CN110401628A - Network data security accesses system - Google Patents
Network data security accesses system Download PDFInfo
- Publication number
- CN110401628A CN110401628A CN201910266166.0A CN201910266166A CN110401628A CN 110401628 A CN110401628 A CN 110401628A CN 201910266166 A CN201910266166 A CN 201910266166A CN 110401628 A CN110401628 A CN 110401628A
- Authority
- CN
- China
- Prior art keywords
- equipment
- image
- connect
- pixel
- network data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 29
- 238000001914 filtration Methods 0.000 claims abstract description 18
- 238000012545 processing Methods 0.000 claims abstract description 16
- 238000012937 correction Methods 0.000 claims abstract description 12
- 238000012544 monitoring process Methods 0.000 claims abstract description 7
- WHXSMMKQMYFTQS-UHFFFAOYSA-N Lithium Chemical compound [Li] WHXSMMKQMYFTQS-UHFFFAOYSA-N 0.000 claims description 22
- 229910052744 lithium Inorganic materials 0.000 claims description 22
- 230000000877 morphologic effect Effects 0.000 claims description 16
- 238000013075 data extraction Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000005611 electricity Effects 0.000 claims description 3
- 238000005530 etching Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 2
- 230000009977 dual effect Effects 0.000 claims 1
- 238000012163 sequencing technique Methods 0.000 claims 1
- 230000003595 spectral effect Effects 0.000 claims 1
- 230000006378 damage Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/20—Image enhancement or restoration using local operators
- G06T5/30—Erosion or dilatation, e.g. thinning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/40—Image enhancement or restoration using histogram techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/80—Geometric correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
- G06T2207/30196—Human being; Person
- G06T2207/30201—Face
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of network data securities to access system, and the terminal includes: monitoring camera, and exit at the train station is arranged, for carrying out live camera shooting movement to outbound scene, to obtain and export collection in worksite image;Instant calibration equipment, for executing colour correction processing to collection in worksite image, to obtain and export corresponding colour correction image;Sort method filter apparatus, for carrying out sort method filtering processing to the colour correction image received, to obtain and export corresponding sort method filtering image.Network data security access system of the invention is safe and reliable, saves artificial.It is made whether that the current outbound train of purchase arranges the web search operation of time ticket due to exporting the face target nearest to each at the train station, particularly critical is, double-encryption mechanism is used in network data transmitting-receiving, to improve the security level of network data.
Description
Technical field
The present invention relates to network safety fileds more particularly to a kind of network data security to access system.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
From the perspective of from the network operation and manager's angle, it is desirable to which the operations such as access, the read-write of local network information are protected
And control, it avoids the occurrence of " trapdoor ", virus, illegal access, refusal service and Internet resources and the prestige such as illegally occupies and illegally control
The side of body prevents the attack with defending against network hacker.For safe and secret department, they wish to illegal, harmful or be related to
The information of state secret be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, country is caused huge
Big loss.
Summary of the invention
The present invention at least has the inventive point of following a few place's keys:
(1) the face target nearest to each is exported at the train station is made whether that the current outbound train of purchase arranges time ticket
Web search operation, it is particularly critical, network data transmitting-receiving in use double-encryption mechanism to improve network data
Security level;
(2) intermediate link for deciding whether skip pictures processing according to the remaining capacity grade of lithium battery, to extend
The working time of image processing system.
According to an aspect of the present invention, a kind of network data security access system is provided, the system comprises: monitoring is taken the photograph
As head, exit at the train station is set, for carrying out live camera shooting movement to outbound scene, to obtain and export collection in worksite figure
Picture;Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the collection in worksite
Image executes colour correction processing, to obtain and export corresponding colour correction image.
More specifically, in the network data security access system, the system also includes: sort method filtering is set
It is standby, it is connect with the instant calibration equipment, for carrying out sort method filtering processing to the colour correction image received, to obtain
It obtains and exports corresponding sort method filtering image.
More specifically, in the network data security access system, the system also includes: histogram equalization is set
It is standby, it connect with the sort method filter apparatus, for receiving the sort method filtering image, the sort method is filtered
Image executes histogram equalization processing, to obtain and export corresponding histogram treatment image.
More specifically, in the network data security access system, the system also includes: Morphological scale-space equipment,
It is connect with the histogram equalization equipment, for executing the form for first expanding post-etching to the histogram treatment image received
Processing, to obtain and export corresponding real time processed images;State recognition equipment, connect with lithium battery, described for detecting
The current state of lithium battery, and when the current state of the lithium battery is operating status, operation identification signal is issued, is also used to
When the current state of the lithium battery is dormant state, suspend mode identification signal is issued;Grade analyzing device, respectively with the shape
State identification equipment is connected with the lithium battery, for when receiving the operation identification signal, to the residue of the lithium battery
Electricity carries out real time parsing, and determines corresponding remaining capacity grade based on the charge value being resolved to;It is set in grade parsing
In standby, the charge value being resolved to is directly proportional to the remaining capacity grade;The grade analyzing device is also used to receiving
When to the suspend mode identification signal, stop carrying out the remaining capacity of the lithium battery real time parsing, and by remaining capacity grade
It is set as zero;Data extraction device is connect with the Morphological scale-space equipment, is used for the depth of field in the real time processed images most
Close face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified.
Network data security access system of the invention is safe and reliable, saves artificial.Due to being exported at the train station to each
A nearest face's target is made whether that the current outbound train of purchase arranges the web search operation of time ticket, particularly critical,
Double-encryption mechanism is used in network data transmitting-receiving, to improve the security level of network data.
Specific embodiment
The embodiment of network data security access system of the invention will be described in detail below.
Encryption is to change original information data with certain special algorithm, even if so that the user of unauthorized obtains
The information encrypted, but the method because not knowing decryption, still can not understand the content of information.In aeronautics, refers to and utilize aviation
Minority control point known to photogra on piece, by photo measure and calculate method as pair or whole photographic strips on increase
The operation at control point.
Encryption why safety, absolutely not because not knowing encryption-decryption algorithm method, but the key of encryption is absolute hidden
Hiding, popular RSA and AES encryption algorithm are all full disclosures, and a side obtains the data encrypted, even if knowing Encryption Algorithm
Might as well, if the key not encrypted, the information for being encrypted protection can not be opened.Only hidden Encryption Algorithm to be to protect information,
In the existing quite discussion of educational circles and industry, it is considered that be not safe enough.Disclosed Encryption Algorithm is to hacker and encryption man
Attack test year in year out compares hidden Encryption Algorithm and wants much more secure.
Currently, since railway station can not accomplish totally-enclosed mode, the situation that causes to steal a ride emerges one after another, thus each train
Standing can all arrange much manually to carry out manually examining tickets whenever there is train column time to reach in exit or visually observe, even if such as
This, due to large number of and manual detection mode the limitation of exit passenger, effect of checking tickets is not obvious.
In order to overcome above-mentioned deficiency, the present invention has built a kind of network data security access system, can effectively solve the problem that phase
The technical issues of answering.
The network data security shown according to an embodiment of the present invention accesses system
Exit at the train station is arranged in monitoring camera, for carrying out live camera shooting movement to outbound scene, simultaneously with acquisition
Export collection in worksite image;
Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the scene
It acquires image and executes colour correction processing, to obtain and export corresponding colour correction image.
Then, continue that the specific structure of network data security access system of the invention is further detailed.
Can also include: in the network data security access system
Sort method filter apparatus is connect with the instant calibration equipment, for the colour correction image received into
Row sort method filtering processing, to obtain and export corresponding sort method filtering image.
Can also include: in the network data security access system
Histogram equalization equipment is connect with the sort method filter apparatus, for receiving the sort method filtering
Image executes histogram equalization processing to the sort method filtering image, to obtain and export corresponding histogram treatment
Image.
Can also include: in the network data security access system
Morphological scale-space equipment is connect with the histogram equalization equipment, for the histogram treatment figure received
The Morphological scale-space of post-etching is expanded, first as executing to obtain and export corresponding real time processed images;
State recognition equipment, connect with lithium battery, for detecting the current state of the lithium battery, and in the lithium battery
Current state be operating status when, issue operation identification signal, be also used to the lithium battery current state be suspend mode shape
When state, suspend mode identification signal is issued;
Grade analyzing device is connect with the state recognition equipment and the lithium battery respectively, for receive it is described
When running identification signal, real time parsing is carried out to the remaining capacity of the lithium battery, and based on determining pair of the charge value being resolved to
The remaining capacity grade answered;
In the grade analyzing device, the charge value being resolved to is directly proportional to the remaining capacity grade;
The grade analyzing device is also used to when receiving the suspend mode identification signal, and stopping remains the lithium battery
Remaining electricity carries out real time parsing, and sets zero for remaining capacity grade;
Data extraction device is connect with the Morphological scale-space equipment, is used for the depth of field in the real time processed images most
Close face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified;
Equipment, including the sub- equipment of double-encryption and the sub- equipment of transmission of network are had secure access to, the sub- equipment of double-encryption is used
In executing double-encryption to the number to be verified, the sub- equipment of transmission of network is connect with the sub- equipment of double-encryption, and being used for will
Data after double-encryption are sent to the authentication server of distal end by time division duplex communication network, to obtain the service for checking credentials
The booking mark that device returns;
Light-illuminating equipment connecting with the secure access equipment, when for being identified as 0 in the booking received, being based on
Relative position of the nearest face's target of the depth of field in the real time processed images face target nearest to the depth of field
Corresponding practical face area executes light-illuminating movement;
FLASH flash memory is connect, for storing respectively with the histogram equalization equipment and the Morphological scale-space equipment
The real time processed images;
Wherein, the authentication server of the distal end is after carrying out double descrambling to the data received, to the body got
Whether part card number, which buys current time outbound train, arranges time ticket and carries out database search, in the case where determining purchase,
1 is set by booking mark, otherwise, sets 0 for booking mark;
Wherein, the sort method filter apparatus, the histogram equalization equipment and the Morphological scale-space equipment is all
It is connect with the grade analyzing device, for entering when the remaining capacity grade received is less than or equal to predetermined level threshold value
Power down mode, otherwise, into working condition;
Wherein, the Morphological scale-space equipment is under power down mode directly using the collection in worksite image as real-time processing
Image output.
Can also include: in the network data security access system
Noise extract equipment is connect, for receiving the real time processed images, to described with the Morphological scale-space equipment
Bright line present in real time processed images is extracted one by one, to obtain the bright line quantity in the real time processed images.
Can also include: in the network data security access system
Window is superimposed equipment, connect with the noise extract equipment, for receiving the bright line quantity, and based on described bright
Line number amount determines the superposition quantity for executing the filter window of filtering, wherein the bright line quantity is more, determines the filter for executing filtering
The superposition quantity of wave window is more, and the shape of each filter window being applied is rectangle, and rectangle width is 1 pixel
Point.
Can also include: in the network data security access system
Pixel selection equipment is connect, for based on folded respectively with the noise extract equipment and window superposition equipment
Filter window shape after adding obtains each pixel of each pixel nearby of each pixel of real time processed images
Value, and determine it is each nearby pixel whether be located on the extracted bright line of noise extract equipment, with from it is described it is real-time from
It manages removal in each pixel nearby of each pixel of image and is located at one or more pixels nearby on bright line to obtain
Obtain each residual pixel point.
Can also include: in the network data security access system
Multiwindow filter apparatus is connect with the pixel selection equipment, is used for each picture of the real time processed images
Each pixel value of the corresponding each residual pixel point of the filtered pixel point is weighted flat by vegetarian refreshments as filtered pixel point
It calculates to obtain the replacement pixel value of the filtered pixel point, wherein by the corresponding each residual pixel of filtered pixel point
Point each pixel value be weighted and averaged calculate include: residual pixel point to the filtered pixel point distance it is remoter, residue
Weighted value used in pixel is smaller;
Image is fitted equipment, connect with the multiwindow filter apparatus, for being based on each filter of the real time processed images
The replacement pixel value of wave pixel, which fits, corresponding has been fitted image;
Wherein, described image fitting equipment is also used to connect with the data extraction device, and being used for will the fitted figure
The data extraction device is sent to as replacing the real time processed images.
In the network data security access system:
The SOC chip of different model is respectively adopted to realize the noise extract equipment, window superposition equipment, described
Pixel selection equipment, the multiwindow filter apparatus and described image are fitted equipment.
In addition, FLASH flash memory is the one kind for belonging to memory devices, " Flash ".Flash memory is then a kind of non-volatile (Non-
Volatile) memory also can muchly keep data under conditions of the supply of no electric current, and storage characteristics is equivalent to firmly
Disk, this characteristic are exactly the basis for the storage medium that flash memory is able to as all kinds of pocket digital devices.
The storage unit of nand flash memory then uses serial structure, and the read-write of storage unit is carried out as unit of page and block
(one page includes several bytes, and several pages then form block storage, and the storage block size of NAND is 8 to 32KB), this structure is maximum
The advantages of be that capacity can be made very big, it is fairly common more than the NAND product of 512MB capacity, the cost of nand flash memory compared with
It is low, be conducive to universal on a large scale.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention
Type.
Claims (9)
1. a kind of network data security accesses system characterized by comprising
Exit at the train station is arranged in monitoring camera, for carrying out live camera shooting movement to outbound scene, to obtain and export
Collection in worksite image;
Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the collection in worksite
Image executes colour correction processing, to obtain and export corresponding colour correction image.
2. network data security as described in claim 1 accesses system, which is characterized in that the system also includes:
Sort method filter apparatus is connect with the instant calibration equipment, for uniting to the colour correction image received
Sequenc-ing cluster processing is counted, to obtain and export corresponding sort method filtering image.
3. network data security as claimed in claim 2 accesses system, which is characterized in that the system also includes:
Histogram equalization equipment is connect with the sort method filter apparatus, for receiving the sort method filtering image,
Histogram equalization processing is executed to the sort method filtering image, to obtain and export corresponding histogram treatment image.
4. network data security as claimed in claim 3 accesses system, which is characterized in that the system also includes:
Morphological scale-space equipment is connect with the histogram equalization equipment, for holding to the histogram treatment image received
Row first expands the Morphological scale-space of post-etching, to obtain and export corresponding real time processed images;
State recognition equipment, connect with lithium battery, for detecting the current state of the lithium battery, and working as in the lithium battery
When preceding state is operating status, operation identification signal is issued, is also used to when the current state of the lithium battery is dormant state,
Issue suspend mode identification signal;
Grade analyzing device is connect with the state recognition equipment and the lithium battery respectively, for receiving the operation
When identification signal, real time parsing is carried out to the remaining capacity of the lithium battery, and is determined based on the charge value being resolved to corresponding
Remaining capacity grade;
In the grade analyzing device, the charge value being resolved to is directly proportional to the remaining capacity grade;
The grade analyzing device is also used to when receiving the suspend mode identification signal, stops the residue electricity to the lithium battery
Amount carries out real time parsing, and sets zero for remaining capacity grade;
Data extraction device is connect with the Morphological scale-space equipment, for nearest to the depth of field in the real time processed images
Face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified;
Have secure access to equipment, including the sub- equipment of double-encryption and the sub- equipment of transmission of network, the sub- equipment of double-encryption for pair
The number to be verified executes double-encryption, and the sub- equipment of transmission of network is connect with the sub- equipment of double-encryption, and being used for will be dual
Encrypted data are sent to the authentication server of distal end by time division duplex communication network, are returned with obtaining the authentication server
The booking mark returned;
Light-illuminating equipment is connect with the secure access equipment, when for being identified as 0 in the booking received, based on described
Relative position of the nearest face's target of the depth of field in the real time processed images face target nearest to the depth of field is corresponding
Practical face area execute light-illuminating movement;
FLASH flash memory is connect with the histogram equalization equipment and the Morphological scale-space equipment respectively, described for storing
Real time processed images;
Wherein, the authentication server of the distal end is after carrying out double descrambling to the data received, to the identity card got
Whether number buys current time outbound train and arranges time ticket progress database search, will purchase in the case where determining purchase
Ticket mark is set as 1, otherwise, sets 0 for booking mark;
Wherein, the sort method filter apparatus, the histogram equalization equipment and the Morphological scale-space equipment all with institute
State grade analyzing device connection, for the remaining capacity grade received be less than or equal to predetermined level threshold value when, into power saving
State, otherwise, into working condition;
Wherein, the Morphological scale-space equipment is under power down mode directly using the collection in worksite image as real time processed images
Output.
5. network data security as claimed in claim 4 accesses system, which is characterized in that the system also includes:
Noise extract equipment is connect with the Morphological scale-space equipment, for receiving the real time processed images, to described real-time
Bright line present in processing image is extracted one by one, to obtain the bright line quantity in the real time processed images.
6. network data security as claimed in claim 5 accesses system, which is characterized in that the system also includes:
Window is superimposed equipment, connect with the noise extract equipment, for receiving the bright line quantity, and is based on the bright line number
Amount determines the superposition quantity for executing the filter window of filtering, wherein the bright line quantity is more, determines the spectral window for executing filtering
The superposition quantity of mouth is more, and the shape of each filter window being applied is rectangle, and rectangle width is 1 pixel.
7. network data security as claimed in claim 6 accesses system, which is characterized in that the system also includes:
Pixel selection equipment is connect, after based on superposition respectively with the noise extract equipment and window superposition equipment
Filter window shape obtain each pixel of real time processed images it is each nearby pixel each pixel value, and
Determine whether each pixel nearby is located on the extracted bright line of noise extract equipment, with from the real time processed images
It is each to obtain to be located at pixel near the one or more on bright line for removal in each pixel nearby of each pixel
Residual pixel point.
8. network data security as claimed in claim 7 accesses system, which is characterized in that the system also includes:
Multiwindow filter apparatus is connect with the pixel selection equipment, is used for each pixel of the real time processed images
As filtered pixel point, each pixel value of the corresponding each residual pixel point of the filtered pixel point is weighted and averaged meter
It calculates to obtain the replacement pixel value of the filtered pixel point, wherein by the corresponding each residual pixel point of the filtered pixel point
Each pixel value be weighted and averaged calculate include: residual pixel point to the filtered pixel point distance it is remoter, residual pixel
Weighted value used in point is smaller;
Image is fitted equipment, connect with the multiwindow filter apparatus, for being based on each filtering picture of the real time processed images
The replacement pixel value of vegetarian refreshments, which fits, corresponding has been fitted image;
Wherein, described image fitting equipment is also used to connect with the data extraction device, for replacing the image that has been fitted
It changes the real time processed images and is sent to the data extraction device.
9. network data security as claimed in claim 8 accesses system, it is characterised in that:
The SOC chip of different model is respectively adopted to realize the noise extract equipment, the window superposition equipment, the pixel
Equipment, the multiwindow filter apparatus and described image is selected to be fitted equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910266166.0A CN110401628A (en) | 2019-04-03 | 2019-04-03 | Network data security accesses system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910266166.0A CN110401628A (en) | 2019-04-03 | 2019-04-03 | Network data security accesses system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110401628A true CN110401628A (en) | 2019-11-01 |
Family
ID=68319855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910266166.0A Pending CN110401628A (en) | 2019-04-03 | 2019-04-03 | Network data security accesses system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110401628A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0908851A2 (en) * | 1997-10-13 | 1999-04-14 | Quality Information Systems, S.A. | A system for the control and monitoring of light vehicle transit in public car parks |
CN1492710A (en) * | 2002-10-24 | 2004-04-28 | 乐金电子(中国)研究开发中心有限公 | Mobile image processing device and method for portable terminal machine of image communication |
CN101197937A (en) * | 2006-12-08 | 2008-06-11 | 佳能株式会社 | Image reproducing apparatus and control method therefor |
CN105931303A (en) * | 2016-04-21 | 2016-09-07 | 关胜晓 | Railway transport intelligent safe passage system and passage method |
CN106780777A (en) * | 2016-12-05 | 2017-05-31 | 中兴智能视觉大数据技术(湖北)有限公司 | A kind of railway testimony of a witness ticket verifying system |
CN106780792A (en) * | 2015-11-18 | 2017-05-31 | 航天信息股份有限公司 | A kind of subway quick payment method and system |
CN107230187A (en) * | 2016-03-25 | 2017-10-03 | 北京三星通信技术研究有限公司 | The method and apparatus of multimedia signal processing |
CN107665536A (en) * | 2017-11-30 | 2018-02-06 | 成都长宇老司机网络科技有限公司 | A kind of quick ticket-checking system based on recognition of face |
CN107958492A (en) * | 2017-11-30 | 2018-04-24 | 中国铁道科学研究院电子计算技术研究所 | A kind of auth method and device based on recognition of face |
CN108022443A (en) * | 2017-09-27 | 2018-05-11 | 于贵庆 | Fixation lugs based on data analysis |
CN108090998A (en) * | 2016-11-20 | 2018-05-29 | 青海沃爱思智能科技有限公司 | A kind of method that the intelligent clearance device of networking is controlled based on recognition of face information |
CN108881706A (en) * | 2017-05-16 | 2018-11-23 | 北京三星通信技术研究有限公司 | Control the method and device of multimedia equipment work |
CN108932616A (en) * | 2018-06-21 | 2018-12-04 | 马铁军 | Electronics transit passage pays switching platform |
-
2019
- 2019-04-03 CN CN201910266166.0A patent/CN110401628A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0908851A2 (en) * | 1997-10-13 | 1999-04-14 | Quality Information Systems, S.A. | A system for the control and monitoring of light vehicle transit in public car parks |
CN1492710A (en) * | 2002-10-24 | 2004-04-28 | 乐金电子(中国)研究开发中心有限公 | Mobile image processing device and method for portable terminal machine of image communication |
CN101197937A (en) * | 2006-12-08 | 2008-06-11 | 佳能株式会社 | Image reproducing apparatus and control method therefor |
CN106780792A (en) * | 2015-11-18 | 2017-05-31 | 航天信息股份有限公司 | A kind of subway quick payment method and system |
CN107230187A (en) * | 2016-03-25 | 2017-10-03 | 北京三星通信技术研究有限公司 | The method and apparatus of multimedia signal processing |
CN105931303A (en) * | 2016-04-21 | 2016-09-07 | 关胜晓 | Railway transport intelligent safe passage system and passage method |
CN108090998A (en) * | 2016-11-20 | 2018-05-29 | 青海沃爱思智能科技有限公司 | A kind of method that the intelligent clearance device of networking is controlled based on recognition of face information |
CN106780777A (en) * | 2016-12-05 | 2017-05-31 | 中兴智能视觉大数据技术(湖北)有限公司 | A kind of railway testimony of a witness ticket verifying system |
CN108881706A (en) * | 2017-05-16 | 2018-11-23 | 北京三星通信技术研究有限公司 | Control the method and device of multimedia equipment work |
CN108022443A (en) * | 2017-09-27 | 2018-05-11 | 于贵庆 | Fixation lugs based on data analysis |
CN107665536A (en) * | 2017-11-30 | 2018-02-06 | 成都长宇老司机网络科技有限公司 | A kind of quick ticket-checking system based on recognition of face |
CN107958492A (en) * | 2017-11-30 | 2018-04-24 | 中国铁道科学研究院电子计算技术研究所 | A kind of auth method and device based on recognition of face |
CN108932616A (en) * | 2018-06-21 | 2018-12-04 | 马铁军 | Electronics transit passage pays switching platform |
Non-Patent Citations (1)
Title |
---|
覃征: "《电子商务导论》", 31 December 2000 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107609373A (en) | A kind of terminal device and its method for safeguard protection | |
CN108062530A (en) | A kind of auth method and system | |
CN206162736U (en) | Access control system based on face recognition | |
CN106530185A (en) | Identity authentication-based business processing method and system, and identity authentication platform | |
CN106650560A (en) | Identity authentication method based on identity card and identity authentication processor and system thereof | |
CN107393073A (en) | Gate inhibition's monitoring control system and method based on image recognition technology | |
US20230091865A1 (en) | Face image verification method and apparatus, electronic device, and storage medium | |
CN104424721A (en) | Face shield identification method combined with ATM | |
CN105574477A (en) | Secure anti-theft method, apparatus and system | |
CN103269481A (en) | Method and system for encrypting and protecting procedure or file of portable electronic equipment | |
CN109492509A (en) | Personal identification method, device, computer-readable medium and system | |
CN108038363A (en) | Improve the method and device of Terminal security | |
CN205827374U (en) | Internet authentication trusted system and terminal | |
CN111866600A (en) | Method, device and system for protecting privacy | |
CN104298988B (en) | A kind of property guard method matched based on video image local feature | |
US8453248B2 (en) | Method and devices for video processing rights enforcement | |
CN107248073A (en) | A kind of Web bank's illegal guard system | |
CN106778160A (en) | Data item display methods and device | |
CN105812127A (en) | NFC dynamic token and working method thereof | |
CN106599843A (en) | Fingerprint authentication method and device | |
CN110008677A (en) | Official seal application method, device and block chain server | |
CN110401628A (en) | Network data security accesses system | |
CN106557450A (en) | A kind of express delivery extraction equipment identity identifying method and express delivery extraction equipment | |
CN106162083A (en) | A kind of HD video overlap-add procedure system and the method carrying out safety certification thereof | |
CN115310061A (en) | Security computer security authentication system and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: No. 313, incubation building, No. 1, No. 11, Changchun Road, Zhengzhou hi tech Zone, Zhengzhou City, Henan Province 450001 Applicant after: Shan Feng Address before: 215600 No.6, North Guotai Road, Zhangjiagang Economic Development Zone, Suzhou City, Jiangsu Province Applicant before: Shan Feng |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191101 |
|
RJ01 | Rejection of invention patent application after publication |