CN111475790A - Authentication management method and electronic equipment - Google Patents
Authentication management method and electronic equipment Download PDFInfo
- Publication number
- CN111475790A CN111475790A CN202010246189.8A CN202010246189A CN111475790A CN 111475790 A CN111475790 A CN 111475790A CN 202010246189 A CN202010246189 A CN 202010246189A CN 111475790 A CN111475790 A CN 111475790A
- Authority
- CN
- China
- Prior art keywords
- user image
- image data
- storage space
- virtual storage
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Abstract
The application discloses an authentication management method. The authentication management method comprises the steps of collecting user image data; performing model training on the user image data to generate a corresponding user image model; allocating a corresponding virtual storage space based on the user image model; and carrying out authority management on the virtual storage space. The authentication management method allocates the corresponding virtual storage space based on the user image model to perform safety management on the virtual storage space, and can realize higher-safety management. In addition, the application also discloses the electronic equipment for implementing the authentication management method.
Description
Technical Field
The present application belongs to the field of security technologies, and in particular, to an authentication management method and an electronic device.
Background
At present, various intelligent electronic devices are widely used for life of people, meanwhile, the internet technology is also deep into the aspects of social life, and the high-tech technologies improve the quality of life of people and bring many potential safety hazards, for example, personal data of people including private information such as pictures, telephones, addresses, hobbies and the like are stolen and scattered. Therefore, how to effectively protect personal information becomes an important issue. Currently, to ensure the security of an accessed system, it is necessary to verify the authority of a user attempting to access the accessed system, and this verification operation is referred to as authentication. In order to protect confidential or sensitive files, the current windows system performs authentication management in a user name/password or fingerprint manner. The authentication management mode realizes the management of the file by granting the file authority after the legal user is verified. However, security in this way still has a hidden danger, and both passwords and fingerprints can be forged.
Disclosure of Invention
The application provides an authentication management method. The authentication management method comprises the steps of collecting user image data; performing model training on the user image data to generate a corresponding user image model; allocating a corresponding virtual storage space based on the user image model; and carrying out authority management on the virtual storage space.
Optionally, the performing model training on the user image data to generate a corresponding user image model includes: acquiring a general sample of user image data; labeling the generic sample; making a general sample file; obtaining the primary model based on the generic sample file; acquiring a current actual sample of user image data; making a label sample file based on the primary model and the current actual sample; and acquiring a secondary model based on the label sample file.
The application also provides an authentication management method. The authentication management method comprises the following steps: collecting user image data; judging whether the user image data is matched with a user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user; and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users.
Optionally, the determining whether the user image data matches the user image model includes: judging whether the at least two user image data are matched with the user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user, including: and if at least one of the at least two user image data is judged to be matched with the user image model, displaying the allocated virtual storage space of the corresponding user.
Optionally, the authentication management method further includes: responding to the opening instruction to further display the content of the currently displayed virtual storage space; obtaining first relation information of the at least two user images; and if the first relation information meets the target condition, further displaying the content of the currently displayed virtual storage space.
Optionally, in a case that the allocated virtual storage space of the corresponding user is displayed if the determination result is yes, the authentication management method further includes: collecting image data of other users; obtaining second relation information of the other user image data and the user image data of the corresponding user; and if the second relation information does not meet the target condition, not displaying the content of the currently displayed virtual storage space.
Optionally, the target condition comprises: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships.
Optionally, the determining whether the user image data matches the user image model includes: judging whether user image data is matched with a user image model; if the judgment result is yes, the authentication management method further includes: and responding to the opening instruction, and further displaying the content of the currently displayed virtual storage space.
The application also provides an electronic device. The electronic device includes: the image acquisition module is used for acquiring user image data; the training configuration module is used for carrying out model training on the user image data to generate a corresponding user image model; the storage management module is used for distributing corresponding virtual storage space based on the user image model; and the authentication module is used for carrying out authority management on the virtual storage space.
The application also provides an electronic device. The electronic device includes: the image acquisition module is used for acquiring user image data; the face recognition module is used for judging whether the user image data is matched with a user image model; and the operating system is used for displaying the allocated virtual storage space corresponding to the user when the judgment result of the face recognition module is yes, and not displaying the virtual storage space information for the unallocated user when the judgment result of the face recognition module is no.
According to the authentication management method, the corresponding virtual storage space is distributed based on the user image model, so that the virtual storage space is safely managed, and management with higher safety can be realized.
Drawings
Fig. 1 is a flowchart of model establishment of an authentication management method according to an embodiment of the present application.
Fig. 2 is a flowchart of a model training procedure of an authentication management method according to an embodiment of the present application.
Fig. 3 is a single person authentication flowchart of the authentication management method according to the embodiment of the present application.
Fig. 4 is a flowchart illustrating multi-user authentication in the authentication management method according to the embodiment of the present application.
Fig. 5 is a flowchart of the single person authentication of the authentication management method according to the embodiment of the present application showing another person.
Fig. 6 is a module schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a model building process of an authentication management method according to an embodiment of the present application, which specifically includes the following steps 210 and 240.
And 240, performing authority management on the virtual storage space. After the operation of allocating the virtual storage space is completed, the authentication management method establishes a corresponding relationship between the user and the allocated virtual storage space, and further performs subsequent security management operations, such as authentication operations, through the corresponding relationship.
FIG. 2 is a flowchart of the model training step 220 of the authentication management method, which further includes the step 221-.
At step 222, labeling is performed on the generic sample.
At step 223, a generic sample file is created. The authentication management method is used for manufacturing a general sample file based on the marked general sample.
At step 226, a secondary model is obtained. And the authentication management method obtains a secondary model based on the primary model and the current actual sample so as to carry out subsequent training.
The authentication management method provided by the application comprises the following steps: collecting user image data; judging whether the user image data is matched with a user image model; if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user; and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users. According to the authentication management method, the corresponding virtual storage space is distributed based on the user image model, so that the virtual storage space is safely managed, and management with higher safety can be realized.
Specifically, the authentication management method provided by the application can be applied to various scenes, such as a scene for authentication, a scene for at least two user authentications, a scene in which others suddenly appear during one user authentication, and the like. The following will specifically describe with reference to the corresponding examples.
Fig. 3 is a single authentication process of the authentication management method according to the embodiment of the present application, which is suitable for a user authentication scenario. The single authentication process specifically comprises the following steps 302-312.
A first process:
A second process:
The authentication management method provided in this embodiment performs security management on a virtual storage space by performing authentication operation on a user, thereby implementing the most basic operation mode of the present application.
Fig. 4 is a flowchart of multi-user authentication in the authentication management method according to the embodiment of the present application, and is applicable to at least two user authentication scenarios. The multi-person authentication procedure specifically comprises the following steps 402-416.
At step 402, at least two user image data are acquired.
A third flow:
The fourth process:
In step 412, first relationship information of at least two user image data is obtained. The first relationship information is used for representing the authority relationship of at least two current users, namely whether the at least two users have the currently displayed authority of the virtual storage space of the corresponding user.
The authentication management method provided by this embodiment performs the authentication operation on at least two users to perform the security management on the virtual storage space, thereby implementing the security management when some users do not have the right, and avoiding the leakage of corresponding content.
Fig. 5 is a flowchart of a case where another person appears during single-person authentication in the authentication management method according to the embodiment of the present application, and is applicable to a scenario where another person appears suddenly during user authentication. The multi-person authentication procedure specifically comprises the following steps 502-518.
A fifth process:
A sixth process:
In step 516, the content of the currently displayed virtual storage space is not displayed, and the process returns to step 508.
Step 518 displays the contents of the currently displayed virtual storage space.
The authentication management method provided by the embodiment performs authentication operation on a scene in which another person suddenly appears when a user authenticates, so as to perform security management on the virtual storage space, thereby realizing security management in which a sudden situation appears when the user authenticates, effectively preventing information of an authorized user from being known by a suddenly appearing non-authorized user, and increasing the practicability of the authentication management method.
Fig. 6 is a block diagram of an electronic device 100 according to an embodiment of the present disclosure. The electronic device 100 includes device hardware 110, an operating system 120, and an authentication component 130. Wherein the device hardware 110 is used to provide hardware support for implementing the authentication management method of the above embodiments. The device hardware 110 includes an image acquisition module 112 for acquiring user image data. The operating system 120 is used to provide system support for implementing the authentication management method of the above embodiments. The authentication component 130 is used to implement the authentication management method of the above embodiment. The authentication component 130 includes a training configuration module 132, a face recognition module 134, a storage management module 136, and an authentication module 138. The training configuration module 132 is configured to perform model training on the user image data to generate a corresponding user image model. The face recognition module 134 is used to determine whether the user image data matches the user image model. The storage management module 136 is configured to assign a corresponding virtual storage space authentication module 138 for performing rights management on the virtual storage space based on the user image model. The operating system 120 is configured to display the allocated virtual storage space corresponding to the user when the determination result of the face recognition module is yes, and not display the virtual storage space information for the unallocated user when the determination result of the face recognition module is no.
In addition, the training configuration module 132 is also used to obtain a generic sample of the user image data; labeling the generic sample; making a general sample file; obtaining the primary model based on the generic sample file; acquiring a current actual sample of user image data; making a label sample file based on the primary model and the current actual sample; and acquiring a secondary model based on the label sample file.
The face recognition module 134 is further configured to determine whether at least two user image data matches the user image model. The operating system 120 is further configured to display the allocated virtual storage space of the at least one corresponding user when it is determined that at least one of the at least two user image data matches the user image model.
The authentication module 138 is further configured to respond to the opening instruction to further display the content of the currently displayed virtual storage space; first relation information of the at least two user images is obtained. The operating system 120 is further configured to further display the content of the currently displayed virtual storage space when the first relationship information satisfies the target condition.
The image capture module 112 is further configured to capture image data of other users while displaying the allocated virtual storage space of the corresponding user. The authentication module 138 is further configured to obtain second relationship information between the other user image data and the user image data of the current corresponding user. The operating system 120 is further configured to not display the content of the currently displayed virtual storage space when the second relationship information does not satisfy the target condition.
The face recognition module 134 is also configured to determine whether a user image data matches the user image model. The operating system 120 is further configured to display the allocated virtual storage space of the corresponding user if the determination result is yes. In this case, the authentication module 138 is further configured to further display the content of the currently displayed virtual storage space in response to the opening instruction.
The above target conditions include: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships. The target condition can be obtained by the authentication management method through big data sorting and analysis, can be set by the user with the initial authority alone, and can be determined after being modified by the user with the initial authority after being sorted and analyzed by the preliminary big data.
The electronic device 100 provided by the present application implements the authentication management method by using the device hardware 110, the operating system 120, and the authentication component 130, so as to allocate a corresponding virtual storage space based on the user image model, to perform security management on the virtual storage space, and to implement higher security management.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. An authentication management method, characterized in that the authentication management method comprises:
collecting user image data;
performing model training on the user image data to generate a corresponding user image model;
allocating a corresponding virtual storage space based on the user image model;
and carrying out authority management on the virtual storage space.
2. The authentication management method according to claim 1, wherein the model training of the user image data to generate a corresponding user image model comprises:
acquiring a general sample of user image data;
labeling the generic sample;
making a general sample file;
obtaining the primary model based on the generic sample file;
acquiring a current actual sample of user image data;
making a label sample file based on the primary model and the current actual sample;
and acquiring a secondary model based on the label sample file.
3. An authentication management method, characterized in that the authentication management method comprises:
collecting user image data;
judging whether the user image data is matched with a user image model;
if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user;
and if the judgment result is negative, not displaying the virtual storage space information for the unallocated users.
4. The authentication management method according to claim 3,
the determining whether the user image data matches the user image model includes: judging whether the at least two user image data are matched with the user image model;
if the judgment result is yes, displaying the allocated virtual storage space corresponding to the user, including: and if at least one of the at least two user image data is judged to be matched with the user image model, displaying the allocated virtual storage space of the corresponding user.
5. The authentication management method according to claim 4, wherein the authentication management method further comprises:
responding to the opening instruction to further display the content of the currently displayed virtual storage space;
obtaining first relation information of the at least two user images;
and if the first relation information meets the target condition, further displaying the content of the currently displayed virtual storage space.
6. The authentication management method according to claim 3, wherein if the determination result is yes, the authentication management method further comprises:
collecting image data of other users;
obtaining second relation information of the other user image data and the user image data of the corresponding user;
and if the second relation information does not meet the target condition, not displaying the content of the currently displayed virtual storage space.
7. The authentication management method according to claim 5 or 6, wherein the target condition comprises: the at least two users belong to a list of people participating in a common project, a list of people signing a common privacy agreement, a list of people having the same level of authority, or have other trust relationships.
8. The authentication management method according to claim 3,
the determining whether the user image data matches the user image model includes: judging whether user image data is matched with a user image model;
if the judgment result is yes, the authentication management method further includes: and responding to the opening instruction, and further displaying the content of the currently displayed virtual storage space.
9. An electronic device, characterized in that the electronic device comprises:
the image acquisition module is used for acquiring user image data;
the training configuration module is used for carrying out model training on the user image data to generate a corresponding user image model;
the storage management module is used for distributing corresponding virtual storage space based on the user image model;
and the authentication module is used for carrying out authority management on the virtual storage space.
10. An electronic device, characterized in that the electronic device comprises:
the image acquisition module is used for acquiring user image data;
the face recognition module is used for judging whether the user image data is matched with a user image model;
and the operating system is used for displaying the allocated virtual storage space corresponding to the user when the judgment result of the face recognition module is yes, and not displaying the virtual storage space information for the unallocated user when the judgment result of the face recognition module is no.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010246189.8A CN111475790A (en) | 2020-03-31 | 2020-03-31 | Authentication management method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010246189.8A CN111475790A (en) | 2020-03-31 | 2020-03-31 | Authentication management method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111475790A true CN111475790A (en) | 2020-07-31 |
Family
ID=71749563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010246189.8A Pending CN111475790A (en) | 2020-03-31 | 2020-03-31 | Authentication management method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111475790A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833624A (en) * | 2010-05-05 | 2010-09-15 | 中兴通讯股份有限公司 | Information machine and access control method thereof |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
CN106611114A (en) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | Equipment using authority determination method and device |
CN106886696A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | The anti-of display information steals a glance at treating method and apparatus |
CN107341662A (en) * | 2017-06-12 | 2017-11-10 | 广东欧珀移动通信有限公司 | Verification method, electronic installation and computer-readable recording medium |
CN109886003A (en) * | 2019-02-28 | 2019-06-14 | 苏州浪潮智能科技有限公司 | A kind of method for managing user right, system and associated component |
WO2020037937A1 (en) * | 2018-08-20 | 2020-02-27 | 深圳壹账通智能科技有限公司 | Facial recognition method and apparatus, terminal, and computer readable storage medium |
-
2020
- 2020-03-31 CN CN202010246189.8A patent/CN111475790A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833624A (en) * | 2010-05-05 | 2010-09-15 | 中兴通讯股份有限公司 | Information machine and access control method thereof |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
CN106611114A (en) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | Equipment using authority determination method and device |
CN106886696A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | The anti-of display information steals a glance at treating method and apparatus |
CN107341662A (en) * | 2017-06-12 | 2017-11-10 | 广东欧珀移动通信有限公司 | Verification method, electronic installation and computer-readable recording medium |
WO2020037937A1 (en) * | 2018-08-20 | 2020-02-27 | 深圳壹账通智能科技有限公司 | Facial recognition method and apparatus, terminal, and computer readable storage medium |
CN109886003A (en) * | 2019-02-28 | 2019-06-14 | 苏州浪潮智能科技有限公司 | A kind of method for managing user right, system and associated component |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5231665B2 (en) | System, method and computer program product for enabling access to corporate resources using a biometric device | |
Dirik et al. | Modeling user choice in the PassPoints graphical password scheme | |
CN104935438B (en) | Method and apparatus for authentication | |
CN111464951A (en) | Epidemic situation prevention and control method, device, equipment and computer readable storage medium | |
DE202017006897U1 (en) | Systems for providing a universal decentralized solution for verifying users with cross-verification features | |
US11947701B2 (en) | Techniques for preventing malicious use of biometric data | |
CN112100041A (en) | Processing method and device and electronic equipment | |
CN115758398A (en) | Access control data processing method and device, access control system and storage medium | |
Bilgi et al. | A shoulder-surfing resistant graphical authentication method | |
JPH08504287A (en) | Method and system for maintaining access security of input / output operations in a computer system | |
CN106295423A (en) | A kind of method for exhibiting data and client | |
CN110648443B (en) | Access control verification method, device, equipment and medium | |
CN111241566A (en) | Policy management method, electronic device, computer device, and storage medium | |
CN111475790A (en) | Authentication management method and electronic equipment | |
CN109726187B (en) | Hadoop-oriented adaptive permission control method and device | |
RU2701088C1 (en) | Method and system for trusted paperless presentation of documents | |
US20220394042A1 (en) | Protecting physical locations with continuous multi-factor authentication systems | |
CN108304563A (en) | Image processing method, device and equipment | |
Dawson et al. | BAAI: biometric authentication and authorization infrastructure | |
CN105701378A (en) | Terminal device control method and device | |
WO2018233255A1 (en) | Application usage permission assignment method and device | |
CN114417397A (en) | Behavior portrait construction method and device, storage medium and computer equipment | |
CN115129229A (en) | Information storage method, device, storage medium and device | |
WO2020179052A1 (en) | Image processing device, control method, and program | |
CN115063873B (en) | Flight data acquisition method and device based on static and dynamic face detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |