CN114360132A - Method and system for network security identity recognition - Google Patents

Method and system for network security identity recognition Download PDF

Info

Publication number
CN114360132A
CN114360132A CN202210004766.1A CN202210004766A CN114360132A CN 114360132 A CN114360132 A CN 114360132A CN 202210004766 A CN202210004766 A CN 202210004766A CN 114360132 A CN114360132 A CN 114360132A
Authority
CN
China
Prior art keywords
module
layer interface
identification
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210004766.1A
Other languages
Chinese (zh)
Inventor
谢林江
杭菲璐
郭威
张振红
罗震宇
陈何雄
毛正雄
李寒箬
何映军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Yunnan Power Grid Co Ltd
Original Assignee
Information Center of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Yunnan Power Grid Co Ltd filed Critical Information Center of Yunnan Power Grid Co Ltd
Priority to CN202210004766.1A priority Critical patent/CN114360132A/en
Publication of CN114360132A publication Critical patent/CN114360132A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B5/00Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
    • G08B5/22Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission
    • G08B5/36Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission using visible light sources

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention relates to the technical field of identity recognition, in particular to a network security identity recognition system which comprises a login system, a user platform system, a central processing unit and an alarm system, wherein the login system comprises a password input module, a face shooting module, a fingerprint card punching module and an iris shooting module.

Description

Method and system for network security identity recognition
Technical Field
The invention relates to the technical field of identity recognition, in particular to a method and a system for network security identity recognition.
Background
With the continuous development of internet technology, more and more information resources select networks as a carrier for propagation, and users can access information in each web page through a web browser, in particular, for a social network site or a shopping network site, there are specific registered users, in order to manage the registered users, for example, to identify whether the registered users are malicious users or analyze interest and preference of the users, a website server generally needs to analyze behaviors of the registered users, and as the number of registered users increases, the amount of analysis data also significantly increases, and the processing workload and time also significantly increases.
At present, most of commonly used identity recognition systems adopt a password recognition mode, namely, a character string with the length of 5-8 generally consists of numbers, letters, special characters, control characters and the like, but the recognition mode has the problems of low safety factor and easy imposition of people.
Therefore, there is a need to design a method and system for network security identification that can solve one or more of the above problems.
Disclosure of Invention
In order to solve one or more problems in the prior art, the invention provides a method and a system for network security identity recognition.
The technical scheme adopted by the invention to achieve the aim is as follows: a network security identity recognition system comprises a login system, a user platform system, a central processing unit and an alarm system, wherein the login system comprises a password input module, a face shooting module, a fingerprint card punching module and an iris shooting module, the password input module is used for inputting character passwords by a user, the face shooting module is used for shooting photos to collect face information of the user for subsequent recognition, the fingerprint card punching module is used for collecting fingerprints of the user for subsequent card punching recognition, the iris shooting module is used for shooting and collecting eyeball iris information of the user for subsequent recognition, the central processing unit comprises a password checking module, a face recognition module, a fingerprint recognition module and an iris recognition module, the password checking module is used for checking the character passwords input by the user through the password input module, the face recognition module is used for recognizing the face information of the user shot and collected through the face shooting module, the fingerprint identification module is used for identifying the user fingerprint acquired by the fingerprint card punching module, and the iris identification module is used for identifying the user eyeball iris information acquired by the iris shooting module.
Preferably, the connection end of the password checking module, the face recognition module, the fingerprint recognition module and the iris recognition module is provided with a data comparison module, the connection end of the data comparison module is provided with a database, a data feedback module and an interface authority module, and the data comparison module is used for comparing user information identified by the password checking module, the face recognition module, the fingerprint recognition module and the iris recognition module in combination with the database, so as to distinguish true from false.
Preferably, the connecting end of the data feedback module is connected with an alarm system, and the data feedback module is used for feeding back the wrong identity information identified by the data comparison module through comparison to the alarm system for alarm processing.
Preferably, the interface authority module comprises a first layer interface module, a second layer interface module, a third layer interface module and a fourth layer interface module, and the first layer interface module, the second layer interface module, the third layer interface module and the fourth layer interface module are respectively connected with the password checking module, the face recognition module, the fingerprint recognition module and the iris recognition module in sequence.
Preferably, the data recording module is arranged at the connecting end of the first layer interface module, the second layer interface module, the third layer interface module and the fourth layer interface module, and is used for recording browsing information traces used for the first layer interface module, the second layer interface module, the third layer interface module and the fourth layer interface module.
Preferably, the alarm system comprises a popup prompt module, a red light alarm module and an interface return module, wherein the popup prompt module is used for prompting an identification error caused by incorrect shooting angle, the red light alarm module is used for alarming illegal identity information which is shot normally but identification identity information of which is completely inconsistent, and the interface return module is used for returning the error identification information existing in the first layer interface module, the second layer interface module, the third layer interface module and the fourth layer interface module to the previous layer interface so as to realize authority management.
A method for network security identity recognition comprises the following steps:
s1: firstly, a user inputs a character password through a password input module, then the character password is identified and compared through a password checking module, a data comparison module and a database in a central processing unit, if the character password is correct, the character password enters a first-layer interface module, meanwhile, an identification inlet of a second-layer interface module appears, and if the character password is wrong, error information is fed back to an alarm system through a data feedback module to be subjected to popup prompt processing through a popup prompt module;
s2: then, a user shoots a picture through a face shooting module to collect face information, then the face information is identified and compared through a face identification module, a data comparison module and a database in a central processing unit, if the face identification is correct, the face information enters a second-layer interface module, meanwhile, an identification inlet of a third-layer interface module appears, and if the face identification is wrong, the wrong information is fed back to an alarm system through a data feedback module to perform alarm processing through a red light alarm module in the alarm system;
s3: then, a user collects user fingerprint information through a fingerprint card punching module, then the user fingerprint information is identified and compared through a fingerprint identification module, a data comparison module and a database in a central processing unit, if the fingerprint identification is correct, the user enters a third-layer interface module, meanwhile, an identification inlet of a fourth-layer interface module appears, and if the fingerprint identification is wrong, the user feeds error information back to an alarm system through a data feedback module to perform alarm processing through a red light alarm module in the alarm system;
s4: then the user shoots through the iris shooting module to collect the information of the user's eyeball iris, then the information is identified and compared through the iris identification module, the data comparison module and the database in the central processing unit, if the iris identification is correct, the information enters the fourth layer interface module, and if the iris identification is wrong, the error information is fed back to the alarm system through the data feedback module to be subjected to the alarm processing of the red light alarm module.
The invention has the beneficial effects that:
the invention can realize multi-level identity recognition and can realize the distribution authority management of the first layer interface module, the second layer interface module, the third layer interface module and the fourth layer interface module at the same time, and the safety coefficient is high.
Drawings
FIG. 1 is a schematic diagram of the system architecture of the invention;
FIG. 2 is a schematic diagram of the login system structure of the present invention;
FIG. 3 is a schematic diagram of the CPU system of the present invention;
fig. 4 is a schematic diagram of the alarm system of the invention.
Description of reference numerals:
1. logging in the system; 2. a user platform system; 3. a central processing unit; 4. an alarm system; 5. a password input module; 6. a face shooting module; 7. a fingerprint card punching module; 8. an iris shooting module; 9. a password checking module; 10. a face recognition module; 11. a fingerprint identification module; 12. an iris recognition module; 13. a data comparison module; 14. a database; 15. a data feedback module; 16. an interface authority module; 17. a first layer interface module; 18. a second layer interface module; 19. a third layer of interface module; 20. a fourth layer of interface module; 21. a data recording module; 22. a pop-up window prompt module; 23. a red light alarm module; 24. and returning the interface to the module.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
As shown in fig. 1-4, the present invention provides a network security identity recognition system, which comprises a login system 1, a user platform system 2, a central processing unit 3 and an alarm system 4, wherein the login system 1 comprises a password input module 5, a face shooting module 6, a fingerprint card punching module 7 and an iris shooting module 8, the password input module 5 is used for inputting a character password by a user, the face shooting module 6 is used for shooting a picture to collect face information of the user for subsequent recognition, the fingerprint card punching module 7 is used for collecting a fingerprint of the user for subsequent card punching recognition, the iris shooting module 8 is used for shooting and collecting eyeball iris information of the user for subsequent recognition, the central processing unit 3 comprises a password checking module 9, a face recognition module 10, a fingerprint recognition module 11 and an iris recognition module 12, the password checking module 9 is used for checking the character password input by the user through the password input module 5, the face recognition module 10 is used for recognizing the face information of the user shot and collected by the face shooting module 6, the fingerprint recognition module 11 is used for recognizing the fingerprint of the user shot and collected by the fingerprint card punching module 7, and the iris recognition module 12 is used for recognizing the eyeball iris information of the user shot and collected by the iris shooting module 8.
Further, in the above technical solution, the connection end of the password checking module 9, the face recognition module 10, the fingerprint recognition module 11 and the iris recognition module 12 is provided with a data comparison module 13, the connection end of the data comparison module 13 is provided with a database 14, a data feedback module 15 and an interface authority module 16, and the data comparison module 13 is used for comparing the user information identified by the password checking module 9, the face recognition module 10, the fingerprint recognition module 11 and the iris recognition module 12 in combination with the database 14 to distinguish authenticity.
Further, in the above technical solution, the connection end of the data feedback module 15 is connected to the alarm system 4, and the data feedback module 15 is configured to feed back the wrong identity information identified by the comparison of the data comparison module 13 to the alarm system 4 for alarm processing.
Further, in the above technical solution, the interface authority module 16 includes a first layer interface module 17, a second layer interface module 18, a third layer interface module 19 and a fourth layer interface module 20, and the first layer interface module 17, the second layer interface module 18, the third layer interface module 19 and the fourth layer interface module 20 are respectively connected to the password checking module 9, the face recognition module 10, the fingerprint recognition module 11 and the iris recognition module 12 in sequence.
Further, in the above technical solution, a data recording module 21 is disposed at a connection end of the first layer interface module 17, the second layer interface module 18, the third layer interface module 19, and the fourth layer interface module 20, and the data recording module 21 is configured to record browsing information traces for the first layer interface module 17, the second layer interface module 18, the third layer interface module 19, and the fourth layer interface module 20.
Further, in the above technical solution, the alarm system 4 includes a pop-up window prompt module 22, a red light alarm module 23, and an interface return module 24, where the pop-up window prompt module 22 is configured to prompt an identification error caused by an incorrect shooting angle, the red light alarm module 23 is configured to alarm illegal identity information that is shot normally but identification identity information is completely inconsistent, and the interface return module 24 is configured to return the wrong identification information existing in the first layer interface module 17, the second layer interface module 18, the third layer interface module 19, and the fourth layer interface module 20 to the previous layer interface, so as to implement authority management.
A method for network security identity recognition comprises the following steps:
s1: firstly, a user inputs a character password through the password input module 5, then the character password is identified and compared through the password checking module 9, the data comparison module 13 and the database 14 in the central processing unit 3, if the character password is correct, the character password enters the first-layer interface module 17, meanwhile, an identification entrance of the second-layer interface module 18 appears, and if the character password is wrong, error information is fed back to the alarm system 4 through the data feedback module 15 to be subjected to the prompt processing of the pop-up window prompt module 22;
s2: then, a user shoots a picture through the face shooting module 6 to collect face information, then the face information is recognized and compared through the face recognition module 10, the data comparison module 13 and the database 14 in the central processing unit 3, if the face recognition is correct, the face information enters the second-layer interface module 18, meanwhile, the face information enters the recognition inlet of the third-layer interface module 19, and if the face recognition is wrong, the wrong information is fed back to the red light alarm module 23 in the alarm system 4 through the data feedback module 15 to perform alarm processing;
s3: then, a user collects user fingerprint information through the fingerprint card punching module 7, then the user carries out identification and comparison through the fingerprint identification module 11, the data comparison module 13 and the database 14 in the central processing unit 3, if the fingerprint identification is correct, the user enters the third-layer interface module 19, meanwhile, the user enters the identification inlet of the fourth-layer interface module 20, and if the fingerprint identification is wrong, the user feeds error information back to the alarm system 4 through the data feedback module 15 to carry out alarm processing through the red light alarm module 23 in the middle of the alarm system;
s4: then the user shoots and collects the information of the iris of the eyeball of the user through the iris shooting module 8, then the information is identified and compared through the iris identification module 12, the data comparison module 13 and the database 14 in the central processing unit 3, if the iris identification is correct, the information enters the fourth layer interface module 20, and if the iris identification is wrong, the error information is fed back to the red light alarm module 23 in the alarm system 4 through the data feedback module 15 for alarm processing.
In summary, the present invention includes: the system comprises a login system 1, a user platform system 2, a central processing unit 3, an alarm system 4, a password input module 5, a face shooting module 6, a fingerprint card punching module 7, an iris shooting module 8, a password checking module 9, a face recognition module 10, a fingerprint recognition module 11, an iris recognition module 12, a data comparison module 13, a database 14, a data feedback module 15, an interface authority module 16, a first-layer interface module 17, a second-layer interface module 18, a third-layer interface module 19, a fourth-layer interface module 20, a data recording module 21, a popup window prompting module 22, a red light alarm module 23 and an interface return module 24, wherein firstly, a user inputs a character password through the password input module 5, then performs identification and comparison through the password checking module 9, the data comparison module 13 and the database 14 in the central processing unit 3, and enters the first-layer interface module 17 if the character password is correct, the user enters the recognition entrance of the second layer interface module 18 at the same time, if the character password is wrong, the wrong information is fed back to the alarm system 4 through the data feedback module 15 to be prompted by the pop-up window prompting module 22, then the user takes a picture through the face shooting module 6 to collect face information, then the face information is recognized and compared through the face recognition module 10, the data comparison module 13 and the database 14 in the central processing unit 3, if the face recognition is correct, the user enters the second layer interface module 18, meanwhile, the user enters the recognition entrance of the third layer interface module 19, if the face recognition is wrong, the wrong information is fed back to the red light alarm module 23 in the alarm system 4 through the data feedback module 15 to be alarmed, then the user collects the user fingerprint information through the fingerprint card punching module 7, and then the user fingerprint information is recognized through the fingerprint recognition module 11 in the central processing unit 3, The data comparison module 13 and the database 14 perform identification comparison, if the fingerprint identification is correct, the data enters the third layer interface module 19, and simultaneously enters the identification entrance of the fourth layer interface module 20, if the fingerprint identification is wrong, the data feedback module 15 feeds error information back to the red light alarm module 23 in the alarm system 4 for alarm processing, then the user performs shooting and acquisition on the eyeball iris information of the user through the iris shooting module 8, then the iris identification module 12, the data comparison module 13 and the database 14 in the central processing unit 3 perform identification comparison, if the iris identification is correct, the data enters the fourth layer interface module 20, and if the iris identification is wrong, the data feedback module 15 feeds the error information back to the red light alarm module 23 in the alarm system 4 for alarm processing.
The above-described embodiments are merely illustrative of one or more embodiments of the present invention, and the description is specific and detailed, but not intended to limit the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (7)

1. A system for network security identification, comprising: the system comprises a login system (1), a user platform system (2), a central processing unit (3) and an alarm system (4), wherein the login system (1) comprises a password input module (5), a face shooting module (6), a fingerprint card punching module (7) and an iris shooting module (8), the password input module (5) is used for inputting a character password by a user, the face shooting module (6) is used for shooting a picture to collect face information of the user for subsequent identification, the fingerprint card punching module (7) is used for collecting a fingerprint of the user for subsequent card punching identification, the iris shooting module (8) is used for shooting and collecting eyeball iris information of the user for subsequent identification, the central processing unit (3) comprises a password checking module (9), a face identification module (10), a fingerprint identification module (11) and an iris identification module (12), password is checked module (9) and is used for checking the character password that the user input through password input module (5), face identification module (10) are used for discerning the user and shoot the user face information of gathering through face shooting module (6), fingerprint identification module (11) are used for discerning the user's fingerprint of gathering through fingerprint card punching module (7), iris identification module (12) are used for discerning the user eyeball iris information of gathering through iris shooting module (8).
2. The system for network security identity recognition according to claim 1, wherein: the link that module (9), face identification module (10), fingerprint identification module (11) and iris identification module (12) were checked to the password is equipped with data and compares module (13), the link that module (13) was compared to data is equipped with database (14), data feedback module (15) and interface authority module (16), data are compared module (13) and are used for combining database (14) and password to check the user information of module (9), face identification module (10), fingerprint identification module (11) and iris identification module (12) discernment and compare, distinguish true and false.
3. The system for network security identity recognition according to claim 2, wherein: the connecting end of the data feedback module (15) is connected with the alarm system (4), and the data feedback module (15) is used for feeding back the wrong identity information identified by the comparison of the data comparison module (13) to the alarm system (4) for alarm processing.
4. The system for network security identity recognition according to claim 2, wherein: the interface authority module (16) comprises a first layer interface module (17), a second layer interface module (18), a third layer interface module (19) and a fourth layer interface module (20), wherein the first layer interface module (17), the second layer interface module (18), the third layer interface module (19) and the fourth layer interface module (20) are respectively connected with the password checking module (9), the face recognition module (10), the fingerprint recognition module (11) and the iris recognition module (12) in sequence.
5. The system for network security identity recognition according to claim 4, wherein: the data recording module (21) is arranged at the connecting end of the first layer interface module (17), the second layer interface module (18), the third layer interface module (19) and the fourth layer interface module (20), and the data recording module (21) is used for recording browsing information traces used for the first layer interface module (17), the second layer interface module (18), the third layer interface module (19) and the fourth layer interface module (20).
6. The system for network security identity recognition according to claim 5, wherein: alarm system (4) are including pop-up window suggestion module (22), ruddiness alarm module (23) and interface return module (24), pop-up window suggestion module (22) are used for indicateing the recognition error that the angle of shooting is incorrect to result in, ruddiness alarm module (23) are used for reporting to the police to the illegal identity information who shoots normal but the discernment identity information totally nonconformity, interface return module (24) are used for returning the upper interface to the wrong discernment information that first floor interface module (17), second floor interface module (18), third floor interface module (19) and fourth floor interface module (20) exist, realize authority management.
7. A network security identification method, which adopts a network security identification system of any one of claims 1-6, characterized in that: the method comprises the following steps:
s1: firstly, a user inputs a character password through a password input module (5), then the character password is identified and compared through a password checking module (9), a data comparison module (13) and a database (14) in a central processing unit (3), if the character password is correct, the character password enters a first-layer interface module (17), and meanwhile, an identification entrance of a second-layer interface module (18) appears, and if the character password is wrong, error information is fed back to an alarm system (4) through a data feedback module (15) to be subjected to popup prompt processing through a popup prompt module (22);
s2: then, a user shoots a picture through a face shooting module (6) to collect face information, then the picture is recognized and compared through a face recognition module (10), a data comparison module (13) and a database (14) in a central processing unit (3), if the face recognition is correct, the picture enters a second layer interface module (18), meanwhile, a recognition inlet of a third layer interface module (19) is formed, and if the face recognition is wrong, wrong information is fed back to an alarm system (4) through a data feedback module (15) to perform alarm processing through a red light alarm module (23);
s3: then, a user collects user fingerprint information through a fingerprint card punching module (7), then the user fingerprint information is identified and compared through a fingerprint identification module (11), a data comparison module (13) and a database (14) in a central processing unit (3), if the fingerprint identification is correct, the user enters a third-layer interface module (19), meanwhile, an identification inlet of a fourth-layer interface module (20) is formed, and if the fingerprint identification is wrong, wrong information is fed back to an alarm system (4) through a data feedback module (15) to perform alarm processing through a red light alarm module (23);
s4: then, a user shoots through the iris shooting module (8) to collect the information of the user's eyeball iris, then the information is identified and compared through the iris identification module (12), the data comparison module (13) and the database (14) in the central processing unit (3), if the iris identification is correct, the information enters the fourth layer interface module (20), and if the iris identification is wrong, the error information is fed back to the alarm system (4) through the data feedback module (15) to be subjected to the alarm processing of the red light alarm module (23).
CN202210004766.1A 2022-01-04 2022-01-04 Method and system for network security identity recognition Pending CN114360132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210004766.1A CN114360132A (en) 2022-01-04 2022-01-04 Method and system for network security identity recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210004766.1A CN114360132A (en) 2022-01-04 2022-01-04 Method and system for network security identity recognition

Publications (1)

Publication Number Publication Date
CN114360132A true CN114360132A (en) 2022-04-15

Family

ID=81107434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210004766.1A Pending CN114360132A (en) 2022-01-04 2022-01-04 Method and system for network security identity recognition

Country Status (1)

Country Link
CN (1) CN114360132A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115529155A (en) * 2022-08-05 2022-12-27 云南电网有限责任公司信息中心 Network user behavior analysis system
CN115967541A (en) * 2022-11-28 2023-04-14 云南电网有限责任公司信息中心 Zero-trust network security biometric identification device and use method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115529155A (en) * 2022-08-05 2022-12-27 云南电网有限责任公司信息中心 Network user behavior analysis system
CN115967541A (en) * 2022-11-28 2023-04-14 云南电网有限责任公司信息中心 Zero-trust network security biometric identification device and use method thereof

Similar Documents

Publication Publication Date Title
US8079061B2 (en) Authentication system managing method
Saevanee et al. Multi-modal behavioural biometric authentication for mobile devices
CN104301286B (en) User log-in authentication method and device
CN114360132A (en) Method and system for network security identity recognition
US8433921B2 (en) Object authentication system
CN112182519B (en) Computer storage system security access method and access system
US20080002861A1 (en) Biometrics authentication method and biometrics authentication system
CN107992739A (en) User authentication method, apparatus and system
Dowland et al. Keystroke analysis as a method of advanced user authentication and response
WO2006041919A1 (en) Security alarm notification using iris detection systems
US20210226948A1 (en) Mobile enrollment using a known biometric
CN107124395B (en) Identification method of user identity identification system based on keystroke rhythm
CN111083165A (en) Login interception method and system based on combined anti-collision library platform
Al Solami et al. Continuous biometric authentication: Can it be more practical?
CN106951776A (en) A kind of Host Anomaly Detection method and system
CN112767586A (en) Passage detection method and device, electronic equipment and computer readable storage medium
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
CN111723595A (en) Personnel identity identification method and system
CN107615299A (en) For assessing the method and system of fingerprint template
Lee et al. New approach for detecting leakage of internal information; using emotional recognition technology
Agbinya et al. Design and implementation of multimodal digital identity management system using fingerprint matching and face recognition
CN106779717A (en) A kind of payment authentication method and device
Matthew et al. Developing coercion detection solutions for biometrie security
KR102069567B1 (en) Structured Cabling System Using Biometric Authentication
CN113239333A (en) Browser user identity authentication method and system based on cross-domain resource access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination