CN109033851A - The mobile application protecting information safety method and apparatus of electric power transaction platform - Google Patents

The mobile application protecting information safety method and apparatus of electric power transaction platform Download PDF

Info

Publication number
CN109033851A
CN109033851A CN201810712488.9A CN201810712488A CN109033851A CN 109033851 A CN109033851 A CN 109033851A CN 201810712488 A CN201810712488 A CN 201810712488A CN 109033851 A CN109033851 A CN 109033851A
Authority
CN
China
Prior art keywords
information
mobile application
processing
electric power
transaction platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810712488.9A
Other languages
Chinese (zh)
Inventor
王清波
郑宗强
高春成
王海宁
张显
刘永辉
方印
史述红
王蕾
张倩
王春艳
习培玉
吕俊良
吕经纬
代勇
汪涛
袁明珠
李守宝
肖锋
陶力
赵显�
承林
谭翔
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Electric Power Trading Center Co Ltd
Beijing Kedong Electric Power Control System Co Ltd
Electric Power Research Institute of State Grid Liaoning Electric Power Co Ltd
Original Assignee
Beijing Electric Power Trading Center Co Ltd
Beijing Kedong Electric Power Control System Co Ltd
Electric Power Research Institute of State Grid Liaoning Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Electric Power Trading Center Co Ltd, Beijing Kedong Electric Power Control System Co Ltd, Electric Power Research Institute of State Grid Liaoning Electric Power Co Ltd filed Critical Beijing Electric Power Trading Center Co Ltd
Priority to CN201810712488.9A priority Critical patent/CN109033851A/en
Publication of CN109033851A publication Critical patent/CN109033851A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention provides the mobile application protecting information safety method and apparatus of electric power transaction platform, comprising: obtains mobile application information;Mobile application information is handled, the information that the mobile application information and date library of processing stores is matched;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen the protection of information security, and mobile application information is effectively protected.

Description

The mobile application protecting information safety method and apparatus of electric power transaction platform
Technical field
The present invention relates to technical field of electric power, more particularly, to the mobile application protecting information safety side of electric power transaction platform Method and device.
Background technique
Nowadays, the mobile terminals such as mobile phone, tablet computer is universal, brings a large amount of mobile terminal user, mobile network It is no longer limited to original simple communication function, the mutual fusion of mobile communications network and internet facilitates mobile mutual The formation of networking.The IT company in the whole world all begins to focus on the huge change of application model brought by mobile Internet, so that The application service of mobile Internet has further development in development technique and business development mode.
With the development of mobile internet, the security protection of information is particularly important.But current safety certification Relatively simple, protecting information safety is weaker, to cannot effectively protect to mobile application information.
Summary of the invention
In view of this, the purpose of the present invention is to provide the mobile application protecting information safety method of electric power transaction platform and Device to strengthen the protection of information security, and is effectively protected mobile application information so that safety certification is diversified Shield.
In a first aspect, the embodiment of the invention provides the mobile application protecting information safety method of electric power transaction platform, institute The method of stating includes:
Obtain mobile application information;
The mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out Matching;
If successful match, shows and identify successfully result information.
Further, the mobile application information includes finger print information, described to handle the mobile application information, The information that the mobile application information and date library of processing stores is matched, comprising:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows and identifies and successfully tie Fruit information.
Further, described that the fingerprint image is extracted into processing, obtain characteristic point, comprising:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, the mobile application information further includes facial image, it is described to the mobile application information at Reason matches the information that the mobile application information and date library of processing stores, further includes:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized, Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, the method also includes:
The file data information is obtained, and the file data information is encrypted by first key;
The file data information of encryption is sent to user terminal, so that the user terminal passes through described in the second key pair The file data information of encryption is decrypted.
Second aspect, the embodiment of the present invention also provide the mobile application protecting information safety device of electric power transaction platform, institute Stating device includes:
Acquiring unit, for obtaining mobile application information;
Processing unit, for handling the mobile application information, by the mobile application information and date library of processing The information of storage is matched;
Display unit, in the case where successful match, display to identify successfully result information.
Further, the mobile application information includes finger print information, and the processing unit is specifically used for:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows and identifies and successfully tie Fruit information.
Further, the processing unit is specifically used for:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, the mobile application information further includes facial image, and the processing unit is specifically used for:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized, Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, described device further include:
Encryption unit, for obtaining the file data information, and to the file data information by first key into Row encryption;
Decryption unit, for the file data information of encryption to be sent to user terminal, so that the user terminal passes through The file data information of encryption described in second key pair is decrypted.
The embodiment of the invention provides the mobile application protecting information safety method and apparatus of electric power transaction platform, comprising: Obtain mobile application information;Mobile application information is handled, the letter that the mobile application information and date library of processing is stored Breath is matched;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen The protection of information security, and mobile application information is effectively protected.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the mobile application protecting information safety method flow for the electric power transaction platform that the embodiment of the present invention one provides Figure;
Fig. 2 is step in the mobile application protecting information safety method for the electric power transaction platform that the embodiment of the present invention one provides The flow chart of S102;
Fig. 3 is step in the mobile application protecting information safety method for the electric power transaction platform that the embodiment of the present invention one provides The flow chart of S102;
Fig. 4 is that the mobile application protecting information safety system of electric power transaction platform provided by Embodiment 2 of the present invention is illustrated Figure;
Fig. 5 is the mobile application information deployment structural schematic diagram for the electric power transaction platform that the embodiment of the present invention three provides;
Fig. 6 is the mobile application protecting information safety device signal for the electric power transaction platform that the embodiment of the present invention four provides Figure.
Icon:
10- acquiring unit;20- processing unit;30- display unit.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
To be described in detail to the embodiment of the present invention below convenient for understanding the present embodiment.
Embodiment one:
Fig. 1 is the mobile application protecting information safety method flow for the electric power transaction platform that the embodiment of the present invention one provides Figure.
Referring to Fig.1, it applies in electric power transaction platform, method includes the following steps:
Step S101 obtains mobile application information;
Step S102 handles mobile application information, the letter that the mobile application information and date library of processing is stored Breath is matched;
Step S103 shows if successful match and identifies successfully result information.
Further, mobile application information includes finger print information, referring to Fig. 2, step S102 the following steps are included:
Step S201 obtains finger print information, and generates fingerprint image according to finger print information;
Fingerprint image is extracted processing, obtains characteristic point by step S202;
Step S203 matches characteristic point with the finger print information of repository, if successful match, display is identified as Function result information.
Here, finger print information is the unique feature of human body, and their complexity is enough to provide for identification Enough features;If necessary to increase reliability, it need to only register more fingerprints, identify more fingers, it at most can be with up to ten It is a, and each fingerprint is unique;The speed of scanning fingerprint is quickly, very easy to use;When reading fingerprint, Yong Hubi Finger and fingerprint collecting head need to be contacted with each other, it is direct with fingerprint collecting head;Contact is that reading human body biological characteristics are most reliable Method;Fingerprint collecting head can be minimized more, and price can be more cheap.
Further, step S202 the following steps are included:
Step S2021 pre-processes the fingerprint image, obtains pretreated image;
The pretreated image is carried out binaryzation, micronization processes, obtains the characteristic point by step S2022;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, mobile application information further includes facial image, and referring to Fig. 3, step S102 is further comprising the steps of:
Step S301 acquires facial image, pre-processes to facial image, obtain pretreated facial image;
Pretreated facial image is carried out feature extraction, obtains characteristic by step S302;
Here, face characteristic extraction is the process modeled to the feature of face, can be characterized using Knowledge based engineering Method can also use the characterizing method based on algebraic characteristic or statistical learning.
The feature templates stored in characteristic and database are matched, obtain similarity by step S303;
Here, matching process can be one-to-one images match, or one-to-many images match.
Step S304, if similarity is more than preset threshold, successful match, and show and identify successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized, Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, and this method is further comprising the steps of:
Step S401 obtains file data information, and is encrypted to file data information by first key;
The file data information of encryption is sent to user terminal by step S402, so that user terminal passes through the second key The file data information of encryption is decrypted.
Here, the above process is the authentication mode of data certificate, wherein first key can be public key, and the second key can Think that private key, each private key set by user are only known to individual, the public key concurrently set is disclosed by user, it can be it His user sharing.
In addition, during safety certification, can also using mobile phone U-shield secure authentication technology, short message verification code technology, Transmission channel encryption technology and security hardening technology.
Specifically, mobile phone U-shield secure authentication technology is that traditional U-shield function is realized using mobile phone, does not depend on hardware encryption core Piece passes through software realization encryption device, crypto-operation and CA (Certificate Authority) digital certificate repertoire. It can be used for authentication, electronic signature and data protection etc..
Short message verification code technology is then to input the identifying code that receives to login frame by sending identifying code to mobile phone, The two unanimously can successfully be logged in, large-scale website can effectively guarantee to do shopping usually using short message verification code service by audit Safety and account number safety.Specifically: server sends random code X to user terminal, and user terminal will by algorithm (such as MD5) User information and random code X are merged, and are handled, and obtain character string Y, and be sent to server;Server is with equally Algorithm random code X and pre-stored user information are handled, obtain character string Z, server is by character string Y and character String Z is compared, if unanimously, confirming user identity or transaction results.
In transmission channel encryption technology, the confidentiality of data transmission is an important content of network security, in enterprise In network information system, SSH (Secure Shell) technology and its software are generallyd use to reach this purpose.
The embodiment of the invention provides the mobile application protecting information safety methods of electric power transaction platform, comprising: obtains and moves Dynamic application message;Mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out Matching;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen information peace Full protection, and mobile application information is effectively protected.
Embodiment two:
Fig. 4 is that the mobile application protecting information safety system of electric power transaction platform provided by Embodiment 2 of the present invention is illustrated Figure.
Referring to Fig. 4, which includes safe security boundary, application, data safety, cryptosecurity and network security.
Security boundary is to information intranet and extranet boundary and information Intranet longitudinal boundary, is isolated by force using existing logic, is hard The boundaries such as part firewall, IDS/IPS safety protection equipment, the safety such as configuration access control, intrusion detection, log recording and audit Strategy realizes boundary isolation and security protection.To the Internet boundaries, on the basis of constituent parts existing boundary safeguard procedures, emphasis Access authentication and the security protection of mobile terminal are realized using the mobile interaction platform of outer net.
In application is safe, the expanded application that mobile terminal transaction application is applied as electricity transaction relates generally to outer net Information Mobile Service end is applied and mobile application both sides security protection, needs mobile eventually by Platform Server end and client The application security function design for holding transaction application interaction guarantees legal mobile service application terminal user access, prevents non-award User's access is weighed, the risk that reduction system is attacked in application guarantees the safety of mobile terminal transaction application itself.Body Part certification, user's authorization and role's distribution are completed by unified rights.
In data safety, the sensitive data of mobile terminal transaction application includes user account data, service application configuration Data, transaction business data, general service data, different, the used safeguard measure of the applicable scene of different data types It is different.
In cryptosecurity, client is guaranteed the authentication of server-side by outer net secure interactive platform, client with It is authenticated after the mobile interaction platform registration of outer net by registration code.Server end uses third to the authentication of client The soft digital certificate that the square center CA is signed and issued is realized.
Network security includes network equipment safety and network channel safety, in network equipment safety, electric power transaction platform And mobile outer net interaction platform is deployed in general headquarters and the letter of (city) company of each province leads to computer room, is mainly set using constituent parts existing network Standby (including safety equipment), being responsible for the network equipment by Guo Wang Xintong Co and (city) Xintong Co of each province, (including core exchange is set Standby, convergence switching equipment, access switching equipment, perimeter firewall etc.) safety management;It is mobile whole in network channel safety End transaction application relates generally to Internet channel, and the integrated mobile interaction platform of outer net is established safe transmission with mobile terminal and led to Road guarantees channel security.
In addition, the framework further includes physical security, Host Security, terminal security and safety management.
Wherein, physical security includes that computer room security protection measure and computer room enter and leave safety management;Host Security includes server behaviour Make system safety and Database System Security;Terminal security includes mobile intelligent terminal safety;Safety management includes development & construction Safety management and operation and maintenance safety management.
Embodiment three:
Fig. 5 is the mobile application information deployment structural schematic diagram for the electric power transaction platform that the embodiment of the present invention three provides.
Referring to Fig. 5, which includes Intranet and outer net, and Intranet is divided into general headquarters' information Intranet and net saves information Intranet, Outer net is divided into general headquarters' information outer net and net saves information outer net;Outer net plays outer end protective film, and Intranet plays terminal protection Effect, the connection between Intranet and outer net are connected by some specific security isolation equipment;In addition to this, outer net is being united One outer net secure interactive platform protects information technology, in external poisoning intrusion, is protected first by outer net, After virus has exceeded outer net protection scope, virus passes through Intranet, by the substantial protection of Intranet, to the information skill of core Art is protected, to substantially reduce the probability of dangerous generation.
Example IV:
Fig. 6 is the mobile application protecting information safety device signal for the electric power transaction platform that the embodiment of the present invention four provides Figure.
Referring to Fig. 6, which includes acquiring unit 10, processing unit 20 and display unit 30.
Acquiring unit 10, for obtaining mobile application information;
Processing unit 20, for handling the mobile application information, by the mobile application information and date of processing The information of library storage is matched;
Display unit 30, in the case where successful match, display to identify successfully result information.
Further, mobile application information includes finger print information, and processing unit 20 is specifically used for:
Finger print information is obtained, and fingerprint image is generated according to finger print information;
Fingerprint image is extracted into processing, obtains characteristic point;
Characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter Breath.
Further, processing unit 20 is specifically used for:
Fingerprint image is pre-processed, pretreated image is obtained;
Pretreated image is subjected to binaryzation, micronization processes, obtains characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, mobile application information further includes facial image, and processing unit 20 is specifically used for:
Facial image is acquired, facial image is pre-processed, pretreated facial image is obtained;
Pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in characteristic and database are matched, similarity is obtained;
If similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized, Geometric correction processing, filtering processing and Edge contrast.
Further, mobile application information further includes file data information, the device further include:
Encryption unit (not shown) passes through for obtaining the file data information, and to the file data information One key is encrypted;
Decryption unit (not shown), for the file data information of encryption to be sent to user terminal, so that the user Terminal is decrypted by the file data information of encryption described in the second key pair.
The embodiment of the invention provides the mobile application protecting information safety devices of electric power transaction platform, comprising: obtains and moves Dynamic application message;Mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out Matching;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen information peace Full protection, and mobile application information is effectively protected.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor, processor realize electricity transaction provided by the above embodiment when executing computer program The step of mobile application protecting information safety method of platform.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program executes the mobile application information peace of the electric power transaction platform of above-described embodiment when computer program is run by processor The step of full protection method.
Computer program product provided by the embodiment of the present invention, the computer-readable storage including storing program code Medium, the instruction that said program code includes can be used for executing previous methods method as described in the examples, and specific implementation can be joined See embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of mobile application protecting information safety method of electric power transaction platform, which is characterized in that the described method includes:
Obtain mobile application information;
The mobile application information is handled, the information progress that the mobile application information and date library of processing is stored Match;
If successful match, shows and identify successfully result information.
2. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute Stating mobile application information includes finger print information, described to handle the mobile application information, and the mobile application of processing is believed Breath is matched with the information of database purchase, comprising:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter Breath.
3. the mobile application protecting information safety method of electric power transaction platform according to claim 2, which is characterized in that institute It states and the fingerprint image is extracted into processing, obtain characteristic point, comprising:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
4. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute Stating mobile application information further includes facial image, described to handle the mobile application information, by the mobile application of processing The information of information and date library storage is matched, further includes:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment includes light compensation deals, greyscale transform process, histogram equalization processing, normalized, geometry Correction process, filtering processing and Edge contrast.
5. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute Stating mobile application information further includes file data information, the method also includes:
The file data information is obtained, and the file data information is encrypted by first key;
The file data information of encryption is sent to user terminal, so that the user terminal described in the second key pair by encrypting File data information be decrypted.
6. a kind of mobile application protecting information safety device of electric power transaction platform, which is characterized in that described device includes:
Acquiring unit, for obtaining mobile application information;
Processing unit stores the mobile application information and date library of processing for handling the mobile application information Information matched;
Display unit, in the case where successful match, display to identify successfully result information.
7. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that institute Stating mobile application information includes finger print information, and the processing unit is specifically used for:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter Breath.
8. the mobile application protecting information safety device of electric power transaction platform according to claim 7, which is characterized in that institute Processing unit is stated to be specifically used for:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
9. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that institute Stating mobile application information further includes facial image, and the processing unit is specifically used for:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment includes light compensation deals, greyscale transform process, histogram equalization processing, normalized, geometry Correction process, filtering processing and Edge contrast.
10. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that The mobile application information further includes file data information, described device further include:
Encryption unit is added for obtaining the file data information, and to the file data information by first key It is close;
Decryption unit, for the file data information of encryption to be sent to user terminal, so that the user terminal passes through second The file data information of encryption described in key pair is decrypted.
CN201810712488.9A 2018-07-02 2018-07-02 The mobile application protecting information safety method and apparatus of electric power transaction platform Pending CN109033851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810712488.9A CN109033851A (en) 2018-07-02 2018-07-02 The mobile application protecting information safety method and apparatus of electric power transaction platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810712488.9A CN109033851A (en) 2018-07-02 2018-07-02 The mobile application protecting information safety method and apparatus of electric power transaction platform

Publications (1)

Publication Number Publication Date
CN109033851A true CN109033851A (en) 2018-12-18

Family

ID=65521346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810712488.9A Pending CN109033851A (en) 2018-07-02 2018-07-02 The mobile application protecting information safety method and apparatus of electric power transaction platform

Country Status (1)

Country Link
CN (1) CN109033851A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508700A (en) * 2018-12-28 2019-03-22 广州粤建三和软件股份有限公司 A kind of face identification method, system and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970676A (en) * 2011-09-01 2013-03-13 中兴通讯股份有限公司 Method for processing original data, internet of thing system and terminal
CN103793640A (en) * 2012-11-01 2014-05-14 北京握奇数据系统有限公司 Method and system for applying biological identification technology to USB Key
CN104135475A (en) * 2014-07-18 2014-11-05 国家电网公司 Safety protection method of electric power information for mobile Internet
CN104751041A (en) * 2015-03-03 2015-07-01 北京卓识数云科技有限公司 Authentication method, system and mobile terminal
CN105740753A (en) * 2014-12-12 2016-07-06 比亚迪股份有限公司 Fingerprint identification method and fingerprint identification system
US20170193316A1 (en) * 2014-04-14 2017-07-06 Alibaba Group Holding Limited Method and apparatus of verifying usability of biological characteristic image

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970676A (en) * 2011-09-01 2013-03-13 中兴通讯股份有限公司 Method for processing original data, internet of thing system and terminal
CN103793640A (en) * 2012-11-01 2014-05-14 北京握奇数据系统有限公司 Method and system for applying biological identification technology to USB Key
US20170193316A1 (en) * 2014-04-14 2017-07-06 Alibaba Group Holding Limited Method and apparatus of verifying usability of biological characteristic image
CN104135475A (en) * 2014-07-18 2014-11-05 国家电网公司 Safety protection method of electric power information for mobile Internet
CN105740753A (en) * 2014-12-12 2016-07-06 比亚迪股份有限公司 Fingerprint identification method and fingerprint identification system
CN104751041A (en) * 2015-03-03 2015-07-01 北京卓识数云科技有限公司 Authentication method, system and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508700A (en) * 2018-12-28 2019-03-22 广州粤建三和软件股份有限公司 A kind of face identification method, system and storage medium

Similar Documents

Publication Publication Date Title
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
JP6264674B2 (en) Authentication system and method using QR code
EP2973164B1 (en) Technologies for secure storage and use of biometric authentication information
US8407762B2 (en) System for three level authentication of a user
CN104247329B (en) The safety of the device of cloud service is asked to be remedied
EP3005202B1 (en) System and method for biometric authentication with device attestation
US20160197919A1 (en) Real identity authentication
KR101755995B1 (en) Method and system for feature vector based remote biometric verification using homomorphic encryption
CN108134791A (en) A kind of data center's total management system login validation method
CN110502886B (en) Multiple identity authentication method, device, terminal and computer storage medium
CN107004080A (en) Environment sensing security token
CN105553947A (en) Methods and devices for finding account back, protecting account security and preventing account theft
Jo et al. Security analysis and improvement of fingerprint authentication for smartphones
CN106687980A (en) Hypervisor and virtual machine protection
CN106131072A (en) A kind of computer information safe system
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN107871081A (en) A kind of computer information safe system
CN106295290B (en) Method, device and system for generating authentication information based on fingerprint information
CN106648125A (en) Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN107733973A (en) Method of controlling security, terminal, server and computer-readable medium
Furnell Securing information and communications systems: Principles, technologies, and applications
Bodepudi et al. Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
CN109033851A (en) The mobile application protecting information safety method and apparatus of electric power transaction platform
US11681787B1 (en) Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218

RJ01 Rejection of invention patent application after publication