CN114124510A - Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof - Google Patents
Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof Download PDFInfo
- Publication number
- CN114124510A CN114124510A CN202111359596.0A CN202111359596A CN114124510A CN 114124510 A CN114124510 A CN 114124510A CN 202111359596 A CN202111359596 A CN 202111359596A CN 114124510 A CN114124510 A CN 114124510A
- Authority
- CN
- China
- Prior art keywords
- user
- monitoring system
- identity authentication
- library monitoring
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 64
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000001815 facial effect Effects 0.000 claims abstract description 6
- 230000001960 triggered effect Effects 0.000 claims description 7
- 239000000284 extract Substances 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a three-dimensional library monitoring system and a user identity authentication and operation tracing method thereof, wherein the system comprises a database establishing module, a user identity authentication module and an operation log recording module; the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user; the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence; the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing. The method solves the problem that the traditional stereoscopic library monitoring system is difficult to trace the actual operator after being operated by other personnel because the account is not withdrawn after the operation of the user and the login time is still in the validity period.
Description
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of automatic three-dimensional library management, in particular to a three-dimensional library monitoring system and a user identity authentication and operation tracing method thereof.
[ background of the invention ]
The traditional user login verification function is weak in safety and poor in traceability, after a user logs in, an account does not quit, when the login time of the account is still in the validity period, the user leaves a station, and after other personnel other than the account operate, the user can only check which operation is performed on the account of the user in the follow-up tracing process, but actual operating personnel cannot be traced. And if the password is a weak password, once the password is cracked, the system is very dangerous, and the stereoscopic library monitoring system and the method for authenticating the user identity and tracing the operation are provided.
[ summary of the invention ]
The invention aims to solve the problems in the prior art, and provides a stereoscopic garage monitoring system and a user identity authentication and operation tracing method thereof, which can effectively judge whether an operator is an authorized user, avoid the operation of unauthorized personnel and protect the safe operation of the stereoscopic garage system.
In order to achieve the purpose, the invention provides a three-dimensional library monitoring system, which comprises a database establishing module, a user identity authentication module and an operation log recording module;
the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user;
the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence;
the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
The invention also provides a method for authenticating the user identity and tracing the operation of the stereo library monitoring system, which comprises the following steps:
s1, establishing a user database: establishing a user portrait data table in a database;
s2, operating a log database by a user: establishing a user operation log data table in a database;
s3, user registration: a user registers an account number in a stereo library monitoring system, inputs a name and a registered face image, and information is stored in a user portrait data table;
s4, user operation: a user operates the three-dimensional library monitoring system to generate a user operation event;
s5, user identity authentication: triggering user identity authentication while a user operates on the three-dimensional library monitoring system;
s6, saving the operation log: when a user operates the three-dimensional library monitoring system, storing an operation event into a user operation log table;
s7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user.
Preferably, in the user portrait data table in step S1, the table field includes a user ID, a user name, a registration time, and a face image field.
Preferably, in the user operation log data table in step S2, the table field contains an operation record ID, an operation event name, an operation event result, an operation time, an operation user ID, and an operation user face image.
Preferably, the specific steps of the user operation in step S4 include:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
Preferably, the specific steps of the user identity authentication in step S5 include:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
Preferably, the specific step of saving the operation log in step S6 includes:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
Preferably, in step S7, the user queries the stereoscopic library monitoring system for historical operation records according to the user name, the operation event name and the operation time.
The invention has the beneficial effects that:
firstly, the safety is high, before a user operates the system, the system can recognize and check whether an actual operator is matched with a login account number or not through face recognition, and the user can log out when the actual operator is not matched with the login account number.
Secondly, the traceability is strong, when the user operates the system, the system can collect the human face and record the human face to the database, and the human face photo of the operator can be subsequently checked, so that the actual operator can be conveniently traced.
The features and advantages of the present invention will be described in detail by embodiments in conjunction with the accompanying drawings.
[ description of the drawings ]
Fig. 1 is a flowchart of a stereoscopic library monitoring system and a method for authenticating user identity and tracing operation thereof.
[ detailed description ] embodiments
The invention discloses a three-dimensional library monitoring system which comprises a database establishing module, a user identity authentication module and an operation log recording module, wherein the database establishing module is used for establishing a database; the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user; the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence; the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
A method for user identity authentication and operation tracing of a stereo library monitoring system comprises the following steps:
s1, establishing a user database: a user portrait data table is established in a database, and the table fields comprise user ID, user name, registration time and face image fields.
S2, operating a log database by a user: and establishing a user operation log data table in the database, wherein the table fields comprise operation record IDs, operation event names, operation event results, operation time, operation user IDs and operation user face images.
S3, user registration: the user registers an account number in the stereo library monitoring system, inputs a name and a registered face image, and the information is stored in a user portrait data table.
S4, user operation: the method comprises the following steps that a user operates a three-dimensional library monitoring system to generate a user operation event, and the specific steps comprise:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
S5, user identity authentication: the method comprises the following steps that when a user operates on a three-dimensional library monitoring system, user identity authentication is triggered, and the method specifically comprises the following steps:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
S6, saving the operation log: the method comprises the following steps that when a user operates a three-dimensional library monitoring system, an operation event is stored in a user operation log table, and the specific steps comprise:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
S7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user according to the user name, the operation event name and the operation time.
Example 1
Referring to fig. 1, the implementation of the method includes the following steps:
the first step is as follows: defining a user database and an operation log database;
the second step is that: registering a user, wherein the system collects a facial image of the user through a camera and stores the facial image in a Chinese zodiac database;
the third step: a user starts to operate the three-dimensional library monitoring system by using a keyboard and a mouse;
the fourth step: triggering the user authentication module to judge when the stereo library monitoring system intercepts an operation event, and starting face recognition by the monitoring system through a camera;
the fifth step: judging whether the authentication of the user authentication module passes, if so, entering the sixth step, otherwise, entering the tenth step;
and a sixth step: reading user data related to the newly identified face;
the seventh step: continuing to execute the operation event of the stereoscopic library monitoring system intercepted in the fourth step;
eighth step: saving the face shot in the fourth step, the identified user ID, the operation time and the operation result into an operation record log table;
the ninth step: inquiring the operation record of the retroactive user on the stereoscopic library monitoring system according to the conditions such as name, operation time name or operation time and the like, and ending the operation;
the tenth step: and the system prompts that the user authentication is invalid, cancels the operation event intercepted in the fourth step and ends the operation.
The method can effectively judge whether the operator is an authorized user, avoids the operation of unauthorized personnel, protects the safe operation of the stereoscopic library system, and accurately records the user operation and the operation time, solves the problem that the traditional stereoscopic library monitoring system is difficult to trace the actual operator after being operated by other personnel because the account number is not withdrawn after the user operation and the login time is still in the validity period, and has obvious effect on large-scale projects with a large amount of operators on site.
The above embodiments are illustrative of the present invention, and are not intended to limit the present invention, and any simple modifications of the present invention are within the scope of the present invention.
Claims (8)
1. A three-dimensional storehouse monitored control system which characterized in that: the system comprises a database establishing module, a user identity authentication module and an operation log recording module;
the database establishing module is used for acquiring facial pictures of a user and establishing a Chinese zodiac database of the user;
the user identity authentication module is used for carrying out face recognition according to the established Chinese zodiac database when operating the three-dimensional library monitoring system, judging whether an operator is an authorized user, allowing the system to operate when the operator is the authorized user, and simultaneously shooting the image of the operator for keeping evidence;
the log recording module is used for recording all operation events and operation time of the user to the database for subsequent tracing.
2. A method for user identity authentication and operation tracing of a stereo library monitoring system is characterized by comprising the following steps: the method comprises the following steps:
s1, establishing a user database: establishing a user portrait data table in a database;
s2, operating a log database by a user: establishing a user operation log data table in a database;
s3, user registration: a user registers an account number in a stereo library monitoring system, inputs a name and a registered face image, and information is stored in a user portrait data table;
s4, user operation: a user operates the three-dimensional library monitoring system to generate a user operation event;
s5, user identity authentication: triggering user identity authentication while a user operates on the three-dimensional library monitoring system;
s6, saving the operation log: when a user operates the three-dimensional library monitoring system, storing an operation event into a user operation log table;
s7, inquiring the operation log: and querying a historical operation record in the stereo library monitoring system by a user.
3. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in the user portrait data table in step S1, the table field includes a user ID, a user name, registration time, and a face image field.
4. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in step S2, the user operates the log data table, and the table fields include an operation record ID, an operation event name, an operation event result, an operation time, an operation user ID, and an operation user face image.
5. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific steps of the user operation in step S4 include:
s41, an operation event triggering step: a user inputs characters or clicks a button on the three-dimensional library monitoring system by operating a keyboard and a mouse and then triggers an operation event, and the three-dimensional library monitoring system firstly intercepts the triggered operation event and does not execute the operation event;
s42, operating event execution step: and after intercepting the operation event, the stereo library monitoring system determines whether to execute the operation event according to an authentication result of the user identity authentication step, if the operation event passes the authentication, the operation event is executed, and if the operation event does not pass the authentication, the execution of the operation event is cancelled.
6. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific steps of the user identity authentication in step S5 include:
s51, triggering identity authentication: the stereoscopic library monitoring system immediately triggers an identity authentication program after intercepting an operation event;
s52, adjusting a camera to shoot: the identity authentication module adjusts a camera interface to shoot a face image;
s53, face recognition: searching a face image stored in a user database and a face image shot by a camera, comparing the face image with a similarity algorithm, identifying an image with similarity higher than a set threshold value, and then showing that the face identification is passed, otherwise, showing that the identification is not passed;
s54, extracting user data: if the identification is passed, the user identity authentication module extracts the data of the user portrait data table which is passed through the authentication and sends the data to the stereo library monitoring system for subsequent steps.
7. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: the specific step of saving the operation log in step S6 includes:
s61, a log storage triggering step: the method comprises the steps that when a stereo library monitoring system program generates an event for executing user operation, a log saving step is triggered immediately;
s62, log storage: and storing the name of the operation event, the result of the operation event, the operation time, the ID of the operation user and the face image of the operation user into a user operation log table.
8. The method for user identity authentication and operation tracing of a stereoscopic library monitoring system of claim 2, wherein: in step S7, the user queries the history operation record in the stereo library monitoring system according to the user name, the operation event name, and the operation time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111359596.0A CN114124510A (en) | 2021-11-17 | 2021-11-17 | Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111359596.0A CN114124510A (en) | 2021-11-17 | 2021-11-17 | Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114124510A true CN114124510A (en) | 2022-03-01 |
Family
ID=80397025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111359596.0A Pending CN114124510A (en) | 2021-11-17 | 2021-11-17 | Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114124510A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005115485A (en) * | 2003-10-03 | 2005-04-28 | Toshiba Social Automation Systems Co Ltd | Authentication system and computer readable storage medium |
CN105243738A (en) * | 2015-11-04 | 2016-01-13 | 深圳先进技术研究院 | ATM operation monitoring system and method based on face recognition |
CN106022046A (en) * | 2016-05-24 | 2016-10-12 | 苏州安至上机电科技有限公司 | Special equipment permitted operation monitoring method |
CN109605957A (en) * | 2019-01-21 | 2019-04-12 | 宁波喜印科技有限公司 | A kind of intelligence seal |
CN110501996A (en) * | 2019-08-30 | 2019-11-26 | 北京起重运输机械设计研究院有限公司 | Stereo garage monitoring system operating right management method and system |
CN110866017A (en) * | 2019-11-27 | 2020-03-06 | 郭学森 | Tax handling operation mark leaving system for visual retrieval and implementation method thereof |
CN111723888A (en) * | 2020-07-24 | 2020-09-29 | 上海金东唐科技有限公司 | Detection jig and detection equipment |
-
2021
- 2021-11-17 CN CN202111359596.0A patent/CN114124510A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005115485A (en) * | 2003-10-03 | 2005-04-28 | Toshiba Social Automation Systems Co Ltd | Authentication system and computer readable storage medium |
CN105243738A (en) * | 2015-11-04 | 2016-01-13 | 深圳先进技术研究院 | ATM operation monitoring system and method based on face recognition |
CN106022046A (en) * | 2016-05-24 | 2016-10-12 | 苏州安至上机电科技有限公司 | Special equipment permitted operation monitoring method |
CN109605957A (en) * | 2019-01-21 | 2019-04-12 | 宁波喜印科技有限公司 | A kind of intelligence seal |
CN110501996A (en) * | 2019-08-30 | 2019-11-26 | 北京起重运输机械设计研究院有限公司 | Stereo garage monitoring system operating right management method and system |
CN110866017A (en) * | 2019-11-27 | 2020-03-06 | 郭学森 | Tax handling operation mark leaving system for visual retrieval and implementation method thereof |
CN111723888A (en) * | 2020-07-24 | 2020-09-29 | 上海金东唐科技有限公司 | Detection jig and detection equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5987153A (en) | Automated verification and prevention of spoofing for biometric data | |
CN113724428B (en) | Gate system for identity recognition and health detection of community owners and management method | |
CN111767583A (en) | Block chain-based enterprise internal information security guarantee method and system | |
CN110008704B (en) | Intelligent electronic information storage system for industrial management | |
CN108809992A (en) | A kind of recognition of face verification system and its correlating method with goal systems | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
CN113160472A (en) | Intelligent management method, device, system, equipment and medium for community access control | |
CN106817342A (en) | Active identity authorization system based on user behavior feature recognition | |
CN113034768A (en) | Intelligent access control device and working method thereof | |
CN109461241A (en) | A kind of face and fingerprint identification entrance guard system control method | |
CN113743725B (en) | Ascending qualification detection method and system for ascending operators based on edge calculation | |
CN114036117A (en) | Log viewing method and device, computer equipment and storage medium | |
CN114268453A (en) | Power system unlocking method and device, computer equipment and storage medium | |
CN114124510A (en) | Stereoscopic library monitoring system and user identity authentication and operation tracing method thereof | |
CN105681344A (en) | Verification code recognition system and method | |
CN111368334A (en) | Safety maintenance system based on data asset data in database | |
CN116778621A (en) | Access control management method and device for large-scale power production | |
CN113010865B (en) | Big data base component safety management method and system of intelligent education platform | |
CN105938528A (en) | Control system for computer events | |
CN112862458B (en) | Nuclear power test procedure supervision method and device, computer equipment and storage medium | |
CN104091111A (en) | Computer login verification system and method based on iris recognition technology | |
CN109800723A (en) | A kind of recognition of face and the computer booting system and method for staying card is logged in violation of rules and regulations | |
CN114611087A (en) | Voiceprint-based method and device for safe operation of power dispatching monitoring system | |
CN117093583A (en) | IAST technology-based method for checking behavior compliance of application program operation database | |
CN115718912A (en) | Safety protection system based on image recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |