CN108491706A - A kind of multi-application computer and office equipment cabinet - Google Patents

A kind of multi-application computer and office equipment cabinet Download PDF

Info

Publication number
CN108491706A
CN108491706A CN201810211213.7A CN201810211213A CN108491706A CN 108491706 A CN108491706 A CN 108491706A CN 201810211213 A CN201810211213 A CN 201810211213A CN 108491706 A CN108491706 A CN 108491706A
Authority
CN
China
Prior art keywords
module
computer
central control
connect
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810211213.7A
Other languages
Chinese (zh)
Inventor
周春花
王仕勋
孟金红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huanggang Polytechnic College
Original Assignee
Huanggang Polytechnic College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huanggang Polytechnic College filed Critical Huanggang Polytechnic College
Priority to CN201810211213.7A priority Critical patent/CN108491706A/en
Publication of CN108491706A publication Critical patent/CN108491706A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/18Phase-modulated carrier systems, i.e. using phase-shift keying
    • H04L27/22Demodulator circuits; Receiver circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Human Computer Interaction (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Evolutionary Computation (AREA)
  • Multimedia (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Computing Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention belongs to cabinet technical field, a kind of multi-application computer and office equipment cabinet are disclosed, multi-application computer includes face recognition module, encryption/decryption module, transmission module, the estimating carrier frequencies module of signal under noise;Office equipment cabinet includes:Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, lighting module, alarm module, display module.The computer operational safety of the present invention, ensure that safe operation;Temperature information can be detected in real time by temperature detecting module;Humidity detecting module can detect humidity information in real time;Temperature detecting module is wet, the information of detection is sent to central control module and carries out discriminatory analysis by degree detection module, is alarmed by alarm module if abnormal;Using safer, function is more various.

Description

A kind of multi-application computer and office equipment cabinet
Technical field
The invention belongs to cabinet technical field more particularly to a kind of multi-application computers and office equipment cabinet.
Background technology
Currently, the prior art commonly used in the trade is such:
The classification of cabinet:Data cabinet is generally comprised to divide in detail according to function, coarctation cabinet, drawing cabinet, locker, storing Cabinet, boxes for keys, shoe chest, the tailor-made sheet iron cabinet such as employee's cabinet.There is steel file cabinet if dividing according to material, board-like file cabinet, Solid wood file cabinet, stainless steel file cabinet.It is all based on the file cabinet with steel usually to do common, and home-use is usually board-like File cabinet, what more luxurious honor showed status is solid wood file cabinet.And stainless steel file cabinet, cost are higher, therefore people it is a little less. Here important is introduce steel file cabinet.Steel file cabinet outlet is dismounting, and domestic market is usually one.Steel text Part cabinet is whether there is or not door and has door, door to have plenty of glass door and iron gate.However, existing cabinet cannot carry out temperature, humidity Detection, if tide or the excessively high electronic equipment or document that can damage storage of temperature excessively, is unfavorable for preserving
Existing Computer Architecture is not perfect to cause the loophole of information security.Currently, the file of PC machine adds Secret skill art is typically participation by software and operating system to complete, i.e., the encryption software in PC machine to file carry out software or It after encrypting card encryption, by operating system (software), is deposited into permanent storage media (such as hard disk), this encryption method is uneasy Entirely, for example, the Hacker Program being hidden in system can obtain key, by whole documents by after the front and back Documents Comparison processing of encryption Decryption.Therefore there is a kind of method by media encryption, such as Patent No. ZL99113164.9, utility model are entitled A kind of Chinese patent literature of Encrypt device for computer hard disc, it discloses a kind of encrypting computer hard disc method and device, In conventional Basis of Computer Engineering, encrypted circuit is formed by encryption chip, encryption chip is by control unit circuit, encryption and decryption Element circuit, RAM memory and control switch K compositions, are encrypted to passing in and out the hardware of data flow selectivity of hard disk, to realize So-called media encryption.Even if illegally obtaining hard disk, illegal key can only also read encrypted file, can not It decodes;There are legitimate secret, different groups, also due to decoding process difference, cannot still obtain useful information although can see D disks. Encrypting computer hard disc is realized, the confidentiality of computer is increased.
With the continuous development of computer technology, information security has become the focus of computer user's common concern.It is many Computer vendors are after computer starting, before os starting, such as in basic input output system (Basic Input Output System, BIOS), or unified Extensible Firmware Interface (UnifiedExtensible Firmware Interface, UEFI) personal identification method of a set of high safety mechanism is arranged in layer, known with the identity to computer user Not, the operational access permission of computer is controlled.
The prior art provide it is a kind of the identity of computer user is identified by password personal identification method, sketch It is as follows:In computer starting and after completing BIOS self-tests, and after having read os starting file, output password inputs boundary Startup password input by user is verified, and after being proved to be successful, start-up operation so that user inputs startup password in face System terminates computer starting flow, to ensure the safety of computer system when verifying unsuccessful.But password identity is known Other method requires user to remember that preset startup password, long startup password are not easy to user's memory, too short startup password It is easy to be cracked, and the password personal identification method usually stores pre-set startup password in a hard disk, thus It needs after having read os starting file, you can after accessing to hard disc of computer, could realize to user's body The identification of part, therefore, password personal identification method is difficult to meet the security requirement of computer system.
The prior art provides a kind of identification smart card and the identity of computer user is identified again.Although identity Identification intelligent card can be very good to protect startup password, but identification smart card is easily stolen takes, moreover, computer Be also required to have read the startup password that could be read after os starting file in identification smart card, to there is also compared with Big security risk.
The prior art provides a kind of method for realizing fingerprint recognition by computer software, since fingerprint is each user Distinctive biological information possesses the characteristic that all will not change throughout one's life, therefore carries out identification to computer user by fingerprint When, higher safety can be reached.But since this method is realized by software completely, only successfully loading Fingerprint recognition could be realized after computer operating system, and after os starting, USB device, CD-ROM drive etc. are all in can make With state, security risk is brought to be identified to computer identity.
Computer communication is made all to occupy an important position in civilian, office realm, understands and grasp signal point in special frequency channel Cloth and parameter situation (carrier frequency of such as signal, chip rate, bandwidth), the intercepting and capturing, analysis and information for realizing signal are broken Reduction is translated to be of great significance.However, since the noise circumstance of space communication is complicated and changeable and interference problem getting worse, letter It number is easily affected by it and faint state is presented.Therefore, improve in deep space communication under Low SNR the detection of small-signal with Parameter Estimation is current urgent problem to be solved.
Psk signal be phase-modulation, constant amplitude digital modulation signals, since it has strong antijamming capability and can be with The advantage of the bandwidth of broadened signal is widely used in pulse compression radar often as the signal type generally used in communication In.
Carrier frequency is one of the core parameter for describing signal arteries and veins internal characteristic, accurately estimates the carrier frequency of signal of communication for modulation The identification of mode, the search of signal specific and demodulation etc. all have great importance.
In practical office computer communication system, often there is largely have notable spiking characteristics and probability The thicker non-gaussian distribution noise of density function hangover, such as multichannel interference and other artificial electromagnetic pulse noises etc..This Outside, the non-Gaussian noise with pulse spike characteristic is usually modeled with Alpha Stable distritations.Therefore, research Alpha stablizes The estimation of psk signal chip rate has certain theory value and actual application value under partition noise.
In conclusion problem of the existing technology is:
(1) in active computer communication, do not have preferable estimation performance under low signal-to-noise ratio environment;It affects and specifically answers With.
(2) active computer Encryption Algorithm cannot be changed, therefore its safety is not also high.
(3) in existing fingerprint individual verification technology, fingerprint template information is typically stored in the hard disk of computer system, Although fingerprint template information had carried out encryption, also it is easy to be stolen, causes computer system security is low to ask Topic.
(4) existing cabinet cannot be detected temperature, humidity, if tide or temperature is excessively high can damage storage excessively Electronic equipment or document are unfavorable for preserving.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of multi-application computer and office equipment cabinets.
The invention is realized in this way a kind of multi-application computer, the multi-application computer include:
Face recognition module is connect with camera, for taking facial image feature vector, and judges whether have using meter Calculation machine legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module is connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module is connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module of signal, connect with transmission module under noise, to the computer operation data of transmission into Row estimating carrier frequencies judge the safety of operation;If safety, is communicated with Cloud Server;If dangerous, stop passing The transmission data of defeated module, and alarmed by alarm module.
Further, the method for the face recognition module includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from It arrives greatly and small is arranged in order λ 1, λ 2 ...;
Take out p value, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, trained sample In this X, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Packet It includes:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;It is each according to present frame The recognition result of a face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by surpassing The Unified Identity of more than half n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<…… <Rn, by obtained similarity value according toRule determine final recognition result;Wherein T1 is rate value, T1=0.6.
Further, the method for the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if being more than One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
Further, the method for estimation of the estimating carrier frequencies module of signal includes under noise:Stable point is contained to reception The signal of cloth noise seeks cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1, 2 ... M, q (t) indicate that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w (t) it is the non-Gaussian noise for obeying S α S distributions, then its autocovariance function is defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then x (t) is followed Ring co-variation is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and takes absolutely The estimated value averaged after value as carrier frequency.
Another object of the present invention is to provide a kind of programs of the operation multi-application computer.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer When upper operation so that computer executes the program.
Another object of the present invention is to provide a kind of office equipment cabinet of the multi-application computer described in storage, institutes Stating office equipment cabinet includes:
Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, illumination Module, alarm module, display module;
Temperature detecting module is connect with central control module, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module is connect with central control module, for detecting storage cabinet humidity by humidity sensor;
Detection module in kind, connect with central control module, whether has presence in kind in cabinet for detecting;
Central control module enables identification module with temperature detecting module, humidity detecting module, detection module in kind, card, shines Bright module, alarm module, display module connection, for being transmitted to temperature detecting module, humidity detecting module, detection module in kind And the data information come carries out processing analysis;
Card enables identification module, is connect with central control module, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module is connect with central control module, and illumination is provided for passing through headlamp;
Alarm module is connect with central control module, is alarmed for passing through alarm;
Display module is connect with central control module, the detection information for showing cabinet.
Further, it is IC card and/or access people's fingerprint that the unlocking card, which enables,;The card enables identification module for a recognizable institute State the card reader of IC card and/or the Fingerprint Identification Unit of recognizable access people's fingerprint;
The display module is human-computer interaction touch screen;
The control core of the central control module is microcontroller.
In conclusion advantages of the present invention and good effect are:
(1) present invention can estimate the carrier frequency of lower number of Stable distritation noise;The present invention is under low signal-to-noise ratio environment With preferable estimation performance;
In identical emulation experiment environment and identical chip rate, carrier frequency, sample frequency, sampling number and noise Than etc. signal parameters setting under the conditions of, the present invention than existing method have preferably estimation performance.
(2) encryption and decryption approaches of the invention increase system reliability, stability and compatibility;Encryption and decryption operation around Mainboard is crossed directly to the access control of hard disk, is substantially reduced password and is trapped the probability for cracking and detouring and open, enhances guarantor Close property;User only needs the operation according to start process to the computer system of the present invention to ensure information security in use Prompt carries out Elementary Function setting and the functions such as data encryption, hard disk protection, Network Isolation can be realized, easy to use.Satisfaction pair The more urgent user of Computer Data Security, such as scientific research institutions, finance and government and national defence demand.
(3) face identification method of the invention ensure that computer application safety.
(4) present invention can detect temperature information in real time by temperature detecting module;Humidity detecting module can be examined in real time Measuring moisture information;Temperature detecting module is wet, the information of detection is sent to central control module and carries out judging to divide by degree detection module Analysis is alarmed if abnormal by alarm module;Using safer, function is more various.
Description of the drawings
Fig. 1 is office equipment cabinet structural schematic diagram provided in an embodiment of the present invention;
Fig. 2 is multi-application computer schematic diagram provided in an embodiment of the present invention.
In figure:1, temperature detecting module;2, humidity detecting module;3, detection module in kind;4, central control module;5, block Enable identification module;6, lighting module;7, alarm module;8, display module;9, face recognition module;10, camera;11, it plus solves Close module;12, transmission module;13, under noise signal estimating carrier frequencies module.
Fig. 3 is time-frequency overlapped signal the estimating under different signal-to-noise ratio provided in an embodiment of the present invention to different modulating type Count performance schematic diagram.
Fig. 4 is that intersection performance is illustrated with the variation of network size in the case of difference LOCK blocks provided in an embodiment of the present invention Figure.
Fig. 5 is change schematic diagram of the algorithms of different intersection performance provided in an embodiment of the present invention with network size.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
Existing cabinet cannot be detected temperature, humidity, if tide or the excessively high electricity that can damage storage of temperature excessively Sub- equipment or document are unfavorable for preserving.
As shown in Figure 1, multi-application computer provided in an embodiment of the present invention and office equipment cabinet include:Temperature detection Module 1, humidity detecting module 2, detection module 3 in kind, central control module 4, card enable identification module 5, lighting module 6, alarm Module 7, display module 8.
Temperature detecting module 1 is connect with central control module 4, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module 2 is connect with central control module 4, for detecting storage cabinet humidity by humidity sensor;
Detection module 3 in kind, connect with central control module 4, whether has presence in kind in cabinet for detecting;
Central control module 4 enables identification mould with temperature detecting module 1, humidity detecting module 2, detection module 3 in kind, card Block 5, lighting module 6, alarm module 7, display module 8 connect, for temperature detecting module 1, humidity detecting module 2, material object The data information that detection module 3 is transmitted to carries out processing analysis;
Card enables identification module 5, is connect with central control module 4, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module 6 is connect with central control module 4, and illumination is provided for passing through headlamp;
Alarm module 7 is connect with central control module 4, is alarmed for passing through alarm;
Display module 8 is connect with central control module 4, the detection information for showing cabinet.
The unlocking card for not inventing offer enables as IC card and/or access people's fingerprint;It is one recognizable that the card, which enables identification module 5, The Fingerprint Identification Unit of the card reader of the IC card and/or recognizable access people's fingerprint.
The display module 8 for not inventing offer is human-computer interaction touch screen.
The control core for not inventing the central control module 4 of offer is microcontroller.
Temperature detecting module 1 of the present invention, humidity detecting module 2, detection module 3 in kind are by the data information and parameter of detection Processing analysis is carried out by central control module 4, is alarmed if abnormal central control module 4 dispatches alarm module 7;Simultaneously The detection information of cabinet is shown by display module 8;When enabling identification module 5 open electric control lock using card, illumination can be passed through Module 6 provides illumination.
As shown in Fig. 2, multi-application computer provided in an embodiment of the present invention, including:
Face recognition module 9 is connect with camera 10, for taking facial image feature vector, and is judged whether to have and be answered With computer legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module 11, connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module 12, connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module 12 of signal, connect with transmission module 12 under noise, and number is run to the computer of transmission According to estimating carrier frequencies are carried out, the safety of operation is judged;If safety, is communicated with Cloud Server;If dangerous, stop The only transmission data of transmission module, and alarmed by alarm module.
The method of the face recognition module 8 includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from It arrives greatly and small is arranged in order λ 1, λ 2 ...;
Take out p value, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, trained sample In this X, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Packet It includes:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;It is each according to present frame The recognition result of a face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by surpassing The Unified Identity of more than half n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<…… <Rn, by obtained similarity value according toRule determine final recognition result;Wherein T1 is rate value, T1=0.6.
The method of the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if being more than One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
The method of estimation of the estimating carrier frequencies module of signal includes under noise:To reception containing Stable distritation noise Signal seeks cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1, 2 ... M, q (t) indicate that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w (t) it is the non-Gaussian noise for obeying S α S distributions, then its autocovariance function is defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then x (t) is followed Ring co-variation is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and takes absolutely The estimated value averaged after value as carrier frequency.
It is described further with reference to the difference of the application and documents.
Existing file 1:CN200910189430.1
A kind of personal identification method of computer user, includes the following steps:
During BIOS power-on self-tests, Bioinformatics chip is driven, and after the completion of BIOS power-on self-tests, reading Before extract operation System startup files, control computer system enters guard mode, and generates identification order;
Bioinformatics chip responds the identification order, and the biological information of collecting computer user will acquire Biological information be compared with the biological template information being stored in advance in Bioinformatics chip;Generate biological information ratio To result;
Judge whether the authentication of computer user succeeds according to comparison result, and in the authentication of computer user When success, the protection to computer system, read operation System startup files and start-up operation system are released, in computer user Authentication it is unsuccessful when, keep the guard mode of computer system.
It is specially by the step in biological template information storage to Bioinformatics chip in advance:
The biological information of Bioinformatics chip controls biometric information sensor collecting computer user;
It is deposited using the biological information of acquisition as preassigned in biological template information storage to Bioinformatics chip Storage unit, the storage unit can only be called by the crypto-engine of Bioinformatics chip.
It is described using the biological information of acquisition as biological template information storage to Bioinformatics chip in refer in advance Before the step of fixed storage unit, the method further includes following step:
Crypto-engine in Bioinformatics chip adds biological template information using preset encryption technology Close processing.
It is described using the biological information of acquisition as biological template information storage to Bioinformatics chip in refer in advance Before the step of fixed storage unit, the method further includes following step:
The biometric image of acquisition is handled, to improve the quality and clarity of biometric image;
From the key feature for extracting biology in treated biometric image;
Processing is digitized to the key feature of the biology of extraction.
A kind of identity recognition device of computer user, described device include main frame, are carried out with main frame The Bioinformatics chip of two-way communication and the biological information that two-way communication is carried out with the Bioinformatics chip pass Sensor,
During the main frame BIOS power-on self-tests, Bioinformatics chip is driven, and power on certainly in BIOS After the completion of inspection, before read operation System startup files, control computer system enters guard mode, generates identification life It enables, and when receiving the biological information comparison result that the Bioinformatics chip returns, is compared and tied according to biological information Fruit judges whether the authentication of computer user succeeds, and in the authentication of computer user success, releases to calculating The protection of machine system, read operation System startup files and start-up operation system, it is unsuccessful in the authentication of computer user When, keep the guard mode of computer system;
The Bioinformatics chip responds the identification order, and the biological information of collecting computer user will The biological information of acquisition is compared with the biological template information being stored in advance in Bioinformatics chip;Generate biology letter Cease comparison result.
The prior art 2
CN200420102957.9
A kind of computer system to ensure information security comprising form the universal component of personal computer, the computer Hard disk be integrated with an embedded intelligence processing system, including processor, Mach and memory, and hard disk drives It is also integrated with hardware logic encrypted circuit module in dynamic circuit, is that system is operated by processor and micro-kernel to data encryption process Hardware logic encrypted circuit is called to complete under the instruction of system.
The computer system forces the head bias of hard disk by hardware circuit, is protection zone and corresponding by hard disk partition Two parts of MIRROR SITE.
The computer further includes an intelligence USB Key system, is one and carries data processor, memory and micro- behaviour Make the system of kernel and cryptographic algorithm process.
The computer system is also configured with external network security separate card, and hard drive circuit draws row's physical signal link Line is connected to the network security separate card.
Each one-to-one binding in the ports RJ-45 of different isolation boot sections and network security separate card.
The usb bus drive control device of the computer system is integrated into hard drive circuit board and draws from the circuit board of hard disk Go out USB port line and accesses USB KEY directly to user.
The distinctive points that the technical method and the prior art 1,2 of the application are compared with reference to table 1 are described the present invention's Advantage.
Table 1 is that the present invention is compared with the prior art
With reference to emulation experiment, the invention will be further described.
In order to test the performance of test statistics of the invention, parameter setting is as follows:The rolling of raised cosine shaping filter function Factor alpha=0.5 drops;Sample frequency is 1600Hz;Sampling number 500000;Chip rate is respectively 200Hz and 160Hz;Carrier wave Frequency is respectively 400Hz and 300Hz;Power ratio 1:1.Simulation result
As shown in figure 3, the signal-noise ratio estimation method of the present invention is effective and feasible.Thus illustrate the present invention in low signal-to-noise ratio Under the conditions of high spectrum Duplication, to the component signal signal-to-noise ratio (SNR) estimation of time-frequency overlapped signal under underlay frequency spectrum share modes With preferable estimation performance.
Emulation
ADFC-CH algorithms are emulated using MATLAB, and and L-DDP【Yang B,Zheng M,Liang W.Padded-Dyck-Path-Based Rendezvous Algorithms for Heterogeneous Cognitive Radio Networks[C]//201524th International Conference on Computer Communication andNetworks(ICCCN).IEEE,2015:1-8】、DSCR【N.C.Theis,R.W.Thomas,and L.A.DaSilva,“Rendezvous for cognitive radios,”IEEE Transactions on Mobile Computing,vol.10,no.2,pp.216–227,Feb.2011】And SSB【Reguera V A,Guerra E O,Souza R D,et al.Short channel hopping sequence approach to rendezvous for cognitive networks[J].IEEE Communications Letters,2014,18(2):289-292】Algorithm is compared.Consider Channel number is respectively 20,35,50,65,80 five kinds of situations in network, and the size of the LOCK of selection is respectively P/4, P/3, The module of P/2,2P/3,3P/4,4P/5, P (P is system channel number), selection are maximum intersection time MTTR respectively, are put down Time ETTR, intersection degree RD are intersected, the time TMRD that maximum intersection degree needs is reached.
In the case that Fig. 4 gives different LOCK block sizes, MTTR, ETTR, RD and TMRD of channel intersection are with network The curve of scale variation.Fig. 4 (a) is it can be seen that when the size of LOCK blocks is 3P/4, and the MTTR of network is minimum, and Fig. 4 (b) shows When the size of LOCK blocks is 4P/5, network ETTR is minimum, and Fig. 4 (c) shows the RD of the network when LOCK block sizes are P/4 most Greatly.By Fig. 4 (d) it can be seen that no matter LOCK is how many when, the gap of TMDR is not very big (being no more than 2.7%), Reaching maximal degree intersection time and network size has the correlation of very strong correlation and algorithm little, but when network reaches The TMDR of network is minimum when LOCK block sizes are 4P/5 when certain scale.
By the simulation to LOCK block sizes, the size of LOCK blocks can be selected according to network demand.If net Network is relatively stablized, and the requirement to RD will be reduced accordingly, then selects LOCK block sizes for 4P/5, and the MTTR of network is most at this time It is small;When network less stable, when the movable bad prediction of PU frequent activities or PU, the RD of channel intersection is required it is relatively high, Select LOCK block sizes for P/4 at this time;The size of LOCK blocks is selected when network requires relatively high simultaneously to RD and MTTR For 3P/4.
Fig. 5 give ADFC-CH algorithms and DSCR, SSB, L-PDP algorithm heterogeneous networks scale lower network performance ratio Compared with figure, the LOCK sizes of the ADFC-CH algorithms selections in wherein Fig. 5 (a) are 3P/4, ADFC-CH algorithms selections in Fig. 5 (b) LOCK block sizes are 4P/5, and the LOCK block sizes of ADFC-CH algorithms selections are P/4 in Fig. 5 (c).
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (8)

1. a kind of multi-application computer, which is characterized in that the multi-application computer includes:
Face recognition module is connect with camera, for taking facial image feature vector, and judges whether have appliance computer Legitimacy;And the result of verification is transferred to opening module;
Encryption/decryption module is connect with opening module;For providing public key cryptography encryption and decryption password;
Transmission module is connect with opening module, the transmission for carrying out computer operation data;
The estimating carrier frequencies module of signal, connect with transmission module under noise, is carried to the computer operation data of transmission Wave frequency rate is estimated, judges the safety of operation;If safety, is communicated with Cloud Server;If dangerous, stop transmission mould The transmission data of block, and alarmed by alarm module.
2. multi-application computer as described in claim 1, which is characterized in that the method for the face recognition module includes:
1) it collects N number of sample and is used as training set X, sample mean m is found out using following formula:
Wherein, xi ∈ sample training collections X=(x1, x2 ..., xN);
2) scatter matrix S is found out:
Find out the eigenvalue λ i and corresponding feature vector ei of scatter matrix, wherein ei is principal component, by characteristic value from greatly to It is small to be arranged in order λ 1, λ 2 ...;
P is taken out to be worth, λ 1, λ 2 ..., λ p determine face space E=(e1, e2 ..., eP), this face spatially, training sample X In, the point that each element projects to the space is obtained by following formula:
X'i=Etxi, t=1,2 ..., N;
What is obtained by above formula is p dimensional vectors by former vector after PCA dimensionality reductions;
Facial image characteristic vector pickup is based on sparse representation, and plurality of human faces identification is carried out using SRC face recognition algorithms;Including:
The recognition result of each face of present frame is obtained to present frame Face datection and by coordinate sequence;According to each individual of present frame The recognition result of face calculates corresponding each face respectively adjacent n frames recognition result;The identity for counting each face, by being more than half The Unified Identity of number n/2 determines the final identity of target;
Wherein, calculate picture and face database to be identified it is of all categories between reconstruction error { r1, r2 ... rn }, r1<r2<……<Rn, By obtained similarity value according toRule determine final recognition result;Wherein T1 is Rate value, T1=0.6.
3. multi-application computer as described in claim 1, which is characterized in that the method for the encryption/decryption module includes:
Public key generates:Public key is made of finite field k and its addition and multiplication structure and n secondary multinomials;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], a point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
This process of decrypting process is encrypted inverse process, and it is the private key chosen to decrypt secret key used;
The public key generation includes the following steps:
Choose finite field k and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
The private key generation includes the following steps:
Choose mappingThat is two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt determines;
Choose two reversible affine transformation L1And L2And theirs is inverse;
The ciphering process includes the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, encrypted ciphertext is:
Z '=(z1′,…,zn'), wherein
The decrypting process includes the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, it calculates first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then verification Z (y1″,…,y2l")=μ abandons this class value if invalid;Otherwise it carries out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase verification equation.
4. multi-application computer as described in claim 1, which is characterized in that
The method of estimation of the estimating carrier frequencies module of signal includes under noise:To the signal containing Stable distritation noise of reception Seek cycle covariant function;Receive signal cycle covariant function include:
(1) signal contains the mpsk signal for obeying S α S partition noises, is expressed as:
Wherein E is the mean power of signal,M=2k, m=1,2 ... M, Q (t) indicates that rectangular pulse waveform, T indicate symbol period, fcIndicate carrier frequency, φ0Initial phase is indicated, if w (t) is to obey The non-Gaussian noise of S α S distribution, then its autocovariance function be defined as:
Wherein (x (t- τ))<p-1>=| x (t- τ) |p-2X* (t- τ), γx(t-τ)It is the coefficient of dispersion of x (t), then the cycle of x (t) is total Change is defined as:
Wherein ε is known as cycle frequency, and T is a code-element period;
(2) the cycle covariant function of the docking collection of letters number carries out Fourier transformation, is expressed as:
It recycles co-variation spectrum and is derived as:
As M >=4,Place,
As M=2,
Wherein Q (f) is the Fourier transformation of q (t), and
(3) carrier frequency estimation is realized in the section that cycle frequency ε=0Hz in co-variation spectrum is recycled by extraction, is carried out as follows:
The envelope of the cycle co-variation spectrum on n=0, that is, ε=sections 0Hz be:
As f=± fcWhen, envelope obtains maximum value;
(4) peak value for searching for the positive and negative semiaxis in the section, finds the corresponding positive negative frequency value of the peak value, and after taking absolute value The estimated value averaged as carrier frequency.
5. the program of multi-application computer described in a kind of operation Claims 1 to 4 any one.
6. a kind of computer readable storage medium, including instruction, when run on a computer so that computer is executed as weighed Profit requires the program described in 5.
7. a kind of office equipment cabinet of storage multi-application computer described in claim 1, which is characterized in that the office Equipment cabinet includes:
Temperature detecting module, humidity detecting module, detection module in kind, central control module, card enable identification module, illumination mould Block, alarm module, display module;
Temperature detecting module is connect with central control module, for detecting storage in-cabinet temperature by temperature sensor;
Humidity detecting module is connect with central control module, for detecting storage cabinet humidity by humidity sensor;
Detection module in kind, connect with central control module, whether has presence in kind in cabinet for detecting;
Central control module enables identification module, illumination mould with temperature detecting module, humidity detecting module, detection module in kind, card Block, alarm module, display module connection, for being transmitted to temperature detecting module, humidity detecting module, detection module in kind Data information carry out processing analysis;
Card enables identification module, is connect with central control module, is enabled for identification with the unlocking card for opening electric control lock;
Lighting module is connect with central control module, and illumination is provided for passing through headlamp;
Alarm module is connect with central control module, is alarmed for passing through alarm;
Display module is connect with central control module, the detection information for showing cabinet.
8. office equipment cabinet as claimed in claim 7, which is characterized in that it is IC card and/or access people that the unlocking card, which enables, Fingerprint;It is a card reader that can recognize that the IC card and/or recognizable access people's fingerprint that the card, which enables identification module, Fingerprint Identification Unit;
The display module is human-computer interaction touch screen;
The control core of the central control module is microcontroller.
CN201810211213.7A 2018-03-14 2018-03-14 A kind of multi-application computer and office equipment cabinet Pending CN108491706A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810211213.7A CN108491706A (en) 2018-03-14 2018-03-14 A kind of multi-application computer and office equipment cabinet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810211213.7A CN108491706A (en) 2018-03-14 2018-03-14 A kind of multi-application computer and office equipment cabinet

Publications (1)

Publication Number Publication Date
CN108491706A true CN108491706A (en) 2018-09-04

Family

ID=63339424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810211213.7A Pending CN108491706A (en) 2018-03-14 2018-03-14 A kind of multi-application computer and office equipment cabinet

Country Status (1)

Country Link
CN (1) CN108491706A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202820312U (en) * 2012-10-12 2013-03-27 厦门市美亚柏科信息股份有限公司 Real- time-monitoring locker and management system of hard disk storing material evidence
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN104038454A (en) * 2014-06-20 2014-09-10 西安电子科技大学 Method for estimating carrier frequency of PSK (phase shift keying) signal in Alpha-stable distribution noise
CN104157057A (en) * 2014-08-11 2014-11-19 浙江力石科技股份有限公司 Kylin operation system-based bullet egress and ingress automated management system
CN204440558U (en) * 2015-02-25 2015-07-01 成都天宁通智能科技有限公司 Intelligent fingerprint management cabinet
CN105652759A (en) * 2016-03-24 2016-06-08 国网辽宁省电力有限公司电力科学研究院 Cabinet capable of automatically completing experimental work measuring instrument handover without human intervene
CN105708236A (en) * 2016-03-28 2016-06-29 时长永 Intelligent storage cabinet
CN106127886A (en) * 2016-06-16 2016-11-16 潜山共同创网络科技有限公司 A kind of computer-controlled intelligence preserver
CN107248762A (en) * 2017-06-15 2017-10-13 武汉洁美雅科技有限公司 A kind of Intelligent lithium battery electric patrol car control system
CN107369263A (en) * 2017-07-15 2017-11-21 西南石油大学 A kind of recognition of face locker system based on cloud computing platform
CN107487398A (en) * 2017-07-31 2017-12-19 满俊恺 A kind of new bicycle safety-protection system
CN107507316A (en) * 2017-09-15 2017-12-22 深圳市先施科技股份有限公司 A kind of implementation method, the device and system of automatic identification intelligence safe cabinet
CN107545265A (en) * 2017-07-17 2018-01-05 浙江智神数码科技有限公司 A kind of intelligent vehicle license plate recognition system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202820312U (en) * 2012-10-12 2013-03-27 厦门市美亚柏科信息股份有限公司 Real- time-monitoring locker and management system of hard disk storing material evidence
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN104038454A (en) * 2014-06-20 2014-09-10 西安电子科技大学 Method for estimating carrier frequency of PSK (phase shift keying) signal in Alpha-stable distribution noise
CN104157057A (en) * 2014-08-11 2014-11-19 浙江力石科技股份有限公司 Kylin operation system-based bullet egress and ingress automated management system
CN204440558U (en) * 2015-02-25 2015-07-01 成都天宁通智能科技有限公司 Intelligent fingerprint management cabinet
CN105652759A (en) * 2016-03-24 2016-06-08 国网辽宁省电力有限公司电力科学研究院 Cabinet capable of automatically completing experimental work measuring instrument handover without human intervene
CN105708236A (en) * 2016-03-28 2016-06-29 时长永 Intelligent storage cabinet
CN106127886A (en) * 2016-06-16 2016-11-16 潜山共同创网络科技有限公司 A kind of computer-controlled intelligence preserver
CN107248762A (en) * 2017-06-15 2017-10-13 武汉洁美雅科技有限公司 A kind of Intelligent lithium battery electric patrol car control system
CN107369263A (en) * 2017-07-15 2017-11-21 西南石油大学 A kind of recognition of face locker system based on cloud computing platform
CN107545265A (en) * 2017-07-17 2018-01-05 浙江智神数码科技有限公司 A kind of intelligent vehicle license plate recognition system
CN107487398A (en) * 2017-07-31 2017-12-19 满俊恺 A kind of new bicycle safety-protection system
CN107507316A (en) * 2017-09-15 2017-12-22 深圳市先施科技股份有限公司 A kind of implementation method, the device and system of automatic identification intelligence safe cabinet

Similar Documents

Publication Publication Date Title
CN103595538B (en) Identity verification method based on mobile phone acceleration sensor
CN102664036A (en) Fingerprint encryption intelligent digital U disk
Joshi et al. A comprehensive security analysis of match-in-database fingerprint biometric system
Militello et al. Embedded access points for trusted data and resources access in HPC systems
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Verma et al. A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment.
CN108109242A (en) A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock
Yusuf et al. A survey of biometric approaches of authentication
Gyamfi et al. Enhancing the security features of automated teller machines (ATMs): A Ghanaian perspective
Belguechi et al. An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates
Anveshini et al. Pattern recognition based fingerprint authentication for ATM system
Mohammed Use of biometrics to tackle ATM fraud
El-Abed et al. Towards the security evaluation of biometric authentication systems
CN108491706A (en) A kind of multi-application computer and office equipment cabinet
CN103456340A (en) Safe movable hard disk and application method thereof
Bhargav-Spantzel et al. Biometrics-based identifiers for digital identity management
Belguechi et al. Texture based fingerprint biohashing: Attacks and robustness
Kovalchuk et al. A practical proposal for ensuring the provenance of hardware devices and their safe operation
Jain et al. Security of biometric systems
Conti et al. Biometric sensors rapid prototyping on field-programmable gate arrays
Sarkar et al. Survey on Biometric applications for implementation of authentication in smart Governance
Chizari et al. Security issues in ATM smart card technology
Kiran et al. Implementation of 3-Level Security System Using Image Grid Based Authentication System
Cimato et al. Biometrics and privacy
Chergui et al. Can a chaos system provide secure communication over insecure networks?—Online automatic teller machine services as a case study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904