CN108491706A - A kind of multi-application computer and office equipment cabinet - Google Patents
A kind of multi-application computer and office equipment cabinet Download PDFInfo
- Publication number
- CN108491706A CN108491706A CN201810211213.7A CN201810211213A CN108491706A CN 108491706 A CN108491706 A CN 108491706A CN 201810211213 A CN201810211213 A CN 201810211213A CN 108491706 A CN108491706 A CN 108491706A
- Authority
- CN
- China
- Prior art keywords
- module
- computer
- central control
- connect
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3058—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/18—Phase-modulated carrier systems, i.e. using phase-shift keying
- H04L27/22—Demodulator circuits; Receiver circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Bioinformatics & Cheminformatics (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Evolutionary Computation (AREA)
- Multimedia (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Computing Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention belongs to cabinet technical field, a kind of multi-application computer and office equipment cabinet are disclosed, multi-application computer includes face recognition module, encryption/decryption module, transmission module, the estimating carrier frequencies module of signal under noise;Office equipment cabinet includes:Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, lighting module, alarm module, display module.The computer operational safety of the present invention, ensure that safe operation;Temperature information can be detected in real time by temperature detecting module;Humidity detecting module can detect humidity information in real time;Temperature detecting module is wet, the information of detection is sent to central control module and carries out discriminatory analysis by degree detection module, is alarmed by alarm module if abnormal;Using safer, function is more various.
Description
Technical field
The invention belongs to cabinet technical field more particularly to a kind of multi-application computers and office equipment cabinet.
Background technology
Currently, the prior art commonly used in the trade is such:
The classification of cabinet:Data cabinet is generally comprised to divide in detail according to function, coarctation cabinet, drawing cabinet, locker, storing
Cabinet, boxes for keys, shoe chest, the tailor-made sheet iron cabinet such as employee's cabinet.There is steel file cabinet if dividing according to material, board-like file cabinet,
Solid wood file cabinet, stainless steel file cabinet.It is all based on the file cabinet with steel usually to do common, and home-use is usually board-like
File cabinet, what more luxurious honor showed status is solid wood file cabinet.And stainless steel file cabinet, cost are higher, therefore people it is a little less.
Here important is introduce steel file cabinet.Steel file cabinet outlet is dismounting, and domestic market is usually one.Steel text
Part cabinet is whether there is or not door and has door, door to have plenty of glass door and iron gate.However, existing cabinet cannot carry out temperature, humidity
Detection, if tide or the excessively high electronic equipment or document that can damage storage of temperature excessively, is unfavorable for preserving
Existing Computer Architecture is not perfect to cause the loophole of information security.Currently, the file of PC machine adds
Secret skill art is typically participation by software and operating system to complete, i.e., the encryption software in PC machine to file carry out software or
It after encrypting card encryption, by operating system (software), is deposited into permanent storage media (such as hard disk), this encryption method is uneasy
Entirely, for example, the Hacker Program being hidden in system can obtain key, by whole documents by after the front and back Documents Comparison processing of encryption
Decryption.Therefore there is a kind of method by media encryption, such as Patent No. ZL99113164.9, utility model are entitled
A kind of Chinese patent literature of Encrypt device for computer hard disc, it discloses a kind of encrypting computer hard disc method and device,
In conventional Basis of Computer Engineering, encrypted circuit is formed by encryption chip, encryption chip is by control unit circuit, encryption and decryption
Element circuit, RAM memory and control switch K compositions, are encrypted to passing in and out the hardware of data flow selectivity of hard disk, to realize
So-called media encryption.Even if illegally obtaining hard disk, illegal key can only also read encrypted file, can not
It decodes;There are legitimate secret, different groups, also due to decoding process difference, cannot still obtain useful information although can see D disks.
Encrypting computer hard disc is realized, the confidentiality of computer is increased.
With the continuous development of computer technology, information security has become the focus of computer user's common concern.It is many
Computer vendors are after computer starting, before os starting, such as in basic input output system (Basic Input
Output System, BIOS), or unified Extensible Firmware Interface (UnifiedExtensible Firmware
Interface, UEFI) personal identification method of a set of high safety mechanism is arranged in layer, known with the identity to computer user
Not, the operational access permission of computer is controlled.
The prior art provide it is a kind of the identity of computer user is identified by password personal identification method, sketch
It is as follows:In computer starting and after completing BIOS self-tests, and after having read os starting file, output password inputs boundary
Startup password input by user is verified, and after being proved to be successful, start-up operation so that user inputs startup password in face
System terminates computer starting flow, to ensure the safety of computer system when verifying unsuccessful.But password identity is known
Other method requires user to remember that preset startup password, long startup password are not easy to user's memory, too short startup password
It is easy to be cracked, and the password personal identification method usually stores pre-set startup password in a hard disk, thus
It needs after having read os starting file, you can after accessing to hard disc of computer, could realize to user's body
The identification of part, therefore, password personal identification method is difficult to meet the security requirement of computer system.
The prior art provides a kind of identification smart card and the identity of computer user is identified again.Although identity
Identification intelligent card can be very good to protect startup password, but identification smart card is easily stolen takes, moreover, computer
Be also required to have read the startup password that could be read after os starting file in identification smart card, to there is also compared with
Big security risk.
The prior art provides a kind of method for realizing fingerprint recognition by computer software, since fingerprint is each user
Distinctive biological information possesses the characteristic that all will not change throughout one's life, therefore carries out identification to computer user by fingerprint
When, higher safety can be reached.But since this method is realized by software completely, only successfully loading
Fingerprint recognition could be realized after computer operating system, and after os starting, USB device, CD-ROM drive etc. are all in can make
With state, security risk is brought to be identified to computer identity.
Computer communication is made all to occupy an important position in civilian, office realm, understands and grasp signal point in special frequency channel
Cloth and parameter situation (carrier frequency of such as signal, chip rate, bandwidth), the intercepting and capturing, analysis and information for realizing signal are broken
Reduction is translated to be of great significance.However, since the noise circumstance of space communication is complicated and changeable and interference problem getting worse, letter
It number is easily affected by it and faint state is presented.Therefore, improve in deep space communication under Low SNR the detection of small-signal with
Parameter Estimation is current urgent problem to be solved.
Psk signal be phase-modulation, constant amplitude digital modulation signals, since it has strong antijamming capability and can be with
The advantage of the bandwidth of broadened signal is widely used in pulse compression radar often as the signal type generally used in communication
In.
Carrier frequency is one of the core parameter for describing signal arteries and veins internal characteristic, accurately estimates the carrier frequency of signal of communication for modulation
The identification of mode, the search of signal specific and demodulation etc. all have great importance.
In practical office computer communication system, often there is largely have notable spiking characteristics and probability
The thicker non-gaussian distribution noise of density function hangover, such as multichannel interference and other artificial electromagnetic pulse noises etc..This
Outside, the non-Gaussian noise with pulse spike characteristic is usually modeled with Alpha Stable distritations.Therefore, research Alpha stablizes
The estimation of psk signal chip rate has certain theory value and actual application value under partition noise.
In conclusion problem of the existing technology is:
(1) in active computer communication, do not have preferable estimation performance under low signal-to-noise ratio environment;It affects and specifically answers
With.
(2) active computer Encryption Algorithm cannot be changed, therefore its safety is not also high.
(3) in existing fingerprint individual verification technology, fingerprint template information is typically stored in the hard disk of computer system,
Although fingerprint template information had carried out encryption, also it is easy to be stolen, causes computer system security is low to ask
Topic.
(4) existing cabinet cannot be detected temperature, humidity, if tide or temperature is excessively high can damage storage excessively
Electronic equipment or document are unfavorable for preserving.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of multi-application computer and office equipment cabinets.
The invention is realized in this way a kind of multi-application computer, the multi-application computer include:
Face recognition module is connect with camera, for taking facial image feature vector, and judges whether have using meter
Calculation machine legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module is connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module is connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module of signal, connect with transmission module under noise, to the computer operation data of transmission into
Row estimating carrier frequencies judge the safety of operation;If safety, is communicated with Cloud Server;If dangerous, stop passing
The transmission data of defeated module, and alarmed by alarm module.
Further, the method for the face recognition module includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from
It arrives greatly and small is arranged in order λ 1, λ 2 ...;
Take out p value, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, trained sample
In this X, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Packet
It includes:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;It is each according to present frame
The recognition result of a face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by surpassing
The Unified Identity of more than half n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<……
<Rn, by obtained similarity value according toRule determine final recognition result;Wherein
T1 is rate value, T1=0.6.
Further, the method for the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if being more than
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
Further, the method for estimation of the estimating carrier frequencies module of signal includes under noise:Stable point is contained to reception
The signal of cloth noise seeks cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1,
2 ... M, q (t) indicate that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w
(t) it is the non-Gaussian noise for obeying S α S distributions, then its autocovariance function is defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then x (t) is followed
Ring co-variation is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and takes absolutely
The estimated value averaged after value as carrier frequency.
Another object of the present invention is to provide a kind of programs of the operation multi-application computer.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation so that computer executes the program.
Another object of the present invention is to provide a kind of office equipment cabinet of the multi-application computer described in storage, institutes
Stating office equipment cabinet includes:
Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, illumination
Module, alarm module, display module;
Temperature detecting module is connect with central control module, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module is connect with central control module, for detecting storage cabinet humidity by humidity sensor;
Detection module in kind, connect with central control module, whether has presence in kind in cabinet for detecting;
Central control module enables identification module with temperature detecting module, humidity detecting module, detection module in kind, card, shines
Bright module, alarm module, display module connection, for being transmitted to temperature detecting module, humidity detecting module, detection module in kind
And the data information come carries out processing analysis;
Card enables identification module, is connect with central control module, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module is connect with central control module, and illumination is provided for passing through headlamp;
Alarm module is connect with central control module, is alarmed for passing through alarm;
Display module is connect with central control module, the detection information for showing cabinet.
Further, it is IC card and/or access people's fingerprint that the unlocking card, which enables,;The card enables identification module for a recognizable institute
State the card reader of IC card and/or the Fingerprint Identification Unit of recognizable access people's fingerprint;
The display module is human-computer interaction touch screen;
The control core of the central control module is microcontroller.
In conclusion advantages of the present invention and good effect are:
(1) present invention can estimate the carrier frequency of lower number of Stable distritation noise;The present invention is under low signal-to-noise ratio environment
With preferable estimation performance;
In identical emulation experiment environment and identical chip rate, carrier frequency, sample frequency, sampling number and noise
Than etc. signal parameters setting under the conditions of, the present invention than existing method have preferably estimation performance.
(2) encryption and decryption approaches of the invention increase system reliability, stability and compatibility;Encryption and decryption operation around
Mainboard is crossed directly to the access control of hard disk, is substantially reduced password and is trapped the probability for cracking and detouring and open, enhances guarantor
Close property;User only needs the operation according to start process to the computer system of the present invention to ensure information security in use
Prompt carries out Elementary Function setting and the functions such as data encryption, hard disk protection, Network Isolation can be realized, easy to use.Satisfaction pair
The more urgent user of Computer Data Security, such as scientific research institutions, finance and government and national defence demand.
(3) face identification method of the invention ensure that computer application safety.
(4) present invention can detect temperature information in real time by temperature detecting module;Humidity detecting module can be examined in real time
Measuring moisture information;Temperature detecting module is wet, the information of detection is sent to central control module and carries out judging to divide by degree detection module
Analysis is alarmed if abnormal by alarm module;Using safer, function is more various.
Description of the drawings
Fig. 1 is office equipment cabinet structural schematic diagram provided in an embodiment of the present invention;
Fig. 2 is multi-application computer schematic diagram provided in an embodiment of the present invention.
In figure:1, temperature detecting module;2, humidity detecting module;3, detection module in kind;4, central control module;5, block
Enable identification module;6, lighting module;7, alarm module;8, display module;9, face recognition module;10, camera;11, it plus solves
Close module;12, transmission module;13, under noise signal estimating carrier frequencies module.
Fig. 3 is time-frequency overlapped signal the estimating under different signal-to-noise ratio provided in an embodiment of the present invention to different modulating type
Count performance schematic diagram.
Fig. 4 is that intersection performance is illustrated with the variation of network size in the case of difference LOCK blocks provided in an embodiment of the present invention
Figure.
Fig. 5 is change schematic diagram of the algorithms of different intersection performance provided in an embodiment of the present invention with network size.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
Existing cabinet cannot be detected temperature, humidity, if tide or the excessively high electricity that can damage storage of temperature excessively
Sub- equipment or document are unfavorable for preserving.
As shown in Figure 1, multi-application computer provided in an embodiment of the present invention and office equipment cabinet include:Temperature detection
Module 1, humidity detecting module 2, detection module 3 in kind, central control module 4, card enable identification module 5, lighting module 6, alarm
Module 7, display module 8.
Temperature detecting module 1 is connect with central control module 4, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module 2 is connect with central control module 4, for detecting storage cabinet humidity by humidity sensor;
Detection module 3 in kind, connect with central control module 4, whether has presence in kind in cabinet for detecting;
Central control module 4 enables identification mould with temperature detecting module 1, humidity detecting module 2, detection module 3 in kind, card
Block 5, lighting module 6, alarm module 7, display module 8 connect, for temperature detecting module 1, humidity detecting module 2, material object
The data information that detection module 3 is transmitted to carries out processing analysis;
Card enables identification module 5, is connect with central control module 4, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module 6 is connect with central control module 4, and illumination is provided for passing through headlamp;
Alarm module 7 is connect with central control module 4, is alarmed for passing through alarm;
Display module 8 is connect with central control module 4, the detection information for showing cabinet.
The unlocking card for not inventing offer enables as IC card and/or access people's fingerprint;It is one recognizable that the card, which enables identification module 5,
The Fingerprint Identification Unit of the card reader of the IC card and/or recognizable access people's fingerprint.
The display module 8 for not inventing offer is human-computer interaction touch screen.
The control core for not inventing the central control module 4 of offer is microcontroller.
Temperature detecting module 1 of the present invention, humidity detecting module 2, detection module 3 in kind are by the data information and parameter of detection
Processing analysis is carried out by central control module 4, is alarmed if abnormal central control module 4 dispatches alarm module 7;Simultaneously
The detection information of cabinet is shown by display module 8;When enabling identification module 5 open electric control lock using card, illumination can be passed through
Module 6 provides illumination.
As shown in Fig. 2, multi-application computer provided in an embodiment of the present invention, including:
Face recognition module 9 is connect with camera 10, for taking facial image feature vector, and is judged whether to have and be answered
With computer legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module 11, connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module 12, connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module 12 of signal, connect with transmission module 12 under noise, and number is run to the computer of transmission
According to estimating carrier frequencies are carried out, the safety of operation is judged;If safety, is communicated with Cloud Server;If dangerous, stop
The only transmission data of transmission module, and alarmed by alarm module.
The method of the face recognition module 8 includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from
It arrives greatly and small is arranged in order λ 1, λ 2 ...;
Take out p value, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, trained sample
In this X, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Packet
It includes:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;It is each according to present frame
The recognition result of a face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by surpassing
The Unified Identity of more than half n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<……
<Rn, by obtained similarity value according toRule determine final recognition result;Wherein
T1 is rate value, T1=0.6.
The method of the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if being more than
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
The method of estimation of the estimating carrier frequencies module of signal includes under noise:To reception containing Stable distritation noise
Signal seeks cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1,
2 ... M, q (t) indicate that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w
(t) it is the non-Gaussian noise for obeying S α S distributions, then its autocovariance function is defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then x (t) is followed
Ring co-variation is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and takes absolutely
The estimated value averaged after value as carrier frequency.
It is described further with reference to the difference of the application and documents.
Existing file 1:CN200910189430.1
A kind of personal identification method of computer user, includes the following steps:
During BIOS power-on self-tests, Bioinformatics chip is driven, and after the completion of BIOS power-on self-tests, reading
Before extract operation System startup files, control computer system enters guard mode, and generates identification order;
Bioinformatics chip responds the identification order, and the biological information of collecting computer user will acquire
Biological information be compared with the biological template information being stored in advance in Bioinformatics chip;Generate biological information ratio
To result;
Judge whether the authentication of computer user succeeds according to comparison result, and in the authentication of computer user
When success, the protection to computer system, read operation System startup files and start-up operation system are released, in computer user
Authentication it is unsuccessful when, keep the guard mode of computer system.
It is specially by the step in biological template information storage to Bioinformatics chip in advance:
The biological information of Bioinformatics chip controls biometric information sensor collecting computer user;
It is deposited using the biological information of acquisition as preassigned in biological template information storage to Bioinformatics chip
Storage unit, the storage unit can only be called by the crypto-engine of Bioinformatics chip.
It is described using the biological information of acquisition as biological template information storage to Bioinformatics chip in refer in advance
Before the step of fixed storage unit, the method further includes following step:
Crypto-engine in Bioinformatics chip adds biological template information using preset encryption technology
Close processing.
It is described using the biological information of acquisition as biological template information storage to Bioinformatics chip in refer in advance
Before the step of fixed storage unit, the method further includes following step:
The biometric image of acquisition is handled, to improve the quality and clarity of biometric image;
From the key feature for extracting biology in treated biometric image;
Processing is digitized to the key feature of the biology of extraction.
A kind of identity recognition device of computer user, described device include main frame, are carried out with main frame
The Bioinformatics chip of two-way communication and the biological information that two-way communication is carried out with the Bioinformatics chip pass
Sensor,
During the main frame BIOS power-on self-tests, Bioinformatics chip is driven, and power on certainly in BIOS
After the completion of inspection, before read operation System startup files, control computer system enters guard mode, generates identification life
It enables, and when receiving the biological information comparison result that the Bioinformatics chip returns, is compared and tied according to biological information
Fruit judges whether the authentication of computer user succeeds, and in the authentication of computer user success, releases to calculating
The protection of machine system, read operation System startup files and start-up operation system, it is unsuccessful in the authentication of computer user
When, keep the guard mode of computer system;
The Bioinformatics chip responds the identification order, and the biological information of collecting computer user will
The biological information of acquisition is compared with the biological template information being stored in advance in Bioinformatics chip;Generate biology letter
Cease comparison result.
The prior art 2
CN200420102957.9
A kind of computer system to ensure information security comprising form the universal component of personal computer, the computer
Hard disk be integrated with an embedded intelligence processing system, including processor, Mach and memory, and hard disk drives
It is also integrated with hardware logic encrypted circuit module in dynamic circuit, is that system is operated by processor and micro-kernel to data encryption process
Hardware logic encrypted circuit is called to complete under the instruction of system.
The computer system forces the head bias of hard disk by hardware circuit, is protection zone and corresponding by hard disk partition
Two parts of MIRROR SITE.
The computer further includes an intelligence USB Key system, is one and carries data processor, memory and micro- behaviour
Make the system of kernel and cryptographic algorithm process.
The computer system is also configured with external network security separate card, and hard drive circuit draws row's physical signal link
Line is connected to the network security separate card.
Each one-to-one binding in the ports RJ-45 of different isolation boot sections and network security separate card.
The usb bus drive control device of the computer system is integrated into hard drive circuit board and draws from the circuit board of hard disk
Go out USB port line and accesses USB KEY directly to user.
The distinctive points that the technical method and the prior art 1,2 of the application are compared with reference to table 1 are described the present invention's
Advantage.
Table 1 is that the present invention is compared with the prior art
With reference to emulation experiment, the invention will be further described.
In order to test the performance of test statistics of the invention, parameter setting is as follows:The rolling of raised cosine shaping filter function
Factor alpha=0.5 drops;Sample frequency is 1600Hz;Sampling number 500000;Chip rate is respectively 200Hz and 160Hz;Carrier wave
Frequency is respectively 400Hz and 300Hz;Power ratio 1:1.Simulation result
As shown in figure 3, the signal-noise ratio estimation method of the present invention is effective and feasible.Thus illustrate the present invention in low signal-to-noise ratio
Under the conditions of high spectrum Duplication, to the component signal signal-to-noise ratio (SNR) estimation of time-frequency overlapped signal under underlay frequency spectrum share modes
With preferable estimation performance.
Emulation
ADFC-CH algorithms are emulated using MATLAB, and and L-DDP【Yang B,Zheng M,Liang
W.Padded-Dyck-Path-Based Rendezvous Algorithms for Heterogeneous Cognitive
Radio Networks[C]//201524th International Conference on Computer
Communication andNetworks(ICCCN).IEEE,2015:1-8】、DSCR【N.C.Theis,R.W.Thomas,and
L.A.DaSilva,“Rendezvous for cognitive radios,”IEEE Transactions on Mobile
Computing,vol.10,no.2,pp.216–227,Feb.2011】And SSB【Reguera V A,Guerra E O,Souza
R D,et al.Short channel hopping sequence approach to rendezvous for cognitive
networks[J].IEEE Communications Letters,2014,18(2):289-292】Algorithm is compared.Consider
Channel number is respectively 20,35,50,65,80 five kinds of situations in network, and the size of the LOCK of selection is respectively P/4, P/3,
The module of P/2,2P/3,3P/4,4P/5, P (P is system channel number), selection are maximum intersection time MTTR respectively, are put down
Time ETTR, intersection degree RD are intersected, the time TMRD that maximum intersection degree needs is reached.
In the case that Fig. 4 gives different LOCK block sizes, MTTR, ETTR, RD and TMRD of channel intersection are with network
The curve of scale variation.Fig. 4 (a) is it can be seen that when the size of LOCK blocks is 3P/4, and the MTTR of network is minimum, and Fig. 4 (b) shows
When the size of LOCK blocks is 4P/5, network ETTR is minimum, and Fig. 4 (c) shows the RD of the network when LOCK block sizes are P/4 most
Greatly.By Fig. 4 (d) it can be seen that no matter LOCK is how many when, the gap of TMDR is not very big (being no more than 2.7%),
Reaching maximal degree intersection time and network size has the correlation of very strong correlation and algorithm little, but when network reaches
The TMDR of network is minimum when LOCK block sizes are 4P/5 when certain scale.
By the simulation to LOCK block sizes, the size of LOCK blocks can be selected according to network demand.If net
Network is relatively stablized, and the requirement to RD will be reduced accordingly, then selects LOCK block sizes for 4P/5, and the MTTR of network is most at this time
It is small;When network less stable, when the movable bad prediction of PU frequent activities or PU, the RD of channel intersection is required it is relatively high,
Select LOCK block sizes for P/4 at this time;The size of LOCK blocks is selected when network requires relatively high simultaneously to RD and MTTR
For 3P/4.
Fig. 5 give ADFC-CH algorithms and DSCR, SSB, L-PDP algorithm heterogeneous networks scale lower network performance ratio
Compared with figure, the LOCK sizes of the ADFC-CH algorithms selections in wherein Fig. 5 (a) are 3P/4, ADFC-CH algorithms selections in Fig. 5 (b)
LOCK block sizes are 4P/5, and the LOCK block sizes of ADFC-CH algorithms selections are P/4 in Fig. 5 (c).
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (8)
1. a kind of multi-application computer, which is characterized in that the multi-application computer includes:
Face recognition module is connect with camera, for taking facial image feature vector, and judges whether have appliance computer
Legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module is connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module is connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module of signal, connect with transmission module under noise, is carried to the computer operation data of transmission
Wave frequency rate is estimated, judges the safety of operation;If safety, is communicated with Cloud Server;If dangerous, stop transmission mould
The transmission data of block, and alarmed by alarm module.
2. multi-application computer as described in claim 1, which is characterized in that the method for the face recognition module includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from greatly to
It is small to be arranged in order λ 1, λ 2 ...;
P is taken out to be worth, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, training sample X
In, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Including:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;According to each individual of present frame
The recognition result of face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by being more than half
The Unified Identity of number n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<……<Rn,
By obtained similarity value according toRule determine final recognition result;Wherein T1 is
Rate value, T1=0.6.
3. multi-application computer as described in claim 1, which is characterized in that the method for the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], a point set
P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group
(m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
4. multi-application computer as described in claim 1, which is characterized in that
The method of estimation of the estimating carrier frequencies module of signal includes under noise:To the signal containing Stable distritation noise of reception
Seek cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1,2 ... M,
Q (t) indicates that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w (t) is to obey
The non-Gaussian noise of S α S distribution, then its autocovariance function be defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then the cycle of x (t) is total
Change is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and after taking absolute value
The estimated value averaged as carrier frequency.
5. the program of multi-application computer described in a kind of operation Claims 1 to 4 any one.
6. a kind of computer readable storage medium, including instruction, when run on a computer so that computer is executed as weighed
Profit requires the program described in 5.
7. a kind of office equipment cabinet of storage multi-application computer described in claim 1, which is characterized in that the office
Equipment cabinet includes:
Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, illumination mould
Block, alarm module, display module;
Temperature detecting module is connect with central control module, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module is connect with central control module, for detecting storage cabinet humidity by humidity sensor;
Detection module in kind, connect with central control module, whether has presence in kind in cabinet for detecting;
Central control module enables identification module, illumination mould with temperature detecting module, humidity detecting module, detection module in kind, card
Block, alarm module, display module connection, for being transmitted to temperature detecting module, humidity detecting module, detection module in kind
Data information carry out processing analysis;
Card enables identification module, is connect with central control module, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module is connect with central control module, and illumination is provided for passing through headlamp;
Alarm module is connect with central control module, is alarmed for passing through alarm;
Display module is connect with central control module, the detection information for showing cabinet.
8. office equipment cabinet as claimed in claim 7, which is characterized in that it is IC card and/or access people that the unlocking card, which enables,
Fingerprint;It is a card reader that can recognize that the IC card and/or recognizable access people's fingerprint that the card, which enables identification module,
Fingerprint Identification Unit;
The display module is human-computer interaction touch screen;
The control core of the central control module is microcontroller.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810211213.7A CN108491706A (en) | 2018-03-14 | 2018-03-14 | A kind of multi-application computer and office equipment cabinet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810211213.7A CN108491706A (en) | 2018-03-14 | 2018-03-14 | A kind of multi-application computer and office equipment cabinet |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108491706A true CN108491706A (en) | 2018-09-04 |
Family
ID=63339424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810211213.7A Pending CN108491706A (en) | 2018-03-14 | 2018-03-14 | A kind of multi-application computer and office equipment cabinet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108491706A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202820312U (en) * | 2012-10-12 | 2013-03-27 | 厦门市美亚柏科信息股份有限公司 | Real- time-monitoring locker and management system of hard disk storing material evidence |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN104038454A (en) * | 2014-06-20 | 2014-09-10 | 西安电子科技大学 | Method for estimating carrier frequency of PSK (phase shift keying) signal in Alpha-stable distribution noise |
CN104157057A (en) * | 2014-08-11 | 2014-11-19 | 浙江力石科技股份有限公司 | Kylin operation system-based bullet egress and ingress automated management system |
CN204440558U (en) * | 2015-02-25 | 2015-07-01 | 成都天宁通智能科技有限公司 | Intelligent fingerprint management cabinet |
CN105652759A (en) * | 2016-03-24 | 2016-06-08 | 国网辽宁省电力有限公司电力科学研究院 | Cabinet capable of automatically completing experimental work measuring instrument handover without human intervene |
CN105708236A (en) * | 2016-03-28 | 2016-06-29 | 时长永 | Intelligent storage cabinet |
CN106127886A (en) * | 2016-06-16 | 2016-11-16 | 潜山共同创网络科技有限公司 | A kind of computer-controlled intelligence preserver |
CN107248762A (en) * | 2017-06-15 | 2017-10-13 | 武汉洁美雅科技有限公司 | A kind of Intelligent lithium battery electric patrol car control system |
CN107369263A (en) * | 2017-07-15 | 2017-11-21 | 西南石油大学 | A kind of recognition of face locker system based on cloud computing platform |
CN107487398A (en) * | 2017-07-31 | 2017-12-19 | 满俊恺 | A kind of new bicycle safety-protection system |
CN107507316A (en) * | 2017-09-15 | 2017-12-22 | 深圳市先施科技股份有限公司 | A kind of implementation method, the device and system of automatic identification intelligence safe cabinet |
CN107545265A (en) * | 2017-07-17 | 2018-01-05 | 浙江智神数码科技有限公司 | A kind of intelligent vehicle license plate recognition system |
-
2018
- 2018-03-14 CN CN201810211213.7A patent/CN108491706A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202820312U (en) * | 2012-10-12 | 2013-03-27 | 厦门市美亚柏科信息股份有限公司 | Real- time-monitoring locker and management system of hard disk storing material evidence |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN104038454A (en) * | 2014-06-20 | 2014-09-10 | 西安电子科技大学 | Method for estimating carrier frequency of PSK (phase shift keying) signal in Alpha-stable distribution noise |
CN104157057A (en) * | 2014-08-11 | 2014-11-19 | 浙江力石科技股份有限公司 | Kylin operation system-based bullet egress and ingress automated management system |
CN204440558U (en) * | 2015-02-25 | 2015-07-01 | 成都天宁通智能科技有限公司 | Intelligent fingerprint management cabinet |
CN105652759A (en) * | 2016-03-24 | 2016-06-08 | 国网辽宁省电力有限公司电力科学研究院 | Cabinet capable of automatically completing experimental work measuring instrument handover without human intervene |
CN105708236A (en) * | 2016-03-28 | 2016-06-29 | 时长永 | Intelligent storage cabinet |
CN106127886A (en) * | 2016-06-16 | 2016-11-16 | 潜山共同创网络科技有限公司 | A kind of computer-controlled intelligence preserver |
CN107248762A (en) * | 2017-06-15 | 2017-10-13 | 武汉洁美雅科技有限公司 | A kind of Intelligent lithium battery electric patrol car control system |
CN107369263A (en) * | 2017-07-15 | 2017-11-21 | 西南石油大学 | A kind of recognition of face locker system based on cloud computing platform |
CN107545265A (en) * | 2017-07-17 | 2018-01-05 | 浙江智神数码科技有限公司 | A kind of intelligent vehicle license plate recognition system |
CN107487398A (en) * | 2017-07-31 | 2017-12-19 | 满俊恺 | A kind of new bicycle safety-protection system |
CN107507316A (en) * | 2017-09-15 | 2017-12-22 | 深圳市先施科技股份有限公司 | A kind of implementation method, the device and system of automatic identification intelligence safe cabinet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103595538B (en) | Identity verification method based on mobile phone acceleration sensor | |
CN102664036A (en) | Fingerprint encryption intelligent digital U disk | |
Joshi et al. | A comprehensive security analysis of match-in-database fingerprint biometric system | |
Militello et al. | Embedded access points for trusted data and resources access in HPC systems | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
Verma et al. | A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment. | |
CN108109242A (en) | A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock | |
Yusuf et al. | A survey of biometric approaches of authentication | |
Gyamfi et al. | Enhancing the security features of automated teller machines (ATMs): A Ghanaian perspective | |
Belguechi et al. | An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates | |
Anveshini et al. | Pattern recognition based fingerprint authentication for ATM system | |
Mohammed | Use of biometrics to tackle ATM fraud | |
El-Abed et al. | Towards the security evaluation of biometric authentication systems | |
CN108491706A (en) | A kind of multi-application computer and office equipment cabinet | |
CN103456340A (en) | Safe movable hard disk and application method thereof | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
Belguechi et al. | Texture based fingerprint biohashing: Attacks and robustness | |
Kovalchuk et al. | A practical proposal for ensuring the provenance of hardware devices and their safe operation | |
Jain et al. | Security of biometric systems | |
Conti et al. | Biometric sensors rapid prototyping on field-programmable gate arrays | |
Sarkar et al. | Survey on Biometric applications for implementation of authentication in smart Governance | |
Chizari et al. | Security issues in ATM smart card technology | |
Kiran et al. | Implementation of 3-Level Security System Using Image Grid Based Authentication System | |
Cimato et al. | Biometrics and privacy | |
Chergui et al. | Can a chaos system provide secure communication over insecure networks?—Online automatic teller machine services as a case study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180904 |