CN108537030A - Management method, device and the electronic equipment of identity-based identification - Google Patents
Management method, device and the electronic equipment of identity-based identification Download PDFInfo
- Publication number
- CN108537030A CN108537030A CN201810352341.3A CN201810352341A CN108537030A CN 108537030 A CN108537030 A CN 108537030A CN 201810352341 A CN201810352341 A CN 201810352341A CN 108537030 A CN108537030 A CN 108537030A
- Authority
- CN
- China
- Prior art keywords
- information
- identity
- user
- manager
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides management method, device and the electronic equipments of a kind of identification of identity-based, are related to data storage and secrecy technology field, and this method is applied to off-line type testimony of a witness verification terminal, including:When receiving the first access request of the first user, the identity identification information of the first user is obtained;Identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;Whether identity identification information and the pre-stored manager's identity information for verifying the first user are consistent;If consistent, the corresponding management function of the first access request is opened.Management method, device and the electronic equipment of identity-based identification provided in an embodiment of the present invention, only corresponding management function is opened in the case where verifying unanimous circumstances, the sensitive data in testimony of a witness verification terminal can be accessed to avoid unauthorized user, improve privacy degrees and the safety of data storage and management.
Description
Technical field
The present invention relates to data storage and secrecy technology fields, more particularly, to a kind of manager of identity-based identification
Method, device and electronic equipment.
Background technology
Off-line type testimony of a witness verifying system collection face real time image collection, ID card information acquisition, the testimony of a witness 1:1 identification, black and white
List 1:The functions such as N identifications are widely used in the industries such as business, security protection in one, can be applied to attendance, gate inhibition, real name are recognized
The multiple fields such as card, safety check.Such as it is exactly that one of which is typically applied that the testimony of a witness, which veritifies all-in-one machine,.
Compared with online testimony of a witness verifying system, off-line type testimony of a witness verifying system is due to preposition matching identification algorithm, i.e.,
Make that in the case where being detached from network matching identification task can also be completed.In the case where being detached from network, for the original of comparison
Data and comparison result data need to be temporarily stored on the headend equipment of testimony of a witness verifying system, can be by number after restoring network connection
According to being synchronized to background management system or manual synchronization to background management system.The data storage method of this forward type is just
The sensibility and confidentiality demand of initial data and comparing result data bring risk.
In view of the above-mentioned problems, not proposing effective solution also.
Invention content
In view of this, the purpose of the present invention is to provide management method, device and the electronics of a kind of identification of identity-based to set
It is standby, privacy degrees and the safety of data storage and management can be improved.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of management method of identity-based identification, it is applied to off-line type people
Verification terminal is demonstrate,proved, including:When receiving the first access request of the first user, the identity identification information of the user is obtained;
The identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;Verification institute
Whether identity identification information and the pre-stored manager's identity information for stating the first user are consistent;If consistent, described in unlatching
The corresponding management function of first access request.
Further, an embodiment of the present invention provides the first possible embodiments of first aspect, wherein the testimony of a witness
The input interface of verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or microphone;The method is also
Including:There is provided the input interface corresponding access control to the first user, to receive the access request of first user.
Further, an embodiment of the present invention provides second of possible embodiments of first aspect, wherein the testimony of a witness
Verification terminal includes photographic device and/or voice input device;The identity identification information for obtaining first user includes:Pass through
The photographic device acquires image information, bone information or the gait information of first user;Described image information include with
It is at least one lower:Facial image, fingerprint image and iris image;And/or acquire described first by the voice input device
The voice messaging of user.
Further, an embodiment of the present invention provides the third possible embodiments of first aspect, wherein described in verification
The identity identification information of first user and pre-stored first manager identity information whether include unanimously:Pass through target nerve
Network carries out feature extraction to the identity identification information, obtains identification characteristic information;Compare the identification feature
Whether information and pre-stored manager's identity information are consistent.
Further, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, wherein described in verification
Identity identification information and pre-stored manager's identity information whether include unanimously:Verify the identity identification information in advance
Whether the super keepe identity information of storage is consistent;If so, opening the corresponding management function of the access request and including:It is aobvious
Show the corresponding managing authority information interface of the super keepe and/or be managed function voice prompt, so that described first
User is managed permission modification.
Further, an embodiment of the present invention provides the 5th kind of possible embodiments of first aspect, wherein when receiving
When the bottom library management request of the first user, show that the corresponding managing authority information interface of the super keepe includes:Display institute
State super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletion common management administrator
The management options of authority information.
Further, an embodiment of the present invention provides the 7th kind of possible embodiments of first aspect, wherein described in verification
Identity identification information and pre-stored manager's identity information whether include unanimously:Verify the identity identification information in advance
Whether common management administrator's identity information of storage is consistent;If so, opening the corresponding management function of the access request and including:It is aobvious
Show that the corresponding testimony of a witness of the access request veritifies data management interface;The testimony of a witness veritifies data management interface and includes newly-increased, becomes
The management options of data are more veritified with the deletion testimony of a witness.
Further, an embodiment of the present invention provides the 8th kind of possible embodiments of first aspect, wherein when receiving
When the second access request of second user, the identity identification information of the second user is obtained;Verify whether exist and described the
Second consistent manager's identity information of the identity identification information of two users;If it does, determining the second manager identity
The administration authority of information;Open the corresponding management function of the administration authority.
Further, an embodiment of the present invention provides the 9th kind of possible embodiment of first aspect, further include:If institute
The identity identification information for stating the first user is consistent with the first manager identity information, searches the identity identification information and corresponds to
Administration authority;Opening the corresponding management function of the access request includes:Open the corresponding management function of the administration authority.
Further, an embodiment of the present invention provides the tenth kind of possible embodiments of first aspect, wherein described in determining
The administration authority of second manager's identity information includes:Determine the matched management of the identity identification information of the second user
Manager's grade belonging to person's identity information;Search the corresponding administration authority of manager's grade, and by the administrative power
Limit is as the corresponding administration authority of the identity identification information.
Further, an embodiment of the present invention provides a kind of the tenth possible embodiments of first aspect, wherein opens institute
Stating the corresponding management function of administration authority includes:Show the corresponding managing authority information interface of the administration authority and/or progress
Management function voice prompt, so that the user is managed permission modification.
Further, an embodiment of the present invention provides the 12nd kind of possible embodiments of first aspect, wherein is opening
After the corresponding management function of the administration authority, the method further includes:Receive third permission modification information input by user
And it stores;The permission modification information includes:Identification modification information and the corresponding management of the identification modification information
Permission.
Further, an embodiment of the present invention provides the 13rd kind of possible embodiments of first aspect, wherein receives the
Three permission modification informations input by user and store include:When the identification modification information is image information, pass through mesh
Mark the feature of neural network extraction described image information;The feature of described image information is stored, and deletes described image information.
Second aspect, the embodiment of the present invention also provide a kind of managing device of identity-based identification, are applied to off-line type people
Verification terminal is demonstrate,proved, including:Identity identification information acquisition module, for when receiving the access request of user, obtaining the use
The identity identification information at family;The identity identification information includes at least one of:Image information, bone information, gait information
And voice messaging;Authentication module, for verify the identity identification information and pre-stored manager's identity information whether one
It causes;If opening module opens the corresponding management of the access request under for verifying unanimous circumstances in the authentication module
Function.
The third aspect an embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in described
On memory and the computer program that can run on the processor, the processor are realized when executing the computer program
The step of first aspect any one of them method.
Fourth aspect, an embodiment of the present invention provides a kind of the computer-readable of program code that can perform with processor
The step of medium, said program code makes the processor execute first aspect any one of them method.
An embodiment of the present invention provides management method, device and the electronic equipments of a kind of identification of identity-based, when receiving
When the access request of user, whether identity identification information and the pre-stored manager's identity information for verifying the user are consistent,
And the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out information management, from
And the sensitive data in testimony of a witness verification terminal can be accessed to avoid unauthorized user, the secrecy of data storage and management can be improved
Degree and safety.
Other feature and advantage of the disclosure will illustrate in the following description, alternatively, Partial Feature and advantage can be with
Deduce from specification or unambiguously determine, or by implement the disclosure above-mentioned technology it can be learnt that.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, other drawings may also be obtained based on these drawings.
Fig. 1 shows a kind of structural schematic diagram for electronic system that the embodiment of the present invention is provided;
Fig. 2 shows a kind of management method flow charts for identity-based identification that the embodiment of the present invention is provided;
Fig. 3 shows a kind of flow chart of the management method for common management administrator that the embodiment of the present invention is provided;
Fig. 4 shows a kind of structure diagram of the managing device for identity-based identification that the embodiment of the present invention is provided;
Fig. 5 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided;
Fig. 6 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided;
Fig. 7 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, shall fall within the protection scope of the present invention.
Online testimony of a witness verifying system, needs to rely on and is stored in the comparison recognizer in high in the clouds or server end and original
Database, when being authenticated veritification, headend equipment needs the data to be verified currently acquired being uploaded to the high in the clouds or the clothes
It is engaged in device end, the headend equipment, headend equipment root being back to after the high in the clouds or the server end are compared, then by comparing result
Respective operations are carried out according to the comparing result, such as is turned on and off corresponding permission, permission or refusal and passes through.Therefore it needs to protect
The real-time communication for holding the headend equipment and the high in the clouds or the server end can not be used if communication cannot keep and is somebody's turn to do
Wire type testimony of a witness verifying system.
Off-line type testimony of a witness verifying system, can be preposition by above-mentioned comparison recognizer and database, i.e., above-mentioned comparison identification
Algorithm and raw data base are stored in headend equipment, need not upload data to be verified in real time to high in the clouds or server end,
There is no need to receive the comparing result of return, it can be operated in and be detached from the state of network.The off-line type testimony of a witness veritifies the decorum de-
Matching identification task can also be completed in the case of off-network network, obtained comparing result is also stored in the headend equipment.Extensive
Comparing result can be synchronized to background management system or manual synchronization to background management system after multiple network connection.
However the data storage method of this forward type is just the sensibility and secrecy of initial data and comparing result data
Property demand brings risk, and disabled user is likely to be obtained or distorts the initial data or comparing result data.It is asked to improve this
Phase can be used in topic, a kind of management method, device and the electronic equipment of identity-based identification provided in an embodiment of the present invention, the technology
The software and hardware answered is realized, off-line type testimony of a witness verification terminal is can be applied to.The off-line type testimony of a witness verification terminal can be attendance
Verification terminal, gate inhibition's verification terminal, real-name authentication verification terminal, the testimony of a witness veritify all-in-one machine or safety check verification terminal etc..It is right below
The embodiment of the present invention describes in detail.
Embodiment one:
First, describe referring to Fig.1 for realizing the embodiment of the present invention identity-based identify management method, device and
The example electronic system 100 of electronic equipment.
A kind of structural schematic diagram of electronic system as shown in Figure 1, electronic system 100 include one or more processing equipments
102, one or more storage devices 104.Optionally, electronic system 100 shown in Fig. 1 can also include input unit 106, output
Device 108 and identity identification information harvester 110, the connection that these components pass through bus system 112 and/or other forms
Mechanism (not shown) interconnection.It should be noted that the component and structure of electronic system 100 shown in FIG. 1 are only exemplary, rather than limit
Property processed, as needed, the electronic system can also have other assemblies and structure.
The processing equipment 102 can be gateway, or intelligent terminal, or include central processing unit
(CPU), the processing of image processing unit (GPU) or the other forms with data-handling capacity and/or instruction execution capability
The equipment of unit can handle the data of other components in the electronic system 100, can also control the electronics
Other components in system 100 are to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can
To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy
The property lost memory is such as may include random access memory (RAM) and/or cache memory (cache).It is described non-
Volatile memory is such as may include read-only memory (ROM), hard disk, flash memory.In the computer readable storage medium
On can store one or more computer program instructions, processing equipment 102 can run described program instruction, to realize hereafter
The client functionality (realized by processing equipment) in the embodiment of the present invention and/or other desired functions.Institute
Various application programs and various data can also be stored by stating in computer readable storage medium, such as the application program uses
And/or the various data etc. generated.
The input unit 106 can be the device that user is used for inputting instruction, and may include keyboard, mouse, wheat
One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and
And may include one or more of display, loud speaker etc..
The identity identification information harvester 110 can shoot the desired image of user (such as photo, video etc.), and
And captured image is stored in the storage device 104 so that other components use.Illustratively, which believes
It can be image collecting device or fingerprint sensor to cease harvester 110.
Illustratively, the management method for realizing identity-based according to the ... of the embodiment of the present invention identification, apparatus and system
Example electronic system in each device can be integrally disposed, can also scattering device, such as by processing equipment 102, storage fill
It sets 104, input unit 106 and output device 108 is integrally disposed in one, and identity identification information harvester 110 is detached
Setting.
For ease of understanding, the application example of the electronic system of the present embodiment is described further below.The electronic system
It can be with installation settings in the various places for needing veritification identity.
Illustratively, the management method for realizing identity-based according to the ... of the embodiment of the present invention identification, the example of device
Electronic equipment may be implemented as such as off-line type testimony of a witness verification terminal can be attendance verification terminal, gate inhibition's verification terminal,
Real-name authentication verification terminal, the testimony of a witness veritify all-in-one machine or safety check verification terminal etc..
Embodiment two:
A kind of management method of identity-based identification is present embodiments provided, this method is held by off-line type testimony of a witness verification terminal
Row.
According to embodiments of the present invention, the embodiment for providing a kind of management method of identity-based identification needs to illustrate
It is that step shown in the flowchart of the accompanying drawings can execute in the computer system of such as a group of computer-executable instructions,
Also, although logical order is shown in flow charts, and it in some cases, can be to be executed different from sequence herein
Shown or described step.
Fig. 2 is a kind of flow chart of the management method of identity-based identification according to the ... of the embodiment of the present invention, as shown in Fig. 2,
This method comprises the following steps:
Step S202 obtains the identity identification information of the first user when receiving the first access request of the first user.
When off-line type testimony of a witness verification terminal receives the request of user's access sensitive data, need to obtain the above-mentioned of user
Identity identification information.The sensitive data includes initial data and comparing result data, can also include administration authority data.
In embodiments of the present invention, testimony of a witness verification terminal can receive above-mentioned access request in several ways, accordingly,
The input interface of testimony of a witness verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or microphone.Testimony of a witness core
Test terminal provides above-mentioned input interface corresponding access control to the first user, to receive the access request of first user.Example
As user can ask to access by clicking corresponding button on the touchscreen, or point beating keyboard (including entity button etc.)
It asks to access, handwriting input instruction on the jotting surface asks to access, or passes through mouse and click corresponding button on interface
To ask to access, or phonetic order sent out to ask to access by Mike's wind direction terminal.
Above-mentioned identity identification information may include at least one of:Image information, bone information, gait information and voice
Information.In one embodiment, the image information of user can be acquired by shooting style by camera, camera etc..
Step S204, whether the identity identification information and pre-stored first manager identity information of the first user of verification
Unanimously.If so, executing step S206;If not, executing step S210.
Wherein, it is previously stored with manager's identity information in testimony of a witness verification terminal, which corresponds to not
Same administration authority.If the identity identification information of the first user obtained and above-mentioned pre-stored manager's identity information one
It causes, then shows that first user has corresponding administration authority, above-mentioned sensitive data can be operated.If inconsistent,
Then show first user without legal administration authority, refusal is needed to open the corresponding management function of above-mentioned administration authority at this time.
The initial data stored in testimony of a witness verification terminal, or be bottom library, it can be extracted with target nerve network
The form storage of feature, therefore before whether verification identity identification information and pre-stored manager's identity information consistent,
Feature extraction is carried out to identity identification information firstly the need of by target nerve network, obtains identification characteristic information;Then
Compare the identification characteristic information and whether pre-stored manager's identity information is consistent.
Step S206 opens the corresponding management function of above-mentioned first access request.
After verification is consistent, testimony of a witness verification terminal can open the corresponding management function of above-mentioned first access request, such as
By way of showing the corresponding administration interface of access request or it can be managed the mode of function voice prompt, it can also
The two carries out jointly, can be changed into row information thereby using family.For example, can be shown in the display device of testimony of a witness verification terminal
The administration interface for showing common management administrator increases for user, deletes or changes common management administrator's account and corresponding permission newly.Again
For example, " common tube can please be input by the sound-producing device outgoing management function voice prompt of testimony of a witness verification terminal, such as prompt
Reason person's information ", " image information that common management administrator please be input ", " authority information that common management administrator please be select " etc., Yong Huke
To be managed permission modification according to voice prompt.
Step S208, refusal open the corresponding management function of above-mentioned first access request.
If verification identity identification information and pre-stored manager's identity information it is inconsistent, show the user without
Permission needed for the access request, the corresponding management function of the above-mentioned access request of refusal unlatching at this time.
The management method of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies eventually
End, when receiving the access request of user, the identity identification information and pre-stored manager's identity of verifying the user are believed
Whether breath is consistent, and the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out
Information management can improve data storage so as to avoid unauthorized user from accessing the sensitive data in testimony of a witness verification terminal
Privacy degrees with management and safety.
In embodiments of the present invention, the mode for obtaining the identity identification information of the first user can be according to identity identification information
Type is different, is executed according to different acquisition modes, as follows:
(1) image information, bone information or the gait information of the first user are acquired by photographic device.
The image information refers to the face of user or the image of other body parts, which can be video flowing to be identified
In each picture frame, can also be the images to be recognized of picture format, such as may include at least one of:Face figure
Picture, fingerprint image and iris image.Wherein fingerprint image can also be obtained by fingerprint sensor, which refers to can be with
Realize the device of fingerprint automatic collection.Wherein, the video extraction that bone information or gait information can be acquired by photographic device
It obtains.
(2) voice messaging of the first user is acquired by voice input device.Wherein, voice input device can be Mike
The input devices such as wind.
In some embodiments, the facial image that user is obtained in S202, since face image can be noninductive in user
The facial image known or acquired in the case of being cooperated on one's own initiative without user, therefore obtain user can be conducive to promote making for user
With experience.
In the specific implementation, the present embodiment gives verification identity identification information in a kind of step S204 and prestores
The whether consistent specific implementation mode of manager's identity information, may include steps of:
(1) identity identification information to be identified is compared with manager's identity information of bottom library storage, obtains waiting knowing
The similarity of other identity identification information and manager's identity information in bottom library.For example, the identity identification information to be identified is
Image, the essence that image compares are the comparisons of image feature value, also the characteristics extraction of image are out compared, total library
The image of middle storage can be image feature value, and similarity is determined by characteristic value comparison result.
(2) judge whether the peak of similarity is higher than predetermined threshold value.If so, determining that the peak of similarity is corresponding
Object is consistent.
Predetermined threshold value can such as set predetermined threshold value as 85%, if the peak of similarity reaches with sets itself
85%, it is determined that preferred object corresponding with the peak of the similarity is consistent.
It is illustrated so that access request is bottom library management request as an example below.Above-mentioned verification identity identification information with deposit in advance
The step whether manager's identity information of storage is consistent can execute according to the following steps:
(1) it verifies identity identification information and whether pre-stored super keepe identity information is consistent;
(2) if consistent, the corresponding management function of above-mentioned unlatching access request includes:Show the corresponding power of super keepe
Limit information administration interface and/or it is managed function voice prompt, so that the first user is managed permission modification.Wherein, when
When receiving the bottom library management request of user, the corresponding managing authority information interface of display super keepe includes following two shapes
Formula:Show super keepe corresponding bottom library management interface;The bottom library management interface includes newly-increased, change and deletion common management
The management options of member's authority information.
When access request is that bottom library management is asked, method provided in this embodiment can also include:Receive user's input
Common management administrator's permission modification information and store;Common management administrator's permission modification information includes:Common management administrator's identity is known
Other modification information administration authority corresponding with common management administrator's identification modification information.
It is below to be illustrated for the testimony of a witness veritifies data management request by access request.Above-mentioned verification identity identification information
Whether consistent step, can execute according to the following steps with pre-stored manager's identity information:
(1) it verifies identity identification information and whether pre-stored common management administrator's identity information is consistent;
(2) if consistent, opening the corresponding management function of the access request includes:Show the corresponding testimony of a witness of the access request
Veritify data management interface;It includes the management for increasing, changing and deleting the testimony of a witness newly and veritify data that the testimony of a witness, which veritifies data management interface,
Option.
In some embodiments, in the second access request for receiving second user, the above method can also walk below
It is rapid to execute:
(1) identity identification information of second user is obtained.The second user and above-mentioned first user can be same user
It may be different user.
(2) verify whether there is the second manager identity information consistent with the identity identification information of second user.
(3) if it does, determining the administration authority of second manager's identity information.After verification is consistent, testimony of a witness verification terminal
Before the response operation for executing the user access request, the corresponding management of the identity identification information of second user can also be first determined
Permission may comprise steps of:
Search the corresponding administration authority of identity identification information of second user.It can be executed by following steps:Determine body
Manager's grade belonging to part matched manager's identity information of identification information.Such as manager's grade includes:Super management
Member and common management administrator.One or more administrator's identity information is may each comprise in each manager's grade, above-mentioned
After step verification is consistent, then manager's grade belonging to consistent manager's identity information can be first searched.
Wherein it is determined that manager's grade belonging to the matched manager's identity information of identity identification information specifically includes:
The determining and matched manager's identity information of identity identification information, and search manager's class information of manager's identity information;
Manager's grade is determined by manager's class information.In the present embodiment, management can be set in manager's identity information
Person's class letter indicates manager's grade belonging to manager's identity information by manager's class letter, such as can be with
Set manager's class letter to A, B, C, D or 1,2,3,4 etc., respectively the different manager's grade of corresponding height.
The corresponding administration authority of manager's grade is searched, and using administration authority as the corresponding administrative power of identity identification information
Limit.The corresponding administration authority of manager's grade, the i.e. management of active user can be found after determining manager's grade
Permission.The administration authority may include reading, change and reading, the change to manager's identity information to sensitive data
Deng.
(4) the corresponding management function of above-mentioned administration authority is opened.
In further embodiments, after being verified unanimously in S204, testimony of a witness verification terminal executes the user access request
Before response operation, the corresponding administration authority of identity identification information of the first user can also be first searched, i.e. the above method may be used also
To include the following steps:If the identity identification information of the first user is consistent with manager's identity information, identification letter is searched
Cease corresponding administration authority.Correspondingly, the corresponding management function of the first access request is opened in S206 includes:Open above-mentioned pipe
Manage the corresponding management function of permission.
In an optional embodiment, after opening the corresponding management function of administration authority, the above method further includes
The step of receiving the administration authority modification instruction of user and executing, can execute in the following manner:Receive third user input
Permission modification information and store.The permission modification information may include:Identification modification information and identification modification letter
Cease corresponding administration authority.Third user and the first user/second user can be same user, or different use
Family.
Above-mentioned administration authority can be reading, change and reading, the change to manager's identity information to sensitive data
More etc..For example, the administration authority of super keepe may include increasing, change and deleting common management administrator's account and its permission newly
Deng.
In view of storing privacy leakage caused by original image information (such as facial image) possibility in testimony of a witness verification terminal,
When above-mentioned identification modification information is image information, the feature of image information is extracted by target nerve network, is only stored
The features described above of image information, and delete the image information.By abandoning original image information, its corresponding spy is only stored
Sign, can further protect the privacy of user.
Embodiment three:
For the management method of the identity-based identification provided in embodiment one, present embodiments provide using this method
Specific example, by testimony of a witness verification terminal manage common management administrator permission for illustrate.Common tube shown in Figure 3
The flow chart of the right management method of reason person, as shown in figure 3, this method comprises the following steps:
The headend equipment of step S302, testimony of a witness verifying system receive the administrator bottom library management request that administrator submits.
In the present embodiment, it is carried out as facial image data instance using the original identity identification information stored in headend equipment
Explanation.Testimony of a witness verifying system can provide the super keepe account of acquiescence when delivering to customer, and super keepe has permission
Common management administrator bottom library is configured, can carry out including the operations such as newly-increased, change and deletion.It should be noted that super pipe
Reason person, which may be set to be, has permission configuration super keepe bottom library, i.e., super keepe, which has permission, carries out including newly-increased, change
With delete the operations such as super keepe.Super keepe and common management administrator have permission to access original in testimony of a witness verifying system
Face image data and comparison result.
The headend equipment that the testimony of a witness veritifies all-in-one machine obtains the face data of the administrator, and by its be stored in advance in bottom library
In the face data of super keepe be compared, to determine whether for super keepe.Here face data can be
Face image can also be the face feature extracted from face image.
Step S304, headend equipment verify whether the administrator is super keepe.If so, executing step S306;Such as
Fruit is no, terminates.
Headend equipment receives the bottom library management request that administrator submits, and verifies whether the administrator is super keepe,
Specific verification process may refer to content in above-described embodiment, and details are not described herein.If verification result is yes, bottom is shown
Library management interface;If it is not, then terminating flow.
Step S306, demonstration manager bottom library management interface.
Super keepe can configure common management administrator's permission in the administration interface, for example, increasing newly, changing and deleting and is general
The functions such as logical administrator's account.Super keepe can upload satisfactory human face photo in the library of bottom by single or batch
And each corresponding permission of human face photo realizes that headend equipment can be handled human face photo, extract human face photo
Feature, and be stored in headend equipment in the form of feature.For example, being handled to obtain to human face photo using neural network
Face characteristic.
The face characteristic of at least one common management administrator and corresponding operation are had recorded in administration authority modification at this time
Permission.Then, the human face photo that administration authority modification can also upload administrator abandons, can preferably conservative management person
Privacy.
The original face image data stored in headend equipment, can be the real-time face taken by camera,
The initial data such as certificate photograph, and the human face photo that is read out out of identity card by card reader.For example, peace can be passed through
Front camera or rear camera acquisition face real-time video on headend equipment or photo, can also be by before this
Set camera or rear camera acquisition certificate photograph.The card reader can be the device for having reading identity card information, example
Such as id card scanner.Above-mentioned original face image data and comparison record all default settings are private permission file, only
It can just be accessed after obtaining identification authentication in testimony of a witness verifying system.
If necessary to access above-mentioned original human face data or compare the information such as record, need to reflect by following flow
It weighs, can access, may comprise steps of after authentication:
First, the request input by user for accessing original human face data or comparison record is received;Then, acquisition should in real time
The human face photo of user;Then, to the human face photo person of being managed library 1:N comparison authentications, after being executed if the authentication is passed
Continuous step, if the authentication not denied access if;Finally, user is allowed to access.
The right management method of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies
Terminal, the configuration to administrator right and the access to the information such as original human face data or comparison record, are required to carry out
Authentication just allows user to carry out aforesaid operations only after the authentication is passed, can access testimony of a witness verification terminal to avoid unauthorized user
In sensitive data, can improve data storage and management privacy degrees and safety.
Example IV:
For the management method of the identity-based identification provided in embodiment two, an embodiment of the present invention provides a kind of bases
In the managing device of identification, it is applied to off-line type testimony of a witness verification terminal, a kind of identity-based shown in Figure 4 identification
The structure diagram of managing device, including:
First acquisition module 402, the identity for when receiving the access request of the first user, obtaining the first user are known
Other information;Identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;
First authentication module 404, for verify identity identification information and pre-stored manager's identity information whether one
It causes;
First opening module 406 opens access request pair under verifying unanimous circumstances in the second authentication module 404
The management function answered.
The managing device of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies eventually
End, when receiving the access request of user, the identity identification information and pre-stored manager's identity of verifying the user are believed
Whether breath is consistent, and the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out
Information management can improve data storage so as to avoid unauthorized user from accessing the sensitive data in testimony of a witness verification terminal
Privacy degrees with management and safety.
The input interface of testimony of a witness verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or Mike
Wind;The structure diagram of the managing device of another identity-based identification shown in Figure 5, on the basis of Fig. 4, above-mentioned apparatus
Further include:
Request receiving module 502 is used for providing input interface corresponding access control to the first user with receiving first
The access request at family.
Testimony of a witness verification terminal includes photographic device and/or voice input device;Above-mentioned first acquisition module 402, is additionally operable to
Image information, bone information or the gait information of the first user are acquired by photographic device;Image information include it is following at least it
One:Facial image, fingerprint image and iris image;And/or the voice messaging of the first user is acquired by voice input device.
Above-mentioned first authentication module 404, including feature extraction unit and comparing unit;Feature extraction unit, for passing through
Target nerve network carries out feature extraction to identity identification information, obtains identification characteristic information;Comparing unit, for comparing
Whether identification characteristic information and pre-stored manager's identity information are consistent.
Above-mentioned first authentication module 404 includes the first authentication unit, which is used for:Verify identification letter
Whether breath is consistent with pre-stored super keepe identity information;Opening module 406 is additionally operable to:Show that super keepe corresponds to
Managing authority information interface and/or be managed function voice prompt so that the first user be managed permission modification.
First authentication unit is used for when receiving the bottom library management request of the first user, and opening module 406 is additionally operable to:It is aobvious
Show super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletion common management administrator's permission
The management options of information.
Above-mentioned first authentication module 404 includes the second authentication unit, which is used for:Verify identification letter
Whether breath is consistent with pre-stored common management administrator's identity information;Opening module 406 is additionally operable to:It is corresponding to open access request
Management function includes:Show that the corresponding testimony of a witness of access request veritifies data management interface;The testimony of a witness veritifies data management interface
Newly-increased, change and the management options for deleting testimony of a witness veritification data.
The structure diagram of the managing device of another identity-based identification shown in Figure 6, above-mentioned apparatus include:Second
Receiving module 602, for when receiving the second access request of second user, obtaining the identity identification information of second user;
Second authentication module 604, for verifying whether there is the second manager identity consistent with the identity identification information of second user
Information;Determining module 606 determines second manager's identity information under verifying unanimous circumstances in the second authentication module 604
Administration authority;Second opening module 608, for opening the corresponding management function of administration authority.
Above-mentioned determining module 606 is additionally operable to:Determine the matched manager's identity information of the identity identification information of second user
Belonging manager's grade;The corresponding administration authority of manager's grade is searched, and using administration authority as identity identification information
Corresponding administration authority.
Above-mentioned second opening module 608, is additionally operable to:The corresponding managing authority information interface of display management permission and/or into
Row management function voice prompt, so that user is managed permission modification.
The structure diagram of the managing device of another identity-based identification shown in Figure 7, on the basis of Fig. 4, on
It further includes permission modification information receiving module 702 to state device, is used for:
It receives third permission modification information input by user and stores;Permission modification information includes:Identification modification letter
Breath administration authority corresponding with identification modification information.
Permission modification information receiving module 702, is additionally operable to:When identification modification information is image information, pass through mesh
Mark the feature of neural network extraction image information;The feature of image information is stored, and deletes image information.
The technique effect of the device that the present embodiment is provided, realization principle and generation is identical with previous embodiment, for letter
It describes, device embodiment part does not refer to place, can refer to corresponding contents in preceding method embodiment.
The embodiment of the present invention additionally provides a kind of electronic equipment, including memory and processor, and being stored in memory can
The computer program run on a processor, processor realize the step for the method that above-described embodiment provides when executing computer program
Suddenly.Optionally, which can also include image collecting device or fingerprint sensor.
It is apparent to those skilled in the art that for convenience and simplicity of description, the electronics of foregoing description
The specific work process of equipment, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Further, the present embodiment additionally provides a kind of computer readable storage medium, is deposited on computer readable storage medium
Computer program is contained, the step for the method that above-mentioned preceding method embodiment is provided is executed when computer program is run by processor
Suddenly.
The management method for the identity-based identification that the embodiment of the present invention is provided, the computer program of device and electronic equipment
Product, including the computer readable storage medium of program code is stored, the instruction that program code includes can be used for executing front
The method provided in embodiment of the method, specific implementation can be found in embodiment of the method, and details are not described herein.
Further, the present embodiment additionally provides a kind of computer program, the computer program can store beyond the clouds or this
On the storage medium on ground.It is carried when the computer program is run by computer or processor for executing in previous methods embodiment
The method of confession, and for realizing the corresponding module in the managing device of identity-based according to the ... of the embodiment of the present invention identification.Tool
Body, which is realized, can be found in embodiment of the method, and details are not described herein.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can be tied
Another equipment is closed or is desirably integrated into, or some features can be ignored or not executed.
Each device embodiment of the application can be with hardware realization, or to run on one or more processors
Software module realize, or realized with combination thereof.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) come realize some modules in device according to the ... of the embodiment of the present invention some
Or repertoire.The application is also implemented as some or all devices for executing method as described herein
Program (for example, computer program and computer program product).For example, the program of the application can be stored in computer-readable Jie
In matter, or can be with the form of one or more signal.Such signal can be downloaded from internet website and be obtained,
It either provides on carrier signal or provides in any other forms.
If the above-mentioned function of the application is realized in the form of SFU software functional unit and sells or make as independent product
Used time can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention essence
On in other words the part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Out, which is stored in a storage medium, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes all or part of each embodiment method of the present invention
Step.And storage medium above-mentioned includes:It is USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random
Access various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD
Matter.
In the application, term " first ", " second ", " third " are used for description purposes only, and should not be understood as instruction or dark
Show relative importance.
Finally it should be noted that:Above example, only specific implementation mode of the invention, to illustrate the skill of the present invention
Art scheme, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to the present invention into
Go detailed description, it will be understood by those of ordinary skill in the art that:Any one skilled in the art is at this
It invents in the technical scope disclosed, still can modify or can be thought easily to the technical solution recorded in previous embodiment
To variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make corresponding
The essence of technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection scope of the present invention
Within.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (16)
1. a kind of management method of identity-based identification, which is characterized in that it is applied to off-line type testimony of a witness verification terminal, including:
When receiving the first access request of the first user, the identity identification information of first user is obtained;The identity
Identification information includes at least one of:Image information, bone information, gait information and voice messaging;
Whether identity identification information and the pre-stored first manager identity information for verifying first user are consistent;
If consistent, the corresponding management function of first access request is opened.
2. according to the method described in claim 1, it is characterized in that, the input interface of the testimony of a witness verification terminal include with down toward
It is one of few:Touch screen, keyboard, handwriting pad, mouse or microphone;
The method further includes:There is provided the input interface corresponding access control to first user, to receive described the
The access request of one user.
3. method according to claim 1 or 2, which is characterized in that the testimony of a witness verification terminal include photographic device and/or
Voice input device;
The identity identification information for obtaining first user includes:
Image information, bone information or the gait information of first user are acquired by the photographic device;Described image is believed
Breath includes at least one of:Facial image, fingerprint image and iris image;And/or
The voice messaging of first user is acquired by the voice input device.
4. according to claim 1-3 any one of them methods, which is characterized in that the identification letter of verification first user
Breath with pre-stored first manager identity information whether include unanimously:
Feature extraction is carried out to the identity identification information of first user by target nerve network, obtains identification feature
Information;
Compare the identification characteristic information and whether the pre-stored first manager identity information is consistent.
5. according to claim 1-4 any one of them methods, which is characterized in that the identification letter of verification first user
Breath with pre-stored first manager identity information whether include unanimously:
Whether identity identification information and the pre-stored super keepe identity information for verifying first user are consistent;
If so, opening the corresponding management function of the access request and including:
It shows the corresponding managing authority information interface of the super keepe and/or is managed function voice prompt, so that institute
It states the first user and is managed permission modification.
6. according to the method described in claim 5, it is characterized in that, when receiving the bottom library management request of the first user, show
Show that the corresponding managing authority information interface of the super keepe includes:
Show the super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletes
The management options of common management administrator's authority information.
7. according to claim 1-4 any one of them methods, which is characterized in that the identification letter of verification first user
Breath with pre-stored first manager identity information whether include unanimously:
Whether identity identification information and the pre-stored common management administrator's identity information for verifying first user are consistent;
If so, opening the corresponding management function of the access request and including:
Show that the corresponding testimony of a witness of the access request veritifies data management interface;It includes new that the testimony of a witness, which veritifies data management interface,
Increase, the management options of change and deletion testimony of a witness veritification data.
8. according to claim 1-4 any one of them methods, which is characterized in that the method further includes:
When receiving the second access request of second user, the identity identification information of the second user is obtained;
Verify whether there is the second manager identity information consistent with the identity identification information of the second user;
If it does, determining the administration authority of the second manager identity information;
Open the corresponding management function of the administration authority.
9. according to claim 1-4 any one of them methods, which is characterized in that the method further includes:
If the identity identification information of first user is consistent with the first manager identity information, searches the identity and know
The corresponding administration authority of other information;
Opening the corresponding management function of the access request includes:
Open the corresponding management function of the administration authority.
10. according to the method described in claim 9, it is characterized in that, determining the administrative power of the second manager identity information
Limit includes:
Determine manager's grade belonging to the matched manager's identity information of the identity identification information of the second user;
The corresponding administration authority of manager's grade is searched, and is corresponded to the administration authority as the identity identification information
Administration authority.
11. according to the method described in claim 9, it is characterized in that, opening the corresponding management function of the administration authority and including:
It shows the corresponding managing authority information interface of the administration authority and/or is managed function voice prompt, so that described
User is managed permission modification.
12. according to claim 1-11 any one of them methods, which is characterized in that the method further includes:
It receives third permission modification information input by user and stores;The permission modification information includes:Identification modification letter
Breath administration authority corresponding with the identification modification information.
13. according to the method for claim 12, which is characterized in that receive third permission modification information input by user and deposit
Storage includes:
When the identification modification information is image information, the spy of described image information is extracted by target nerve network
Sign;
The feature of described image information is stored, and deletes described image information.
14. a kind of managing device of identity-based identification, which is characterized in that it is applied to off-line type testimony of a witness verification terminal, including:
Identity identification information acquisition module, for when receiving the access request of the first user, obtaining first user's
Identity identification information;The identity identification information includes at least one of:Image information, bone information, gait information and language
Message ceases;
Authentication module, it is whether consistent for verifying the identity identification information and pre-stored manager's identity information;
Opening module opens the corresponding management work(of the access request under verifying unanimous circumstances in the authentication module
Energy.
15. a kind of electronic equipment, including memory, processor and it is stored on the memory and can transports on the processor
Capable computer program, which is characterized in that the processor realizes the claims 1 to 13 when executing the computer program
Any one of described in method the step of.
16. a kind of computer-readable medium for the program code that can perform with processor, which is characterized in that said program code
The processor is set to execute any the method in the claims 1 to 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810352341.3A CN108537030A (en) | 2018-04-18 | 2018-04-18 | Management method, device and the electronic equipment of identity-based identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810352341.3A CN108537030A (en) | 2018-04-18 | 2018-04-18 | Management method, device and the electronic equipment of identity-based identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108537030A true CN108537030A (en) | 2018-09-14 |
Family
ID=63477714
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810352341.3A Pending CN108537030A (en) | 2018-04-18 | 2018-04-18 | Management method, device and the electronic equipment of identity-based identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537030A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286499A (en) * | 2018-09-21 | 2019-01-29 | 武汉大学 | A kind of authentication method on the scene of Behavior-based control feature |
CN109598208A (en) * | 2018-11-14 | 2019-04-09 | 阿里巴巴集团控股有限公司 | Portrait verification method and device |
CN110049490A (en) * | 2019-04-23 | 2019-07-23 | 广东小天才科技有限公司 | Safety protection method and device for wearable equipment, wearable equipment and medium |
CN110084143A (en) * | 2019-04-04 | 2019-08-02 | 广州大学 | A kind of emotional information guard method and system for recognition of face |
CN110084147A (en) * | 2019-04-04 | 2019-08-02 | 广州大学 | A kind of gender method for secret protection and system for recognition of face |
CN110378087A (en) * | 2019-07-24 | 2019-10-25 | 四川爱创科技有限公司 | Self-service terminal management method and system |
CN110851185A (en) * | 2019-11-08 | 2020-02-28 | 杭州宇泛智能科技有限公司 | Automatic configuration method and device for equipment, electronic equipment and storage medium |
CN110859613A (en) * | 2019-11-20 | 2020-03-06 | 深圳市健云互联科技有限公司 | Electrocardio data processing method and device, computer equipment and storage medium |
CN111523141A (en) * | 2020-04-23 | 2020-08-11 | 陆宝华 | Personal privacy protection-based identity identification and verification system |
CN112348974A (en) * | 2020-10-28 | 2021-02-09 | 四川瑞云信通科技有限公司 | PRT novel automatic ticket selling and checking method and system |
WO2021051941A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Information processing method and apparatus |
CN112773262A (en) * | 2019-11-08 | 2021-05-11 | 珠海市一微半导体有限公司 | Security control method based on sweeping robot, sweeping robot and chip |
CN114360114A (en) * | 2022-03-14 | 2022-04-15 | 云丁网络技术(北京)有限公司 | User authority management method and system |
CN114422236A (en) * | 2021-10-27 | 2022-04-29 | 珠海奔图电子有限公司 | Intelligent device access method and device and electronic device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150200948A1 (en) * | 2012-04-23 | 2015-07-16 | Google Inc. | Controlling Access by Web Applications to Resources on Servers |
CN105184133A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Authentication method and apparatus, and corresponding mobile terminal |
CN105488377A (en) * | 2015-12-15 | 2016-04-13 | 深圳先进技术研究院 | Production method and equipment of fake iris template and identity authentication method and equipment |
CN105913019A (en) * | 2016-04-11 | 2016-08-31 | 北京奇虎科技有限公司 | Iris identification method and terminal |
CN106446638A (en) * | 2016-10-14 | 2017-02-22 | 郑州云海信息技术有限公司 | Cloud computing operation system security access method and device |
CN106506442A (en) * | 2016-09-14 | 2017-03-15 | 上海百芝龙网络科技有限公司 | A kind of smart home multi-user identification and its Rights Management System |
-
2018
- 2018-04-18 CN CN201810352341.3A patent/CN108537030A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150200948A1 (en) * | 2012-04-23 | 2015-07-16 | Google Inc. | Controlling Access by Web Applications to Resources on Servers |
CN105184133A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Authentication method and apparatus, and corresponding mobile terminal |
CN105488377A (en) * | 2015-12-15 | 2016-04-13 | 深圳先进技术研究院 | Production method and equipment of fake iris template and identity authentication method and equipment |
CN105913019A (en) * | 2016-04-11 | 2016-08-31 | 北京奇虎科技有限公司 | Iris identification method and terminal |
CN106506442A (en) * | 2016-09-14 | 2017-03-15 | 上海百芝龙网络科技有限公司 | A kind of smart home multi-user identification and its Rights Management System |
CN106446638A (en) * | 2016-10-14 | 2017-02-22 | 郑州云海信息技术有限公司 | Cloud computing operation system security access method and device |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286499A (en) * | 2018-09-21 | 2019-01-29 | 武汉大学 | A kind of authentication method on the scene of Behavior-based control feature |
CN109286499B (en) * | 2018-09-21 | 2020-08-07 | 武汉大学 | Behavior feature-based presence authentication method |
CN109598208A (en) * | 2018-11-14 | 2019-04-09 | 阿里巴巴集团控股有限公司 | Portrait verification method and device |
CN110084147A (en) * | 2019-04-04 | 2019-08-02 | 广州大学 | A kind of gender method for secret protection and system for recognition of face |
CN110084143A (en) * | 2019-04-04 | 2019-08-02 | 广州大学 | A kind of emotional information guard method and system for recognition of face |
CN110049490A (en) * | 2019-04-23 | 2019-07-23 | 广东小天才科技有限公司 | Safety protection method and device for wearable equipment, wearable equipment and medium |
CN110378087A (en) * | 2019-07-24 | 2019-10-25 | 四川爱创科技有限公司 | Self-service terminal management method and system |
WO2021051941A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Information processing method and apparatus |
CN110851185A (en) * | 2019-11-08 | 2020-02-28 | 杭州宇泛智能科技有限公司 | Automatic configuration method and device for equipment, electronic equipment and storage medium |
CN112773262A (en) * | 2019-11-08 | 2021-05-11 | 珠海市一微半导体有限公司 | Security control method based on sweeping robot, sweeping robot and chip |
CN110859613B (en) * | 2019-11-20 | 2022-07-22 | 深圳市健云互联科技有限公司 | Electrocardiogram data processing device, computer device, and storage medium |
CN110859613A (en) * | 2019-11-20 | 2020-03-06 | 深圳市健云互联科技有限公司 | Electrocardio data processing method and device, computer equipment and storage medium |
CN111523141A (en) * | 2020-04-23 | 2020-08-11 | 陆宝华 | Personal privacy protection-based identity identification and verification system |
CN111523141B (en) * | 2020-04-23 | 2024-04-09 | 陆宝华 | Personal privacy protection-based identity identification and verification system |
CN112348974A (en) * | 2020-10-28 | 2021-02-09 | 四川瑞云信通科技有限公司 | PRT novel automatic ticket selling and checking method and system |
CN114422236A (en) * | 2021-10-27 | 2022-04-29 | 珠海奔图电子有限公司 | Intelligent device access method and device and electronic device |
CN114422236B (en) * | 2021-10-27 | 2023-12-01 | 珠海奔图电子有限公司 | Intelligent device access method and device and electronic device |
CN114360114A (en) * | 2022-03-14 | 2022-04-15 | 云丁网络技术(北京)有限公司 | User authority management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108537030A (en) | Management method, device and the electronic equipment of identity-based identification | |
US11151819B2 (en) | Access control method, access control apparatus, system, and storage medium | |
CN111886842B (en) | Remote user authentication using threshold-based matching | |
US9773151B2 (en) | System and methods for contactless biometrics-based identification | |
CN105139470B (en) | Work attendance method, apparatus and system based on recognition of face | |
US9189612B2 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
US8970348B1 (en) | Using sequences of facial gestures to authenticate users | |
JP7090008B2 (en) | Identity verification support device and identity verification support method | |
US10846514B2 (en) | Processing images from an electronic mirror | |
US12019728B2 (en) | AdHoc enrollment process | |
CN109885994A (en) | A kind of offline identity authorization system, equipment and computer readable storage medium | |
CN108270789A (en) | Internetbank activating method, equipment, system and computer readable storage medium | |
CN107656959A (en) | A kind of message leaving method, device and message equipment | |
Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
US20240028698A1 (en) | System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration | |
CN109446778A (en) | Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face | |
JP2022117025A (en) | Method for personal identification, program, and information system | |
US20200028847A1 (en) | Authentication method and authentication device | |
CN114005208B (en) | Access control method, device, equipment and storage medium | |
Krishna Prasad | Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition | |
Aithal | A Study on Multifactor Authentication Model Using Fingerprint Hash Code, Password and OTP | |
US20230186307A1 (en) | Method for enhancing transaction security | |
US20230206240A1 (en) | Account security system | |
KR101008654B1 (en) | Fingerprint Authentication Device for Access Check | |
Krishna Prasad et al. | A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE AND IRIS RECOGNITION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |
|
RJ01 | Rejection of invention patent application after publication |