CN110401628A - Network data security accesses system - Google Patents

Network data security accesses system Download PDF

Info

Publication number
CN110401628A
CN110401628A CN201910266166.0A CN201910266166A CN110401628A CN 110401628 A CN110401628 A CN 110401628A CN 201910266166 A CN201910266166 A CN 201910266166A CN 110401628 A CN110401628 A CN 110401628A
Authority
CN
China
Prior art keywords
equipment
image
connect
pixel
network data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910266166.0A
Other languages
Chinese (zh)
Inventor
山峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910266166.0A priority Critical patent/CN110401628A/en
Publication of CN110401628A publication Critical patent/CN110401628A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/20Image enhancement or restoration using local operators
    • G06T5/30Erosion or dilatation, e.g. thinning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/40Image enhancement or restoration using histogram techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/80Geometric correction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30196Human being; Person
    • G06T2207/30201Face

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of network data securities to access system, and the terminal includes: monitoring camera, and exit at the train station is arranged, for carrying out live camera shooting movement to outbound scene, to obtain and export collection in worksite image;Instant calibration equipment, for executing colour correction processing to collection in worksite image, to obtain and export corresponding colour correction image;Sort method filter apparatus, for carrying out sort method filtering processing to the colour correction image received, to obtain and export corresponding sort method filtering image.Network data security access system of the invention is safe and reliable, saves artificial.It is made whether that the current outbound train of purchase arranges the web search operation of time ticket due to exporting the face target nearest to each at the train station, particularly critical is, double-encryption mechanism is used in network data transmitting-receiving, to improve the security level of network data.

Description

Network data security accesses system
Technical field
The present invention relates to network safety fileds more particularly to a kind of network data security to access system.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
From the perspective of from the network operation and manager's angle, it is desirable to which the operations such as access, the read-write of local network information are protected And control, it avoids the occurrence of " trapdoor ", virus, illegal access, refusal service and Internet resources and the prestige such as illegally occupies and illegally control The side of body prevents the attack with defending against network hacker.For safe and secret department, they wish to illegal, harmful or be related to The information of state secret be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, country is caused huge Big loss.
Summary of the invention
The present invention at least has the inventive point of following a few place's keys:
(1) the face target nearest to each is exported at the train station is made whether that the current outbound train of purchase arranges time ticket Web search operation, it is particularly critical, network data transmitting-receiving in use double-encryption mechanism to improve network data Security level;
(2) intermediate link for deciding whether skip pictures processing according to the remaining capacity grade of lithium battery, to extend The working time of image processing system.
According to an aspect of the present invention, a kind of network data security access system is provided, the system comprises: monitoring is taken the photograph As head, exit at the train station is set, for carrying out live camera shooting movement to outbound scene, to obtain and export collection in worksite figure Picture;Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the collection in worksite Image executes colour correction processing, to obtain and export corresponding colour correction image.
More specifically, in the network data security access system, the system also includes: sort method filtering is set It is standby, it is connect with the instant calibration equipment, for carrying out sort method filtering processing to the colour correction image received, to obtain It obtains and exports corresponding sort method filtering image.
More specifically, in the network data security access system, the system also includes: histogram equalization is set It is standby, it connect with the sort method filter apparatus, for receiving the sort method filtering image, the sort method is filtered Image executes histogram equalization processing, to obtain and export corresponding histogram treatment image.
More specifically, in the network data security access system, the system also includes: Morphological scale-space equipment, It is connect with the histogram equalization equipment, for executing the form for first expanding post-etching to the histogram treatment image received Processing, to obtain and export corresponding real time processed images;State recognition equipment, connect with lithium battery, described for detecting The current state of lithium battery, and when the current state of the lithium battery is operating status, operation identification signal is issued, is also used to When the current state of the lithium battery is dormant state, suspend mode identification signal is issued;Grade analyzing device, respectively with the shape State identification equipment is connected with the lithium battery, for when receiving the operation identification signal, to the residue of the lithium battery Electricity carries out real time parsing, and determines corresponding remaining capacity grade based on the charge value being resolved to;It is set in grade parsing In standby, the charge value being resolved to is directly proportional to the remaining capacity grade;The grade analyzing device is also used to receiving When to the suspend mode identification signal, stop carrying out the remaining capacity of the lithium battery real time parsing, and by remaining capacity grade It is set as zero;Data extraction device is connect with the Morphological scale-space equipment, is used for the depth of field in the real time processed images most Close face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified.
Network data security access system of the invention is safe and reliable, saves artificial.Due to being exported at the train station to each A nearest face's target is made whether that the current outbound train of purchase arranges the web search operation of time ticket, particularly critical, Double-encryption mechanism is used in network data transmitting-receiving, to improve the security level of network data.
Specific embodiment
The embodiment of network data security access system of the invention will be described in detail below.
Encryption is to change original information data with certain special algorithm, even if so that the user of unauthorized obtains The information encrypted, but the method because not knowing decryption, still can not understand the content of information.In aeronautics, refers to and utilize aviation Minority control point known to photogra on piece, by photo measure and calculate method as pair or whole photographic strips on increase The operation at control point.
Encryption why safety, absolutely not because not knowing encryption-decryption algorithm method, but the key of encryption is absolute hidden Hiding, popular RSA and AES encryption algorithm are all full disclosures, and a side obtains the data encrypted, even if knowing Encryption Algorithm Might as well, if the key not encrypted, the information for being encrypted protection can not be opened.Only hidden Encryption Algorithm to be to protect information, In the existing quite discussion of educational circles and industry, it is considered that be not safe enough.Disclosed Encryption Algorithm is to hacker and encryption man Attack test year in year out compares hidden Encryption Algorithm and wants much more secure.
Currently, since railway station can not accomplish totally-enclosed mode, the situation that causes to steal a ride emerges one after another, thus each train Standing can all arrange much manually to carry out manually examining tickets whenever there is train column time to reach in exit or visually observe, even if such as This, due to large number of and manual detection mode the limitation of exit passenger, effect of checking tickets is not obvious.
In order to overcome above-mentioned deficiency, the present invention has built a kind of network data security access system, can effectively solve the problem that phase The technical issues of answering.
The network data security shown according to an embodiment of the present invention accesses system
Exit at the train station is arranged in monitoring camera, for carrying out live camera shooting movement to outbound scene, simultaneously with acquisition Export collection in worksite image;
Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the scene It acquires image and executes colour correction processing, to obtain and export corresponding colour correction image.
Then, continue that the specific structure of network data security access system of the invention is further detailed.
Can also include: in the network data security access system
Sort method filter apparatus is connect with the instant calibration equipment, for the colour correction image received into Row sort method filtering processing, to obtain and export corresponding sort method filtering image.
Can also include: in the network data security access system
Histogram equalization equipment is connect with the sort method filter apparatus, for receiving the sort method filtering Image executes histogram equalization processing to the sort method filtering image, to obtain and export corresponding histogram treatment Image.
Can also include: in the network data security access system
Morphological scale-space equipment is connect with the histogram equalization equipment, for the histogram treatment figure received The Morphological scale-space of post-etching is expanded, first as executing to obtain and export corresponding real time processed images;
State recognition equipment, connect with lithium battery, for detecting the current state of the lithium battery, and in the lithium battery Current state be operating status when, issue operation identification signal, be also used to the lithium battery current state be suspend mode shape When state, suspend mode identification signal is issued;
Grade analyzing device is connect with the state recognition equipment and the lithium battery respectively, for receive it is described When running identification signal, real time parsing is carried out to the remaining capacity of the lithium battery, and based on determining pair of the charge value being resolved to The remaining capacity grade answered;
In the grade analyzing device, the charge value being resolved to is directly proportional to the remaining capacity grade;
The grade analyzing device is also used to when receiving the suspend mode identification signal, and stopping remains the lithium battery Remaining electricity carries out real time parsing, and sets zero for remaining capacity grade;
Data extraction device is connect with the Morphological scale-space equipment, is used for the depth of field in the real time processed images most Close face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified;
Equipment, including the sub- equipment of double-encryption and the sub- equipment of transmission of network are had secure access to, the sub- equipment of double-encryption is used In executing double-encryption to the number to be verified, the sub- equipment of transmission of network is connect with the sub- equipment of double-encryption, and being used for will Data after double-encryption are sent to the authentication server of distal end by time division duplex communication network, to obtain the service for checking credentials The booking mark that device returns;
Light-illuminating equipment connecting with the secure access equipment, when for being identified as 0 in the booking received, being based on Relative position of the nearest face's target of the depth of field in the real time processed images face target nearest to the depth of field Corresponding practical face area executes light-illuminating movement;
FLASH flash memory is connect, for storing respectively with the histogram equalization equipment and the Morphological scale-space equipment The real time processed images;
Wherein, the authentication server of the distal end is after carrying out double descrambling to the data received, to the body got Whether part card number, which buys current time outbound train, arranges time ticket and carries out database search, in the case where determining purchase, 1 is set by booking mark, otherwise, sets 0 for booking mark;
Wherein, the sort method filter apparatus, the histogram equalization equipment and the Morphological scale-space equipment is all It is connect with the grade analyzing device, for entering when the remaining capacity grade received is less than or equal to predetermined level threshold value Power down mode, otherwise, into working condition;
Wherein, the Morphological scale-space equipment is under power down mode directly using the collection in worksite image as real-time processing Image output.
Can also include: in the network data security access system
Noise extract equipment is connect, for receiving the real time processed images, to described with the Morphological scale-space equipment Bright line present in real time processed images is extracted one by one, to obtain the bright line quantity in the real time processed images.
Can also include: in the network data security access system
Window is superimposed equipment, connect with the noise extract equipment, for receiving the bright line quantity, and based on described bright Line number amount determines the superposition quantity for executing the filter window of filtering, wherein the bright line quantity is more, determines the filter for executing filtering The superposition quantity of wave window is more, and the shape of each filter window being applied is rectangle, and rectangle width is 1 pixel Point.
Can also include: in the network data security access system
Pixel selection equipment is connect, for based on folded respectively with the noise extract equipment and window superposition equipment Filter window shape after adding obtains each pixel of each pixel nearby of each pixel of real time processed images Value, and determine it is each nearby pixel whether be located on the extracted bright line of noise extract equipment, with from it is described it is real-time from It manages removal in each pixel nearby of each pixel of image and is located at one or more pixels nearby on bright line to obtain Obtain each residual pixel point.
Can also include: in the network data security access system
Multiwindow filter apparatus is connect with the pixel selection equipment, is used for each picture of the real time processed images Each pixel value of the corresponding each residual pixel point of the filtered pixel point is weighted flat by vegetarian refreshments as filtered pixel point It calculates to obtain the replacement pixel value of the filtered pixel point, wherein by the corresponding each residual pixel of filtered pixel point Point each pixel value be weighted and averaged calculate include: residual pixel point to the filtered pixel point distance it is remoter, residue Weighted value used in pixel is smaller;
Image is fitted equipment, connect with the multiwindow filter apparatus, for being based on each filter of the real time processed images The replacement pixel value of wave pixel, which fits, corresponding has been fitted image;
Wherein, described image fitting equipment is also used to connect with the data extraction device, and being used for will the fitted figure The data extraction device is sent to as replacing the real time processed images.
In the network data security access system:
The SOC chip of different model is respectively adopted to realize the noise extract equipment, window superposition equipment, described Pixel selection equipment, the multiwindow filter apparatus and described image are fitted equipment.
In addition, FLASH flash memory is the one kind for belonging to memory devices, " Flash ".Flash memory is then a kind of non-volatile (Non- Volatile) memory also can muchly keep data under conditions of the supply of no electric current, and storage characteristics is equivalent to firmly Disk, this characteristic are exactly the basis for the storage medium that flash memory is able to as all kinds of pocket digital devices.
The storage unit of nand flash memory then uses serial structure, and the read-write of storage unit is carried out as unit of page and block (one page includes several bytes, and several pages then form block storage, and the storage block size of NAND is 8 to 32KB), this structure is maximum The advantages of be that capacity can be made very big, it is fairly common more than the NAND product of 512MB capacity, the cost of nand flash memory compared with It is low, be conducive to universal on a large scale.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention Type.

Claims (9)

1. a kind of network data security accesses system characterized by comprising
Exit at the train station is arranged in monitoring camera, for carrying out live camera shooting movement to outbound scene, to obtain and export Collection in worksite image;
Instant calibration equipment is connect with the monitoring camera, for receiving the collection in worksite image, to the collection in worksite Image executes colour correction processing, to obtain and export corresponding colour correction image.
2. network data security as described in claim 1 accesses system, which is characterized in that the system also includes:
Sort method filter apparatus is connect with the instant calibration equipment, for uniting to the colour correction image received Sequenc-ing cluster processing is counted, to obtain and export corresponding sort method filtering image.
3. network data security as claimed in claim 2 accesses system, which is characterized in that the system also includes:
Histogram equalization equipment is connect with the sort method filter apparatus, for receiving the sort method filtering image, Histogram equalization processing is executed to the sort method filtering image, to obtain and export corresponding histogram treatment image.
4. network data security as claimed in claim 3 accesses system, which is characterized in that the system also includes:
Morphological scale-space equipment is connect with the histogram equalization equipment, for holding to the histogram treatment image received Row first expands the Morphological scale-space of post-etching, to obtain and export corresponding real time processed images;
State recognition equipment, connect with lithium battery, for detecting the current state of the lithium battery, and working as in the lithium battery When preceding state is operating status, operation identification signal is issued, is also used to when the current state of the lithium battery is dormant state, Issue suspend mode identification signal;
Grade analyzing device is connect with the state recognition equipment and the lithium battery respectively, for receiving the operation When identification signal, real time parsing is carried out to the remaining capacity of the lithium battery, and is determined based on the charge value being resolved to corresponding Remaining capacity grade;
In the grade analyzing device, the charge value being resolved to is directly proportional to the remaining capacity grade;
The grade analyzing device is also used to when receiving the suspend mode identification signal, stops the residue electricity to the lithium battery Amount carries out real time parsing, and sets zero for remaining capacity grade;
Data extraction device is connect with the Morphological scale-space equipment, for nearest to the depth of field in the real time processed images Face's target carries out identification operation, to extract corresponding identity card number and export as number to be verified;
Have secure access to equipment, including the sub- equipment of double-encryption and the sub- equipment of transmission of network, the sub- equipment of double-encryption for pair The number to be verified executes double-encryption, and the sub- equipment of transmission of network is connect with the sub- equipment of double-encryption, and being used for will be dual Encrypted data are sent to the authentication server of distal end by time division duplex communication network, are returned with obtaining the authentication server The booking mark returned;
Light-illuminating equipment is connect with the secure access equipment, when for being identified as 0 in the booking received, based on described Relative position of the nearest face's target of the depth of field in the real time processed images face target nearest to the depth of field is corresponding Practical face area execute light-illuminating movement;
FLASH flash memory is connect with the histogram equalization equipment and the Morphological scale-space equipment respectively, described for storing Real time processed images;
Wherein, the authentication server of the distal end is after carrying out double descrambling to the data received, to the identity card got Whether number buys current time outbound train and arranges time ticket progress database search, will purchase in the case where determining purchase Ticket mark is set as 1, otherwise, sets 0 for booking mark;
Wherein, the sort method filter apparatus, the histogram equalization equipment and the Morphological scale-space equipment all with institute State grade analyzing device connection, for the remaining capacity grade received be less than or equal to predetermined level threshold value when, into power saving State, otherwise, into working condition;
Wherein, the Morphological scale-space equipment is under power down mode directly using the collection in worksite image as real time processed images Output.
5. network data security as claimed in claim 4 accesses system, which is characterized in that the system also includes:
Noise extract equipment is connect with the Morphological scale-space equipment, for receiving the real time processed images, to described real-time Bright line present in processing image is extracted one by one, to obtain the bright line quantity in the real time processed images.
6. network data security as claimed in claim 5 accesses system, which is characterized in that the system also includes:
Window is superimposed equipment, connect with the noise extract equipment, for receiving the bright line quantity, and is based on the bright line number Amount determines the superposition quantity for executing the filter window of filtering, wherein the bright line quantity is more, determines the spectral window for executing filtering The superposition quantity of mouth is more, and the shape of each filter window being applied is rectangle, and rectangle width is 1 pixel.
7. network data security as claimed in claim 6 accesses system, which is characterized in that the system also includes:
Pixel selection equipment is connect, after based on superposition respectively with the noise extract equipment and window superposition equipment Filter window shape obtain each pixel of real time processed images it is each nearby pixel each pixel value, and Determine whether each pixel nearby is located on the extracted bright line of noise extract equipment, with from the real time processed images It is each to obtain to be located at pixel near the one or more on bright line for removal in each pixel nearby of each pixel Residual pixel point.
8. network data security as claimed in claim 7 accesses system, which is characterized in that the system also includes:
Multiwindow filter apparatus is connect with the pixel selection equipment, is used for each pixel of the real time processed images As filtered pixel point, each pixel value of the corresponding each residual pixel point of the filtered pixel point is weighted and averaged meter It calculates to obtain the replacement pixel value of the filtered pixel point, wherein by the corresponding each residual pixel point of the filtered pixel point Each pixel value be weighted and averaged calculate include: residual pixel point to the filtered pixel point distance it is remoter, residual pixel Weighted value used in point is smaller;
Image is fitted equipment, connect with the multiwindow filter apparatus, for being based on each filtering picture of the real time processed images The replacement pixel value of vegetarian refreshments, which fits, corresponding has been fitted image;
Wherein, described image fitting equipment is also used to connect with the data extraction device, for replacing the image that has been fitted It changes the real time processed images and is sent to the data extraction device.
9. network data security as claimed in claim 8 accesses system, it is characterised in that:
The SOC chip of different model is respectively adopted to realize the noise extract equipment, the window superposition equipment, the pixel Equipment, the multiwindow filter apparatus and described image is selected to be fitted equipment.
CN201910266166.0A 2019-04-03 2019-04-03 Network data security accesses system Pending CN110401628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910266166.0A CN110401628A (en) 2019-04-03 2019-04-03 Network data security accesses system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910266166.0A CN110401628A (en) 2019-04-03 2019-04-03 Network data security accesses system

Publications (1)

Publication Number Publication Date
CN110401628A true CN110401628A (en) 2019-11-01

Family

ID=68319855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910266166.0A Pending CN110401628A (en) 2019-04-03 2019-04-03 Network data security accesses system

Country Status (1)

Country Link
CN (1) CN110401628A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0908851A2 (en) * 1997-10-13 1999-04-14 Quality Information Systems, S.A. A system for the control and monitoring of light vehicle transit in public car parks
CN1492710A (en) * 2002-10-24 2004-04-28 乐金电子(中国)研究开发中心有限公 Mobile image processing device and method for portable terminal machine of image communication
CN101197937A (en) * 2006-12-08 2008-06-11 佳能株式会社 Image reproducing apparatus and control method therefor
CN105931303A (en) * 2016-04-21 2016-09-07 关胜晓 Railway transport intelligent safe passage system and passage method
CN106780777A (en) * 2016-12-05 2017-05-31 中兴智能视觉大数据技术(湖北)有限公司 A kind of railway testimony of a witness ticket verifying system
CN106780792A (en) * 2015-11-18 2017-05-31 航天信息股份有限公司 A kind of subway quick payment method and system
CN107230187A (en) * 2016-03-25 2017-10-03 北京三星通信技术研究有限公司 The method and apparatus of multimedia signal processing
CN107665536A (en) * 2017-11-30 2018-02-06 成都长宇老司机网络科技有限公司 A kind of quick ticket-checking system based on recognition of face
CN107958492A (en) * 2017-11-30 2018-04-24 中国铁道科学研究院电子计算技术研究所 A kind of auth method and device based on recognition of face
CN108022443A (en) * 2017-09-27 2018-05-11 于贵庆 Fixation lugs based on data analysis
CN108090998A (en) * 2016-11-20 2018-05-29 青海沃爱思智能科技有限公司 A kind of method that the intelligent clearance device of networking is controlled based on recognition of face information
CN108881706A (en) * 2017-05-16 2018-11-23 北京三星通信技术研究有限公司 Control the method and device of multimedia equipment work
CN108932616A (en) * 2018-06-21 2018-12-04 马铁军 Electronics transit passage pays switching platform

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0908851A2 (en) * 1997-10-13 1999-04-14 Quality Information Systems, S.A. A system for the control and monitoring of light vehicle transit in public car parks
CN1492710A (en) * 2002-10-24 2004-04-28 乐金电子(中国)研究开发中心有限公 Mobile image processing device and method for portable terminal machine of image communication
CN101197937A (en) * 2006-12-08 2008-06-11 佳能株式会社 Image reproducing apparatus and control method therefor
CN106780792A (en) * 2015-11-18 2017-05-31 航天信息股份有限公司 A kind of subway quick payment method and system
CN107230187A (en) * 2016-03-25 2017-10-03 北京三星通信技术研究有限公司 The method and apparatus of multimedia signal processing
CN105931303A (en) * 2016-04-21 2016-09-07 关胜晓 Railway transport intelligent safe passage system and passage method
CN108090998A (en) * 2016-11-20 2018-05-29 青海沃爱思智能科技有限公司 A kind of method that the intelligent clearance device of networking is controlled based on recognition of face information
CN106780777A (en) * 2016-12-05 2017-05-31 中兴智能视觉大数据技术(湖北)有限公司 A kind of railway testimony of a witness ticket verifying system
CN108881706A (en) * 2017-05-16 2018-11-23 北京三星通信技术研究有限公司 Control the method and device of multimedia equipment work
CN108022443A (en) * 2017-09-27 2018-05-11 于贵庆 Fixation lugs based on data analysis
CN107665536A (en) * 2017-11-30 2018-02-06 成都长宇老司机网络科技有限公司 A kind of quick ticket-checking system based on recognition of face
CN107958492A (en) * 2017-11-30 2018-04-24 中国铁道科学研究院电子计算技术研究所 A kind of auth method and device based on recognition of face
CN108932616A (en) * 2018-06-21 2018-12-04 马铁军 Electronics transit passage pays switching platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
覃征: "《电子商务导论》", 31 December 2000 *

Similar Documents

Publication Publication Date Title
CN107609373A (en) A kind of terminal device and its method for safeguard protection
CN108062530A (en) A kind of auth method and system
CN206162736U (en) Access control system based on face recognition
CN106530185A (en) Identity authentication-based business processing method and system, and identity authentication platform
CN106650560A (en) Identity authentication method based on identity card and identity authentication processor and system thereof
CN107393073A (en) Gate inhibition's monitoring control system and method based on image recognition technology
US20230091865A1 (en) Face image verification method and apparatus, electronic device, and storage medium
CN104424721A (en) Face shield identification method combined with ATM
CN105574477A (en) Secure anti-theft method, apparatus and system
CN103269481A (en) Method and system for encrypting and protecting procedure or file of portable electronic equipment
CN109492509A (en) Personal identification method, device, computer-readable medium and system
CN108038363A (en) Improve the method and device of Terminal security
CN205827374U (en) Internet authentication trusted system and terminal
CN111866600A (en) Method, device and system for protecting privacy
CN104298988B (en) A kind of property guard method matched based on video image local feature
US8453248B2 (en) Method and devices for video processing rights enforcement
CN107248073A (en) A kind of Web bank's illegal guard system
CN106778160A (en) Data item display methods and device
CN105812127A (en) NFC dynamic token and working method thereof
CN106599843A (en) Fingerprint authentication method and device
CN110008677A (en) Official seal application method, device and block chain server
CN110401628A (en) Network data security accesses system
CN106557450A (en) A kind of express delivery extraction equipment identity identifying method and express delivery extraction equipment
CN106162083A (en) A kind of HD video overlap-add procedure system and the method carrying out safety certification thereof
CN115310061A (en) Security computer security authentication system and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: No. 313, incubation building, No. 1, No. 11, Changchun Road, Zhengzhou hi tech Zone, Zhengzhou City, Henan Province 450001

Applicant after: Shan Feng

Address before: 215600 No.6, North Guotai Road, Zhangjiagang Economic Development Zone, Suzhou City, Jiangsu Province

Applicant before: Shan Feng

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20191101

RJ01 Rejection of invention patent application after publication