Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a UI design method and a storage medium for safe box app, which can control a safe box to be opened on the app through a combination mode of password login, face recognition, iris recognition and safe box password simulation check, so that the safety of the safe box is ensured.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for designing UI of safe box app is provided, which comprises the following steps:
101, acquiring a safe box login request instruction of a user, jumping a current interface to an ID (identity) identification interface, wherein the current interface is an initial interface of app, the initial interface is specifically distributed in such a way that a virtual button is arranged at a central position, and the login request instruction is triggered when a region of the virtual button is pressed;
step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned;
103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, performing face recognition and iris recognition, acquiring results of the face recognition and the iris recognition, turning to the step 104 if the verification is passed, and returning to the face selection interface if the verification is not passed;
and 104, skipping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the numerical values according to the password numerical values, acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence, judging whether the password numbers are correct passwords or not, opening the safe and returning to the initial interface if the password numbers are correct passwords, and returning to the password verification interface if the password numbers are not correct passwords.
Further, the virtual button in step 101 may also perform fingerprint identification, and the login request command may be triggered only when the fingerprint of the user can be identified and the duration of pressing the virtual button by the user reaches 5 s.
Further, in step 102, when the verification fails, jumping the displayed interface from the ID identification interface to a first intermediate interface, where an interface center position of the first intermediate interface displays a reason for the failure of the verification and a remaining verification number of times of the day, where the verification number is automatically updated to 3 times per day, the verification number is decreased by 1 each time the verification fails, when the display time of the first intermediate interface reaches a first threshold, jumping the displayed interface from the first intermediate interface to an initial interface, and determining whether the remaining face identification number of the day is greater than 0, if so, continuing the verification, and if not, failing to continue the verification.
Further, the interface layout of the face selection interface specifically includes not less than 1 page of face selection sub-interfaces, and the face image of each face selection sub-interface is arranged in the center of the interface in a five-grid form.
Further, the specific placement of the face images further includes that the face image of each face selection sub-interface is a face image subjected to normalization processing, and it is ensured that the eye parts of the face images in the same horizontal line are located in the same horizontal line, and the eye parts of the face images in the same vertical line are located in the same vertical line.
Further, in the step 103, the specific judgment criteria for verifying whether the verification passes include: judging the recognition results of the face recognition and the iris recognition, only when the face recognition and the iris recognition are both passed, transferring to a step 104, when the face recognition and the iris recognition are not completely passed, transferring to a second intermediate interface, displaying the reason of the failed combined recognition and the number of combined recognition times remained on the day at the interface center position of the second intermediate interface, automatically updating the number of combined recognition times to 3 times every day, reducing the verification times to 1 when the verification is failed every time, when the display time of the second intermediate interface reaches a second threshold value, jumping the displayed interface from the second intermediate interface to a face selection interface, judging whether the number of combined recognition times remained on the day is larger than 0, if so, continuing the combined recognition, and if not, failing to continue the combined recognition.
Further, the specific layout of the password verification interface includes: the password verification interface comprises a virtual pointer arranged at the center of the password verification interface, a virtual dial is arranged on the outer side of the virtual pointer, 10 Arabic numerals of 0-9 are arranged on the virtual dial at equal intervals, and a user presses the virtual pointer and drags the virtual pointer to rotate so that the virtual pointer points to 1 Arabic numeral to complete 1-time password number selection.
Further, after the user completes account password verification, 1 log file is formed, and the log file is used for recording the subsequent operation conditions of the user, wherein the subsequent operation conditions specifically include the number of times of errors of face recognition performed by the user, face image information selected by each error, the number of times of errors of password verification performed by the user, and the number of passwords corresponding to each error.
A computer-readable storage medium is also proposed, the computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the UI design method of the safe app.
The invention has the beneficial effects that: the invention provides a UI design method and a storage medium for safe box app, which can control a safe box to be opened on the app by a combination mode of password login, face recognition, iris recognition and safe box password simulation check, so that the safety of the safe box is ensured.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
With reference to fig. 1, the present invention provides a method for designing UI of a safe app, including the following steps:
101, acquiring a safe box login request instruction of a user, jumping a current interface to an ID (identity) identification interface, wherein the current interface is an initial interface of app, the initial interface is specifically distributed in such a way that a virtual button is arranged at a central position, and the login request instruction is triggered when a region of the virtual button is pressed;
step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned;
103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, performing face recognition and iris recognition, acquiring results of the face recognition and the iris recognition, turning to the step 104 if the verification is passed, and returning to the face selection interface if the verification is not passed;
and 104, skipping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the numerical values according to the password numerical values, acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence, judging whether the password numbers are correct passwords or not, opening the safe and returning to the initial interface if the password numbers are correct passwords, and returning to the password verification interface if the password numbers are not correct passwords.
When the safe deposit box is used, firstly, a user presses a virtual button to trigger a login request instruction, then the user inputs an account password registered before the user to confirm the identity information of the user, the user can perform the next operation after the user passes the operation, if the user fails, the login request instruction needs to be sent again, after the identity information is confirmed, the user needs to select a face image of the user to perform face recognition, the user can enter the next interface after the face recognition is successful, namely, a safe deposit box password verification interface, and the safe deposit box can be opened by inputting a correct safe deposit box password.
As a preferred embodiment of the present invention, the virtual button described in step 101 above can also perform fingerprint identification, and the login request command is triggered only when the fingerprint of the user can be identified and the user presses the virtual button for a period of time of 5 s.
In the embodiment, the virtual button is added with a fingerprint identification function, so that two purposes are achieved, the identity of the user can be preliminarily confirmed, the login request of the user can be acquired, and the method is very convenient.
As a preferred embodiment of the present invention, in step 102, when the verification fails, the displayed interface is skipped from the ID identification interface to the first intermediate interface, the interface center position of the first intermediate interface displays the reason of the failure of the verification and the number of verification times remaining on the day, the number of verification times is automatically updated to 3 times per day, the number of verification times is reduced by 1 when the verification fails each time, when the time displayed by the first intermediate interface reaches a first threshold (which can be set manually and reasonably), the displayed interface is skipped from the first intermediate interface to the initial interface, and whether the number of verification times remaining on the day is greater than 0 is determined, if so, the verification can be continued, and if not, the verification cannot be continued.
In the embodiment, the authentication frequency of the user per day is limited to only 3 times, so that the user is prevented from cracking the account password logged in by the user through a malicious means.
As a preferred embodiment of the present invention, the interface layout of the face selection interface specifically includes not less than 1 page of face selection sub-interfaces, and the face image of each face selection sub-interface is arranged in the center of the interface in the form of a five-grid.
In the embodiment, the arrangement problem of the face selection interface is considered, and the face image can be more orderly without losing features by adopting a five-grid arrangement mode.
As a preferred embodiment of the present invention, the specific placement of the face images further includes that the face image of each face selection sub-interface is a face image subjected to normalization processing, and it should be ensured that the eye parts of the face images in the same horizontal line are located in the same horizontal line, and the eye parts of the face images in the same vertical line are located in the same vertical line.
In the embodiment, because the face images have large or small sizes due to shooting, personal problems and the like, the normalization processing is performed on the face images to ensure that the stored face images have the same size, so that a user does not feel that each face image is too obtrusive when selecting the face images, and the use experience of the user is greatly improved.
As a preferred embodiment of the present invention, in the step 103, the specific judgment criteria for verifying whether the verification is passed include: judging the recognition results of the face recognition and the iris recognition, only when the face recognition and the iris recognition are both passed, transferring to a step 104, when the face recognition and the iris recognition are not completely passed, transferring to a second intermediate interface, displaying the reason of the failed combined recognition and the residual combined recognition times on the day at the interface center position of the second intermediate interface, automatically updating the combined recognition times to 3 times every day, reducing the verification times to 1 when the verification is failed every time, when the display time of the second intermediate interface reaches a second threshold value (which can be manually set and reasonably), skipping the displayed interface from the second intermediate interface to a face selection interface, judging whether the residual combined recognition times on the day are larger than 0, if so, continuing the combined recognition, and if not, continuing the combined recognition.
The iris identification technology is based on the iris in eyes for identification, and is applied to security equipment (such as access control and the like) and places with high confidentiality requirements.
The human eye structure is composed of parts such as the sclera, iris, pupil lens, retina, etc. The iris is an annular segment between the black pupil and the white sclera containing many details characteristic of interlaced spots, filaments, coronaries, stripes, crypts, etc. And the iris will remain unchanged throughout life span after it is formed during the fetal development stage. These features determine the uniqueness of the iris features and also the uniqueness of the identification. Therefore, the iris feature of the eye can be used as an identification target for each person.
The process of iris recognition technology generally comprises the following four steps:
1. iris image acquisition
The whole eye of the person is shot by using a specific camera equipment, and the shot image is transmitted to image preprocessing software of an iris recognition system.
2. Image pre-processing
The obtained iris image is processed as follows, so that the requirement of extracting the iris characteristics is met.
Iris positioning: and determining the positions of the inner circle, the outer circle and the quadratic curve in the image. Wherein, the inner circle is the boundary between the iris and the pupil, the outer circle is the boundary between the iris and the sclera, and the secondary curve is the boundary between the iris and the upper and lower eyelids.
Normalization of the iris image: and adjusting the size of the iris in the image to a fixed size set by the recognition system.
Image enhancement: and processing the normalized image by brightness, contrast, smoothness and the like, so as to improve the recognition rate of the iris information in the image.
3. Feature extraction
And extracting characteristic points required by iris recognition from the iris image by adopting a specific algorithm, and coding the characteristic points.
4. Feature matching
And matching the feature codes obtained by feature extraction with the iris image feature codes in the database one by one, and judging whether the iris images are the same iris images or not, thereby achieving the aim of identity recognition.
In the embodiment, the number of times of daily combined recognition (namely face recognition and iris recognition) of the user is limited to only 3, so that the user is prevented from cracking the account password logged in by a malicious means. In the embodiment, the verification accuracy is further ensured and the safety of the safe box is greatly improved by adopting a mode of combined recognition of face recognition and iris recognition.
As a preferred embodiment of the present invention, a specific layout of the password verification interface includes: the password verification interface comprises a virtual pointer arranged at the center of the password verification interface, a virtual dial is arranged on the outer side of the virtual pointer, 10 Arabic numerals of 0-9 are arranged on the virtual dial at equal intervals, and a user presses the virtual pointer and drags the virtual pointer to rotate so that the virtual pointer points to 1 Arabic numeral to complete 1-time password number selection.
In the embodiment, the virtual pointer is arranged to simulate the real rotation unlocking mode of the safe box, so that the preference of a user can be met.
As a preferred embodiment of the present invention, after the user completes the account password verification, 1 log file is formed, where the log file is used to record the subsequent operation conditions of the user, and the subsequent operation conditions specifically include the number of face recognition errors performed by the user, the face image information selected by each error, the number of password verification errors performed by the user, and the number of passwords corresponding to each error.
In the present embodiment, by generating a log file, the owner or manager of the safe can refer to the information of the opener and the error information of the opener in operation, thereby helping the owner or manager of the safe to analyze the risk situation.
A computer-readable storage medium is also proposed, the computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the UI design method of the safe app.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the above-described method embodiments when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.