CN107944248A - A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication - Google Patents
A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication Download PDFInfo
- Publication number
- CN107944248A CN107944248A CN201711340126.3A CN201711340126A CN107944248A CN 107944248 A CN107944248 A CN 107944248A CN 201711340126 A CN201711340126 A CN 201711340126A CN 107944248 A CN107944248 A CN 107944248A
- Authority
- CN
- China
- Prior art keywords
- face
- information
- code
- authentication
- quick response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
A kind of LINUX operating system login methods based on face and Quick Response Code double authentication of the present application.The advanced row face authentication when LINUX operating systems log in, if certification success, then system generates random 2 D code information, user passes through the corresponding 2 D code information of client scan that oneself is registered, if the user information that 2 D code information includes is matched with current user information, certification passes through.It is this by face and Quick Response Code double authentication mode, improve the reliability and security of the login of LINUX operating systems.
Description
Technical field
The present invention relates to server authentication field, and in particular to a kind of based on recognition of face and Quick Response Code double authentication
LINUX operating system login methods.
Background technology
Face recognition technology is the face feature based on people, to the facial image or video flowing of input.First determine whether it
With the presence or absence of face, if there is face, then the position of each face, size and each major facial organ are further provided
Positional information.And according to these information, further extract the identity characteristic contained in each face, and by itself and known people
Face is contrasted, so as to identify the identity of each face.The recognition of face of broad sense is actual to include the one of structure face identification system
Serial correlation technique, including man face image acquiring, Face detection, recognition of face pretreatment, identity validation and identity finder etc.;
And the recognition of face of narrow sense refers in particular to carry out the technology or system of identity validation or identity finder by face.
Quick Response Code, also known as QR Code, QR full name Quick Response, are one and moved super stream in equipment in recent years
A kind of capable coding mode, it can deposit more information than traditional Bar Code bar codes, can also represent more data class
Type.Two-dimensional bar code/Quick Response Code (2-dimensional bar code) is existed according to certain rules with certain specific geometric figure
The chequered with black and white graphic recording data symbol information of plane (on two-dimensional directional) distribution;Dexterously utilized on coding
" 0 ", the concept of " 1 " bit stream of computer-internal logical foundations are formed, uses several and the corresponding geometric form of binary system
Body represents word numerical information, by image input device or photoelectric scanning device automatically identifying and reading to realize that information is located automatically
Reason:It has some general character of barcode technology:Every kind of code system has its specific character set;Each character occupies certain width;
With certain verifying function etc..It is also rotationally-varying with the information automatic identification function to not going together and processing figure at the same time
Point.
Traditional LINUX operating system login schemes based on password, each user are required for default login password, are stepping on
During recording system, user needs input password to be authenticated, if password is consistent, certification passes through user's Successful login system;If
Password is inconsistent, then authentification failure.But such password login scheme, there are two big defects:First, password is easily forgotten, cause
It can not log in, it is necessary to reset password, the operation for resetting password is very cumbersome;Second, the easy quilt of file comprising encrypted message
People steals, so that cause password to be revealed, therefore there are some potential safety problems.
In view of the above-mentioned problems, a kind of LINUX operating systems based on face and Quick Response Code double authentication of the present application are stepped on
Recording method, by face and Quick Response Code double authentication, improves reliability and security that LINUX operating systems log in.
The content of the invention
Specifically, a kind of LINUX operating systems based on recognition of face and Quick Response Code double authentication are claimed in the application
Login method, it is characterised in that the LINUX operating systems login method is made of face authentication and two-dimentional code authentication two parts;
Advanced row face authentication, if certification success, carries out two-dimentional code authentication;
Quick Response Code authenticating step generates random 2 D code information, the client scan that user is registered by oneself for system
Corresponding 2 D code information, if the user information that 2 D code information includes is matched with current user information, certification passes through;
If authentification failure, certification again is prompted;
If repeating failure 10 times, login system is locked.
LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as described above, its feature
Also reside in, which further comprises the face information of collection user in advance, and the face information of collection is stored in and is
System information bank, establishes the only one face information storehouse of user;When user needs login system, integrated camera gathers first
The face information of user, then carries out face information matching, if certification success, carries out two-dimentional code authentication in next step;If recognize
Card failure, then prompt certification again;If repeating failure 10 times, login system is locked.
LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as described above, its feature
Also reside in, which further comprises, system is the user name and specific private key information according to user, and specifically
Quick Response Code generating algorithm, generates random 2 D code information.
LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as described above, its feature
Also reside in, in the generation random 2 D code information set time effectively.
Brief description of the drawings
Fig. 1, face authentication subsystem structure schematic diagram
Fig. 2, Quick Response Code authentication subsystem structure diagram
Fig. 3, recognition of face identifying procedure figure
Fig. 4, Quick Response Code identifying procedure figure
Embodiment
Operating system login method of the present invention is greatly by face authentication subsystem and Quick Response Code authentication subsystem two
Module of uniting composition:
1) face authentication subsystem component:
Face information acquisition module:It is mainly used for gathering the face information of user;
Face information matching module:User's face information of collection is authenticated comparing with system information storehouse;
Authentication module:According to information matches as a result, carrying out authentication.
2) Quick Response Code authentication subsystem part:
The relevant specific 2 D code information generation system of user:System according to the user name and specific private key information of user,
There is specific Quick Response Code generating algorithm, generate random 2 D code information, in the Quick Response Code one minute effectively;
Client two-dimensional code scanning identifies:User is by the corresponding 2 D code information of client scan that oneself is registered, such as
The user information that fruit 2 D code information includes is matched with current user information, then certification passes through;
Quick Response Code authentication module:For carrying out the matching certification of 2 D code information.If consistent, certification passes through;If differ
Cause, then authentification failure.
Below in conjunction with the accompanying drawings, the whole embodiment of the present invention is illustrated by a specific embodiment:
In operating system login method of the present invention, the specific identifying procedure of recognition of face is as follows:
Face authentication flow chart is as shown in Figure 3.During LINUX operating systems are logged in, it is necessary first to which collection is used
The face information at family, and the face information of collection is stored in system information storehouse, establish the only one face information storehouse of user.
When user needs login system, integrated camera gathers the face information of user first, then carries out face
Information matches, if certification success, carry out two-dimentional code authentication in next step.If authentification failure, certification again is prompted.If repeat
Failure 10 times, then lock login system.
In operating system login method of the present invention, the idiographic flow of two-dimentional code authentication includes:
The operational flowchart of two-dimentional code authentication is as shown in Figure 4.
When entering LINUX system login interface, in user's recognition of face certification by the way that afterwards, system can be according to the use of user
Name in an account book and specific private key information, and specific Quick Response Code generating algorithm, generate random 2 D code information.The Quick Response Code one divides
In clock effectively.
User is by the corresponding 2 D code information of client scan that oneself is registered, if the user that 2 D code information includes
Information is matched with current user information, then certification passes through;If otherwise authentification failure, certification again is prompted.If repeat to fail
10 times, then lock login system.
It should be evident that illustrated above is only the specific embodiment of the present invention, for the common skill in this area
For art personnel, without creative efforts, other technical solutions can also be obtained according to above-described embodiment,
And the equivalent variations made in the scope of protection of the invention should all be fallen within the scope of protection of the present invention, and belong to the present invention
The scope of protection.
Operating system login method of the present invention employs recognition of face and Quick Response Code double authentication system, carries significantly
The reliability and security that high LINUX operating systems log in.For the field to security requirement higher, can integrate more
Certification such as fingerprint, brain wave etc., carries out multiple authentication, strengthens security.
Claims (4)
1. a kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication, it is characterised in that should
LINUX operating systems login method is made of face authentication and two-dimentional code authentication two parts;
Advanced row face authentication, if certification success, carries out two-dimentional code authentication;
Quick Response Code authenticating step generates random 2 D code information for system, and user is corresponded to by the client scan oneself registered
2 D code information, if the user information that 2 D code information includes is matched with current user information, certification passes through;If recognize
Card failure, then prompt certification again;
If repeating failure 10 times, login system is locked.
2. the LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as claimed in claim 1, its
It is further characterized in that, which further comprises the face information of collection user in advance, and the face information of collection is stored
In system information storehouse, the only one face information storehouse of user is established;When user needs login system, integrated camera is first
The face information of user is gathered, then carries out face information matching, if certification success, carries out two-dimentional code authentication in next step;
If authentification failure, certification again is prompted;If repeating failure 10 times, login system is locked.
3. the LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as claimed in claim 2, its
It is further characterized in that, which further comprises, system is the user name and specific private key information according to user, Yi Jite
Fixed Quick Response Code generating algorithm, generates random 2 D code information.
4. the LINUX operating system login methods based on recognition of face and Quick Response Code double authentication as claimed in claim 3, its
It is further characterized in that, in the generation random 2 D code information set time effectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711340126.3A CN107944248A (en) | 2017-12-14 | 2017-12-14 | A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711340126.3A CN107944248A (en) | 2017-12-14 | 2017-12-14 | A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107944248A true CN107944248A (en) | 2018-04-20 |
Family
ID=61944147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711340126.3A Pending CN107944248A (en) | 2017-12-14 | 2017-12-14 | A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107944248A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763895A (en) * | 2018-04-28 | 2018-11-06 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment, storage medium |
CN108985036A (en) * | 2018-06-25 | 2018-12-11 | 北京蜂盒科技有限公司 | Method, apparatus, electronic equipment, login service device and the medium that user logs in |
CN110995654A (en) * | 2019-11-05 | 2020-04-10 | 合肥优尔电子科技有限公司 | Remote terminal temporary authorization method, device and system based on dynamic two-dimensional code |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065621A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Identify verification method for third-party service, client and system |
CN104363226A (en) * | 2014-11-12 | 2015-02-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for logging in operating system |
CN104506562A (en) * | 2015-01-13 | 2015-04-08 | 东北大学 | Two-dimension code and face recognition fused conference identity authentication device and method |
CN107277812A (en) * | 2017-07-11 | 2017-10-20 | 上海斐讯数据通信技术有限公司 | A kind of wireless network authentication method and system based on Quick Response Code |
-
2017
- 2017-12-14 CN CN201711340126.3A patent/CN107944248A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065621A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Identify verification method for third-party service, client and system |
CN104363226A (en) * | 2014-11-12 | 2015-02-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for logging in operating system |
CN104506562A (en) * | 2015-01-13 | 2015-04-08 | 东北大学 | Two-dimension code and face recognition fused conference identity authentication device and method |
CN107277812A (en) * | 2017-07-11 | 2017-10-20 | 上海斐讯数据通信技术有限公司 | A kind of wireless network authentication method and system based on Quick Response Code |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763895A (en) * | 2018-04-28 | 2018-11-06 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment, storage medium |
CN108763895B (en) * | 2018-04-28 | 2021-03-30 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment and storage medium |
CN108985036A (en) * | 2018-06-25 | 2018-12-11 | 北京蜂盒科技有限公司 | Method, apparatus, electronic equipment, login service device and the medium that user logs in |
CN110995654A (en) * | 2019-11-05 | 2020-04-10 | 合肥优尔电子科技有限公司 | Remote terminal temporary authorization method, device and system based on dynamic two-dimensional code |
CN110995654B (en) * | 2019-11-05 | 2022-11-18 | 合肥优尔电子科技有限公司 | Terminal temporary authorization method, device and system based on dynamic two-dimensional code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Roy et al. | Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems | |
Jain et al. | Biometrics: a tool for information security | |
CN106330464B (en) | A kind of identity identifying method, equipment and system | |
Hao et al. | Combining crypto with biometrics effectively | |
Jain et al. | Biometric authentication: System security and user privacy | |
Nandakumar et al. | Fingerprint-based fuzzy vault: Implementation and performance | |
KR100824733B1 (en) | Method for concealment and authentication of fingerprint data using 3d fuzzy vault, apparatus for concealment of fingerprint data using 3d fuzzy vault and system for authentication of fingerprint data using 3d fuzzy vault | |
US10403076B2 (en) | Method for securing and verifying a document | |
US20150143483A1 (en) | Device and Method for Identity Authentication Management | |
US10296734B2 (en) | One touch two factor biometric system and method for identification of a user utilizing a portion of the person's fingerprint and a vein map of the sub-surface of the finger | |
KR20090031093A (en) | Method and apparatus for data pattern recognition for data protection | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN107944248A (en) | A kind of LINUX operating system login methods based on recognition of face and Quick Response Code double authentication | |
CN103714282A (en) | Interactive type identification method based on biological features | |
JP2020524860A (en) | Identity authentication method and device, electronic device, computer program and storage medium | |
Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
Bobkowska et al. | Incorporating iris, fingerprint and face biometric for fraud prevention in e‐passports using fuzzy vault | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
Kalra et al. | A survey on multimodal biometric | |
CN110516425B (en) | Secret sharing method and system | |
Latha et al. | A study on attacks and security against fingerprint template database | |
CN103700151A (en) | Morning run check-in method | |
JP2011118452A (en) | Biological information processing device, biological information processing method, biological information processing system and biological information processing computer program | |
Tajuddin et al. | Cryptographic Key Generation using Retina Biometric Parameter | |
CN110795769B (en) | Anti-counterfeiting method for check-in data of face recognition check-in system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180420 |
|
RJ01 | Rejection of invention patent application after publication |