CN110751033A - Offline login method and related product - Google Patents

Offline login method and related product Download PDF

Info

Publication number
CN110751033A
CN110751033A CN201910870113.XA CN201910870113A CN110751033A CN 110751033 A CN110751033 A CN 110751033A CN 201910870113 A CN201910870113 A CN 201910870113A CN 110751033 A CN110751033 A CN 110751033A
Authority
CN
China
Prior art keywords
information
verified
data
employee
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910870113.XA
Other languages
Chinese (zh)
Other versions
CN110751033B (en
Inventor
郭浩鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910870113.XA priority Critical patent/CN110751033B/en
Publication of CN110751033A publication Critical patent/CN110751033A/en
Application granted granted Critical
Publication of CN110751033B publication Critical patent/CN110751033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/14Vascular patterns

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to login security detection in the technical field of identity authentication, and particularly discloses an offline login method and a related product, wherein the method comprises the following steps: synchronizing the data information of each employee to a local database; receiving a login request, wherein the login request carries an information set to be verified and an employee identifier; acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified; and when the target matching value is larger than a threshold value, allowing login. The embodiment of the application is beneficial to improving the user experience.

Description

Offline login method and related product
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an offline login method and a related product.
Background
With the popularization of terminal devices and the iterative update of instant messaging tools, currently, when a service person uses a terminal device to handle services, login information (including a user name, a password and the like) generally needs to be input on the terminal device, the terminal device sends the received login information to a server through a network so that the server can authenticate the login information, after the authentication is passed, authentication passing information is fed back to the terminal device, after the terminal device receives the authentication passing information, the service person can log in a corresponding application program, and relevant services are handled in the application program. Therefore, when logging in, an Application Program Interface (API) of a third party needs to be called, the logging mode is single, logging failure is caused when the third party application is abnormal, and the fault tolerance rate is low.
Disclosure of Invention
The embodiment of the application provides an offline login method and a related product, so that offline login can be realized without third-party verification during login application through data synchronization, and user experience is improved.
In a first aspect, an embodiment of the present application provides an offline login method, including:
synchronizing the data information of each employee to a local database;
receiving a login request, wherein the login request carries an information set to be verified and an employee identifier;
acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
and when the target matching value is larger than a threshold value, allowing login.
In a second aspect, an embodiment of the present application provides an offline login apparatus, including:
the synchronization unit is used for synchronizing the data information of each employee to the local database;
the system comprises a receiving unit, a verification unit and a verification unit, wherein the receiving unit is used for receiving a login request which carries an information set to be verified and an employee identifier;
the matching unit is used for acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
and the login unit is used for allowing login when the target matching value is larger than the threshold value.
In a third aspect, embodiments of the present application provide an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the steps in the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, which stores a computer program, where the computer program makes a computer execute the method according to the first aspect.
The embodiment of the application has the following beneficial effects:
it can be seen that in the embodiment of the application, the data information of each employee is synchronized to the local database, the information to be verified is matched with the template in the local database during login, and the login is allowed when the matching is passed, so that offline login is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an offline login method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another offline login method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another offline login method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an offline login apparatus according to an embodiment of the present application;
fig. 5 is a block diagram illustrating functional units of an offline login apparatus according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device in the present application may include a smart phone (such as an Android phone, an iOS phone, a windows phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile internet device MID (Mobile internet devices, abbreviated as MID), a wearable device, and the like, and the electronic device is merely an example, but not an exhaustive example, and includes but is not limited to the electronic device in practical applications, and the electronic device may further include: intelligent vehicle-mounted terminal, computer equipment and the like.
Referring to fig. 1, fig. 1 is a flowchart illustrating an offline login method according to an embodiment of the present application, where the offline login method includes, but is not limited to, the following steps:
101: and synchronizing the data information of each employee to a local database.
The data information of each employee includes other data information such as employee name, gender, age, and verification template, wherein the verification template may include one or a combination of several of a vein template, a fingerprint template, a face template, a phone number, a terminal MAC address, and an employee UM account, which is not limited to the above verification templates, for example, an iris template may also be included.
Optionally, the job data of each employee is synchronized, that is, the data information of each employee is synchronized to the local database.
102: and receiving a login request, wherein the login request carries an information set to be verified and an employee identifier.
103: and acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified.
Optionally, the verification template is synchronized to the local database in the form of a data packet, that is, a template set, and the employee identifier is used as an index identifier of the data packet, so that the template set corresponding to the information set to be verified is queried based on the employee identifier.
Optionally, after the template set is obtained, matching the information to be verified in the information set to be verified with the respective corresponding templates to obtain the target matching value corresponding to the information set to be verified.
104: and when the target matching value is larger than a threshold value, allowing login.
And when the target matching value is larger than the threshold value, determining that the login request is legal and allowing login.
Wherein the threshold may be 0.8, 0.9, or other values.
It can be seen that, in the embodiment of the application, the data information of each employee is synchronized to the local database, when logging in, the information to be verified is matched with the template in the local database, and when the matching is passed, the logging in is allowed, so that the offline logging in is realized.
In some possible embodiments, the implementation process of synchronizing the data information of each employee to the local database may be: acquiring basic data of each employee, wherein the basic data is data information input during job entry; synchronizing the basic data to a local database and establishing index identification for the basic data; acquiring latest input employee data in a first preset period to obtain incremental data of each employee; and synchronizing the incremental data of each employee to the local database according to the index identification. In the embodiment of the application, incremental data are regularly additionally recorded, so that the data of the staff are updated in time, and the problem of mistakenly refusing login is avoided.
Specifically, a jobb timing task is created, the jobb timing task is started through a button interface, latest recorded employee data is periodically scanned to obtain incremental data of each employee in the employees who work, the incremental data of each employee is synchronized to a local database, basic data of the employees are subjected to supplementary recording, and complete data of the employees are synchronized to the local database.
The first preset period may be 1 week, 2 weeks, 1 month, or other values.
In some possible embodiments, after synchronizing the employee data to a local database, the method further comprises: if the information of leaving the job of any employee is received, synchronizing the information of leaving the job to the local database; adding a flag bit to data information corresponding to the employee according to the job leaving information, wherein the flag bit is used for indicating that the data information of the employee is job leaving data; and acquiring employee data of the local database containing the zone bit in a second preset period, and compressing the acquired employee data to obtain compressed data so as to save the storage space of the local database. The job leaving data is deleted through the logic flag bit, so that the employee data of all employees can be inquired in a local database subsequently, and the integrity of the data information of each employee is guaranteed.
In some possible embodiments, the process of synchronizing the basic data to the local database may be: establishing a message queue; synchronizing the base data to a local database through the message queue.
Specifically, a message queue is established in advance, namely a message queue service is established, wherein the message queue service comprises a user name, a password, an access path and a port number, so that before basic data are synchronized to a local database, data volume corresponding to the basic data is obtained, the data volume corresponds to the number of employees to be synchronized, when the data volume is larger than a threshold value, the basic data are added into the message queue, and original data of the employees are synchronized to the local database through the user name, the password, the access path and the port number of the message queue.
In some possible embodiments, if the information set to be verified includes a plurality of pieces of information to be verified, matching the information set to be verified with the template set, and obtaining a target matching value corresponding to the information set to be verified may be: acquiring the information integrity of each piece of information to be verified in the plurality of pieces of information to be verified; selecting first information to be verified with the highest information integrity from the plurality of information to be verified; matching the first information to be verified with a corresponding first template to obtain a first matching value; determining second information to be verified in the information set to be verified according to the first matching value; matching the second information to be verified with a corresponding second template to obtain a second matching value; and obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value.
The information integrity is used for representing the missing condition of each piece of information to be verified, for example, when the piece of information to be verified is a face image, the face image is identified, the integrity of a face region is determined, if the face region contains a complete face, the information integrity is 100%, that is, no information is missing, and if the piece of information to be verified is a telephone number, whether the digit of the telephone number is consistent with a standard format is determined, and the information integrity is obtained.
Optionally, when a plurality of pieces of first to-be-verified information with the highest information integrity are provided, a preset matching level corresponding to each piece of first to-be-verified information is obtained, and the first to-be-verified information with the highest matching level is used as the target first to-be-verified information to match the target first to-be-verified information. The preset matching level is related to the reliability of successful matching, for example, for veins, non-living bodies may be excluded when matching is performed, so that the reliability of the user himself is considered to be the highest when matching is successful, and the telephone number may be input by another person, so that the reliability of matching is the lowest when matching is successful, and the like, which are only exemplified herein.
In some possible embodiments, the determining, according to the first matching value, second information to be verified in the set of information to be verified may be implemented by: determining the integrity of second information according to the first matching value, and selecting second information to be verified corresponding to the integrity of the second information from the plurality of information to be verified, specifically, when the first matching value is higher, the second matching value is lower, and the matching can be successful, so that the information to be verified, which is easy to verify and has less information quantity, can be selected from the plurality of information to be verified as the second information to be verified; on the contrary, when the first matching value is lower, the first matching is considered to be failed to a certain extent, if the two matching are successful, the matching value of the second matching needs to be improved, the verification information which is difficult to verify and has a large amount of information needs to be used as the second verification information, so that the success rate of the whole matching process is improved.
In some possible embodiments, when the first information to be verified is a vein image, matching the first information to be verified with a corresponding first template to obtain a first matching value may be: analyzing the distribution of the characteristic points of the vein image; performing circular image interception on the vein image according to M different circle centers to obtain M circular vein images, wherein M is an integer larger than 3; selecting a target vein image from the M circular vein images, wherein the number of feature points contained in the target circular vein image is larger than that of other circular vein images in the M circular vein images; and dividing the target circular vein image to obtain N circular rings, wherein the widths of the N circular rings are the same. Sequentially matching the N circular rings with vein templates for feature points from the circular ring with the smallest radius in the N circular rings to obtain N matching values; and taking the maximum matching value in the N matching values as a first matching value. In the embodiment, a circular matching mode is adopted, and the vein reliability is high, so that a partial matching mode is adopted, the matching success rate is improved, and the false recognition rate is reduced.
In some possible embodiments, when the first information to be verified is a vein image, matching the first information to be verified with a corresponding first template to obtain a first matching value may be: acquiring a first gray value matrix of the vein image; obtaining a vein template in the template set; and acquiring a second gray value matrix of the vein template. And matching the first gray value matrix with the second template gray value matrix to obtain a first matching value matrix, and taking the maximum matching value in the first matching value matrix as the first matching value corresponding to the vein template. In the embodiment, the vein image and the vein template are partially matched, and when the partial matching is successful, the vein matching is determined to be successful, so that the error recognition rate is reduced, and the login success rate is improved.
Specifically, when the template is recorded, vein images of a body part at a plurality of angles are acquired, for example, when a finger vein is recorded, an operator rotates a finger to record vein images at a plurality of angles, each vein is matched with the acquired vein image, only one vein image is acquired, so the vein image temporarily acquired is only a partial image of the vein template, the scale of the second gray value matrix is larger than that of the first gray value matrix, the first gray value matrix can be sequentially slid on the second gray value matrix according to a preset sliding step length, a third gray value matrix with the same scale as the first gray value matrix is selected on the second template matrix during each sliding, the first gray value matrix and the third gray value matrix are matched to obtain a matching value during the current sliding, and the first matching value matrix is obtained after multiple sliding, and taking the maximum matching value in the first matching value matrix as the first matching value corresponding to each target vein template.
Optionally, the matching value may be obtained by calculating a euclidean distance, a manhattan distance, or a Jaccard coefficient of the first gray value matrix and the third gray value matrix, and the calculation process is prior art and is not described again.
The sliding order on the template matrix may be a sliding order of sliding in rows first and then in columns, and the preset sliding step may be 1 pixel value, 2 pixel values, or other values.
In some possible embodiments, the obtaining of the target matching value corresponding to the information set to be verified according to the first matching value and the second matching value may be implemented by: acquiring first information integrity of the first information to be verified; acquiring a second information integrity of the second information to be verified; determining a first weight coefficient of the first matching value and a second weight coefficient of the second matching value based on the first information integrity and the second information integrity; and weighting the first matching value and the second matching value based on the first weight coefficient and the second weight coefficient to obtain a target matching value corresponding to the information set to be verified.
Because the information integrity represents the reliability of the matching values, the weight coefficient corresponding to each matching value is dynamically set based on the information integrity, so that the obtained target matching value is more representative, and the recognition success rate is improved. For example, if the first information integrity is a% and the second information integrity is b%, if k is a positive real number and k is a ratio of the first weight coefficient and the second weight coefficient, the first weight coefficient is determined to be (k/(k +1)) and the second weight coefficient is determined to be (1/(k + 1)).
In a possible example, before obtaining, from the local database, a set of templates corresponding to the set of information to be verified according to the employee identification, the method further includes: synchronizing the data information of each employee in the local database to a cloud database; when receiving the login request, the method further comprises: judging whether the cloud server is connected with the cloud server, if so, executing the following steps: the login request is sent to the cloud server, the cloud server searches corresponding seed information and a password algorithm according to an information set to be verified in the received login information, a verification window is generated according to the found seed information and password algorithm and a dynamic factor stored in the cloud server, whether a dynamic password in the login information is matched with a dynamic password in the verification window is judged, if yes, login is allowed, and if not, prompt information for refusing user login is sent; if not, the content is executed in step 103, i.e. offline login is performed.
In some possible embodiments, the synchronizing the employee data in the local database to a cloud database includes: adding a time stamp to the data information of each employee, wherein the time stamp is used for recording the synchronization time of the data information of each employee; synchronizing the data added with the timestamp to a cloud database; setting a jobtask for the cloud server, wherein the jobtask is used for indicating the cloud server to periodically scan data information in the cloud database, analyzing a timestamp in the data information, acquiring the storage time of the data information, acquiring the data information of which the storage time is greater than a time threshold, and deleting the data information if no access record is recorded on the data information within preset time.
In some possible embodiments, after allowing the login, the method further comprises: and receiving data information input by a user in an offline state, and storing the data information. Optionally, before storing the data information, performing privacy identification on the data information, and if the data information includes privacy information, performing encryption processing on the data information, and storing the encrypted data information, specifically including: and judging whether a folder corresponding to the data information exists or not, if so, saving the encrypted data information into the file, creating the folder corresponding to the data information when the file corresponding to the data information does not exist, and saving the encrypted data information into a newly created folder.
Referring to fig. 2, fig. 2 is a diagram of another offline login method provided in the embodiment of the present application, where the method includes, but is not limited to, the following steps:
201: and synchronizing the data information of each employee to a local database.
202: and if the information of the job leaving of any employee is received, synchronizing the information of the job leaving to the local database.
203: and adding a mark bit to the data information corresponding to the employee according to the job leaving information, wherein the mark bit is used for indicating that the data information of the employee is job leaving data.
204: and acquiring employee data of the local database containing the zone bit in a second preset period, and compressing the acquired employee data to obtain compressed data so as to save the storage space of the local database.
205: and receiving a login request, wherein the login request carries an information set to be verified and an employee identifier.
206: and acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified.
207: and when the target matching value is larger than a threshold value, allowing login.
It can be seen that in the embodiment of the application, the data information of each employee is synchronized to the local database, the job leaving information of the employee is received after the data information is synchronized, and a flag bit is added to the job leaving data when the employee leaves, so that the job leaving data is logically deleted, and the job leaving data is compressed, so that the storage space of the local database is saved; and matching the information to be verified with the template in the local database during login, and allowing login when the matching is passed, thereby realizing offline login.
It should be noted that, the specific implementation of the steps of the method shown in fig. 2 can refer to the specific implementation of the method described in fig. 1, and will not be described here.
Referring to fig. 3, fig. 3 is a schematic flowchart of another offline login method provided in the embodiment of the present application, where the method includes, but is not limited to, the following steps:
301: and synchronizing the data information of each employee to a local database.
302: and receiving a login request, wherein the login request carries an information set to be verified and an employee identifier.
303: and acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified.
304: and when the target matching value is larger than a threshold value, allowing login.
305: and receiving data information input by a user in an offline state, and storing the data information.
It can be seen that in the embodiment of the application, the data information of each employee is synchronized to the local database, the information to be verified is matched with the template in the local database during login, and the login is allowed when the matching is passed, so that offline login is realized; and moreover, the data information input under offline login is stored, and the integrity of the data is ensured.
It should be noted that, for the specific implementation of the steps of the method shown in fig. 3, reference may be made to the specific implementation of the method described in fig. 1, and a description thereof is omitted here.
Referring to fig. 4, and fig. 4 are schematic structural diagrams of an offline login apparatus 400 according to an embodiment of the present application, as shown in fig. 4, the offline login apparatus 400 includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are different from the one or more application programs, and the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the following steps:
synchronizing the data information of each employee to a local database;
receiving a login request, wherein the login request carries an information set to be verified and an employee identifier;
acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
and when the target matching value is larger than a threshold value, allowing login.
In some possible embodiments, the program is specifically configured to execute the following steps in terms of synchronizing the data information of each employee to a local database:
acquiring basic data of each employee, wherein the basic data is data information input during job entry;
synchronizing the basic data to a local database and establishing index identification for the basic data;
acquiring latest input employee data in a first preset period to obtain incremental data of each employee;
and synchronizing the incremental data to the local database according to the index identification.
In some possible embodiments, the program is further configured to, before synchronizing the base data to the local database, execute the following steps:
establishing a message queue;
in synchronizing the base data to a local database, the program is specifically configured to execute the instructions of: synchronizing the base data to a local database through the message queue.
In some possible embodiments, after synchronizing the employee data to a local database, the program is further for executing the instructions of:
if the information of leaving the job of any employee is received, synchronizing the information of leaving the job to the local database;
adding a flag bit to data information corresponding to the employee according to the job leaving information, wherein the flag bit is used for indicating that the data information of the employee is job leaving data;
and acquiring employee data of the local database containing the zone bit in a second preset period, and compressing the acquired employee data to obtain compressed data so as to save the storage space of the local database.
In some possible embodiments, the information set to be verified includes a plurality of pieces of information to be verified, and in terms of matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified, the above-mentioned program is specifically configured to execute the following instructions:
acquiring the information integrity of each piece of information to be verified in the plurality of pieces of information to be verified;
selecting first information to be verified with the highest information integrity from the plurality of information to be verified;
matching the first information to be verified with a corresponding first template to obtain a first matching value;
determining second information to be verified in the information set to be verified according to the first matching value;
matching the second information to be verified with a corresponding second template to obtain a second matching value;
and obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value.
In some possible embodiments, when the first information to be verified is a vein image, in terms of matching the first information to be verified with a corresponding first template to obtain a first matching value, the above-mentioned program is specifically configured to execute the following instructions:
analyzing the distribution of the characteristic points of the vein image;
performing circular image interception on the vein image according to M different circle centers to obtain M circular vein images, wherein M is an integer larger than 3;
selecting a target vein image from the M circular vein images, wherein the number of feature points contained in the target circular vein image is larger than that of other circular vein images in the M circular vein images;
dividing the target circular vein image to obtain N circular rings, wherein the widths of the N circular rings are the same;
sequentially matching the N circular rings with vein templates for feature points from the circular ring with the smallest radius in the N circular rings to obtain N matching values;
and taking the maximum matching value in the N matching values as a first matching value.
In some possible embodiments, in terms of obtaining the target matching value corresponding to the information set to be verified according to the first matching value and the second matching value, the above-mentioned program is specifically configured to execute the following instructions:
acquiring first information integrity of the first information to be verified;
acquiring a second information integrity of the second information to be verified;
determining a first weight coefficient of the first matching value and a second weight coefficient of the second matching value based on the first information integrity and the second information integrity;
and weighting the first matching value and the second matching value based on the first weight coefficient and the second weight coefficient to obtain a target matching value corresponding to the information set to be verified.
Referring to fig. 5, fig. 5 shows a block diagram of a possible functional unit of the offline registration apparatus 500 according to the above embodiment, where the offline registration apparatus 500 includes: a synchronization unit 510, a receiving unit 520, a matching unit 530 and a logging unit 540, wherein:
a synchronization unit 510, configured to synchronize data information of each employee to a local database;
a receiving unit 520, configured to receive a login request, where the login request carries an information set to be authenticated and an employee identifier;
a matching unit 530, configured to obtain, according to the employee identifier, a template set corresponding to the information set to be verified from the local database, and match the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
a logging unit 540, configured to allow logging when the target matching value is greater than a threshold value.
In some possible embodiments, in synchronizing the data information of each employee to the local database, the synchronization unit 510 is specifically configured to:
acquiring basic data of each employee, wherein the basic data is data information input during job entry;
synchronizing the basic data to a local database and establishing index identification for the basic data;
acquiring latest input employee data in a first preset period to obtain incremental data of each employee;
and synchronizing the incremental data to the local database according to the index identification.
In some possible embodiments, before synchronizing the basic data to the local database, the synchronizing unit 510 is further configured to: establishing a message queue;
in synchronizing the basic data to the local database, the synchronizing unit 510 is specifically configured to: synchronizing the base data to a local database through the message queue.
In some possible embodiments, the offline login apparatus 500 further includes a compression unit 550, wherein:
after synchronizing the employee data to the local database, a compression unit 550 for executing the instructions of the following steps:
if the information of leaving the job of any employee is received, synchronizing the information of leaving the job to the local database;
adding a flag bit to data information corresponding to the employee according to the job leaving information, wherein the flag bit is used for indicating that the data information of the employee is job leaving data;
and acquiring employee data of the local database containing the zone bit in a second preset period, and compressing the acquired employee data to obtain compressed data so as to save the storage space of the local database.
In some possible embodiments, the information set to be verified includes a plurality of information to be verified, and in terms of matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified, the matching unit 530 is specifically configured to:
acquiring the information integrity of each piece of information to be verified in the plurality of pieces of information to be verified;
selecting first information to be verified with the highest information integrity from the plurality of information to be verified;
matching the first information to be verified with a corresponding first template to obtain a first matching value;
determining second information to be verified in the information set to be verified according to the first matching value;
matching the second information to be verified with a corresponding second template to obtain a second matching value;
and obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value.
In some possible embodiments, when the first information to be verified is a vein image, in terms of matching the first information to be verified with a corresponding first template to obtain a first matching value, the matching unit 530 is specifically configured to:
analyzing the distribution of the characteristic points of the vein image;
performing circular image interception on the vein image according to M different circle centers to obtain M circular vein images, wherein M is an integer larger than 3;
selecting a target vein image from the M circular vein images, wherein the number of feature points contained in the target circular vein image is larger than that of other circular vein images in the M circular vein images;
dividing the target circular vein image to obtain N circular rings, wherein the widths of the N circular rings are the same;
sequentially matching the N circular rings with vein templates for feature points from the circular ring with the smallest radius in the N circular rings to obtain N matching values;
and taking the maximum matching value in the N matching values as a first matching value.
In some possible embodiments, in terms of obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value, the matching unit 530 is specifically configured to:
acquiring first information integrity of the first information to be verified;
acquiring a second information integrity of the second information to be verified;
determining a first weight coefficient of the first matching value and a second weight coefficient of the second matching value based on the first information integrity and the second information integrity;
and weighting the first matching value and the second matching value based on the first weight coefficient and the second weight coefficient to obtain a target matching value corresponding to the information set to be verified.
Embodiments of the present application further provide a computer storage medium, where the computer storage medium stores a computer program, and the computer program is executed by a processor to implement part or all of the steps of any one of the offline login methods described in the above method embodiments.
Embodiments of the present application also provide a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform part or all of the steps of any one of the offline login methods as described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. An offline login method, comprising:
synchronizing the data information of each employee to a local database;
receiving a login request, wherein the login request carries an information set to be verified and an employee identifier;
acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
and when the target matching value is larger than a threshold value, allowing login.
2. The method of claim 1, wherein synchronizing the data information for each employee to a local database comprises:
acquiring basic data of each employee, wherein the basic data is data information input during job entry;
synchronizing the basic data to a local database, and establishing index identification for the basic data;
acquiring latest input employee data in a first preset period to obtain incremental data of each employee;
and synchronizing the incremental data to the local database according to the index identification.
3. The method of claim 2, wherein prior to synchronizing the base data to a local database, the method further comprises:
establishing a message queue;
the synchronizing the base data to a local database includes:
synchronizing the base data to a local database through the message queue.
4. The method of claim 1, wherein after synchronizing the employee data to a local database, the method further comprises:
if the information of leaving the job of any employee is received, synchronizing the information of leaving the job to the local database;
adding a flag bit to data information corresponding to the employee according to the job leaving information, wherein the flag bit is used for indicating that the data information of the employee is job leaving data;
and acquiring employee data of the local database containing the zone bit in a second preset period, and compressing the acquired employee data to obtain compressed data so as to save the storage space of the local database.
5. The method according to any one of claims 1 to 4, wherein the information set to be verified includes a plurality of information to be verified, and the matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified includes:
acquiring the information integrity of each piece of information to be verified in the plurality of pieces of information to be verified;
selecting first information to be verified with the highest information integrity from the plurality of information to be verified;
matching the first information to be verified with a corresponding first template to obtain a first matching value;
determining second information to be verified in the information set to be verified according to the first matching value;
matching the second information to be verified with a corresponding second template to obtain a second matching value;
and obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value.
6. The method according to claim 5, wherein when the first information to be verified is a vein image, the matching the first information to be verified with a corresponding first template to obtain a first matching value includes:
analyzing the distribution of the characteristic points of the vein image;
performing circular image interception on the vein image according to M different circle centers to obtain M circular vein images, wherein M is an integer larger than 3;
selecting a target vein image from the M circular vein images, wherein the number of feature points contained in the target circular vein image is larger than that of other circular vein images in the M circular vein images;
dividing the target circular vein image to obtain N circular rings, wherein the widths of the N circular rings are the same;
sequentially matching the N circular rings with vein templates for feature points from the circular ring with the smallest radius in the N circular rings to obtain N matching values;
and taking the maximum matching value in the N matching values as a first matching value.
7. The method according to claim 5 or 6, wherein obtaining a target matching value corresponding to the information set to be verified according to the first matching value and the second matching value comprises:
acquiring first information integrity of the first information to be verified;
acquiring a second information integrity of the second information to be verified;
determining a first weight coefficient of the first matching value and a second weight coefficient of the second matching value based on the first information integrity and the second information integrity;
and weighting the first matching value and the second matching value based on the first weight coefficient and the second weight coefficient to obtain a target matching value corresponding to the information set to be verified.
8. An offline login apparatus, comprising:
the synchronization unit is used for synchronizing the data information of each employee to the local database;
the system comprises a receiving unit, a verification unit and a verification unit, wherein the receiving unit is used for receiving a login request which carries an information set to be verified and an employee identifier;
the matching unit is used for acquiring a template set corresponding to the information set to be verified from the local database according to the employee identification, and matching the information set to be verified with the template set to obtain a target matching value corresponding to the information set to be verified;
and the login unit is used for allowing login when the target matching value is larger than the threshold value.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which is executed by a processor to implement the method according to any one of claims 1-7.
CN201910870113.XA 2019-09-16 2019-09-16 Offline login method and related product Active CN110751033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910870113.XA CN110751033B (en) 2019-09-16 2019-09-16 Offline login method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910870113.XA CN110751033B (en) 2019-09-16 2019-09-16 Offline login method and related product

Publications (2)

Publication Number Publication Date
CN110751033A true CN110751033A (en) 2020-02-04
CN110751033B CN110751033B (en) 2024-07-26

Family

ID=69276372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910870113.XA Active CN110751033B (en) 2019-09-16 2019-09-16 Offline login method and related product

Country Status (1)

Country Link
CN (1) CN110751033B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114637977A (en) * 2022-01-26 2022-06-17 安徽点亮网络技术有限公司 Account authority management method, system and device based on finger vein authentication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049407A (en) * 2015-05-28 2015-11-11 深圳市永兴元科技有限公司 Login method and login device
CN106130739A (en) * 2016-08-29 2016-11-16 乐视控股(北京)有限公司 Application program login process method and device
KR20180008187A (en) * 2016-07-15 2018-01-24 주식회사 마크애니 Video export processing server, video export web server and video export management system, and digital video integraty verification method for encrypted videos
CN107911340A (en) * 2017-10-25 2018-04-13 平安普惠企业管理有限公司 Login validation method, device, equipment and the storage medium of application program
CN109462602A (en) * 2018-12-13 2019-03-12 平安普惠企业管理有限公司 Log-on message storage method, login validation method, device, equipment and medium
CN110135250A (en) * 2019-04-08 2019-08-16 一脉通(深圳)智能科技有限公司 A kind of auth method based on bio-identification, device, equipment and readable medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049407A (en) * 2015-05-28 2015-11-11 深圳市永兴元科技有限公司 Login method and login device
KR20180008187A (en) * 2016-07-15 2018-01-24 주식회사 마크애니 Video export processing server, video export web server and video export management system, and digital video integraty verification method for encrypted videos
CN106130739A (en) * 2016-08-29 2016-11-16 乐视控股(北京)有限公司 Application program login process method and device
CN107911340A (en) * 2017-10-25 2018-04-13 平安普惠企业管理有限公司 Login validation method, device, equipment and the storage medium of application program
CN109462602A (en) * 2018-12-13 2019-03-12 平安普惠企业管理有限公司 Log-on message storage method, login validation method, device, equipment and medium
CN110135250A (en) * 2019-04-08 2019-08-16 一脉通(深圳)智能科技有限公司 A kind of auth method based on bio-identification, device, equipment and readable medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114637977A (en) * 2022-01-26 2022-06-17 安徽点亮网络技术有限公司 Account authority management method, system and device based on finger vein authentication

Also Published As

Publication number Publication date
CN110751033B (en) 2024-07-26

Similar Documents

Publication Publication Date Title
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN104468531B (en) The authorization method of sensitive data, device and system
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN106909811B (en) Method and device for processing user identification
US20130262873A1 (en) Method and system for authenticating remote users
US20140317062A1 (en) Amethod and apparatus for recovering sqlite file deleted from mobile terminal
CN106789855A (en) The method and device of user login validation
WO2015106728A1 (en) Data processing method and system
CN109614789B (en) Terminal equipment verification method and equipment
CN111506632A (en) Data processing method and device
US12072963B2 (en) System and method for affixing a signature using biometric authentication
CN110162942B (en) Identity verification method, device, equipment and storage medium based on time stamp
CN106204038A (en) The method and device that a kind of password string generates
CN102882851B (en) The generation method of address list and server
CN107517180B (en) Login method and device
CN105791246A (en) Information verification method, device and system
CN114245374B (en) Security authentication method, system and related equipment
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
CN107818252B (en) Face recognition information synchronization method and related product
CN110751033B (en) Offline login method and related product
CN116916310B (en) Verification code generation and verification method and device and electronic equipment
CN116450745B (en) Multi-device-based note file operation method, system and readable storage medium
CN110618989B (en) Information processing method, information processing device and related products
CN112328686A (en) Block chain link point sharing method based on digital certificate and related products thereof
CN115499120A (en) Data storage method and data storage platform based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant