CN109635534A - A kind of computer information data multi-stage protection system and method - Google Patents

A kind of computer information data multi-stage protection system and method Download PDF

Info

Publication number
CN109635534A
CN109635534A CN201811505368.8A CN201811505368A CN109635534A CN 109635534 A CN109635534 A CN 109635534A CN 201811505368 A CN201811505368 A CN 201811505368A CN 109635534 A CN109635534 A CN 109635534A
Authority
CN
China
Prior art keywords
module
fingerprint
user
data
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811505368.8A
Other languages
Chinese (zh)
Inventor
徐章峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Dash Mdt Infotech Ltd
Original Assignee
Guangzhou Dash Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dash Mdt Infotech Ltd filed Critical Guangzhou Dash Mdt Infotech Ltd
Priority to CN201811505368.8A priority Critical patent/CN109635534A/en
Publication of CN109635534A publication Critical patent/CN109635534A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to Computer Data Security fields, specifically a kind of computer information data multi-stage protection system and method, including photographing module, face recognition module, fingerprint identification module, fingerprint contrast module, fingerprint recording module, fingerprint sequence contrast module, fingerprint sequence confirmation module, data read module and alarm module, the present invention can carry out whole real time monitoring in use to user, the identity of moment confirmation user, substantially increase safety, simultaneously, the successive typing sequence of multiple fingerprints and fingerprint can be set in the present invention, further ensure that safety, when needing to export data, the identity of user is further confirmed that by the way that numerical ciphers are arranged, the safety of data information is further ensured that, the multi-stage protection system that the present invention passes through setting data, data safety is set to obtain strong guarantee.

Description

A kind of computer information data multi-stage protection system and method
Technical field
The present invention relates to Computer Data Security field, specifically a kind of computer information data multi-stage protection system and side Method.
Background technique
Computer is can to run according to program, automatic, high speed processing mass data modernization intelligent electronic device, no Same unit and tissue, there is the Network Information Centre of oneself, and computer system security is established and adopted for data processing system The safeguard protection of technology and management, protect computer hardware, software and data not because accidentally and the reason of malice by broken Bad, change and leakage.Thus the safety of computer network makes net it is to be understood that by using various technologies and management measure Network system operates normally, so that it is guaranteed that the availability of network data, integrality and confidentiality.
Nowadays, the safety of computer information data increasingly obtains the attention of people, needs to storing in computer Information data provides strong protection.
Summary of the invention
The purpose of the present invention is to provide a kind of computer information data multi-stage protection system and method, to solve above-mentioned back The problem of being proposed in scape technology.
To achieve the above object, the invention provides the following technical scheme:
A kind of computer information data multi-stage protection system, including photographing module, face recognition module, fingerprint identification module, refer to Line contrast module, fingerprint recording module, fingerprint sequence contrast module, fingerprint sequence confirmation module, data read module and alarm Module, photographing module are used for the face of captured in real-time user, and the facial characteristics of face recognition module user for identification refers to The fingerprint of line identification module user for identification, and the fingerprint typing sequence of the multiple fingers of user is recorded, and will be collected into Finger print information be sent to fingerprint contrast module, fingerprint letter of the fingerprint recording module for multiple fingers of typing user in advance Breath and fingerprint typing sequence, the finger print information and fingerprint typing that fingerprint contrast module is used to for fingerprint identification module being collected into The finger print information that module shifts to an earlier date the user of typing compares, and fingerprint sequence confirmation module is used to confirm multiple hands of user The fingerprint typing sequence of finger, fingerprint sequence contrast module are used to compare the fingerprint input sequence of user, and with fingerprint typing mould The fingerprint typing sequence that block shifts to an earlier date typing is compared, if the two mismatches, directly triggers alarm module, sounds an alarm, number According to read module for reading protected data.
As a further solution of the present invention: further including numerical ciphers input module, numerical ciphers confirmation module and data Export module, numerical ciphers input module are used for the input numerical ciphers when user needs to export data.
As further scheme of the invention: the face recognition module is also used to real-time lock user.
As further scheme of the invention: the numerical ciphers confirmation module is used to confirm the number of user's input Password.
A kind of data guard method of appliance computer information data multi-stage protection system, specific steps are as follows:
S1, in advance by the facial information of user, fingerprint, fingerprint typing sequence and numerical ciphers input computer Information Number According to multi-stage protection system;
S2, when user needs to read computer information data, using photographing module, face recognition module to the face of user Portion carries out real-time monitoring identification, and time locking user avoids midway from changing user, triggers report if user is replaced in midway Alert module sounds an alarm;
S3, it is identified using fingerprint of the fingerprint identification module to the multiple fingers of user, compares the fingerprint of user, using referring to Line confirms the identity of user, if fingerprint mismatches, triggers alarm module and sounds an alarm;
S4, confirmation is compared using fingerprint input sequence of the fingerprint sequence contrast module to the multiple fingers of user, if fingerprint Sequence error then triggers alarm module and sounds an alarm;
S5, using data read module read data, for user inquiry, refering to;
S6, using numerical ciphers input module input numerical ciphers, user is inputted using numerical ciphers confirmation module close Code is confirmed, if password mistake, is triggered alarm module and is sounded an alarm;
S7, data are exported using data export module, for user's duplication, used.
As further scheme of the invention: in step S7, in the data deposit mobile hard disk after export.
As further scheme of the invention: in step S7, in the data deposit USB flash disk after export.
Compared with prior art, the beneficial effects of the present invention are: the present invention can carry out user in use Whole process real time monitoring, the identity of moment confirmation user, substantially increases safety, meanwhile, multiple fingers can be set in the present invention Line and fingerprint successive typing sequence, further ensure that safety, when needing to export data, by setting numerical ciphers into One step confirms the identity of user, has further ensured that the safety of data information, the multistage that the present invention passes through setting data Protection system makes data safety obtain strong guarantee.
Detailed description of the invention
Fig. 1 is the module map of computer information data multi-stage protection system.
In figure: 1- photographing module;2- face recognition module;3- fingerprint identification module;4- fingerprint contrast module;The record of 5- fingerprint Enter module;6- fingerprint sequence contrast module;7- fingerprint sequence confirmation module;8- data read module;9- numerical ciphers input mould Block;10- numerical ciphers confirmation module;11- data export module;12- alarm module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment 1
In the embodiment of the present invention, a kind of computer information data multi-stage protection method, comprising:
S1, in advance by the facial information of user, fingerprint, fingerprint typing sequence and numerical ciphers input computer Information Number According to multi-stage protection system;
S2, when user needs to read computer information data, to user face carry out real-time monitoring identification, the moment lock Determine user, midway is avoided to change user, triggers alarm if user is replaced in midway;
S3, the fingerprint of the multiple fingers of user is identified, compares the fingerprint of user, utilizes the body of fingerprint identification user Part, if fingerprint mismatches, trigger alarm;
S4, confirmation is compared to the fingerprint input sequence of the multiple fingers of user, if fingerprint sequence error, triggers alarm;
S5, read data, for user inquiry, refering to;
S6, input numerical ciphers confirm the password of user's input, if password mistake, triggers alarm;
S7, export data, for user's duplication, use.
Referring to Fig. 1, in the embodiment of the present invention, a kind of computer information data multi-stage protection method, system, including camera shooting mould Block 1, face recognition module 2, fingerprint identification module 3, fingerprint contrast module 4, fingerprint recording module 5, fingerprint sequence contrast module 6, fingerprint sequence confirmation module 7, data read module 8 and alarm module 12.
Photographing module 1 is used for the face of captured in real-time user.
The facial characteristics of the user for identification of face recognition module 2, and user is locked, if face recognition module 2 is not It can identify the identity of user, then directly trigger alarm module 12, sound an alarm.
The fingerprint of the user for identification of fingerprint identification module 3, and the fingerprint typing sequence of the multiple fingers of user is recorded, And the finger print information being collected into is sent to fingerprint contrast module 4.
Fingerprint recording module 5 is for the finger print information of multiple fingers of typing user in advance and fingerprint typing sequence.
Fingerprint contrast module 4 for recording the finger print information that fingerprint identification module 3 is collected into fingerprint recording module 5 in advance The finger print information of the user entered compares, if the two mismatches, directly triggers alarm module 12, sounds an alarm.
Fingerprint sequence confirmation module 7 is used to confirm the fingerprint typing sequence of multiple fingers of user.
Fingerprint sequence contrast module 6 is used to compare the fingerprint input sequence of user, and records in advance with fingerprint recording module 5 The fingerprint typing sequence entered is compared, if the two mismatches, directly triggers alarm module 12, sounds an alarm.
Data read module 8 for reading protected data, for user's inquiry, refering to.
Embodiment 2
A kind of computer information data multi-stage protection method, system further includes numerical ciphers input module 9, numerical ciphers confirmation module 10 and data export module 11.
Numerical ciphers input module 9 is used for when user needs to export data, needs input numerical ciphers, further really Recognize user's identity.
Numerical ciphers confirmation module 10 is used to confirm the numerical ciphers of user's input, password and typing early period when input Password not match when, then directly trigger alarm module 12, sound an alarm.
Data export module 11 is used to protected data exporting to external storage equipment, such as USB flash disk, mobile hard disk.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (7)

1. a kind of computer information data multi-stage protection system, which is characterized in that including photographing module (1), face recognition module (2), fingerprint identification module (3), fingerprint contrast module (4), fingerprint recording module (5), fingerprint sequence contrast module (6), fingerprint Sequence confirmation module (7), data read module (8) and alarm module (12), photographing module (1) is for captured in real-time user's Face, the facial characteristics of face recognition module (2) user for identification, fingerprint identification module (3) user for identification Fingerprint, and the fingerprint typing sequence of the multiple fingers of user is recorded, and the finger print information being collected into is sent to fingerprint comparison mould Block (4), the finger print information and fingerprint typing sequence of multiple fingers of the fingerprint recording module (5) for shifting to an earlier date typing user, Fingerprint contrast module (4) is used to the finger print information that fingerprint identification module (3) is collected into shifting to an earlier date typing with fingerprint recording module (5) The finger print information of user compare, fingerprint sequence confirmation module (7) is used to confirm the fingerprint of multiple fingers of user Typing sequence, fingerprint sequence contrast module (6) are used to compare the fingerprint input sequence of user, and with fingerprint recording module (5) The fingerprint typing sequence of typing in advance is compared, if the two mismatches, directly triggering alarm module (12) is sounded an alarm, Data read module (8) is for reading protected data.
2. computer information data multi-stage protection system according to claim 1, which is characterized in that further include numerical ciphers Input module (9), numerical ciphers confirmation module (10) and data export module (11), numerical ciphers input module (9) is for working as When user needs to export data, input numerical ciphers.
3. computer information data multi-stage protection system according to claim 1, which is characterized in that the recognition of face mould Block (2) is also used to real-time lock user.
4. computer information data multi-stage protection system according to claim 2, which is characterized in that the numerical ciphers are true Module (10) are recognized for confirming the numerical ciphers of user's input.
5. a kind of data guard method using any computer information data multi-stage protection system of claim 1-4, It is characterized in that, specific steps are as follows:
S1, in advance by the facial information of user, fingerprint, fingerprint typing sequence and numerical ciphers input computer Information Number According to multi-stage protection system;
S2, when user needs to read computer information data, using photographing module (1), face recognition module (2) to using The face of person carries out real-time monitoring identification, and time locking user avoids midway from changing user, if user is replaced in midway Triggering alarm module (12) sounds an alarm;
S3, it is identified using fingerprint of the fingerprint identification module (3) to the multiple fingers of user, compares the fingerprint of user, benefit It is triggered alarm module (12) if fingerprint is mismatched with the identity of fingerprint identification user and sounded an alarm;
S4, confirmation is compared using fingerprint input sequence of the fingerprint sequence contrast module (6) to the multiple fingers of user, if referring to Line sequence error then triggers alarm module (12) and sounds an alarm;
S5, using data read module (8) read data, for user inquiry, refering to;
S6, using numerical ciphers input module (9) input numerical ciphers, it is defeated to user using numerical ciphers confirmation module (10) The password entered is confirmed, if password mistake, is triggered alarm module (12) and is sounded an alarm;
S7, data are exported using data export module (11), for user's duplication, used.
6. computer information data multi-stage protection method according to claim 5, which is characterized in that in step S7, export In data deposit mobile hard disk afterwards.
7. computer information data multi-stage protection method according to claim 5, which is characterized in that in step S7, export In data deposit USB flash disk afterwards.
CN201811505368.8A 2018-12-10 2018-12-10 A kind of computer information data multi-stage protection system and method Pending CN109635534A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811505368.8A CN109635534A (en) 2018-12-10 2018-12-10 A kind of computer information data multi-stage protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811505368.8A CN109635534A (en) 2018-12-10 2018-12-10 A kind of computer information data multi-stage protection system and method

Publications (1)

Publication Number Publication Date
CN109635534A true CN109635534A (en) 2019-04-16

Family

ID=66072402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811505368.8A Pending CN109635534A (en) 2018-12-10 2018-12-10 A kind of computer information data multi-stage protection system and method

Country Status (1)

Country Link
CN (1) CN109635534A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110398670A (en) * 2019-07-04 2019-11-01 深圳市科安达轨道交通技术有限公司 A kind of railway signal cable insulation testing system
CN111191208A (en) * 2019-12-30 2020-05-22 莆田学院 High-security computer information data protection system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110398670A (en) * 2019-07-04 2019-11-01 深圳市科安达轨道交通技术有限公司 A kind of railway signal cable insulation testing system
CN111191208A (en) * 2019-12-30 2020-05-22 莆田学院 High-security computer information data protection system and method

Similar Documents

Publication Publication Date Title
Li et al. Unobservable re-authentication for smartphones.
CN107992739A (en) User authentication method, apparatus and system
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN105554026A (en) Electronic record information security management system
EP3407232A1 (en) Spatiotemporal authentication
CN108664784A (en) Alarm method, apparatus and system
CN106899409A (en) Identity identifying method and device
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN106780866A (en) Gate control system based on living things feature recognition
CN109635534A (en) A kind of computer information data multi-stage protection system and method
CN106485225A (en) Identity card checking method and system based on biological nature identification
WO2017173640A1 (en) Method and apparatus for recognizing individuals based on multi-mode biological recognition information
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN110175573A (en) The coding of face and iris and verification method, system and computer readable storage medium
CN111597589A (en) Information authenticity protection method and system
CN105184184A (en) Anti-theft method for terminal data
CN103368736B (en) Business information encryption, decryption method and device
Paulini et al. Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection.
KR20190002523A (en) Biometric systems and associated methods based on intrinsic non-refractorable codes of vein nets and tree structures
CN102385673B (en) Human body lock
CN109522694A (en) A kind of identification system based on computer network
CN109815663A (en) A kind of computer information data multi-stage protection system and method
CN105427480A (en) Teller machine based on image analysis
CN107169460A (en) A kind of method for sending information and device, user equipment
CN111478875A (en) Block chain-based biological sign mixed mode authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190416

WD01 Invention patent application deemed withdrawn after publication