CN111475790A - Authentication management method and electronic equipment - Google Patents

Authentication management method and electronic equipment Download PDF

Info

Publication number
CN111475790A
CN111475790A CN202010246189.8A CN202010246189A CN111475790A CN 111475790 A CN111475790 A CN 111475790A CN 202010246189 A CN202010246189 A CN 202010246189A CN 111475790 A CN111475790 A CN 111475790A
Authority
CN
China
Prior art keywords
user image
image data
storage space
virtual storage
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010246189.8A
Other languages
Chinese (zh)
Inventor
顾书露
王元成
王左彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202010246189.8A priority Critical patent/CN111475790A/en
Publication of CN111475790A publication Critical patent/CN111475790A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The application discloses an authentication management method. The authentication management method comprises the steps of collecting user image data; performing model training on the user image data to generate a corresponding user image model; allocating a corresponding virtual storage space based on the user image model; and carrying out authority management on the virtual storage space. The authentication management method allocates the corresponding virtual storage space based on the user image model to perform safety management on the virtual storage space, and can realize higher-safety management. In addition, the application also discloses the electronic equipment for implementing the authentication management method.

Description

Authentication management method and electronic equipment
Technical Field
The present application belongs to the field of security technologies, and in particular, to an authentication management method and an electronic device.
Background
At present, various intelligent electronic devices are widely used for life of people, meanwhile, the internet technology is also deep into the aspects of social life, and the high-tech technologies improve the quality of life of people and bring many potential safety hazards, for example, personal data of people including private information such as pictures, telephones, addresses, hobbies and the like are stolen and scattered. Therefore, how to effectively protect personal information becomes an important issue. Currently, to ensure the security of an accessed system, it is necessary to verify the authority of a user attempting to access the accessed system, and this verification operation is referred to as authentication. In order to protect confidential or sensitive files, the current windows system performs authentication management in a user name/password or fingerprint manner. The authentication management mode realizes the management of the file by granting the file authority after the legal user is verified. However, security in this way still has a hidden danger, and both passwords and fingerprints can be forged.
Disclosure of Invention
The application provides an authentication management method. The authentication management method comprises the steps of collecting user image data; performing model training on the user image data to generate a corresponding user image model; allocating a corresponding virtual storage space based on the user image model; and carrying out authority management on the virtual storage space.
Optionally, the performing model training on the user image data to generate a corresponding user image model includes: acquiring a general sample of user image data; labeling the generic sample; making a general sample file; obtaining the primary model based on the generic sample file; acquiring a current actual sample of user image data; making a label sample file based on the primary model and the current actual sample; and acquiring a secondary model based on the label sample file.
The application also provides an authentication management method. The authentication management method comprises the following steps: collecting user image data; judging whether the user image data is matched with a user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user; and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users.
Optionally, the determining whether the user image data matches the user image model includes: judging whether the at least two user image data are matched with the user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user, including: and if at least one of the at least two user image data is judged to be matched with the user image model, displaying the allocated virtual storage space of the corresponding user.
Optionally, the authentication management method further includes: responding to the opening instruction to further display the content of the currently displayed virtual storage space; obtaining first relation information of the at least two user images; and if the first relation information meets the target condition, further displaying the content of the currently displayed virtual storage space.
Optionally, in a case that the allocated virtual storage space of the corresponding user is displayed if the determination result is yes, the authentication management method further includes: collecting image data of other users; obtaining second relation information of the other user image data and the user image data of the corresponding user; and if the second relation information does not meet the target condition, not displaying the content of the currently displayed virtual storage space.
Optionally, the target condition comprises: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships.
Optionally, the determining whether the user image data matches the user image model includes: judging whether user image data is matched with a user image model; if the judgment result is yes, the authentication management method further includes: and responding to the opening instruction, and further displaying the content of the currently displayed virtual storage space.
The application also provides an electronic device. The electronic device includes: the image acquisition module is used for acquiring user image data; the training configuration module is used for carrying out model training on the user image data to generate a corresponding user image model; the storage management module is used for distributing corresponding virtual storage space based on the user image model; and the authentication module is used for carrying out authority management on the virtual storage space.
The application also provides an electronic device. The electronic device includes: the image acquisition module is used for acquiring user image data; the face recognition module is used for judging whether the user image data is matched with a user image model; and the operating system is used for displaying the allocated virtual storage space corresponding to the user when the judgment result of the face recognition module is yes, and not displaying the virtual storage space information for the unallocated user when the judgment result of the face recognition module is no.
According to the authentication management method, the corresponding virtual storage space is distributed based on the user image model, so that the virtual storage space is safely managed, and management with higher safety can be realized.
Drawings
Fig. 1 is a flowchart of model establishment of an authentication management method according to an embodiment of the present application.
Fig. 2 is a flowchart of a model training procedure of an authentication management method according to an embodiment of the present application.
Fig. 3 is a single person authentication flowchart of the authentication management method according to the embodiment of the present application.
Fig. 4 is a flowchart illustrating multi-user authentication in the authentication management method according to the embodiment of the present application.
Fig. 5 is a flowchart of the single person authentication of the authentication management method according to the embodiment of the present application showing another person.
Fig. 6 is a module schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a model building process of an authentication management method according to an embodiment of the present application, which specifically includes the following steps 210 and 240.
Step 210, collecting user image data. When the authentication management method is actually operated, firstly, when a user is added, a camera is used for shooting a user image.
Step 220, performing model training on the user image data to generate a corresponding user image model. Model training is carried out on user image data acquired by a camera, an image feature point set of a user is acquired through artificial intelligence, and then model training is carried out on the image feature points. There are two ways that models can be used, one using a unique model and the other using a dedicated model. A unique model means that different users use the same model. The special model refers to a special model which is adopted by each user and correspondingly matched.
Step 230, allocating corresponding virtual storage space based on the user image model. The authentication management method calls a storage management program to allocate corresponding virtual hard disks or other similar virtual storage spaces, such as a folder, to different users. And the users with non-corresponding rights can not open the corresponding virtual storage space.
And 240, performing authority management on the virtual storage space. After the operation of allocating the virtual storage space is completed, the authentication management method establishes a corresponding relationship between the user and the allocated virtual storage space, and further performs subsequent security management operations, such as authentication operations, through the corresponding relationship.
FIG. 2 is a flowchart of the model training step 220 of the authentication management method, which further includes the step 221-.
Step 221, a generic sample of user image data is obtained. In order to improve the accuracy of model training, the embodiment adopts a two-level face model training mode. Thus, generic samples may first be downloaded from the network. In other embodiments, the general samples may be obtained from other approaches, such as screening out the general samples directly through big data analysis, or using previously stored general samples.
At step 222, labeling is performed on the generic sample.
At step 223, a generic sample file is created. The authentication management method is used for manufacturing a general sample file based on the marked general sample.
Step 224, obtain the primary model. In this embodiment, the primary model only captures a general face portion, and thus, the samples provided for the subsequent secondary model can avoid complicated labeling operation of each specific face image.
Step 225, a current actual sample of the user image data is obtained.
At step 226, a secondary model is obtained. And the authentication management method obtains a secondary model based on the primary model and the current actual sample so as to carry out subsequent training.
The authentication management method provided by the application comprises the following steps: collecting user image data; judging whether the user image data is matched with a user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user; and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users. According to the authentication management method, the corresponding virtual storage space is distributed based on the user image model, so that the virtual storage space is safely managed, and management with higher safety can be realized.
Specifically, the authentication management method provided by the application can be applied to various scenes, such as a scene for authentication, a scene for at least two user authentications, a scene in which others suddenly appear during one user authentication, and the like. The following will specifically describe with reference to the corresponding examples.
Fig. 3 is a single authentication process of the authentication management method according to the embodiment of the present application, which is suitable for a user authentication scenario. The single authentication process specifically comprises the following steps 302-312.
Step 302, a user image data is acquired.
Step 304, determine if a user image data matches the user image model. If the judgment result is no, entering a first flow step 306; if yes, go to the second flow step 308.
A first process:
step 306, not displaying the virtual storage space information for the unallocated users, and returning to step 302.
A second process:
step 308, displaying the allocated corresponding user virtual storage space, and entering step 310.
Step 310, responding to the opening command. The opening instruction is used for opening the virtual storage space by the user to view the content in the virtual storage space.
Step 312, displaying the content of a user virtual storage space currently displayed.
The authentication management method provided in this embodiment performs security management on a virtual storage space by performing authentication operation on a user, thereby implementing the most basic operation mode of the present application.
Fig. 4 is a flowchart of multi-user authentication in the authentication management method according to the embodiment of the present application, and is applicable to at least two user authentication scenarios. The multi-person authentication procedure specifically comprises the following steps 402-416.
At step 402, at least two user image data are acquired.
Step 404, determine whether each user image data matches the user image model. If the judgment result is no, entering a third process step 406; if yes, go to the fourth step 408.
A third flow:
step 406, not displaying the virtual storage space information for the unallocated users, and returning to step 402.
The fourth process:
step 408, displaying the allocated corresponding user virtual storage space, and entering step 410.
Step 410, responding to the opening instruction, further displaying the content of a currently displayed user virtual storage space.
In step 412, first relationship information of at least two user image data is obtained. The first relationship information is used for representing the authority relationship of at least two current users, namely whether the at least two users have the currently displayed authority of the virtual storage space of the corresponding user.
Step 414, determine whether the first relationship information satisfies the target condition. If the determination result is negative, go to step 416; if yes, go to step 418. The target conditions include: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships. The target condition can be obtained by the authentication management method through big data sorting and analysis, can be set by the user with the initial authority alone, and can be determined after being modified by the user with the initial authority after being sorted and analyzed by the preliminary big data.
Step 416, stop displaying the currently displayed virtual storage space, and return to step 408.
Step 418, displaying the content of the virtual storage space currently displayed.
The authentication management method provided by this embodiment performs the authentication operation on at least two users to perform the security management on the virtual storage space, thereby implementing the security management when some users do not have the right, and avoiding the leakage of corresponding content.
Fig. 5 is a flowchart of a case where another person appears during single-person authentication in the authentication management method according to the embodiment of the present application, and is applicable to a scenario where another person appears suddenly during user authentication. The multi-person authentication procedure specifically comprises the following steps 502-518.
Step 502, a user image data is collected.
Step 504, determine if a user image data matches the user image model. If the determination result is negative, go to the fifth flow step 506; if yes, go to the sixth step 508.
A fifth process:
step 506, virtual storage space information is not displayed for unallocated users, and the process returns to step 502.
A sixth process:
step 508, displaying the allocated virtual storage space of the corresponding user, and proceeding to step 510.
Step 510, collecting other user image data.
Step 512, obtain the second relationship information between the image data of other users and the image data of the user corresponding to the current user. The second relationship information is used for representing the authority relationship between the other users and the current corresponding user, namely whether the other users and the current corresponding user have the currently displayed authority of the virtual storage space of the corresponding user.
Step 514, determining whether the second relationship information satisfies the target condition. If the determination result is negative, go to step 516; if yes, go to step 518. The target conditions include: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships. The target condition can be obtained by the authentication management method through big data sorting and analysis, can be set by the user with the initial authority alone, and can be determined after being modified by the user with the initial authority after being sorted and analyzed by the preliminary big data.
In step 516, the content of the currently displayed virtual storage space is not displayed, and the process returns to step 508.
Step 518 displays the contents of the currently displayed virtual storage space.
The authentication management method provided by the embodiment performs authentication operation on a scene in which another person suddenly appears when a user authenticates, so as to perform security management on the virtual storage space, thereby realizing security management in which a sudden situation appears when the user authenticates, effectively preventing information of an authorized user from being known by a suddenly appearing non-authorized user, and increasing the practicability of the authentication management method.
Fig. 6 is a block diagram of an electronic device 100 according to an embodiment of the present disclosure. The electronic device 100 includes device hardware 110, an operating system 120, and an authentication component 130. Wherein the device hardware 110 is used to provide hardware support for implementing the authentication management method of the above embodiments. The device hardware 110 includes an image acquisition module 112 for acquiring user image data. The operating system 120 is used to provide system support for implementing the authentication management method of the above embodiments. The authentication component 130 is used to implement the authentication management method of the above embodiment. The authentication component 130 includes a training configuration module 132, a face recognition module 134, a storage management module 136, and an authentication module 138. The training configuration module 132 is configured to perform model training on the user image data to generate a corresponding user image model. The face recognition module 134 is used to determine whether the user image data matches the user image model. The storage management module 136 is configured to assign a corresponding virtual storage space authentication module 138 for performing rights management on the virtual storage space based on the user image model. The operating system 120 is configured to display the allocated virtual storage space corresponding to the user when the determination result of the face recognition module is yes, and not display the virtual storage space information for the unallocated user when the determination result of the face recognition module is no.
In addition, the training configuration module 132 is also used to obtain a generic sample of the user image data; labeling the generic sample; making a general sample file; obtaining the primary model based on the generic sample file; acquiring a current actual sample of user image data; making a label sample file based on the primary model and the current actual sample; and acquiring a secondary model based on the label sample file.
The face recognition module 134 is further configured to determine whether at least two user image data matches the user image model. The operating system 120 is further configured to display the allocated virtual storage space of the at least one corresponding user when it is determined that at least one of the at least two user image data matches the user image model.
The authentication module 138 is further configured to respond to the opening instruction to further display the content of the currently displayed virtual storage space; first relation information of the at least two user images is obtained. The operating system 120 is further configured to further display the content of the currently displayed virtual storage space when the first relationship information satisfies the target condition.
The image capture module 112 is further configured to capture image data of other users while displaying the allocated virtual storage space of the corresponding user. The authentication module 138 is further configured to obtain second relationship information between the other user image data and the user image data of the current corresponding user. The operating system 120 is further configured to not display the content of the currently displayed virtual storage space when the second relationship information does not satisfy the target condition.
The face recognition module 134 is also configured to determine whether a user image data matches the user image model. The operating system 120 is further configured to display the allocated virtual storage space of the corresponding user if the determination result is yes. In this case, the authentication module 138 is further configured to further display the content of the currently displayed virtual storage space in response to the opening instruction.
The above target conditions include: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships. The target condition can be obtained by the authentication management method through big data sorting and analysis, can be set by the user with the initial authority alone, and can be determined after being modified by the user with the initial authority after being sorted and analyzed by the preliminary big data.
The electronic device 100 provided by the present application implements the authentication management method by using the device hardware 110, the operating system 120, and the authentication component 130, so as to allocate a corresponding virtual storage space based on the user image model, to perform security management on the virtual storage space, and to implement higher security management.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An authentication management method, characterized in that the authentication management method comprises:
collecting user image data;
performing model training on the user image data to generate a corresponding user image model;
allocating a corresponding virtual storage space based on the user image model;
and carrying out authority management on the virtual storage space.
2. The authentication management method according to claim 1, wherein the model training of the user image data to generate a corresponding user image model comprises:
acquiring a general sample of user image data;
labeling the generic sample;
making a general sample file;
obtaining the primary model based on the generic sample file;
acquiring a current actual sample of user image data;
making a label sample file based on the primary model and the current actual sample;
and acquiring a secondary model based on the label sample file.
3. An authentication management method, characterized in that the authentication management method comprises:
collecting user image data;
judging whether the user image data is matched with a user image model;
if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user;
and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users.
4. The authentication management method according to claim 3,
the determining whether the user image data matches the user image model includes: judging whether the at least two user image data are matched with the user image model;
if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user, including: and if at least one of the at least two user image data is judged to be matched with the user image model, displaying the allocated virtual storage space of the corresponding user.
5. The authentication management method according to claim 4, wherein the authentication management method further comprises:
responding to the opening instruction to further display the content of the currently displayed virtual storage space;
obtaining first relation information of the at least two user images;
and if the first relation information meets the target condition, further displaying the content of the currently displayed virtual storage space.
6. The authentication management method according to claim 3, wherein if the determination result is yes, the authentication management method further comprises:
collecting image data of other users;
obtaining second relation information of the other user image data and the user image data of the corresponding user;
and if the second relation information does not meet the target condition, not displaying the content of the currently displayed virtual storage space.
7. The authentication management method according to claim 5 or 6, wherein the target condition comprises: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships.
8. The authentication management method according to claim 3,
the determining whether the user image data matches the user image model includes: judging whether user image data is matched with a user image model;
if the judgment result is yes, the authentication management method further includes: and responding to the opening instruction, and further displaying the content of the currently displayed virtual storage space.
9. An electronic device, characterized in that the electronic device comprises:
the image acquisition module is used for acquiring user image data;
the training configuration module is used for carrying out model training on the user image data to generate a corresponding user image model;
the storage management module is used for distributing corresponding virtual storage space based on the user image model;
and the authentication module is used for carrying out authority management on the virtual storage space.
10. An electronic device, characterized in that the electronic device comprises:
the image acquisition module is used for acquiring user image data;
the face recognition module is used for judging whether the user image data is matched with a user image model;
and the operating system is used for displaying the allocated virtual storage space corresponding to the user when the judgment result of the face recognition module is yes, and not displaying the virtual storage space information for the unallocated user when the judgment result of the face recognition module is no.
CN202010246189.8A 2020-03-31 2020-03-31 Authentication management method and electronic equipment Pending CN111475790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010246189.8A CN111475790A (en) 2020-03-31 2020-03-31 Authentication management method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010246189.8A CN111475790A (en) 2020-03-31 2020-03-31 Authentication management method and electronic equipment

Publications (1)

Publication Number Publication Date
CN111475790A true CN111475790A (en) 2020-07-31

Family

ID=71749563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010246189.8A Pending CN111475790A (en) 2020-03-31 2020-03-31 Authentication management method and electronic equipment

Country Status (1)

Country Link
CN (1) CN111475790A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833624A (en) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 Information machine and access control method thereof
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN106611114A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Equipment using authority determination method and device
CN106886696A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 The anti-of display information steals a glance at treating method and apparatus
CN107341662A (en) * 2017-06-12 2017-11-10 广东欧珀移动通信有限公司 Verification method, electronic installation and computer-readable recording medium
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component
WO2020037937A1 (en) * 2018-08-20 2020-02-27 深圳壹账通智能科技有限公司 Facial recognition method and apparatus, terminal, and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833624A (en) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 Information machine and access control method thereof
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN106611114A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Equipment using authority determination method and device
CN106886696A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 The anti-of display information steals a glance at treating method and apparatus
CN107341662A (en) * 2017-06-12 2017-11-10 广东欧珀移动通信有限公司 Verification method, electronic installation and computer-readable recording medium
WO2020037937A1 (en) * 2018-08-20 2020-02-27 深圳壹账通智能科技有限公司 Facial recognition method and apparatus, terminal, and computer readable storage medium
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component

Similar Documents

Publication Publication Date Title
JP5231665B2 (en) System, method and computer program product for enabling access to corporate resources using a biometric device
Dirik et al. Modeling user choice in the PassPoints graphical password scheme
CN104935438B (en) Method and apparatus for authentication
CN111464951A (en) Epidemic situation prevention and control method, device, equipment and computer readable storage medium
DE202017006897U1 (en) Systems for providing a universal decentralized solution for verifying users with cross-verification features
US11947701B2 (en) Techniques for preventing malicious use of biometric data
CN112100041A (en) Processing method and device and electronic equipment
CN115758398A (en) Access control data processing method and device, access control system and storage medium
Bilgi et al. A shoulder-surfing resistant graphical authentication method
JPH08504287A (en) Method and system for maintaining access security of input / output operations in a computer system
CN106295423A (en) A kind of method for exhibiting data and client
CN110648443B (en) Access control verification method, device, equipment and medium
CN111241566A (en) Policy management method, electronic device, computer device, and storage medium
CN111475790A (en) Authentication management method and electronic equipment
CN109726187B (en) Hadoop-oriented adaptive permission control method and device
RU2701088C1 (en) Method and system for trusted paperless presentation of documents
US20220394042A1 (en) Protecting physical locations with continuous multi-factor authentication systems
CN108304563A (en) Image processing method, device and equipment
Dawson et al. BAAI: biometric authentication and authorization infrastructure
CN105701378A (en) Terminal device control method and device
WO2018233255A1 (en) Application usage permission assignment method and device
CN114417397A (en) Behavior portrait construction method and device, storage medium and computer equipment
CN115129229A (en) Information storage method, device, storage medium and device
WO2020179052A1 (en) Image processing device, control method, and program
CN115063873B (en) Flight data acquisition method and device based on static and dynamic face detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination