methods described is performed by password management and control device, the password management and control The face feature data of validated user, and the one or more clothes bound with the face feature data are previously stored with device The user cipher of business provider;The password management and control device is connected with outside terminal communication;Methods described includes:
Receive the stress signal that the validated user is sent;Wherein, the stress signal passes through described including the validated user The trigger signal that password management and control device is sent, or, the face feature signal of the validated user obtained by camera device;
The user cipher and the binding relationship of the face feature data of the validated user are released, the open user cipher Access rights;
During access rights opening, the behavioural information of active user is monitored;Wherein, the behavioural information includes described Service provider in running status, the corresponding use of the service provider extracted in the terminal of active user's triggering The view data for the active user that family password and the camera device are obtained;The service provider includes applying journey Sequence and/or website;
Record snoop results.
2. according to the method described in claim 1, it is characterised in that methods described also includes:By the snoop results send to The server of distal end, to trigger the server generation warning message.
3. according to the method described in claim 1, it is characterised in that the behavioural information step for monitoring active user, including:
Gather the reflected signal of active user face;
Feature extraction is carried out to the reflected signal, the face feature data of the active user are generated;
Judge the active user face feature data whether the face feature data match with the validated user;
If not, recording the view data of the active user.
4. method according to claim 3, it is characterised in that the behavioural information step of the monitoring active user, is also wrapped Include:
When listening to the service provider for existing in the terminal and being in running status, the service provider is extracted corresponding User cipher;
Mark the service provider and the user cipher.
5. according to the method described in claim 1, it is characterised in that it is described receive stress signal that the validated user sends it Before, methods described also includes:
When receiving enabled instruction, the reflected signal of active user face is obtained;
Judge the reflected signal whether the face feature data match with validated user;
If it is, the identity information for determining active user is validated user;
If not, locking the password management and control device.
6. method according to claim 5, it is characterised in that it is described judge the reflected signal whether with validated user The face feature data match, including:
Feature extraction processing is carried out to the reflected signal, the face feature data of the active user are generated;
The face feature data of the face feature data of the active user and validated user are compared, obtains and compares knot Really;
Judge whether the comparison result reaches default matching threshold;
If it is, determining that the characteristic of validated user of the reflected signal with prestoring matches;
If not, the characteristic for the validated user for determining the reflected signal and prestoring is mismatched.
7. a kind of coerce-proof password control device, it is characterised in that described device is arranged at password management and control device, the password management and control The face feature data of validated user, and the one or more clothes bound with the face feature data are previously stored with device The user cipher of business provider;The password management and control device is connected with outside terminal communication;Described device includes:
Signal receiving module, for receiving the stress signal that the validated user is sent;Wherein, the stress signal includes described The trigger signal that validated user is sent by the password management and control device, or, the validated user obtained by camera device Face feature signal;
Module is released, it is open for releasing the user cipher and the binding relationship of the face feature data of the validated user The access rights of the user cipher;
Module is monitored, for during access rights opening, monitoring the behavioural information of active user;Wherein, the row Include the service provider in running status in the terminal that the active user triggers, the service extracted for information The view data for the active user that the corresponding user cipher of provider and the camera device are obtained;The service is carried Supplier includes application program and/or website;
Logging modle, for recording snoop results.
8. device according to claim 7, it is characterised in that described device also includes sending module, for by the prison Result is listened to send to the server of distal end, to trigger the server generation warning message.
9. device according to claim 7, it is characterised in that the monitoring module, including:
Signal gathering unit, the reflected signal for gathering active user face;
Feature extraction unit, for carrying out feature extraction to the reflected signal, generates the face feature number of the active user According to;
Interpretation unit, for judging whether the face feature data of the active user are special with the face of the validated user Levy data match;
Recording unit, if the face feature of face feature data not with the validated user for the active user Data match, records the view data of the active user.
10. device according to claim 9, it is characterised in that the monitoring module, in addition to:
Code extraction module, for when listening in the terminal in the presence of the service provider in running status, extracting institute State the corresponding user cipher of service provider;
Mark module, for marking the service provider and the user cipher.
CN201710610218.2A 2017-07-25 2017-07-25 Anti-coercion password control method and device based on face recognition Active CN107277046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710610218.2A CN107277046B (en) 2017-07-25 2017-07-25 Anti-coercion password control method and device based on face recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710610218.2A CN107277046B (en) 2017-07-25 2017-07-25 Anti-coercion password control method and device based on face recognition

Publications (2)

Publication Number Publication Date
CN107277046A true CN107277046A (en) 2017-10-20
CN107277046B CN107277046B (en) 2020-08-28

Family

ID=60079143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710610218.2A Active CN107277046B (en) 2017-07-25 2017-07-25 Anti-coercion password control method and device based on face recognition

Country Status (1)

Country Link
CN (1) CN107277046B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence
CN107808151A (en) * 2017-11-22 2018-03-16 维沃移动通信有限公司 Bio-identification resume module method, device and mobile terminal
CN107862194A (en) * 2017-11-22 2018-03-30 维沃移动通信有限公司 A kind of method, device and mobile terminal of safety verification
CN107944242A (en) * 2017-11-22 2018-04-20 维沃移动通信有限公司 A kind of bio-identification function prohibited method and mobile terminal
CN111882418A (en) * 2020-04-16 2020-11-03 马上消费金融股份有限公司 Identification method and device for financial behavior validity

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN102624699A (en) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 Method and system for protecting data
CN202503545U (en) * 2012-03-26 2012-10-24 广州商景网络科技有限公司 Account security application system
CN102883049A (en) * 2012-09-06 2013-01-16 广东欧珀移动通信有限公司 Hidden alarm unlocking method for mobile terminal, and mobile terminal
US20130104205A1 (en) * 2011-10-19 2013-04-25 Primax Electronics Ltd. Account creating and authenticating method
TWM483471U (en) * 2014-03-07 2014-08-01 Univ Nat Taiwan Normal An authorization system based on eye movement behavior
CN105120122A (en) * 2015-06-29 2015-12-02 小米科技有限责任公司 Alarm method and device
CN105389493A (en) * 2015-10-28 2016-03-09 广东欧珀移动通信有限公司 Password management method and password management system
US20170091507A1 (en) * 2015-09-30 2017-03-30 Apple Inc. Finger biometric sensor including capacitance change sensing pressure sensing circuit and related methods
CN106600786A (en) * 2016-12-22 2017-04-26 林海 Entrance guard passage management method combining biological recognition and password recognition
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification
US20170161976A1 (en) * 2015-12-07 2017-06-08 Utechzone Co., Ltd. Identity verification method, apparatus and system and non-transitory computer readable medium thereof

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
US20130104205A1 (en) * 2011-10-19 2013-04-25 Primax Electronics Ltd. Account creating and authenticating method
CN102624699A (en) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 Method and system for protecting data
CN202503545U (en) * 2012-03-26 2012-10-24 广州商景网络科技有限公司 Account security application system
CN102883049A (en) * 2012-09-06 2013-01-16 广东欧珀移动通信有限公司 Hidden alarm unlocking method for mobile terminal, and mobile terminal
TWM483471U (en) * 2014-03-07 2014-08-01 Univ Nat Taiwan Normal An authorization system based on eye movement behavior
CN105120122A (en) * 2015-06-29 2015-12-02 小米科技有限责任公司 Alarm method and device
US20170091507A1 (en) * 2015-09-30 2017-03-30 Apple Inc. Finger biometric sensor including capacitance change sensing pressure sensing circuit and related methods
CN105389493A (en) * 2015-10-28 2016-03-09 广东欧珀移动通信有限公司 Password management method and password management system
US20170161976A1 (en) * 2015-12-07 2017-06-08 Utechzone Co., Ltd. Identity verification method, apparatus and system and non-transitory computer readable medium thereof
CN106600786A (en) * 2016-12-22 2017-04-26 林海 Entrance guard passage management method combining biological recognition and password recognition
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence
CN107808151A (en) * 2017-11-22 2018-03-16 维沃移动通信有限公司 Bio-identification resume module method, device and mobile terminal
CN107862194A (en) * 2017-11-22 2018-03-30 维沃移动通信有限公司 A kind of method, device and mobile terminal of safety verification
CN107944242A (en) * 2017-11-22 2018-04-20 维沃移动通信有限公司 A kind of bio-identification function prohibited method and mobile terminal
CN107944242B (en) * 2017-11-22 2024-01-16 维沃移动通信有限公司 Biological identification function disabling method and mobile terminal
CN111882418A (en) * 2020-04-16 2020-11-03 马上消费金融股份有限公司 Identification method and device for financial behavior validity

Also Published As

Publication number Publication date
CN107277046B (en) 2020-08-28

Similar Documents

Publication Publication Date Title
CN107277046A (en) Coerce-proof password management-control method and device
US11106768B2 (en) Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings
US9832225B2 (en) Identity theft countermeasures
US7971246B1 (en) Identity theft countermeasures
CN109711126A (en) A kind of computer information safe management system and method
CN107196932A (en) Managing and control system in a kind of document sets based on virtualization
CN110944014A (en) Terminal data security active defense method and device
CN107358084A (en) The cloud storage method and apparatus of data
CN103268447A (en) Anti-phishing method and system
Mridha et al. A new approach to enhance internet banking security
CN105208045A (en) Identity authentication method, equipment and system
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN107392008A (en) Cipher management method, Password Management equipment and computer-readable recording medium
WO2010116109A1 (en) Method of authentication at a server by a user of a mobile apparatus
CN111698253A (en) Computer network safety system
Sudha et al. Alleviating internal data theft attacks by decoy technology in cloud
CN107181766A (en) The management-control method and device of log-on message
CN107094079B (en) Method, device and equipment for opening terminal function
CN107249006A (en) The authentication method and device of password use environment
CN107241197A (en) Password management-control method, device and password management and control device
CN107368734A (en) Cipher-code input method and device
CN106682531A (en) Method for confidential data encryption based on biological information authorization
WO2012155818A1 (en) Method and device for protecting user information based on credible resource
WO2017000123A1 (en) Information processing method and device
CN107392047A (en) The acquisition methods and device of health data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant