CN109033851A - The mobile application protecting information safety method and apparatus of electric power transaction platform - Google Patents
The mobile application protecting information safety method and apparatus of electric power transaction platform Download PDFInfo
- Publication number
- CN109033851A CN109033851A CN201810712488.9A CN201810712488A CN109033851A CN 109033851 A CN109033851 A CN 109033851A CN 201810712488 A CN201810712488 A CN 201810712488A CN 109033851 A CN109033851 A CN 109033851A
- Authority
- CN
- China
- Prior art keywords
- information
- mobile application
- processing
- electric power
- transaction platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention provides the mobile application protecting information safety method and apparatus of electric power transaction platform, comprising: obtains mobile application information;Mobile application information is handled, the information that the mobile application information and date library of processing stores is matched;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen the protection of information security, and mobile application information is effectively protected.
Description
Technical field
The present invention relates to technical field of electric power, more particularly, to the mobile application protecting information safety side of electric power transaction platform
Method and device.
Background technique
Nowadays, the mobile terminals such as mobile phone, tablet computer is universal, brings a large amount of mobile terminal user, mobile network
It is no longer limited to original simple communication function, the mutual fusion of mobile communications network and internet facilitates mobile mutual
The formation of networking.The IT company in the whole world all begins to focus on the huge change of application model brought by mobile Internet, so that
The application service of mobile Internet has further development in development technique and business development mode.
With the development of mobile internet, the security protection of information is particularly important.But current safety certification
Relatively simple, protecting information safety is weaker, to cannot effectively protect to mobile application information.
Summary of the invention
In view of this, the purpose of the present invention is to provide the mobile application protecting information safety method of electric power transaction platform and
Device to strengthen the protection of information security, and is effectively protected mobile application information so that safety certification is diversified
Shield.
In a first aspect, the embodiment of the invention provides the mobile application protecting information safety method of electric power transaction platform, institute
The method of stating includes:
Obtain mobile application information;
The mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out
Matching;
If successful match, shows and identify successfully result information.
Further, the mobile application information includes finger print information, described to handle the mobile application information,
The information that the mobile application information and date library of processing stores is matched, comprising:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows and identifies and successfully tie
Fruit information.
Further, described that the fingerprint image is extracted into processing, obtain characteristic point, comprising:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, the mobile application information further includes facial image, it is described to the mobile application information at
Reason matches the information that the mobile application information and date library of processing stores, further includes:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized,
Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, the method also includes:
The file data information is obtained, and the file data information is encrypted by first key;
The file data information of encryption is sent to user terminal, so that the user terminal passes through described in the second key pair
The file data information of encryption is decrypted.
Second aspect, the embodiment of the present invention also provide the mobile application protecting information safety device of electric power transaction platform, institute
Stating device includes:
Acquiring unit, for obtaining mobile application information;
Processing unit, for handling the mobile application information, by the mobile application information and date library of processing
The information of storage is matched;
Display unit, in the case where successful match, display to identify successfully result information.
Further, the mobile application information includes finger print information, and the processing unit is specifically used for:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows and identifies and successfully tie
Fruit information.
Further, the processing unit is specifically used for:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, the mobile application information further includes facial image, and the processing unit is specifically used for:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized,
Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, described device further include:
Encryption unit, for obtaining the file data information, and to the file data information by first key into
Row encryption;
Decryption unit, for the file data information of encryption to be sent to user terminal, so that the user terminal passes through
The file data information of encryption described in second key pair is decrypted.
The embodiment of the invention provides the mobile application protecting information safety method and apparatus of electric power transaction platform, comprising:
Obtain mobile application information;Mobile application information is handled, the letter that the mobile application information and date library of processing is stored
Breath is matched;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen
The protection of information security, and mobile application information is effectively protected.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims
And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the mobile application protecting information safety method flow for the electric power transaction platform that the embodiment of the present invention one provides
Figure;
Fig. 2 is step in the mobile application protecting information safety method for the electric power transaction platform that the embodiment of the present invention one provides
The flow chart of S102;
Fig. 3 is step in the mobile application protecting information safety method for the electric power transaction platform that the embodiment of the present invention one provides
The flow chart of S102;
Fig. 4 is that the mobile application protecting information safety system of electric power transaction platform provided by Embodiment 2 of the present invention is illustrated
Figure;
Fig. 5 is the mobile application information deployment structural schematic diagram for the electric power transaction platform that the embodiment of the present invention three provides;
Fig. 6 is the mobile application protecting information safety device signal for the electric power transaction platform that the embodiment of the present invention four provides
Figure.
Icon:
10- acquiring unit;20- processing unit;30- display unit.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
To be described in detail to the embodiment of the present invention below convenient for understanding the present embodiment.
Embodiment one:
Fig. 1 is the mobile application protecting information safety method flow for the electric power transaction platform that the embodiment of the present invention one provides
Figure.
Referring to Fig.1, it applies in electric power transaction platform, method includes the following steps:
Step S101 obtains mobile application information;
Step S102 handles mobile application information, the letter that the mobile application information and date library of processing is stored
Breath is matched;
Step S103 shows if successful match and identifies successfully result information.
Further, mobile application information includes finger print information, referring to Fig. 2, step S102 the following steps are included:
Step S201 obtains finger print information, and generates fingerprint image according to finger print information;
Fingerprint image is extracted processing, obtains characteristic point by step S202;
Step S203 matches characteristic point with the finger print information of repository, if successful match, display is identified as
Function result information.
Here, finger print information is the unique feature of human body, and their complexity is enough to provide for identification
Enough features;If necessary to increase reliability, it need to only register more fingerprints, identify more fingers, it at most can be with up to ten
It is a, and each fingerprint is unique;The speed of scanning fingerprint is quickly, very easy to use;When reading fingerprint, Yong Hubi
Finger and fingerprint collecting head need to be contacted with each other, it is direct with fingerprint collecting head;Contact is that reading human body biological characteristics are most reliable
Method;Fingerprint collecting head can be minimized more, and price can be more cheap.
Further, step S202 the following steps are included:
Step S2021 pre-processes the fingerprint image, obtains pretreated image;
The pretreated image is carried out binaryzation, micronization processes, obtains the characteristic point by step S2022;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, mobile application information further includes facial image, and referring to Fig. 3, step S102 is further comprising the steps of:
Step S301 acquires facial image, pre-processes to facial image, obtain pretreated facial image;
Pretreated facial image is carried out feature extraction, obtains characteristic by step S302;
Here, face characteristic extraction is the process modeled to the feature of face, can be characterized using Knowledge based engineering
Method can also use the characterizing method based on algebraic characteristic or statistical learning.
The feature templates stored in characteristic and database are matched, obtain similarity by step S303;
Here, matching process can be one-to-one images match, or one-to-many images match.
Step S304, if similarity is more than preset threshold, successful match, and show and identify successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized,
Geometric correction processing, filtering processing and Edge contrast.
Further, the mobile application information further includes file data information, and this method is further comprising the steps of:
Step S401 obtains file data information, and is encrypted to file data information by first key;
The file data information of encryption is sent to user terminal by step S402, so that user terminal passes through the second key
The file data information of encryption is decrypted.
Here, the above process is the authentication mode of data certificate, wherein first key can be public key, and the second key can
Think that private key, each private key set by user are only known to individual, the public key concurrently set is disclosed by user, it can be it
His user sharing.
In addition, during safety certification, can also using mobile phone U-shield secure authentication technology, short message verification code technology,
Transmission channel encryption technology and security hardening technology.
Specifically, mobile phone U-shield secure authentication technology is that traditional U-shield function is realized using mobile phone, does not depend on hardware encryption core
Piece passes through software realization encryption device, crypto-operation and CA (Certificate Authority) digital certificate repertoire.
It can be used for authentication, electronic signature and data protection etc..
Short message verification code technology is then to input the identifying code that receives to login frame by sending identifying code to mobile phone,
The two unanimously can successfully be logged in, large-scale website can effectively guarantee to do shopping usually using short message verification code service by audit
Safety and account number safety.Specifically: server sends random code X to user terminal, and user terminal will by algorithm (such as MD5)
User information and random code X are merged, and are handled, and obtain character string Y, and be sent to server;Server is with equally
Algorithm random code X and pre-stored user information are handled, obtain character string Z, server is by character string Y and character
String Z is compared, if unanimously, confirming user identity or transaction results.
In transmission channel encryption technology, the confidentiality of data transmission is an important content of network security, in enterprise
In network information system, SSH (Secure Shell) technology and its software are generallyd use to reach this purpose.
The embodiment of the invention provides the mobile application protecting information safety methods of electric power transaction platform, comprising: obtains and moves
Dynamic application message;Mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out
Matching;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen information peace
Full protection, and mobile application information is effectively protected.
Embodiment two:
Fig. 4 is that the mobile application protecting information safety system of electric power transaction platform provided by Embodiment 2 of the present invention is illustrated
Figure.
Referring to Fig. 4, which includes safe security boundary, application, data safety, cryptosecurity and network security.
Security boundary is to information intranet and extranet boundary and information Intranet longitudinal boundary, is isolated by force using existing logic, is hard
The boundaries such as part firewall, IDS/IPS safety protection equipment, the safety such as configuration access control, intrusion detection, log recording and audit
Strategy realizes boundary isolation and security protection.To the Internet boundaries, on the basis of constituent parts existing boundary safeguard procedures, emphasis
Access authentication and the security protection of mobile terminal are realized using the mobile interaction platform of outer net.
In application is safe, the expanded application that mobile terminal transaction application is applied as electricity transaction relates generally to outer net
Information Mobile Service end is applied and mobile application both sides security protection, needs mobile eventually by Platform Server end and client
The application security function design for holding transaction application interaction guarantees legal mobile service application terminal user access, prevents non-award
User's access is weighed, the risk that reduction system is attacked in application guarantees the safety of mobile terminal transaction application itself.Body
Part certification, user's authorization and role's distribution are completed by unified rights.
In data safety, the sensitive data of mobile terminal transaction application includes user account data, service application configuration
Data, transaction business data, general service data, different, the used safeguard measure of the applicable scene of different data types
It is different.
In cryptosecurity, client is guaranteed the authentication of server-side by outer net secure interactive platform, client with
It is authenticated after the mobile interaction platform registration of outer net by registration code.Server end uses third to the authentication of client
The soft digital certificate that the square center CA is signed and issued is realized.
Network security includes network equipment safety and network channel safety, in network equipment safety, electric power transaction platform
And mobile outer net interaction platform is deployed in general headquarters and the letter of (city) company of each province leads to computer room, is mainly set using constituent parts existing network
Standby (including safety equipment), being responsible for the network equipment by Guo Wang Xintong Co and (city) Xintong Co of each province, (including core exchange is set
Standby, convergence switching equipment, access switching equipment, perimeter firewall etc.) safety management;It is mobile whole in network channel safety
End transaction application relates generally to Internet channel, and the integrated mobile interaction platform of outer net is established safe transmission with mobile terminal and led to
Road guarantees channel security.
In addition, the framework further includes physical security, Host Security, terminal security and safety management.
Wherein, physical security includes that computer room security protection measure and computer room enter and leave safety management;Host Security includes server behaviour
Make system safety and Database System Security;Terminal security includes mobile intelligent terminal safety;Safety management includes development & construction
Safety management and operation and maintenance safety management.
Embodiment three:
Fig. 5 is the mobile application information deployment structural schematic diagram for the electric power transaction platform that the embodiment of the present invention three provides.
Referring to Fig. 5, which includes Intranet and outer net, and Intranet is divided into general headquarters' information Intranet and net saves information Intranet,
Outer net is divided into general headquarters' information outer net and net saves information outer net;Outer net plays outer end protective film, and Intranet plays terminal protection
Effect, the connection between Intranet and outer net are connected by some specific security isolation equipment;In addition to this, outer net is being united
One outer net secure interactive platform protects information technology, in external poisoning intrusion, is protected first by outer net,
After virus has exceeded outer net protection scope, virus passes through Intranet, by the substantial protection of Intranet, to the information skill of core
Art is protected, to substantially reduce the probability of dangerous generation.
Example IV:
Fig. 6 is the mobile application protecting information safety device signal for the electric power transaction platform that the embodiment of the present invention four provides
Figure.
Referring to Fig. 6, which includes acquiring unit 10, processing unit 20 and display unit 30.
Acquiring unit 10, for obtaining mobile application information;
Processing unit 20, for handling the mobile application information, by the mobile application information and date of processing
The information of library storage is matched;
Display unit 30, in the case where successful match, display to identify successfully result information.
Further, mobile application information includes finger print information, and processing unit 20 is specifically used for:
Finger print information is obtained, and fingerprint image is generated according to finger print information;
Fingerprint image is extracted into processing, obtains characteristic point;
Characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter
Breath.
Further, processing unit 20 is specifically used for:
Fingerprint image is pre-processed, pretreated image is obtained;
Pretreated image is subjected to binaryzation, micronization processes, obtains characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
Further, mobile application information further includes facial image, and processing unit 20 is specifically used for:
Facial image is acquired, facial image is pre-processed, pretreated facial image is obtained;
Pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in characteristic and database are matched, similarity is obtained;
If similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment include light compensation deals, greyscale transform process, histogram equalization processing, normalized,
Geometric correction processing, filtering processing and Edge contrast.
Further, mobile application information further includes file data information, the device further include:
Encryption unit (not shown) passes through for obtaining the file data information, and to the file data information
One key is encrypted;
Decryption unit (not shown), for the file data information of encryption to be sent to user terminal, so that the user
Terminal is decrypted by the file data information of encryption described in the second key pair.
The embodiment of the invention provides the mobile application protecting information safety devices of electric power transaction platform, comprising: obtains and moves
Dynamic application message;Mobile application information is handled, the information that the mobile application information and date library of processing is stored carries out
Matching;If successful match, show and identify successfully result information, so that safety certification is diversified, to strengthen information peace
Full protection, and mobile application information is effectively protected.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor, processor realize electricity transaction provided by the above embodiment when executing computer program
The step of mobile application protecting information safety method of platform.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program executes the mobile application information peace of the electric power transaction platform of above-described embodiment when computer program is run by processor
The step of full protection method.
Computer program product provided by the embodiment of the present invention, the computer-readable storage including storing program code
Medium, the instruction that said program code includes can be used for executing previous methods method as described in the examples, and specific implementation can be joined
See embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention
Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of mobile application protecting information safety method of electric power transaction platform, which is characterized in that the described method includes:
Obtain mobile application information;
The mobile application information is handled, the information progress that the mobile application information and date library of processing is stored
Match;
If successful match, shows and identify successfully result information.
2. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute
Stating mobile application information includes finger print information, described to handle the mobile application information, and the mobile application of processing is believed
Breath is matched with the information of database purchase, comprising:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter
Breath.
3. the mobile application protecting information safety method of electric power transaction platform according to claim 2, which is characterized in that institute
It states and the fingerprint image is extracted into processing, obtain characteristic point, comprising:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
4. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute
Stating mobile application information further includes facial image, described to handle the mobile application information, by the mobile application of processing
The information of information and date library storage is matched, further includes:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment includes light compensation deals, greyscale transform process, histogram equalization processing, normalized, geometry
Correction process, filtering processing and Edge contrast.
5. the mobile application protecting information safety method of electric power transaction platform according to claim 1, which is characterized in that institute
Stating mobile application information further includes file data information, the method also includes:
The file data information is obtained, and the file data information is encrypted by first key;
The file data information of encryption is sent to user terminal, so that the user terminal described in the second key pair by encrypting
File data information be decrypted.
6. a kind of mobile application protecting information safety device of electric power transaction platform, which is characterized in that described device includes:
Acquiring unit, for obtaining mobile application information;
Processing unit stores the mobile application information and date library of processing for handling the mobile application information
Information matched;
Display unit, in the case where successful match, display to identify successfully result information.
7. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that institute
Stating mobile application information includes finger print information, and the processing unit is specifically used for:
The finger print information is obtained, and fingerprint image is generated according to the finger print information;
The fingerprint image is extracted into processing, obtains characteristic point;
The characteristic point is matched with the finger print information of repository, if successful match, shows identification successful result letter
Breath.
8. the mobile application protecting information safety device of electric power transaction platform according to claim 7, which is characterized in that institute
Processing unit is stated to be specifically used for:
The fingerprint image is pre-processed, pretreated image is obtained;
The pretreated image is subjected to binaryzation, micronization processes, obtains the characteristic point;
Wherein, pretreatment includes extreme value filtering processing, a smoothing processing, Edge contrast and secondary smoothing processing.
9. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that institute
Stating mobile application information further includes facial image, and the processing unit is specifically used for:
The facial image is acquired, the facial image is pre-processed, obtains pretreated facial image;
The pretreated facial image is subjected to feature extraction, obtains characteristic;
The feature templates stored in the characteristic and database are matched, similarity is obtained;
If the similarity shows more than preset threshold, successful match and identifies successfully result information;
Wherein, pretreatment includes light compensation deals, greyscale transform process, histogram equalization processing, normalized, geometry
Correction process, filtering processing and Edge contrast.
10. the mobile application protecting information safety device of electric power transaction platform according to claim 6, which is characterized in that
The mobile application information further includes file data information, described device further include:
Encryption unit is added for obtaining the file data information, and to the file data information by first key
It is close;
Decryption unit, for the file data information of encryption to be sent to user terminal, so that the user terminal passes through second
The file data information of encryption described in key pair is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810712488.9A CN109033851A (en) | 2018-07-02 | 2018-07-02 | The mobile application protecting information safety method and apparatus of electric power transaction platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810712488.9A CN109033851A (en) | 2018-07-02 | 2018-07-02 | The mobile application protecting information safety method and apparatus of electric power transaction platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109033851A true CN109033851A (en) | 2018-12-18 |
Family
ID=65521346
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810712488.9A Pending CN109033851A (en) | 2018-07-02 | 2018-07-02 | The mobile application protecting information safety method and apparatus of electric power transaction platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033851A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508700A (en) * | 2018-12-28 | 2019-03-22 | 广州粤建三和软件股份有限公司 | A kind of face identification method, system and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970676A (en) * | 2011-09-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method for processing original data, internet of thing system and terminal |
CN103793640A (en) * | 2012-11-01 | 2014-05-14 | 北京握奇数据系统有限公司 | Method and system for applying biological identification technology to USB Key |
CN104135475A (en) * | 2014-07-18 | 2014-11-05 | 国家电网公司 | Safety protection method of electric power information for mobile Internet |
CN104751041A (en) * | 2015-03-03 | 2015-07-01 | 北京卓识数云科技有限公司 | Authentication method, system and mobile terminal |
CN105740753A (en) * | 2014-12-12 | 2016-07-06 | 比亚迪股份有限公司 | Fingerprint identification method and fingerprint identification system |
US20170193316A1 (en) * | 2014-04-14 | 2017-07-06 | Alibaba Group Holding Limited | Method and apparatus of verifying usability of biological characteristic image |
-
2018
- 2018-07-02 CN CN201810712488.9A patent/CN109033851A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970676A (en) * | 2011-09-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method for processing original data, internet of thing system and terminal |
CN103793640A (en) * | 2012-11-01 | 2014-05-14 | 北京握奇数据系统有限公司 | Method and system for applying biological identification technology to USB Key |
US20170193316A1 (en) * | 2014-04-14 | 2017-07-06 | Alibaba Group Holding Limited | Method and apparatus of verifying usability of biological characteristic image |
CN104135475A (en) * | 2014-07-18 | 2014-11-05 | 国家电网公司 | Safety protection method of electric power information for mobile Internet |
CN105740753A (en) * | 2014-12-12 | 2016-07-06 | 比亚迪股份有限公司 | Fingerprint identification method and fingerprint identification system |
CN104751041A (en) * | 2015-03-03 | 2015-07-01 | 北京卓识数云科技有限公司 | Authentication method, system and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508700A (en) * | 2018-12-28 | 2019-03-22 | 广州粤建三和软件股份有限公司 | A kind of face identification method, system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6239788B2 (en) | Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium | |
JP6264674B2 (en) | Authentication system and method using QR code | |
EP2973164B1 (en) | Technologies for secure storage and use of biometric authentication information | |
US8407762B2 (en) | System for three level authentication of a user | |
CN104247329B (en) | The safety of the device of cloud service is asked to be remedied | |
EP3005202B1 (en) | System and method for biometric authentication with device attestation | |
US20160197919A1 (en) | Real identity authentication | |
KR101755995B1 (en) | Method and system for feature vector based remote biometric verification using homomorphic encryption | |
CN108134791A (en) | A kind of data center's total management system login validation method | |
CN110502886B (en) | Multiple identity authentication method, device, terminal and computer storage medium | |
CN107004080A (en) | Environment sensing security token | |
CN105553947A (en) | Methods and devices for finding account back, protecting account security and preventing account theft | |
Jo et al. | Security analysis and improvement of fingerprint authentication for smartphones | |
CN106687980A (en) | Hypervisor and virtual machine protection | |
CN106131072A (en) | A kind of computer information safe system | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN107871081A (en) | A kind of computer information safe system | |
CN106295290B (en) | Method, device and system for generating authentication information based on fingerprint information | |
CN106648125A (en) | Fingerprint keyboard, verification system and method based on fingerprint keyboard | |
CN107733973A (en) | Method of controlling security, terminal, server and computer-readable medium | |
Furnell | Securing information and communications systems: Principles, technologies, and applications | |
Bodepudi et al. | Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review | |
Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
CN109033851A (en) | The mobile application protecting information safety method and apparatus of electric power transaction platform | |
US11681787B1 (en) | Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |
|
RJ01 | Rejection of invention patent application after publication |