CN112464192A - Power grid data asset management system based on big data - Google Patents
Power grid data asset management system based on big data Download PDFInfo
- Publication number
- CN112464192A CN112464192A CN202011158451.XA CN202011158451A CN112464192A CN 112464192 A CN112464192 A CN 112464192A CN 202011158451 A CN202011158451 A CN 202011158451A CN 112464192 A CN112464192 A CN 112464192A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- face
- coefficient
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 claims abstract description 35
- 230000008676 import Effects 0.000 claims abstract description 15
- 238000013075 data extraction Methods 0.000 claims abstract description 6
- 238000000034 method Methods 0.000 claims description 15
- 244000241872 Lycium chinense Species 0.000 claims description 12
- 235000015468 Lycium chinense Nutrition 0.000 claims description 12
- 238000002360 preparation method Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 8
- 101000878595 Arabidopsis thaliana Squalene synthase 1 Proteins 0.000 claims description 3
- 101000713575 Homo sapiens Tubulin beta-3 chain Proteins 0.000 claims description 3
- 101000713585 Homo sapiens Tubulin beta-4A chain Proteins 0.000 claims description 3
- 101000642811 Oryza sativa subsp. indica Soluble starch synthase 1, chloroplastic/amyloplastic Proteins 0.000 claims description 3
- 102100036790 Tubulin beta-3 chain Human genes 0.000 claims description 3
- 102100036788 Tubulin beta-4A chain Human genes 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Water Supply & Treatment (AREA)
- Tourism & Hospitality (AREA)
- Multimedia (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Public Health (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a power grid data asset management system based on big data, which comprises a login module, an identity verification module, a data right-lifting module, a data import module, a data receiving module, a master control module, an alarm sending module, a backup storage module, a storage cloud and a data extraction module, wherein the login module is used for storing the identity verification module; the system comprises a login module, an identity verification module, a data import module and a data receiving module, wherein the login module is used for a user to log in the system to extract and import data assets, the identity verification module is used for verifying the identity of a person logged in the system through the login module, alarm information is generated when the person is not verified in the identity verification module, the data extraction module is used for extracting the data assets of the user who passes the verification, the data import module is used for importing the data asset information into the system through the user who passes the verification, and the data receiving module is used for receiving the data asset information imported through the data import module. The invention can better ensure the safety of the power grid data assets and can better manage the power grid data assets.
Description
Technical Field
The invention relates to the field of power grid management, in particular to a power grid data asset management system based on big data.
Background
The whole of the substation and the transmission and distribution line of various voltages in the power system is called a power grid. The system comprises three units of power transformation, power transmission and power distribution. The task of the power grid is to transmit and distribute electric energy, change voltage, and be a kind of grid data, which needs to be managed and operated.
The existing power grid data asset management system is low in safety, easily causes leakage of power grid data assets, and brings certain influence to the use of the power grid data asset management system, so that the power grid data asset management system based on big data is provided.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to solve the problems that the existing power grid data asset management system is low in safety, easily causes leakage of power grid data assets and brings certain influence to the use of the power grid data asset management system, and the power grid data asset management system based on big data is provided.
The invention solves the technical problems through the following technical scheme that the system comprises a login module, an identity authentication module, a data right-lifting module, a data import module, a data receiving module, a master control module, an alarm sending module, a backup storage module, a storage cloud and a data extraction module;
the system comprises a login module, an identity authentication module, a data receiving module, a master control module and a backup storage module, wherein the login module is used for a user to log in the system to extract and import data assets, the identity authentication module is used for authenticating the identity of a person logged in the system through the login module, alarm information is generated when the person is not authenticated in the identity authentication module, the data extracting module is used for extracting the data assets of the authenticated user, the data importing module is used for importing data asset information into the system through the authenticated user, the data receiving module is used for receiving the data asset information imported through the data importing module, the master control module is used for generating a backup control instruction, and the backup control instruction is sent to the backup storage module;
the backup storage module backs up the data asset information received by the data receiving module to the hard disk, and backs up the data asset information to the storage cloud;
the master control module converts the alarm information into an alarm instruction and sends the alarm instruction to the alarm sending module, and the alarm sending module sends the alarm instruction to the instructed mobile terminal.
Preferably, the login module comprises a login keyboard, a display screen and a face recognition camera, the login keyboard is used for inputting account and password information by a user, the display screen is used for displaying prompting performance, and the face recognition camera is used for collecting face information of the login user.
Preferably, the authentication module stores preset login information of a user allowed to login, and the specific processing procedure of the authentication module is as follows:
the method comprises the following steps: obtaining a user real-time account password coefficient M after a user inputs an account and a passwordFruit of Chinese wolfberry;
Step two: extracting a prestored user prestored account password coefficient MPreparation of;
Step three: calculating the real-time account password coefficient MFruit of Chinese wolfberryAnd a prestored account password coefficient MPreparation ofThe difference value between the account number and the password coefficient difference M is obtainedDifference (D)When the account number password coefficient difference MDifference (D)The verification is passed, and when the input account password is completely consistent with the pre-stored account password, the face verification is carried out;
step four: extracting the acquired real-time face image information and acquiring a real-time face coefficient PFruit of Chinese wolfberry;
Step five: then extracting the pre-stored face coefficient PPreparation ofReal-time face coefficient PFruit of Chinese wolfberryWith prestored face coefficients PPreparation ofThe difference between them is used to obtain the face coefficient difference PDifference (D)When the face coefficient difference PDifference (D)When the verification result is smaller than the preset value, the verification is passed;
step six: when the account number password coefficient passes the verification and the face image verification is carried out, alarm information is generated when the face image verification does not pass more than the preset times continuously.
Preferably, the specific processing procedure of the account password coefficient is as follows:
s1: recording the account input duration of the user to obtain an account input duration M1;
s2: time length information M2 when the user input password is recorded;
s3: by the formula (M1+ M2)/(M1-M1) ═ MFruit of Chinese wolfberryObtaining the real-time account password coefficient MFruit of Chinese wolfberry。
Preferably, the specific processing procedure of the face coefficient is as follows:
SS 1: extracting user face image information acquired in real time, wherein the face image information is a real-time face picture;
SS 2: marking two mouth corners in the face in the real-time face picture as a point A1 and a point A2, and marking a nose tip point as a point A3;
SS 3: connecting a point A1 and a point A2 to obtain a line segment L1, and respectively connecting a point A1 and a point A2 with a point A3 to obtain a line segment L2 and a line segment L3;
SS 4: a point A3 is used as an end point to make a line segment L4 which is perpendicular to the line segment L1, and the lengths of the line segment L4 and the line segment L1 are measured;
SS 5: by the formula L1L 4/2PFruit of Chinese wolfberryObtaining the real-time face coefficient PFruit of Chinese wolfberry。
Preferably, the login module is also used for the user to directly use the face to perform identity authentication.
Preferably, the backup storage of the backup storage module specifically comprises the following processes:
SSS 1: the backup storage module automatically backs up the data assets to the hard disk at preset time intervals;
SSS 2: the backup storage module compares data with the storage cloud at preset time intervals, when the data in the backup storage module is completely the same as the data in the storage cloud, backup is not performed, and when the data in the backup storage module is deviated from the data in the storage cloud and the size of the data in the backup storage module is larger than that of the data in the storage cloud, cloud backup processing is performed.
Compared with the prior art, the invention has the following advantages: this electric wire netting data asset management system based on big data, the safety of assurance electric wire netting data asset that can be better, when the user carries out data asset and uploads and draws, verify user's identity, the effectual condition emergence of revealing of electric wire netting data asset that leads to other people falsely account number that has avoided user's account number password data to reveal the condition that leads to has realized better automatic backup of data, the effectual condition emergence of data disclosure that has avoided system's trouble to lead to.
Drawings
FIG. 1 is a system block diagram of the present invention.
Detailed Description
The following examples are given for the detailed implementation and specific operation of the present invention, but the scope of the present invention is not limited to the following examples.
As shown in fig. 1, the present embodiment provides a technical solution: a power grid data asset management system based on big data comprises a login module, an identity authentication module, a data right-lifting module, a data import module, a data receiving module, a master control module, an alarm sending module, a backup storage module, a storage cloud and a data extraction module;
the system comprises a login module, an identity authentication module, a data receiving module, a master control module and a backup storage module, wherein the login module is used for a user to log in the system to extract and import data assets, the identity authentication module is used for authenticating the identity of a person logged in the system through the login module, alarm information is generated when the person is not authenticated in the identity authentication module, the data extracting module is used for extracting the data assets of the authenticated user, the data importing module is used for importing data asset information into the system through the authenticated user, the data receiving module is used for receiving the data asset information imported through the data importing module, the master control module is used for generating a backup control instruction, and the backup control instruction is sent to the backup storage module;
the backup storage module backs up the data asset information received by the data receiving module to the hard disk, and backs up the data asset information to the storage cloud;
the master control module converts the alarm information into an alarm instruction and sends the alarm instruction to the alarm sending module, and the alarm sending module sends the alarm instruction to the instructed mobile terminal.
The login module comprises a login keyboard, a display screen and a face recognition camera, wherein the login keyboard is used for inputting account and password information by a user, the display screen is used for displaying prompting performance, and the face recognition camera is used for collecting face information of the login user.
The authentication module stores preset login information of a user allowed to login, and the specific processing process of the authentication module is as follows:
the method comprises the following steps: obtaining a user real-time account password coefficient M after a user inputs an account and a passwordFruit of Chinese wolfberry;
Step two: extracting a prestored user prestored account password coefficient MPreparation of;
Step three: calculating the real-time account password coefficient MFruit of Chinese wolfberryAnd a prestored account password coefficient MPreparation ofThe difference value between the account number and the password coefficient difference M is obtainedDifference (D)When the account number password coefficient difference MDifference (D)The verification is passed, and when the input account password is completely consistent with the pre-stored account password, the face verification is carried out;
step four: extracting the acquired real-time face image information and acquiring a real-time face coefficient PFruit of Chinese wolfberry;
Step five: then extracting the pre-stored face coefficient PPreparation ofReal-time face coefficient PFruit of Chinese wolfberryWith prestored face coefficients PPreparation ofThe difference between them is used to obtain the face coefficient difference PDifference (D)When the face coefficient difference PDifference (D)When the verification result is smaller than the preset value, the verification is passed;
step six: when the account number password coefficient passes the verification and the face image verification is carried out, alarm information is generated when the face image verification does not pass more than the preset times continuously.
The specific processing process of the account password coefficient is as follows:
s1: recording the account input duration of the user to obtain an account input duration M1;
s2: time length information M2 when the user input password is recorded;
s3: by the formula (M1+ M2)/(M1-M1) ═ MFruit of Chinese wolfberryObtaining the real-time account password coefficient MFruit of Chinese wolfberry。
Preferably, the specific processing procedure of the face coefficient is as follows:
SS 1: extracting user face image information acquired in real time, wherein the face image information is a real-time face picture;
SS 2: marking two mouth corners in the face in the real-time face picture as a point A1 and a point A2, and marking a nose tip point as a point A3;
SS 3: connecting a point A1 and a point A2 to obtain a line segment L1, and respectively connecting a point A1 and a point A2 with a point A3 to obtain a line segment L2 and a line segment L3;
SS 4: a point A3 is used as an end point to make a line segment L4 which is perpendicular to the line segment L1, and the lengths of the line segment L4 and the line segment L1 are measured;
SS 5: by the formula L1L 4/2PFruit of Chinese wolfberryObtaining the real-time face coefficient PFruit of Chinese wolfberry。
The login module is also used for the user to directly use the face to carry out identity authentication.
The backup storage process of the backup storage module is as follows:
SSS 1: the backup storage module automatically backs up the data assets to the hard disk at preset time intervals;
SSS 2: the backup storage module compares data with the storage cloud at preset time intervals, when the data in the backup storage module is completely the same as the data in the storage cloud, backup is not performed, and when the data in the backup storage module is deviated from the data in the storage cloud and the size of the data in the backup storage module is larger than that of the data in the storage cloud, cloud backup processing is performed.
In summary, when the invention is used, a login module user logs in the system to extract and import data assets, an identity verification module performs identity verification on personnel logged in the system through the login module, alarm information is generated when the verification fails in the identity verification module, a data extraction module performs data asset extraction on a user who passes the verification, a data import module imports data asset information into the system through a user who passes the verification, a data receiving module is used for receiving the data asset information imported through the data import module, a master control module generates a backup control instruction, the backup control instruction is sent to a backup storage module, the backup storage module backs up the data asset information received by the data receiving module to a hard disk for processing, meanwhile, the data asset information is backed up to a storage cloud, and the master control module converts the alarm information into an alarm instruction to be sent to an alarm sending module, and the alarm sending module sends the alarm instruction to the instructed mobile terminal.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (7)
1. A power grid data asset management system based on big data is characterized by comprising a login module, an identity verification module, a data right-lifting module, a data import module, a data receiving module, a master control module, an alarm sending module, a backup storage module, a storage cloud and a data extraction module;
the system comprises a login module, an identity authentication module, a data receiving module, a master control module and a backup storage module, wherein the login module is used for a user to log in the system to extract and import data assets, the identity authentication module is used for authenticating the identity of a person logged in the system through the login module, alarm information is generated when the person is not authenticated in the identity authentication module, the data extracting module is used for extracting the data assets of the authenticated user, the data importing module is used for importing data asset information into the system through the authenticated user, the data receiving module is used for receiving the data asset information imported through the data importing module, the master control module is used for generating a backup control instruction, and the backup control instruction is sent to the backup storage module;
the backup storage module backs up the data asset information received by the data receiving module to the hard disk, and backs up the data asset information to the storage cloud;
the master control module converts the alarm information into an alarm instruction and sends the alarm instruction to the alarm sending module, and the alarm sending module sends the alarm instruction to the instructed mobile terminal.
2. The big data-based power grid data asset management system according to claim 1, wherein: the login module comprises a login keyboard, a display screen and a face recognition camera, wherein the login keyboard is used for inputting account and password information by a user, the display screen is used for displaying prompting performance, and the face recognition camera is used for collecting face information of the login user.
3. The big data-based power grid data asset management system according to claim 2, wherein: the authentication module stores preset login information of a user allowed to login, and the specific processing process of the authentication module is as follows:
the method comprises the following steps: obtaining a user real-time account password coefficient M after a user inputs an account and a passwordFruit of Chinese wolfberry;
Step two: extracting a prestored user prestored account password coefficient MPreparation of;
Step three: calculating the real-time account password coefficient MFruit of Chinese wolfberryAnd a prestored account password coefficient MPreparation ofThe difference value between the account number and the password coefficient difference M is obtainedDifference (D)When the account number password coefficient difference MDifference (D)The verification is passed, and when the input account password is completely consistent with the pre-stored account password, the face verification is carried out;
step four: extracting the acquired real-time face image information and acquiring a real-time face coefficient PFruit of Chinese wolfberry;
Step five: then extracting the pre-stored face coefficient PPreparation ofReal-time face coefficient PFruit of Chinese wolfberryWith prestored face coefficients PPreparation ofThe difference between them is used to obtain the face coefficient difference PDifference (D)When the face coefficient difference PDifference (D)When the verification result is smaller than the preset value, the verification is passed;
step six: when the account number password coefficient passes the verification and the face image verification is carried out, alarm information is generated when the face image verification does not pass more than the preset times continuously.
4. The big data based power grid data asset management system according to claim 3, wherein: the specific processing process of the account password coefficient is as follows:
s1: recording the account input duration of the user to obtain an account input duration M1;
s2: time length information M2 when the user input password is recorded;
s3: by the formula (M1+ M2)/(M1-M1) ═ MFruit of Chinese wolfberryObtaining the real-time account password coefficient MFruit of Chinese wolfberry。
5. The big data based power grid data asset management system according to claim 3, wherein: the specific processing process of the face coefficient is as follows:
SS 1: extracting user face image information acquired in real time, wherein the face image information is a real-time face picture;
SS 2: marking two mouth corners in the face in the real-time face picture as a point A1 and a point A2, and marking a nose tip point as a point A3;
SS 3: connecting a point A1 and a point A2 to obtain a line segment L1, and respectively connecting a point A1 and a point A2 with a point A3 to obtain a line segment L2 and a line segment L3;
SS 4: a point A3 is used as an end point to make a line segment L4 which is perpendicular to the line segment L1, and the lengths of the line segment L4 and the line segment L1 are measured;
SS 5: by the formula L1L 4/2PFruit of Chinese wolfberryObtaining the real-time face coefficient PFruit of Chinese wolfberry。
6. The big data-based power grid data asset management system according to claim 1, wherein: the login module is also used for the user to directly use the face to carry out identity authentication.
7. The big data-based power grid data asset management system according to claim 1, wherein: the backup storage process of the backup storage module is as follows:
SSS 1: the backup storage module automatically backs up the data assets to the hard disk at preset time intervals;
SSS 2: the backup storage module compares data with the storage cloud at preset time intervals, when the data in the backup storage module is completely the same as the data in the storage cloud, backup is not performed, and when the data in the backup storage module is deviated from the data in the storage cloud and the size of the data in the backup storage module is larger than that of the data in the storage cloud, cloud backup processing is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011158451.XA CN112464192A (en) | 2020-10-26 | 2020-10-26 | Power grid data asset management system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011158451.XA CN112464192A (en) | 2020-10-26 | 2020-10-26 | Power grid data asset management system based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112464192A true CN112464192A (en) | 2021-03-09 |
Family
ID=74835406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011158451.XA Pending CN112464192A (en) | 2020-10-26 | 2020-10-26 | Power grid data asset management system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112464192A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010860A (en) * | 2021-03-10 | 2021-06-22 | 安徽超清科技股份有限公司 | Data safety protection system based on industrial internet |
CN113094679A (en) * | 2021-04-01 | 2021-07-09 | 深圳鸿祥源科技有限公司 | Remote sensing test observation processing equipment based on 5G network |
CN113536068A (en) * | 2021-08-02 | 2021-10-22 | 贵州泰若数字科技有限公司 | Asset management method and asset management system |
CN113591044A (en) * | 2021-07-27 | 2021-11-02 | 睿思网盾(北京)科技有限公司 | Intrusion protection system based on identity recognition |
CN113706015A (en) * | 2021-08-27 | 2021-11-26 | 孙树芹 | Data collection system for enterprise asset arrangement based on block chain |
CN113824900A (en) * | 2021-09-18 | 2021-12-21 | 深圳市爱剪辑科技有限公司 | Cloud video editing system |
CN113868609A (en) * | 2021-09-18 | 2021-12-31 | 深圳市爱剪辑科技有限公司 | Video editing system based on deep learning |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN207097042U (en) * | 2017-06-30 | 2018-03-13 | 国家电网公司 | A kind of electric power apparatus integrated information digitalization management system |
CN109376596A (en) * | 2018-09-14 | 2019-02-22 | 广州杰赛科技股份有限公司 | Face matching process, device, equipment and storage medium |
CN109740575A (en) * | 2019-01-30 | 2019-05-10 | 北京一维大成科技有限公司 | A kind of method, apparatus of authentication, computer-readable medium and equipment |
CN109784124A (en) * | 2017-11-10 | 2019-05-21 | 北京嘀嘀无限科技发展有限公司 | A kind of determination method of vivo identification, decision-making system and computer installation |
CN109902463A (en) * | 2019-04-02 | 2019-06-18 | 广州任天游网络科技有限公司 | Login system for immigration consultation service platform based on face recognition |
CN109919627A (en) * | 2019-03-21 | 2019-06-21 | 安徽宽广科技有限公司 | A kind of system monitoring management system Internet-based |
CN110032851A (en) * | 2019-04-10 | 2019-07-19 | 柳州铁道职业技术学院 | A kind of login system being used to encrypt file polling platform based on recognition of face |
CN110032476A (en) * | 2019-04-17 | 2019-07-19 | 柳州铁道职业技术学院 | A kind of file storage intelligent backup system based on big data |
CN110571932A (en) * | 2019-09-13 | 2019-12-13 | 国家电网有限公司 | Big data-based substation equipment running state early warning device |
CN111026798A (en) * | 2019-12-05 | 2020-04-17 | 苏州中车建设工程有限公司 | Electromechanical equipment database system and control method thereof |
CN111091031A (en) * | 2018-10-24 | 2020-05-01 | 北京旷视科技有限公司 | Target object selection method and face unlocking method |
CN111508126A (en) * | 2020-03-31 | 2020-08-07 | 苏州科腾软件开发有限公司 | Intelligent security system based on 5G communication |
CN111814701A (en) * | 2020-07-13 | 2020-10-23 | 安徽兰臣信息科技有限公司 | Children face recognition algorithm for feature migration learning based on double-layer heterogeneous network |
CN111814702A (en) * | 2020-07-13 | 2020-10-23 | 安徽兰臣信息科技有限公司 | Child face recognition method based on adult face and child photo feature space mapping relation |
-
2020
- 2020-10-26 CN CN202011158451.XA patent/CN112464192A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN207097042U (en) * | 2017-06-30 | 2018-03-13 | 国家电网公司 | A kind of electric power apparatus integrated information digitalization management system |
CN109784124A (en) * | 2017-11-10 | 2019-05-21 | 北京嘀嘀无限科技发展有限公司 | A kind of determination method of vivo identification, decision-making system and computer installation |
CN109376596A (en) * | 2018-09-14 | 2019-02-22 | 广州杰赛科技股份有限公司 | Face matching process, device, equipment and storage medium |
CN111091031A (en) * | 2018-10-24 | 2020-05-01 | 北京旷视科技有限公司 | Target object selection method and face unlocking method |
CN109740575A (en) * | 2019-01-30 | 2019-05-10 | 北京一维大成科技有限公司 | A kind of method, apparatus of authentication, computer-readable medium and equipment |
CN109919627A (en) * | 2019-03-21 | 2019-06-21 | 安徽宽广科技有限公司 | A kind of system monitoring management system Internet-based |
CN109902463A (en) * | 2019-04-02 | 2019-06-18 | 广州任天游网络科技有限公司 | Login system for immigration consultation service platform based on face recognition |
CN110032851A (en) * | 2019-04-10 | 2019-07-19 | 柳州铁道职业技术学院 | A kind of login system being used to encrypt file polling platform based on recognition of face |
CN110032476A (en) * | 2019-04-17 | 2019-07-19 | 柳州铁道职业技术学院 | A kind of file storage intelligent backup system based on big data |
CN110571932A (en) * | 2019-09-13 | 2019-12-13 | 国家电网有限公司 | Big data-based substation equipment running state early warning device |
CN111026798A (en) * | 2019-12-05 | 2020-04-17 | 苏州中车建设工程有限公司 | Electromechanical equipment database system and control method thereof |
CN111508126A (en) * | 2020-03-31 | 2020-08-07 | 苏州科腾软件开发有限公司 | Intelligent security system based on 5G communication |
CN111814701A (en) * | 2020-07-13 | 2020-10-23 | 安徽兰臣信息科技有限公司 | Children face recognition algorithm for feature migration learning based on double-layer heterogeneous network |
CN111814702A (en) * | 2020-07-13 | 2020-10-23 | 安徽兰臣信息科技有限公司 | Child face recognition method based on adult face and child photo feature space mapping relation |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010860A (en) * | 2021-03-10 | 2021-06-22 | 安徽超清科技股份有限公司 | Data safety protection system based on industrial internet |
CN113094679A (en) * | 2021-04-01 | 2021-07-09 | 深圳鸿祥源科技有限公司 | Remote sensing test observation processing equipment based on 5G network |
CN113591044A (en) * | 2021-07-27 | 2021-11-02 | 睿思网盾(北京)科技有限公司 | Intrusion protection system based on identity recognition |
CN113536068A (en) * | 2021-08-02 | 2021-10-22 | 贵州泰若数字科技有限公司 | Asset management method and asset management system |
CN113706015A (en) * | 2021-08-27 | 2021-11-26 | 孙树芹 | Data collection system for enterprise asset arrangement based on block chain |
CN113824900A (en) * | 2021-09-18 | 2021-12-21 | 深圳市爱剪辑科技有限公司 | Cloud video editing system |
CN113868609A (en) * | 2021-09-18 | 2021-12-31 | 深圳市爱剪辑科技有限公司 | Video editing system based on deep learning |
CN113824900B (en) * | 2021-09-18 | 2024-05-28 | 深圳市爱剪辑科技有限公司 | Cloud video editing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112464192A (en) | Power grid data asset management system based on big data | |
CN110458154B (en) | Face recognition method, face recognition device and computer-readable storage medium | |
US10135818B2 (en) | User biological feature authentication method and system | |
CN113010860A (en) | Data safety protection system based on industrial internet | |
CN109815665A (en) | Identity authentication method and system, electronic equipment and computer readable storage medium | |
US20210377311A1 (en) | Establishment of network connections | |
CN106156578A (en) | Auth method and device | |
CN209103378U (en) | A kind of access control system with speech recognition | |
CN110139062A (en) | A kind of creation method, device and the terminal device of video conference record | |
CN115641067A (en) | Student information integrated management system based on cloud platform | |
CN113824900B (en) | Cloud video editing system | |
CN108830230A (en) | Identity checking method, identity veritify management system and equipment | |
CN205880966U (en) | Device is verified to fit of group part | |
CN111476580A (en) | Face payment method and system | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN104240347A (en) | Admittance identity authentication system based on image identification | |
CN112269969A (en) | Digital content safety protection system | |
CN116049797A (en) | Intelligent storage system based on data classification system | |
CN206224516U (en) | Vena metacarpea recognizes authentication device and system | |
DE102011050156A1 (en) | Signature pad for electronic signing of text document, has unit outputting representation of signature of combination information, and another representation of part of signing data, where signature is generated based on private key | |
CN109583426A (en) | A method of according to image identification face | |
CN113961902A (en) | Household skill level authentication method, equipment and medium | |
CN108230211A (en) | A kind of resident information authentication method based on property information | |
CN210038807U (en) | Intelligent management system of cigarette workshop | |
CN113434851A (en) | Key management method and system based on data acquisition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210309 |