CN111274568A - User side authority control method and device, computer equipment and storage medium - Google Patents

User side authority control method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111274568A
CN111274568A CN202010125464.0A CN202010125464A CN111274568A CN 111274568 A CN111274568 A CN 111274568A CN 202010125464 A CN202010125464 A CN 202010125464A CN 111274568 A CN111274568 A CN 111274568A
Authority
CN
China
Prior art keywords
preset
picture
image
user side
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010125464.0A
Other languages
Chinese (zh)
Inventor
曾志群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202010125464.0A priority Critical patent/CN111274568A/en
Publication of CN111274568A publication Critical patent/CN111274568A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/08Projecting images onto non-planar surfaces, e.g. geodetic screens
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/60Analysis of geometric attributes
    • G06T7/62Analysis of geometric attributes of area, perimeter, diameter or volume
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/56Extraction of image or video features relating to colour

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Multimedia (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Geometry (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The application discloses a user side authority control method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: receiving an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting the first picture to obtain a picture with holes; placing the picture with the hole in a preset virtual three-dimensional space, and penetrating a virtual smooth cylinder through a round hole in the picture with the hole; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.

Description

User side authority control method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for controlling user side permissions, a computer device, and a storage medium.
Background
The effective authority control of the terminal is an important guarantee for information security. Generally, the authority of a large cluster of terminals is controlled by a server, for example, the authority for external communication (meaning that the terminals are in an internal network and must obtain authorization from the server if connection to the external network is required). In the conventional technology, for authorization verification, usually, an application terminal sends an authorization application to a verification terminal, and a verifier using the verification terminal manually verifies whether the authorization reason is reasonable and then gives the application terminal. However, the auditing process takes a certain amount of time, and when quick authorization is required (for example, an email needs to be sent to the outside immediately), the auditing process of the conventional auditing method gives quick authorization, which may cause problems such as information delay. Thus, the conventional scheme is not adequate for situations when urgent authorization is required.
Disclosure of Invention
The present application mainly aims to provide a user side authority control method, device, computer device and storage medium, and aims to reduce the possibility of information leakage on the basis of emergency authorization so as to ensure information security.
In order to achieve the above object, the present application provides a method for controlling user side rights, which is applied to a server and includes:
receiving an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture;
cutting a preset circular area in the first picture to obtain a picture with holes and circular holes;
placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, wherein the radius of the smooth cylinder is equal to that of the round hole, and the virtual three-dimensional space follows the light linear propagation principle, so that the image on the picture with the holes is converged on the surface of the smooth cylinder;
generating a designated position according to a preset position generating method, and collecting a convergence image on the smooth cylinder at the designated position;
calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value;
and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time.
Further, the receiving an emergency authorization application sent by a user side, where before the step of carrying the first picture, the receiving an emergency authorization application includes:
acquiring four pre-collected different initial pictures, and performing cutting and splicing treatment to obtain a first picture, wherein the upper left part, the lower left part, the upper right part and the lower right part of the first picture are respectively from different initial pictures, and the initial pictures and the first picture are both rectangular black and white pictures;
cutting the preset circular area in the first picture to obtain a second picture with a circular hole;
placing the second picture in the virtual three-dimensional space, and penetrating a round hole in the second picture by using a preset smooth cylinder, wherein the virtual three-dimensional space follows the principle of linear propagation of light rays, so that an image on the second picture is converged on the surface of the smooth cylinder;
generating the specified position according to the position generation method, acquiring a third image on the smooth cylinder at the specified position, and recording the third image as a reference image;
and sending the first picture to a user side, and deleting the first picture and the second picture in the server.
Further, the emergency authorization application further records generation time of the first picture, and the step of generating the designated location according to a preset location generation method includes:
taking the circle center of the circular hole as an origin, taking a preset direction in a plane where the picture with holes is located as an x-axis, taking a direction in the plane where the picture with holes is located, which is vertical to the x-axis, as a y-axis, and taking a cylindrical axis direction of the smooth cylinder as a z-axis, so as to establish a three-dimensional rectangular coordinate system;
analyzing the generation time of the first picture to obtain values M, D and T, wherein the values M, D and T respectively refer to the Tth hour on the Dth day in the Mth month of the year of the generation time;
using the formula:
x is k1 × M + a 1; k2 × D + a 2; and z is k3 × T + a3, and the specified position (x, y, z) is calculated, wherein k1, k2, k3, a1, a2 and a1 are preset parameters.
Further, the step of calculating the image similarity value between the convergence image and a preset reference image according to a preset image similarity calculation method includes:
setting the color values of all pixel points in the convergence image as a first color value or a second color value according to a preset pixel binarization setting method, and setting the color values of all pixel points in the reference image as the first color value or the second color value; the pixel binarization setting method comprises the steps of setting pixel points with color values smaller than a preset numerical value as a first color value, and setting pixel points with color values not smaller than the preset numerical value as a second color value;
acquiring a first boundary line in the converged image and a second boundary line in the reference image, wherein the first boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the converged image, and the second boundary line refers to a boundary line between a pixel point of the first color value and a pixel point of the second color value in the reference image;
generating a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line and calculating a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle;
according to the formula:
Figure BDA0002394259360000031
and calculating the image similarity value Sim of the convergence image and a preset reference image.
Further, the emergency authorization application is an application of communication authorization, and the step of giving authorization to the user side and freezing all rights of the user side after a preset time includes:
opening the permission of the user side to use a preset signal channel;
acquiring the size of a total data packet needing to be transmitted by the user side and the size of data transmitted by the user side after preset time;
judging whether the difference value obtained by subtracting the size of the transmitted data from the size of the total data packet is larger than a preset difference threshold value or not;
and if the difference value is larger than the preset difference value threshold value, freezing all the permissions of the user side.
Further, after the steps of giving authorization to the user side and freezing all rights of the user side after a preset time if the image similarity value is greater than a preset similarity threshold, the method includes:
receiving reason information sent by the user side, wherein the reason information is used for explaining the reason that the user side requests emergency authorization;
preprocessing the reason information to obtain a word sequence, wherein the preprocessing at least comprises word segmentation processing;
inputting the word sequence into a specified naive Bayes classifier for classification, thereby obtaining a classification result output by the naive Bayes classifier, wherein the classification result comprises reasonable or unreasonable results;
judging whether the classification result is reasonable or not;
and if the classification result is reasonable, performing permission unfreezing treatment on the user side so as to restore the permission of the user side to the state before the emergency authorization application is sent.
Further, the inputting the word sequence into a specified naive bayes classifier for classification to obtain a classification result output by the naive bayes classifier, wherein the classification result comprises before the reasonable or unreasonable steps:
calling pre-collected training data and test data, wherein the training data and the test data both comprise preset authorized application reasons and audit results corresponding to the authorized application reasons, the audit results comprise reasonable or unreasonable results, and the authorized application reasons at least comprise reasons of emergency authorization;
inputting the training data into an initial naive Bayes classifier for training to obtain an intermediate naive Bayes classifier;
verifying the naive Bayes classifier by using the test data, and judging whether a verification result is passed;
and if the verification result is that the verification is passed, recording the intermediate naive Bayes classifier as an appointed naive Bayes classifier.
The application provides a user side authority control device, is applied to the server, includes:
the system comprises an authorization application receiving unit, a first image processing unit and a second image processing unit, wherein the authorization application receiving unit is used for receiving an emergency authorization application sent by a user side, and the emergency authorization application carries a first image;
the cutting unit is used for cutting a preset circular area in the first picture so as to obtain a picture with holes and circular holes;
a penetrating unit, configured to place the picture with holes in a preset virtual three-dimensional space, and penetrate a circular hole in the picture with holes by using a virtual smooth cylinder, where a radius of the smooth cylinder is equal to a radius of the circular hole, and the virtual three-dimensional space follows a light linear propagation principle, so that an image on the picture with holes is converged on a surface of the smooth cylinder;
the convergence image acquisition unit is used for generating a specified position according to a preset position generation method and acquiring a convergence image on the smooth cylinder at the specified position;
the similarity calculation unit is used for calculating the image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method and judging whether the image similarity value is larger than a preset similarity threshold value or not;
and the authorization unit is used for giving authorization to the user side if the image similarity value is larger than a preset similarity threshold value, and freezing all the permissions of the user side after preset time.
The present application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
The present application provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
The user side authority control method, the user side authority control device, the computer equipment and the storage medium receive an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting a preset circular area in the first picture to obtain a picture with holes and circular holes; placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, so that an image on the picture with the holes is converged on the surface of the smooth cylinder; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for controlling a user side authority according to an embodiment of the present application;
fig. 2 is a schematic block diagram of a structure of a user side authority control device according to an embodiment of the present application;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a user side permission control method, which is applied to a server and includes:
s1, receiving an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture;
s2, cutting a preset circular area in the first picture to obtain a picture with holes and circular holes;
s3, placing the picture with holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with holes by using a virtual smooth cylinder, wherein the radius of the smooth cylinder is equal to that of the round hole, and the virtual three-dimensional space follows the light linear propagation principle, so that the image on the picture with holes is converged on the surface of the smooth cylinder;
s4, generating a designated position according to a preset position generating method, and collecting a convergence image on the smooth cylinder at the designated position;
s5, calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is larger than a preset similarity threshold value;
and S6, if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time.
The method and the device judge whether to give authorization to the user side or not by using the first picture as the emergency authorization authentication. The emergency authorization refers to rapid authorization and all permissions of the user side are frozen after a preset time, namely the emergency authorization is a disposable product (or a disposable product within a certain time), so that the information security is ensured on the premise of meeting the requirement of the rapid authorization. Specifically, the emergency authorization is expedient, and after the emergency authorization event occurs, the user terminal is indicated to be in a special condition, and in order to prevent information leakage, all rights of the user terminal are frozen after the user terminal pays the cost of possible information leakage to meet the requirement of the emergency authorization, so as to prevent possible information leakage. Furthermore, when the first picture is to be verified, a two-dimensional-three-dimensional-two-dimensional image conversion method (namely, a picture with a hole, an image on a smooth cylinder and a convergence image acquired at a specified position) is adopted, so that the security can be improved as long as the user side can ensure that the first picture is not stolen (namely, a reference image prestored in the server cannot be used as a standard for emergency authorization authentication, and the hidden danger of information leakage on the server is eliminated).
As described in step S1, an emergency authorization application sent by a user end is received, where the emergency authorization application carries a first picture. The emergency authorization refers to quick authorization and all permissions of the user terminal are frozen after a preset time, that is, the emergency authorization is a disposable product (or a disposable product within a certain time). The first picture is used as a standard of emergency authorization authentication. The user terminal can be authorized only when the first picture passes the audit of the server.
As described in step S2, the preset circular area in the first picture is cut to obtain a perforated picture with circular holes. The first picture may be any feasible shape, preferably a rectangular picture. The preset circular area can be at any feasible position in the first picture, and preferably, the circle center is overlapped with the center of the first picture.
As described in the above step S3, the perforated picture is placed in a predetermined virtual three-dimensional space, and a virtual smooth cylinder is used to penetrate through the circular hole in the perforated picture, wherein the radius of the smooth cylinder is equal to the radius of the circular hole, and the virtual three-dimensional space follows the principle of ray straight-line propagation, so that the image on the perforated picture is converged on the surface of the smooth cylinder. The virtual three-dimensional space may be constructed by any method, such as a 3D modeling tool, and will not be described herein. And the virtual three-dimensional space is similar to the real three-dimensional space and also follows the ray straight line propagation principle. And then a virtual smooth cylinder is used for penetrating through the round hole in the picture with the hole, wherein the radius of the smooth cylinder is equal to that of the round hole, so that the situation that one cylinder penetrates through one picture is formed. And because the virtual three-dimensional space follows the light linear propagation principle and the cylinder is a smooth cylinder, the image of the picture with the holes can be projected onto the smooth cylinder, so that the two-dimensional image is converted into the image on the three-dimensional cylinder.
As described in the above step S4, according to the preset position generating method, a specified position is generated, and a convergent image on the smooth cylinder is acquired at the specified position. Wherein the specified location is a location at which a converging image on the smooth cylinder can be acquired. The position generating method comprises the following steps: taking the circle center of the circular hole as an origin, taking a preset direction in a plane where the picture with holes is located as an x-axis, taking a direction in the plane where the picture with holes is located, which is vertical to the x-axis, as a y-axis, and taking a cylindrical axis direction of the smooth cylinder as a z-axis, so as to establish a three-dimensional rectangular coordinate system; analyzing the generation time of the first picture to obtain values M, D and T, wherein the values M, D and T respectively refer to the Tth hour on the Dth day in the Mth month of the year of the generation time; using the formula:
x is k1 × M + a 1; k2 × D + a 2; and z is k3 × T + a3, and the specified position (x, y, z) is calculated, wherein k1, k2, k3, a1, a2 and a1 are preset parameters.
As described in step S5, according to a preset image similarity calculation method, an image similarity value between the convergence image and a preset reference image is calculated, and it is determined whether the image similarity value is greater than a preset similarity threshold. The image similarity calculation method may be any method, for example, a method of comparing pixel points one by one is adopted, and a calculation method with less calculation power consumption (compared with pixel point comparison) is preferably adopted to increase the calculation speed. The image similarity calculation method includes: setting the color values of all pixel points in the convergence image as a first color value or a second color value according to a preset pixel binarization setting method, and setting the color values of all pixel points in the reference image as the first color value or the second color value; the pixel binarization setting method comprises the steps of setting pixel points with color values smaller than a preset numerical value as a first color value, and setting pixel points with color values not smaller than the preset numerical value as a second color value; acquiring a first boundary line in the converged image and a second boundary line in the reference image, wherein the first boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the converged image, and the second boundary line refers to a boundary line between a pixel point of the first color value and a pixel point of the second color value in the reference image; generating a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line and calculating a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle; according to the formula:
Figure BDA0002394259360000081
and calculating the image similarity value Sim of the convergence image and a preset reference image. Thereby increasing the calculation speed.
As described in step S6, if the image similarity value is greater than the preset similarity threshold, the user terminal is authorized and all rights of the user terminal are frozen after a preset time. The emergency authorization is an expedient measure, after the emergency authorization event occurs, the user terminal is in a special condition, and in order to prevent information leakage, all rights of the user terminal are frozen after the requirement of the emergency authorization is met at the cost of one possible information leakage, so as to prevent possible information leakage. Accordingly, the user side is authorized firstly, and all the permissions of the user side are frozen after the preset time. And when the emergency authorization is verified to be reasonable subsequently, the authority of the user side is unfrozen.
In an embodiment, the receiving an emergency authorization application sent by a user side, where the emergency authorization application carries a first picture before step S1, includes:
s01, acquiring four pre-collected different initial pictures, and performing cutting and splicing processing to obtain a first picture, wherein the upper left part, the lower left part, the upper right part and the lower right part of the first picture are respectively from different initial pictures, and the initial pictures and the first picture are both rectangular black and white pictures;
s02, cutting the preset circular area in the first picture to obtain a second picture with a circular hole;
s03, placing the second picture in the virtual three-dimensional space, and penetrating a circular hole in the second picture by using a preset smooth cylinder, wherein the virtual three-dimensional space follows the principle of ray straight-line propagation, so that the image on the second picture is converged on the surface of the smooth cylinder;
s04, generating the specified position according to the position generation method, collecting a third image on the smooth cylinder at the specified position, and marking the third image as a reference image;
s05, sending the first picture to a user side, and deleting the first picture and the second picture in the server.
As described above, generation of the first picture and the reference image is realized. The method includes the steps that a first picture is obtained by obtaining four different initial pictures collected in advance and performing cutting and splicing, specifically, the upper left part of the first picture is obtained by cutting the upper left part of one initial picture, and the lower left part of the first picture is obtained by cutting the lower left part of the other initial picture. The initial picture and the first picture are both rectangular black and white pictures, and due to the adoption of the two-dimensional-three-dimensional-two-dimensional image conversion method, the color value of a pixel is not required to be too high, so that the calculation pressure can be reduced by adopting the black and white pictures, and the identification accuracy cannot be reduced. And finally, the first picture is sent to the user side, and the first picture and the second picture are deleted in the server, so that the first picture only exists in the user side, and the reference image stored in the server can only be used as a reference, so that even if lawless persons steal the reference image, no threat can be caused to information safety, and the information safety is ensured.
In one embodiment, the step S4 of generating the specified location according to a preset location generation method further includes:
s401, taking the circle center of the circular hole as an origin, taking a preset direction in a plane where the picture with holes is located as an x axis, taking a direction perpendicular to the x axis in the plane where the picture with holes is located as a y axis, and taking a cylindrical axis direction of the smooth cylinder as a z axis, so as to establish a three-dimensional rectangular coordinate system;
s402, analyzing the generation time of the first picture to obtain values M, D and T, wherein the values M, D and T respectively refer to the Tth hour in the Dth day in the Mth month of the year of the generation time;
s403, using a formula:
x is k1 × M + a 1; k2 × D + a 2; and z is k3 × T + a3, and the specified position (x, y, z) is calculated, wherein k1, k2, k3, a1, a2 and a1 are preset parameters.
As described above, generation of the specified position according to the preset position generation method is realized. The generation time of the first picture is used as a generation basis of the designated position. Establishing a three-dimensional rectangular coordinate system by taking the circle center of the circular hole as an origin, taking a preset direction in a plane where the picture with holes is located as an x-axis, taking a direction in the plane where the picture with holes is located, which is vertical to the x-axis, as a y-axis, and taking the cylindrical axis direction of the smooth cylinder as a z-axis; reuse formula:
x is k1 × M + a 1; k2 × D + a 2; the designated position (x, y, z) is calculated as k3 × T + a3, and the designated position is generated using the generation time of the first picture. Therefore, the specified position is mapped by the corresponding relationship of the generation time of the first picture, and on the premise that the corresponding parameters are obtained (the server meets the requirements), the generation time of the first picture can be reversely deduced by the specified position, so that the utilization rate of data is improved for the server (for example, when the generation time of the first picture is lost, the data of the specified position is obtained, and the utilization rate of the data can be improved).
In one embodiment, the step S5 of calculating the image similarity value between the convergence image and a preset reference image according to a preset image similarity calculation method includes:
s501, setting color values of all pixel points in the convergence image as a first color value or a second color value according to a preset pixel binarization setting method, and setting color values of all pixel points in the reference image as the first color value or the second color value; the pixel binarization setting method comprises the steps of setting pixel points with color values smaller than a preset numerical value as a first color value, and setting pixel points with color values not smaller than the preset numerical value as a second color value;
s502, acquiring a first boundary line in the convergence image and acquiring a second boundary line in the reference image, wherein the first boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the convergence image, and the second boundary line refers to a boundary line between a pixel point of the first color value and a pixel point of the second color value in the reference image;
s503, generating a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line, and calculating a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle;
s504, according to a formula:
Figure BDA0002394259360000111
and calculating the image similarity value Sim of the convergence image and a preset reference image.
As described above, calculating the image similarity value of the convergence image and the preset reference image is achieved. The method adopts a two-dimensional-three-dimensional-two-dimensional image conversion method, so that the tolerance on the complexity of an image (namely, the complexity of a pattern, the size of color values of pixel points and the like) is high, and in order to reduce the calculation pressure, the method also adopts a pixel binarization setting method, sets the color values of all the pixel points in the convergence image as a first color value or a second color value, and sets the color values of all the pixel points in the reference image as the first color value or the second color value; acquiring a first boundary line in the convergence image and acquiring a second boundary line in the reference image; generating a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line and calculating a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle; according to the formula:
Figure BDA0002394259360000112
and calculating the image similarity value Sim of the convergence image and a preset reference image. The image similarity is converted into the area difference of the minimum circumscribed rectangle through the progressive relation of the image, the boundary line and the minimum circumscribed rectangle, and therefore the calculation speed is improved.
In one embodiment, the emergency authorization application is an application of communication authorization, and the step S6 of giving authorization to the user terminal and freezing all rights of the user terminal after a preset time includes:
s601, opening the authority of the user side for using a preset signal channel;
s602, acquiring the size of a total data packet needing to be transmitted by the user side and the size of data transmitted by the user side after preset time;
s603, judging whether the difference value obtained by subtracting the size of the transmitted data from the size of the total data packet is greater than a preset difference threshold value or not;
s604, if the difference is larger than the preset difference threshold, all the permissions of the user side are frozen.
As described above, it is achieved that the user side is given authorization and all rights of the user side are frozen after a preset time. The emergency authorization gives the user side the authority within the preset time by taking time as a standard, however, when the emergency authorization application is a communication authorization application and the amount of data needing to be communicated is large, a small amount of data is still not transmitted after the preset time, and at this time, if the authority of the user side is forcibly frozen, communication failure is caused, so that the emergency authorization is meaningless. Therefore, the method and the device also open the authority of the user side to use the preset signal channel; acquiring the size of a total data packet needing to be transmitted by the user side and the size of data transmitted by the user side after preset time; judging whether the difference value obtained by subtracting the size of the transmitted data from the size of the total data packet is larger than a preset difference threshold value or not; if the difference value is larger than the preset difference value threshold value, all the permissions of the user side are frozen, and a judgment standard of data quantity is introduced to finely adjust the time of freezing the permissions. If the difference value is greater than the preset difference threshold value, it indicates that a large amount of data is still not transmitted, which is different from the expected situation, so that it is possible to transmit abnormal data (for example, not normal data supposed to be transmitted, but important confidential data, etc.), and at this time, all rights of the user terminal are forcibly frozen to prevent a possible information leakage situation. Further, if the total data packet is not greater than the preset difference threshold, allowing the user side to freeze all the permissions of the user side after the user side finishes transmitting the total data packet. Thereby improving the applicability of the user side authority control method.
In one embodiment, after the step S6 of granting authorization to the user terminal if the image similarity value is greater than a preset similarity threshold, and freezing all rights of the user terminal after a preset time, the method includes:
s61, receiving reason information sent by the user side, wherein the reason information is used for explaining the reason that the user side requests emergency authorization;
s62, preprocessing the reason information to obtain a word sequence, wherein the preprocessing at least comprises word segmentation;
s63, inputting the word sequence into a specified naive Bayes classifier for classification, thereby obtaining a classification result output by the naive Bayes classifier, wherein the classification result comprises reasonable or unreasonable results;
s64, judging whether the classification result is reasonable;
and S65, if the classification result is reasonable, performing permission unfreezing processing on the user side so as to restore the permission of the user side to the state before the emergency authorization application is sent.
As described above, the permission unfreezing processing is performed on the user side, so that the permission of the user side is restored to the state before the emergency authorization application is sent. The preprocessing can be performed in any mode, for example, an open source NLP word segmentation tool, a jieba word segmentation tool and the like. The method comprises the steps of receiving reason information sent by a user side, wherein the reason information is used for explaining the reason that the user side requests emergency authorization; preprocessing the reason information to obtain a word sequence, wherein the preprocessing at least comprises word segmentation processing; and inputting the word sequence into a specified naive Bayes classifier for classification, thereby obtaining a classification result output by the naive Bayes classifier and judging whether the reason for requesting the emergency authorization by the user side is reasonable. The naive Bayes classifier is a series of simple probability classifiers based on Bayes theorem under the strong (naive) independence among the assumed features, has high training speed, is suitable for classifying word sequences, and can classify the word sequences by the naive Bayes classifier only by using pre-collected data verified as reasonable and unreasonable authorization reasons, thereby obtaining the conclusion whether the authorization reasons are reasonable. If the classification result is reasonable, the emergency authorization is necessary, and the user side is not abnormal, so that the user side is unfrozen, and the authority of the user side is restored to the state before the emergency authorization application is sent.
In one embodiment, the inputting the word sequence into a specified naive bayes classifier for classification to obtain a classification result output by the naive bayes classifier, wherein the classification result includes before the reasonable or unreasonable step S63:
s621, calling pre-collected training data and test data, wherein the training data and the test data both comprise preset authorized application reasons and audit results corresponding to the authorized application reasons, the audit results comprise reasonable or unreasonable results, and the authorized application reasons at least comprise reasons of emergency authorization;
s622, inputting the training data into an initial naive Bayes classifier for training to obtain an intermediate naive Bayes classifier;
s623, verifying the intermediate naive Bayes classifier by using the test data, and judging whether a verification result is passed;
and S624, if the verification result is that the verification is passed, recording the intermediate naive Bayes classifier as an appointed naive Bayes classifier.
As described above, an obtain naive bayes classifier is implemented. The training data and the test data are adopted by the application, wherein the reason for the authorization application at least comprises the reason for emergency authorization. Because the emergency authorization application has fewer situations, namely training data and test data of emergency authorization are fewer, the training data and the test data of wider authorization application reasons are adopted, the quantity of the training data and the test data can be effectively increased, and the trained naive Bayes classifier is more accurate. And inputting the training data into an initial naive Bayes classifier for training to obtain an intermediate naive Bayes classifier, verifying the intermediate naive Bayes classifier by using the test data, and recording the intermediate naive Bayes classifier as an appointed naive Bayes classifier if the verification result is that the verification is passed. And obtaining the specified naive Bayes classifier which can be competent for accurately auditing the reason information sent by the user side.
The user side authority control method receives an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting a preset circular area in the first picture to obtain a picture with holes and circular holes; placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, so that an image on the picture with the holes is converged on the surface of the smooth cylinder; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.
Referring to fig. 2, an embodiment of the present application provides a user side permission control device, which is applied to a server, and includes:
an authorization application receiving unit 10, configured to receive an emergency authorization application sent by a user, where the emergency authorization application carries a first picture;
a cutting unit 20, configured to cut a preset circular area in the first picture, so as to obtain a picture with holes and circular holes;
a penetrating unit 30 for placing the perforated picture in a preset virtual three-dimensional space, and penetrating a circular hole in the perforated picture by using a virtual smooth cylinder, wherein the radius of the smooth cylinder is equal to that of the circular hole, and the virtual three-dimensional space follows the principle of light linear propagation, so that an image on the perforated picture is converged on the surface of the smooth cylinder;
a convergence image acquisition unit 40, configured to generate a specified position according to a preset position generation method, and acquire a convergence image on the smooth cylinder at the specified position;
a similarity calculation unit 50, configured to calculate an image similarity value between the convergence image and a preset reference image according to a preset image similarity calculation method, and determine whether the image similarity value is greater than a preset similarity threshold;
an authorization unit 60, configured to give authorization to the user side if the image similarity value is greater than a preset similarity threshold, and freeze all permissions of the user side after a preset time.
The operations respectively executed by the above units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the apparatus comprises:
the cutting and splicing unit is used for acquiring four different initial pictures which are collected in advance, and performing cutting and splicing processing to obtain a first picture, wherein the upper left part, the lower left part, the upper right part and the lower right part of the first picture are respectively from different initial pictures, and the initial pictures and the first picture are both rectangular black and white pictures;
the second picture acquisition unit is used for cutting the preset circular area in the first picture so as to obtain a second picture with a circular hole;
a second picture placing unit, configured to place the second picture in the virtual three-dimensional space, and penetrate a circular hole in the second picture using a preset smooth cylinder, where the virtual three-dimensional space follows a light linear propagation principle, so that an image on the second picture is converged onto a surface of the smooth cylinder;
the third image acquisition unit is used for generating the specified position according to the position generation method, acquiring a third image on the smooth cylinder at the specified position and recording the third image as a reference image;
and the first picture sending unit is used for sending the first picture to a user side and deleting the first picture and the second picture in the server.
The operations respectively executed by the above units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the emergency authorization application further records a generation time of the first picture, and the convergent image capture unit 40 includes:
a coordinate system establishing subunit, configured to use a circle center of the circular hole as an origin, where a preset direction in a plane where the picture with holes is located is an x-axis, a direction perpendicular to the x-axis in the plane where the picture with holes is located is a y-axis, and a cylindrical axis direction of the smooth cylinder is a z-axis, so as to establish a three-dimensional rectangular coordinate system;
a parsing subunit, configured to parse the generation time of the first picture to obtain values M, D and T, where the values M, D and T respectively refer to the tth hour on day D in the mth month of the year in which the generation time is located;
a designated location calculation subunit for using the formula:
x is k1 × M + a 1; k2 × D + a 2; and z is k3 × T + a3, and the specified position (x, y, z) is calculated, wherein k1, k2, k3, a1, a2 and a1 are preset parameters.
The operations executed by the sub-units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the similarity calculation unit 50 includes:
a binarization subunit, configured to set color values of all pixel points in the convergence image as a first color value or a second color value according to a preset pixel binarization setting method, and set color values of all pixel points in the reference image as the first color value or the second color value; the pixel binarization setting method comprises the steps of setting pixel points with color values smaller than a preset numerical value as a first color value, and setting pixel points with color values not smaller than the preset numerical value as a second color value;
a boundary line acquiring subunit, configured to acquire a first boundary line in the converged image, and acquire a second boundary line in the reference image, where the first boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the converged image, and the second boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the reference image;
an area calculation subunit configured to generate a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line, and calculate a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle;
a similarity value calculating subunit, configured to:
Figure BDA0002394259360000171
and calculating the image similarity value Sim of the convergence image and a preset reference image.
The operations executed by the sub-units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the emergency authorization application is an application of communication authorization, and the authorization unit 60 includes:
the permission opening subunit is used for opening the permission of the user side for using the preset signal channel;
the data acquisition subunit is configured to acquire, after a preset time, the size of a total data packet that needs to be transmitted by the user side and the size of data that has been transmitted by the user side;
a difference threshold judgment subunit, configured to judge whether a difference obtained by subtracting the size of the transmitted data from the size of the total data packet is greater than a preset difference threshold;
and the permission freezing subunit is used for freezing all permissions of the user side if the permission freezing subunit is larger than a preset difference threshold.
The operations executed by the sub-units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the apparatus comprises:
a reason information receiving unit, configured to receive reason information sent by the user side, where the reason information is used to explain a reason why the user side requests emergency authorization;
the preprocessing unit is used for preprocessing the reason information so as to obtain a word sequence, wherein the preprocessing at least comprises word segmentation processing;
the classification unit is used for inputting the word sequence into a specified naive Bayes classifier for classification so as to obtain a classification result output by the naive Bayes classifier, wherein the classification result comprises reasonable or unreasonable results;
a classification result judgment unit for judging whether the classification result is reasonable;
and the unfreezing unit is used for unfreezing the authority of the user side if the classification result is reasonable so as to restore the authority of the user side to the state before the emergency authorization application is sent.
The operations respectively executed by the above units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the apparatus comprises:
the system comprises a data calling unit, a data processing unit and a data processing unit, wherein the data calling unit is used for calling pre-collected training data and test data, the training data and the test data both comprise preset authorization application reasons and audit results corresponding to the authorization application reasons, the audit results comprise reasonability or unreasonableness, and the authorization application reasons at least comprise reasons of emergency authorization;
the classifier training unit is used for inputting the training data into an initial naive Bayes classifier for training to obtain an intermediate naive Bayes classifier;
the verification unit is used for verifying the intermediate naive Bayes classifier by using the test data and judging whether a verification result is passed or not;
and the classifier marking unit is used for marking the intermediate naive Bayes classifier as an appointed naive Bayes classifier if the verification result is that the verification is passed.
The operations respectively executed by the above units correspond to the steps of the user side permission control method of the foregoing embodiment one to one, and are not described herein again.
The user side authority control device receives an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting a preset circular area in the first picture to obtain a picture with holes and circular holes; placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, so that an image on the picture with the holes is converged on the surface of the smooth cylinder; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.
Referring to fig. 3, an embodiment of the present invention further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in the figure. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer device is used for storing data used by the user side authority control method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a client side authority control method.
The processor executes the user side authority control method, wherein the steps of the method are respectively in one-to-one correspondence with the steps of executing the user side authority control method of the embodiment, and are not described herein again.
It will be understood by those skilled in the art that the structures shown in the drawings are only block diagrams of some of the structures associated with the embodiments of the present application and do not constitute a limitation on the computer apparatus to which the embodiments of the present application may be applied.
The computer device receives an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting a preset circular area in the first picture to obtain a picture with holes and circular holes; placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, so that an image on the picture with the holes is converged on the surface of the smooth cylinder; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a user side permission control method, where steps included in the method are respectively in one-to-one correspondence with steps of executing the user side permission control method of the foregoing embodiment, and are not described herein again.
The computer-readable storage medium of the application receives an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture; cutting a preset circular area in the first picture to obtain a picture with holes and circular holes; placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, so that an image on the picture with the holes is converged on the surface of the smooth cylinder; collecting a convergent image on the smooth cylinder at the designated position; calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value; and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time. Therefore, the possibility of information leakage is reduced on the basis of emergency authorization, and information safety is guaranteed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A user side authority control method is applied to a server and comprises the following steps:
receiving an emergency authorization application sent by a user side, wherein the emergency authorization application carries a first picture;
cutting a preset circular area in the first picture to obtain a picture with holes and circular holes;
placing the picture with the holes in a preset virtual three-dimensional space, and penetrating a round hole in the picture with the holes by using a virtual smooth cylinder, wherein the radius of the smooth cylinder is equal to that of the round hole, and the virtual three-dimensional space follows the light linear propagation principle, so that the image on the picture with the holes is converged on the surface of the smooth cylinder;
generating a designated position according to a preset position generating method, and collecting a convergence image on the smooth cylinder at the designated position;
calculating an image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method, and judging whether the image similarity value is greater than a preset similarity threshold value;
and if the image similarity value is larger than a preset similarity threshold value, giving authorization to the user side, and freezing all the rights of the user side after preset time.
2. The user side permission control method according to claim 1, wherein the receiving an emergency authorization application sent by a user side, wherein before the step of carrying the first picture, the method comprises:
acquiring four pre-collected different initial pictures, and performing cutting and splicing treatment to obtain a first picture, wherein the upper left part, the lower left part, the upper right part and the lower right part of the first picture are respectively from different initial pictures, and the initial pictures and the first picture are both rectangular black and white pictures;
cutting the preset circular area in the first picture to obtain a second picture with a circular hole;
placing the second picture in the virtual three-dimensional space, and penetrating a round hole in the second picture by using a preset smooth cylinder, wherein the virtual three-dimensional space follows the principle of linear propagation of light rays, so that an image on the second picture is converged on the surface of the smooth cylinder;
generating the specified position according to the position generation method, acquiring a third image on the smooth cylinder at the specified position, and recording the third image as a reference image;
and sending the first picture to a user side, and deleting the first picture and the second picture in the server.
3. The user side authority control method according to claim 1, wherein the emergency authorization application further records a generation time of the first picture, and the step of generating the designated location according to a preset location generation method includes:
taking the circle center of the circular hole as an origin, taking a preset direction in a plane where the picture with holes is located as an x-axis, taking a direction in the plane where the picture with holes is located, which is vertical to the x-axis, as a y-axis, and taking a cylindrical axis direction of the smooth cylinder as a z-axis, so as to establish a three-dimensional rectangular coordinate system;
analyzing the generation time of the first picture to obtain values M, D and T, wherein the values M, D and T respectively refer to the Tth hour on the Dth day in the Mth month of the year of the generation time;
using the formula:
x is k1 × M + a 1; k2 × D + a 2; and z is k3 × T + a3, and the specified position (x, y, z) is calculated, wherein k1, k2, k3, a1, a2 and a1 are preset parameters.
4. The user-side authority control method according to claim 1, wherein the step of calculating the image similarity between the convergence image and a preset reference image according to a preset image similarity calculation method comprises:
setting the color values of all pixel points in the convergence image as a first color value or a second color value according to a preset pixel binarization setting method, and setting the color values of all pixel points in the reference image as the first color value or the second color value; the pixel binarization setting method comprises the steps of setting pixel points with color values smaller than a preset numerical value as a first color value, and setting pixel points with color values not smaller than the preset numerical value as a second color value;
acquiring a first boundary line in the converged image and a second boundary line in the reference image, wherein the first boundary line refers to a boundary line between a pixel point of a first color value and a pixel point of a second color value in the converged image, and the second boundary line refers to a boundary line between a pixel point of the first color value and a pixel point of the second color value in the reference image;
generating a first minimum bounding rectangle of the first boundary line and a second minimum bounding rectangle of the second boundary line and calculating a first area1 of the first minimum bounding rectangle and a second area2 of the second minimum bounding rectangle;
according to the formula:
Figure FDA0002394259350000031
and calculating the image similarity value Sim of the convergence image and a preset reference image.
5. The user side authority control method according to claim 1, wherein the emergency authorization application is an application of communication authorization, and the step of giving authorization to the user side and freezing all authorities of the user side after a preset time includes:
opening the permission of the user side to use a preset signal channel;
acquiring the size of a total data packet needing to be transmitted by the user side and the size of data transmitted by the user side after preset time;
judging whether the difference value obtained by subtracting the size of the transmitted data from the size of the total data packet is larger than a preset difference threshold value or not;
and if the difference value is larger than the preset difference value threshold value, freezing all the permissions of the user side.
6. The method for controlling user side permission according to claim 1, wherein the step of giving the user side authorization if the image similarity value is greater than a preset similarity threshold and freezing all permissions of the user side after a preset time, comprises:
receiving reason information sent by the user side, wherein the reason information is used for explaining the reason that the user side requests emergency authorization;
preprocessing the reason information to obtain a word sequence, wherein the preprocessing at least comprises word segmentation processing;
inputting the word sequence into a specified naive Bayes classifier for classification, thereby obtaining a classification result output by the naive Bayes classifier, wherein the classification result comprises reasonable or unreasonable results;
judging whether the classification result is reasonable or not;
and if the classification result is reasonable, performing permission unfreezing treatment on the user side so as to restore the permission of the user side to the state before the emergency authorization application is sent.
7. The user-side permission control method according to claim 6, wherein the step of inputting the word sequence into a specified naive Bayes classifier for classification to obtain the classification result output by the naive Bayes classifier, wherein the classification result comprises the steps of, before the step of rationalizing or irrational, comprising:
calling pre-collected training data and test data, wherein the training data and the test data both comprise preset authorized application reasons and audit results corresponding to the authorized application reasons, the audit results comprise reasonable or unreasonable results, and the authorized application reasons at least comprise reasons of emergency authorization;
inputting the training data into an initial naive Bayes classifier for training to obtain an intermediate naive Bayes classifier;
verifying the naive Bayes classifier by using the test data, and judging whether a verification result is passed;
and if the verification result is that the verification is passed, recording the intermediate naive Bayes classifier as an appointed naive Bayes classifier.
8. A user side authority control device is applied to a server and comprises:
the system comprises an authorization application receiving unit, a first image processing unit and a second image processing unit, wherein the authorization application receiving unit is used for receiving an emergency authorization application sent by a user side, and the emergency authorization application carries a first image;
the cutting unit is used for cutting a preset circular area in the first picture so as to obtain a picture with holes and circular holes;
a penetrating unit, configured to place the picture with holes in a preset virtual three-dimensional space, and penetrate a circular hole in the picture with holes by using a virtual smooth cylinder, where a radius of the smooth cylinder is equal to a radius of the circular hole, and the virtual three-dimensional space follows a light linear propagation principle, so that an image on the picture with holes is converged on a surface of the smooth cylinder;
the convergence image acquisition unit is used for generating a specified position according to a preset position generation method and acquiring a convergence image on the smooth cylinder at the specified position;
the similarity calculation unit is used for calculating the image similarity value of the convergence image and a preset reference image according to a preset image similarity calculation method and judging whether the image similarity value is larger than a preset similarity threshold value or not;
and the authorization unit is used for giving authorization to the user side if the image similarity value is larger than a preset similarity threshold value, and freezing all the permissions of the user side after preset time.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010125464.0A 2020-02-27 2020-02-27 User side authority control method and device, computer equipment and storage medium Pending CN111274568A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010125464.0A CN111274568A (en) 2020-02-27 2020-02-27 User side authority control method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010125464.0A CN111274568A (en) 2020-02-27 2020-02-27 User side authority control method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111274568A true CN111274568A (en) 2020-06-12

Family

ID=70999229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010125464.0A Pending CN111274568A (en) 2020-02-27 2020-02-27 User side authority control method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111274568A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784668A (en) * 2020-07-01 2020-10-16 武汉楚精灵医疗科技有限公司 Digestive endoscopy image automatic freezing method based on perceptual hash algorithm

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784668A (en) * 2020-07-01 2020-10-16 武汉楚精灵医疗科技有限公司 Digestive endoscopy image automatic freezing method based on perceptual hash algorithm

Similar Documents

Publication Publication Date Title
CN112528259A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN110598823B (en) Signature method and device based on virtual three-dimensional seal and computer equipment
CN114863506B (en) Authentication method, device and system of admission permission and identity authentication terminal
CN115130122A (en) Big data security protection method and system
CN113672654B (en) Data query method, device, computer equipment and storage medium
CN111274568A (en) User side authority control method and device, computer equipment and storage medium
CN117332391A (en) Power distribution network data asset security access method and system considering authority hierarchical management and control
CN109614804B (en) Bimodal biological characteristic encryption method, device and storage device
CN113988862B (en) Safety early warning system and safety early warning method for block chain data chaining method
CN114416875B (en) Task processing method, device, equipment and storage medium based on blockchain
CN113987432A (en) Role authorization method, role authorization device, computer equipment and storage medium
CN109740369A (en) A kind of detection method and device of information steganography
CN117240607B (en) Security authentication method based on security computer
CN116910149B (en) File management system based on distributed database
CN117278334B (en) Intelligent operation and maintenance management method and system for Internet of things
KR102307288B1 (en) Method for managing quality of performing video call certification
CN113987063B (en) Data particle distribution system based on block chain
CN110717157A (en) User authentication method, device, computer equipment and storage medium
CN116956346B (en) Transaction data safety supervision system and method based on big data
CN111404683B (en) Self-service equipment master key generation method, server and self-service equipment
CN113158920B (en) Training method and device for specific action recognition model and computer equipment
CN111415150A (en) Mobile payment method and device based on vehicle-mounted terminal and computer equipment
CN116757879A (en) Building wall cracking monitoring device and method
CN117056890A (en) Personnel identity verification method, device and storage medium
CN117650939A (en) User information management method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination