CN114124510A - Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof - Google Patents

Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof Download PDF

Info

Publication number
CN114124510A
CN114124510A CN202111359596.0A CN202111359596A CN114124510A CN 114124510 A CN114124510 A CN 114124510A CN 202111359596 A CN202111359596 A CN 202111359596A CN 114124510 A CN114124510 A CN 114124510A
Authority
CN
China
Prior art keywords
user
monitoring system
identity authentication
library monitoring
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111359596.0A
Other languages
Chinese (zh)
Inventor
姜跃君
田晓聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Lanjiang Storage System Software Co ltd
Original Assignee
Jiaxing Lanjiang Storage System Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Lanjiang Storage System Software Co ltd filed Critical Jiaxing Lanjiang Storage System Software Co ltd
Priority to CN202111359596.0A priority Critical patent/CN114124510A/en
Publication of CN114124510A publication Critical patent/CN114124510A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a three-dimensional library monitoring system and a user identity authentication and operation tracing method thereof, wherein the system comprises a database establishing module, a user identity authentication module and an operation log recording module; the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user; the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence; the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing. The method solves the problem that the traditional stereoscopic library monitoring system is difficult to trace the actual operator after being operated by other personnel because the account is not withdrawn after the operation of the user and the login time is still in the validity period.

Description

Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of automatic three-dimensional library management, in particular to a three-dimensional library monitoring system and a user identity authentication and operation tracing method thereof.
[ background of the invention ]
The traditional user login verification function is weak in safety and poor in traceability, after a user logs in, an account does not quit, when the login time of the account is still in the validity period, the user leaves a station, and after other personnel other than the account operate, the user can only check which operation is performed on the account of the user in the follow-up tracing process, but actual operating personnel cannot be traced. And if the password is a weak password, once the password is cracked, the system is very dangerous, and the stereoscopic library monitoring system and the method for authenticating the user identity and tracing the operation are provided.
[ summary of the invention ]
The invention aims to solve the problems in the prior art, and provides a stereoscopic garage monitoring system and a user identity authentication and operation tracing method thereof, which can effectively judge whether an operator is an authorized user, avoid the operation of unauthorized personnel and protect the safe operation of the stereoscopic garage system.
In order to achieve the purpose, the invention provides a three-dimensional library monitoring system, which comprises a database establishing module, a user identity authentication module and an operation log recording module;
the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user;
the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence;
the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
The invention also provides a method for authenticating the user identity and tracing the operation of the stereo library monitoring system, which comprises the following steps:
s1, establishing a user database: establishing a user portrait data table in a database;
s2, operating a log database by a user: establishing a user operation log data table in a database;
s3, user registration: a user registers an account number in a stereo library monitoring system, inputs a name and a registered face image, and information is stored in a user portrait data table;
s4, user operation: a user operates the three-dimensional library monitoring system to generate a user operation event;
s5, user identity authentication: triggering user identity authentication while a user operates on the three-dimensional library monitoring system;
s6, saving the operation log: when a user operates the three-dimensional library monitoring system, storing an operation event into a user operation log table;
s7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user.
Preferably, in the user portrait data table in step S1, the table field includes a user ID, a user name, a registration time, and a face image field.
Preferably, in the user operation log data table in step S2, the table field contains an operation record ID, an operation event name, an operation event result, an operation time, an operation user ID, and an operation user face image.
Preferably, the specific steps of the user operation in step S4 include:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
Preferably, the specific steps of the user identity authentication in step S5 include:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
Preferably, the specific step of saving the operation log in step S6 includes:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
Preferably, in step S7, the user queries the stereoscopic library monitoring system for historical operation records according to the user name, the operation event name and the operation time.
The invention has the beneficial effects that:
firstly, the safety is high, before a user operates the system, the system can recognize and check whether an actual operator is matched with a login account number or not through face recognition, and the user can log out when the actual operator is not matched with the login account number.
Secondly, the traceability is strong, when the user operates the system, the system can collect the human face and record the human face to the database, and the human face photo of the operator can be subsequently checked, so that the actual operator can be conveniently traced.
The features and advantages of the present invention will be described in detail by embodiments in conjunction with the accompanying drawings.
[ description of the drawings ]
Fig. 1 is a flowchart of a stereoscopic library monitoring system and a method for authenticating user identity and tracing operation thereof.
[ detailed description ] embodiments
The invention discloses a three-dimensional library monitoring system which comprises a database establishing module, a user identity authentication module and an operation log recording module, wherein the database establishing module is used for establishing a database; the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user; the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence; the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
A method for user identity authentication and operation tracing of a stereo library monitoring system comprises the following steps:
s1, establishing a user database: a user portrait data table is established in a database, and the table fields comprise user ID, user name, registration time and face image fields.
S2, operating a log database by a user: and establishing a user operation log data table in the database, wherein the table fields comprise operation record IDs, operation event names, operation event results, operation time, operation user IDs and operation user face images.
S3, user registration: the user registers an account number in the stereo library monitoring system, inputs a name and a registered face image, and the information is stored in a user portrait data table.
S4, user operation: the method comprises the following steps that a user operates a three-dimensional library monitoring system to generate a user operation event, and the specific steps comprise:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
S5, user identity authentication: the method comprises the following steps that when a user operates on a three-dimensional library monitoring system, user identity authentication is triggered, and the method specifically comprises the following steps:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
S6, saving the operation log: the method comprises the following steps that when a user operates a three-dimensional library monitoring system, an operation event is stored in a user operation log table, and the specific steps comprise:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
S7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user according to the user name, the operation event name and the operation time.
Example 1
Referring to fig. 1, the implementation of the method includes the following steps:
the first step is as follows: defining a user database and an operation log database;
the second step is that: registering a user, wherein the system collects a facial image of the user through a camera and stores the facial image in a Chinese zodiac database;
the third step: a user starts to operate the three-dimensional library monitoring system by using a keyboard and a mouse;
the fourth step: triggering the user authentication module to judge when the stereo library monitoring system intercepts an operation event, and starting face recognition by the monitoring system through a camera;
the fifth step: judging whether the authentication of the user authentication module passes, if so, entering the sixth step, otherwise, entering the tenth step;
and a sixth step: reading user data related to the newly identified face;
the seventh step: continuing to execute the operation event of the stereoscopic library monitoring system intercepted in the fourth step;
eighth step: saving the face shot in the fourth step, the identified user ID, the operation time and the operation result into an operation record log table;
the ninth step: inquiring the operation record of the retroactive user on the stereoscopic library monitoring system according to the conditions such as name, operation time name or operation time and the like, and ending the operation;
the tenth step: and the system prompts that the user authentication is invalid, cancels the operation event intercepted in the fourth step and ends the operation.
The method can effectively judge whether the operator is an authorized user, avoids the operation of unauthorized personnel, protects the safe operation of the stereoscopic library system, and accurately records the user operation and the operation time, solves the problem that the traditional stereoscopic library monitoring system is difficult to trace the actual operator after being operated by other personnel because the account number is not withdrawn after the user operation and the login time is still in the validity period, and has obvious effect on large-scale projects with a large amount of operators on site.
The above embodiments are illustrative of the present invention, and are not intended to limit the present invention, and any simple modifications of the present invention are within the scope of the present invention.

Claims (8)

1. A three-dimensional storehouse monitored control system which characterized in that: the system comprises a database establishing module, a user identity authentication module and an operation log recording module;
the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user;
the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence;
the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
2. A method for user identity authentication and operation tracing of a stereo library monitoring system is characterized by comprising the following steps: the method comprises the following steps:
s1, establishing a user database: establishing a user portrait data table in a database;
s2, operating a log database by a user: establishing a user operation log data table in a database;
s3, user registration: a user registers an account number in a stereo library monitoring system, inputs a name and a registered face image, and information is stored in a user portrait data table;
s4, user operation: a user operates the three-dimensional library monitoring system to generate a user operation event;
s5, user identity authentication: triggering user identity authentication while a user operates on the three-dimensional library monitoring system;
s6, saving the operation log: when a user operates the three-dimensional library monitoring system, storing an operation event into a user operation log table;
s7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user.
3. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in the user portrait data table in step S1, the table field includes a user ID, a user name, registration time, and a face image field.
4. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in step S2, the user operates the log data table, and the table fields include an operation record ID, an operation event name, an operation event result, an operation time, an operation user ID, and an operation user face image.
5. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific steps of the user operation in step S4 include:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
6. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific steps of the user identity authentication in step S5 include:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
7. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific step of saving the operation log in step S6 includes:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
8. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in step S7, the user queries the history operation record in the stereo library monitoring system according to the user name, the operation event name, and the operation time.
CN202111359596.0A 2021-11-17 2021-11-17 Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof Pending CN114124510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111359596.0A CN114124510A (en) 2021-11-17 2021-11-17 Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111359596.0A CN114124510A (en) 2021-11-17 2021-11-17 Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof

Publications (1)

Publication Number Publication Date
CN114124510A true CN114124510A (en) 2022-03-01

Family

ID=80397025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111359596.0A Pending CN114124510A (en) 2021-11-17 2021-11-17 Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof

Country Status (1)

Country Link
CN (1) CN114124510A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005115485A (en) * 2003-10-03 2005-04-28 Toshiba Social Automation Systems Co Ltd Authentication system and computer readable storage medium
CN105243738A (en) * 2015-11-04 2016-01-13 深圳先进技术研究院 ATM operation monitoring system and method based on face recognition
CN106022046A (en) * 2016-05-24 2016-10-12 苏州安至上机电科技有限公司 Special equipment permitted operation monitoring method
CN109605957A (en) * 2019-01-21 2019-04-12 宁波喜印科技有限公司 A kind of intelligence seal
CN110501996A (en) * 2019-08-30 2019-11-26 北京起重运输机械设计研究院有限公司 Stereo garage monitoring system operating right management method and system
CN110866017A (en) * 2019-11-27 2020-03-06 郭学森 Tax handling operation mark leaving system for visual retrieval and implementation method thereof
CN111723888A (en) * 2020-07-24 2020-09-29 上海金东唐科技有限公司 Detection jig and detection equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005115485A (en) * 2003-10-03 2005-04-28 Toshiba Social Automation Systems Co Ltd Authentication system and computer readable storage medium
CN105243738A (en) * 2015-11-04 2016-01-13 深圳先进技术研究院 ATM operation monitoring system and method based on face recognition
CN106022046A (en) * 2016-05-24 2016-10-12 苏州安至上机电科技有限公司 Special equipment permitted operation monitoring method
CN109605957A (en) * 2019-01-21 2019-04-12 宁波喜印科技有限公司 A kind of intelligence seal
CN110501996A (en) * 2019-08-30 2019-11-26 北京起重运输机械设计研究院有限公司 Stereo garage monitoring system operating right management method and system
CN110866017A (en) * 2019-11-27 2020-03-06 郭学森 Tax handling operation mark leaving system for visual retrieval and implementation method thereof
CN111723888A (en) * 2020-07-24 2020-09-29 上海金东唐科技有限公司 Detection jig and detection equipment

Similar Documents

Publication Publication Date Title
US5987153A (en) Automated verification and prevention of spoofing for biometric data
CN113724428B (en) Gate system for identity recognition and health detection of community owners and management method
CN111767583A (en) Block chain-based enterprise internal information security guarantee method and system
CN110008704B (en) Intelligent electronic information storage system for industrial management
CN108809992A (en) A kind of recognition of face verification system and its correlating method with goal systems
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
CN106817342A (en) Active identity authorization system based on user behavior feature recognition
CN113034768A (en) Intelligent access control device and working method thereof
CN109461241A (en) A kind of face and fingerprint identification entrance guard system control method
CN113743725B (en) Ascending qualification detection method and system for ascending operators based on edge calculation
CN114036117A (en) Log viewing method and device, computer equipment and storage medium
CN114268453A (en) Power system unlocking method and device, computer equipment and storage medium
CN114124510A (en) Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof
CN105681344A (en) Verification code recognition system and method
CN111368334A (en) Safety maintenance system based on data asset data in database
CN116778621A (en) Access control management method and device for large-scale power production
CN113010865B (en) Big data base component safety management method and system of intelligent education platform
CN105938528A (en) Control system for computer events
CN112862458B (en) Nuclear power test procedure supervision method and device, computer equipment and storage medium
CN104091111A (en) Computer login verification system and method based on iris recognition technology
CN109800723A (en) A kind of recognition of face and the computer booting system and method for staying card is logged in violation of rules and regulations
CN114611087A (en) Voiceprint-based method and device for safe operation of power dispatching monitoring system
CN117093583A (en) IAST technology-based method for checking behavior compliance of application program operation database
CN115718912A (en) Safety protection system based on image recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination