CN115967541A - Zero-trust network security biometric identification device and use method thereof - Google Patents
Zero-trust network security biometric identification device and use method thereof Download PDFInfo
- Publication number
- CN115967541A CN115967541A CN202211498511.1A CN202211498511A CN115967541A CN 115967541 A CN115967541 A CN 115967541A CN 202211498511 A CN202211498511 A CN 202211498511A CN 115967541 A CN115967541 A CN 115967541A
- Authority
- CN
- China
- Prior art keywords
- module
- image
- trust
- data
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012795 verification Methods 0.000 claims abstract description 90
- 230000003068 static effect Effects 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012567 pattern recognition method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a zero-trust network security biological recognition device and a use method thereof, relating to the field of network identity recognition, wherein the technical scheme comprises a recognition device, a security recognition system is arranged in the recognition device, the security recognition system comprises an image system, a fingerprint recognition system, a dynamic verification module, a static verification module, a data acquisition system, a central processing module and a cloud storage module, the image system comprises an image processing module and an image recognition module, and the image system collects external images and processes the collected images; the comparison of the user account number and the password is realized through the static verification module, and the central processing module is used for comparing the user account number and the password according to the biological identification data of the user: the face comparison data, the fingerprint comparison data and the dynamic/static verification data are fused, so that whether the user passes through the trust judgment module or not is judged, and the safety of the user is guaranteed.
Description
Technical Field
The invention relates to the technical field of network identity recognition, in particular to a zero-trust network security biometric identification device and a using method thereof.
Background
The biometric identification technology is a technology for identity authentication by using human body biological characteristics. The method is characterized in that the inherent physiological characteristics or behavior characteristics of a human body are collected through the close combination of a computer and high-tech means such as optics, acoustics, biosensors and a biometrical principle, sampling is carried out, the characteristics are extracted by image processing and pattern recognition methods for digital processing and conversion into digital codes, and the codes form a characteristic template to be stored in a database.
Through retrieval, the invention patent with the Chinese patent number of CN104821882A discloses a network security verification method based on voice biological characteristics, which comprises a client and a verification server, wherein the client is in communication connection with the verification server; the method comprises the steps that a client side collects voice signals of a user, preprocesses the voice signals and then extracts voice biological characteristic data used for representing voice biological characteristic information; the database of the verification server stores voice biological characteristic data of the user in advance, and a processing module of the verification server verifies and matches the voice biological characteristic data retrieved from the database with the received voice biological characteristic data; if the two are matched, the verification is passed, and the corresponding functional module is controlled to be started on the client; if the two are not matched, the verification fails, and verification failure information is sent to the client. The network security verification method does not need to identify verification codes and complex input operation, adopts voice as the verification codes, and has the advantages of high identification rate, high verification efficiency, convenience, rapidness and high security performance.
However, the method adopts voice as the verification code, so that the method has high recognition rate, high verification efficiency, convenience, rapidness and high safety performance, and abnormal conditions such as advanced recording and the like exist in the voice recognition in the actual use process, so that the method has the advantages of high recognition rate, high verification efficiency, convenience, rapidness and high safety performance
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a zero-trust network security biometric identification device and a using method thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
a zero-trust network security biometric identification device and a use method thereof comprise an identification device, wherein a security identification system is arranged in the identification device, the security identification system comprises an image system, a fingerprint identification system, a dynamic verification module, a static verification module, a data acquisition system, a central processing module and a cloud storage module, the image system comprises an image processing module and an image identification module, and the image system collects external images and processes the collected images;
the central processing module is used for comparing faces of people and judging the trust degree according to multiple comparison results, and is in communication connection with the safety alarm module, and the central processing module transmits the comparison results to the safety alarm module to send out safety alarms through the safety alarm module.
The above technical solution further comprises:
the identification device is characterized in that a CMOS camera is mounted outside the identification device, the CMOS camera starts to shoot in real time when people verify, and the image processing module collects and processes images shot by the CMOS camera.
The image processing module transmits the acquired and processed image to the image recognition module, and the image recognition module recognizes the received image and performs modular processing and comparison on the texture and the details in the image.
The image system transmits processed image information data to the data acquisition system, the fingerprint identification system is in communication connection with the cloud storage module, the fingerprint identification system identifies and compares fingerprints of personnel with a fingerprint database in the cloud storage module, and the fingerprint identification system transmits a compared result to the data acquisition system.
The personnel carry out account number password input through static verification module, communication connection between static verification module and the high in the clouds storage module, static verification module compares account number password and the data of the inside storage of high in the clouds storage module, static verification module is with data transmission to the data acquisition system after comparing, the user carries out the identifying code login through dynamic verification module, the identifying code that dynamic verification module simultaneously inputs the user is compared with the identifying code that sends.
The data acquisition system transmits received information data to the central processing module, the brightness improvement module processes the received image information data to increase the brightness of the image, the face recognition module extracts the face image data with enhanced brightness, brings the face image data into a three-dimensional coordinate system to mark key positions, and compares the data of the mark points with the face data stored in the cloud storage module.
The trust judgment module is used for comprehensively judging the trust degree of the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, the trust judgment module is used for transmitting untrusted information to the safety alarm module, and the cloud storage module is used for synchronizing data information in the safety identification system in real time.
A method for using a zero trust network security biometric identification device comprises the following steps:
the first step is as follows: the personnel are subjected to image acquisition, processing and identification through an image system, fingerprint comparison is carried out through a fingerprint identification system, dynamic verification is carried out through a dynamic verification module, and static verification is carried out through a static verification module;
the second step is that: the image system, the fingerprint identification system, the dynamic verification module and the static verification module transmit data information to the central processing module through the data acquisition system;
the third step: comparing the faces of the persons through a brightness improving module and a face recognition module;
the fourth step: the trust judgment module carries out comprehensive trust judgment on the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, and when the trust judgment module judges that the personnel fails to pass the credit judgment, the trust judgment module transmits information to the safety alarm module and gives an alarm;
when the trust judgment module judges that the person passes the credit judgment, the person can continue to access.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, the effective acquisition of user face data is realized through the matched use of the safety alarm module, the image processing module and the image recognition module in the image system and the cooperation of the brightness improving module and the face recognition module in the central processing module, and whether the user is a safe user or not is judged according to the comparison stored in the cloud storage module.
2. In the invention, the comparison of user fingerprints is realized through a fingerprint identification system, the comparison of user dynamic verification is realized through a dynamic verification module, the comparison of user account passwords is realized through a static verification module, and a central processing module is used for comparing the user fingerprints with the user passwords according to biological identification data of the user: the face comparison data, the fingerprint comparison data and the dynamic/static verification data are fused, so that whether the user passes through the trust judgment module or not is judged, and the safety of the user is guaranteed.
Drawings
Fig. 1 is a system block diagram of a zero trust network security biometric apparatus and a method for using the same according to the present invention.
In the figure: 1. an image system; 2. a fingerprint identification system; 3. a dynamic verification module; 4. a static verification module; 5. a data acquisition system; 6. a central processing module; 7. a cloud storage module; 8. a security alarm module; 9. an image processing module; 10. an image recognition module; 11. a brightness boost module; 12. a face recognition module; 13. a trust judgment module; 14. a CMOS camera.
Detailed Description
The technical solution of the present invention is further explained with reference to the accompanying drawings and specific embodiments.
Example one
As shown in fig. 1, the network security biometric identification device with zero trust and the use method thereof provided by the present invention include an identification device, a security identification system is arranged inside the identification device, the security identification system includes an image system 1, a fingerprint identification system 2, a dynamic verification module 3, a static verification module 4, a data acquisition system 5, a central processing module 6 and a cloud storage module 7, the image system 1 includes an image processing module 9 and an image identification module 10, the image system 1 collects an external image and processes the collected image;
the central processing module 6 comprises a brightness improving module 11, a face recognition module 12 and a trust judging module 13, the central processing module 6 compares faces of people, meanwhile, the trust degree judgment is carried out according to multiple comparison results, the central processing module 6 is in communication connection with the safety alarm module 8, and the central processing module 6 transmits the comparison results to the safety alarm module 8 and sends out safety alarms through the safety alarm module 8.
The zero-trust network security biometric identification device and the use method thereof based on the first embodiment have the working principle that when the device works and a person is verified, the image system 1 collects images when the person is verified and processes the collected images;
the central processing module 6 compares the faces of the persons, meanwhile, the confidence degree judgment is carried out according to the multiple comparison results, and when the central processing module 6 determines that the persons do not pass the credit judgment, the central processing module 6 transmits information to the safety alarm module 8 and gives an alarm; when the central processing module 6 finds that the person is judged to be credit, the person can continue the access.
Example two
As shown in fig. 1, based on the first embodiment, a CMOS camera 14 is installed outside the identification device, the CMOS camera 14 starts to shoot in real time when the person performs the verification, and an image processing module 9 collects and processes an image shot by the CMOS camera 14;
the image processing module 9 transmits the acquired and processed image to the image recognition module 10, and the image recognition module 10 recognizes the received image and performs modular processing comparison on the texture and the details in the image;
the image system 1 transmits the processed image information data to the data acquisition system 5, the fingerprint identification system 2 is in communication connection with the cloud storage module 7, the fingerprint identification system 2 identifies and compares the fingerprints of the personnel with a fingerprint database in the cloud storage module 7, and the fingerprint identification system 2 transmits the compared result to the data acquisition system 5;
personnel input account passwords through the static verification module 4, the static verification module 4 is in communication connection with the cloud storage module 7, the static verification module 4 compares the account passwords with data stored in the cloud storage module 7, the static verification module 4 transmits the compared data to the data acquisition system 5, a user logs in verification codes through the dynamic verification module 3, and meanwhile the dynamic verification module 3 compares the verification codes input by the user with the transmitted verification codes;
the data acquisition system 5 transmits the received information data to the central processing module 6, the brightness improvement module 11 processes the received image information data to increase the brightness of the image, the face recognition module 12 extracts the face image data with enhanced brightness, brings the face image data into a three-dimensional coordinate system to mark a key position, and compares the data of the mark point with the face data stored in the cloud storage module 7;
the trust judgment module 13 performs comprehensive trust judgment on the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, the trust judgment module 13 transmits untrusted information to the security alarm module 8, and the cloud storage module 7 performs real-time synchronization on data information in the security identification system.
In this embodiment, during operation, the CMOS camera 14 starts to shoot in real time when the person performs verification, the image processing module 9 collects and processes an image shot by the CMOS camera 14, the image recognition module 10 recognizes the image processed in the image processing module 9, and performs modular processing comparison on textures and details in the image;
the image system 1 transmits the processed image information data to the data acquisition system 5, the fingerprint identification system 2 identifies and compares the fingerprints of the personnel with a fingerprint database in the cloud storage module 7, and then the fingerprint identification system 2 transmits the compared result to the data acquisition system 5;
a person inputs an account password through the static verification module 4, the static verification module 4 compares the input account password with data stored in the cloud storage module 7, the static verification module 4 transmits the compared data to the data acquisition system 5, a user logs in a verification code through the dynamic verification module 3, and meanwhile, the dynamic verification module 3 compares the verification code input by the user with the sent verification code;
the data acquisition system 5 transmits the received information data to the central processing module 6, the brightness improvement module 11 processes the received image information data to increase the brightness of the image, the face recognition module 12 extracts the face image data with enhanced brightness, brings the face image data into a three-dimensional coordinate system to mark a key position, and compares the data of the mark point with the face data stored in the cloud storage module 7;
the trust judgment module 13 performs comprehensive trust judgment on the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, and the cloud storage module 7 performs real-time synchronization on data information in the security identification system.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (8)
1. The zero-trust network security biometric identification device comprises an identification device and is characterized in that a security identification system is arranged in the identification device, the security identification system comprises an image system (1), a fingerprint identification system (2), a dynamic verification module (3), a static verification module (4), a data acquisition system (5), a central processing module (6) and a cloud storage module (7), the image system (1) comprises an image processing module (9) and an image identification module (10), and the image system (1) collects external images and processes the collected images;
the interior of the central processing module (6) comprises a brightness improving module (11), a face recognition module (12) and a trust judging module (13), the central processing module (6) compares faces of people, meanwhile, trust degree judgment is carried out according to multiple comparison results, the central processing module (6) is in communication connection with the safety alarm module (8), and the central processing module (6) transmits the comparison results to the safety alarm module (8) to send out safety alarms through the safety alarm module (8).
2. The network security biological recognition device with zero trust according to claim 1, wherein a CMOS camera (14) is installed outside the recognition device, the CMOS camera (14) starts to shoot in real time when people are authenticated, and the image processing module (9) collects and processes images shot by the CMOS camera (14).
3. The network security biometric device with zero trust as claimed in claim 2, wherein the image processing module (9) transmits the acquired and processed image to the image recognition module (10), and the image recognition module (10) recognizes the received image and performs modular processing comparison on the texture and the details in the image.
4. The network security biometric identification device with zero trust according to claim 3, wherein the image system (1) transmits the processed image information data to the data acquisition system (5), the fingerprint identification system (2) is in communication connection with the cloud storage module (7), the fingerprint identification system (2) identifies and compares the fingerprint of the person with a fingerprint database in the cloud storage module (7), and the fingerprint identification system (2) transmits the comparison result to the data acquisition system (5).
5. The zero-trust network security biometric apparatus according to claim 4, wherein a person inputs an account password through the static verification module (4), the static verification module (4) is in communication connection with the cloud storage module (7), the static verification module (4) compares the account password with data stored in the cloud storage module (7), the static verification module (4) transmits the compared data to the data acquisition system (5), a user logs in through the dynamic verification module (3) by using a verification code, and the dynamic verification module (3) compares the verification code input by the user with the verification code sent by using the verification code.
6. The zero-trust network security biometric device according to claim 5, wherein the data acquisition system (5) transmits the received information data to the central processing module (6), the brightness enhancement module (11) processes the received image information data to increase the brightness of the image, the face recognition module (12) extracts the brightness enhanced face image data, brings the face image data into a three-dimensional coordinate system to mark key positions, and compares the data of the marked points with the face data stored in the cloud storage module (7).
7. The zero-trust network security biometric apparatus according to claim 6, wherein the trust judgment module (13) performs comprehensive trust judgment on the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, the trust judgment module (13) transmits untrusted information to the security alarm module (8), and the cloud storage module (7) synchronizes data information inside the security identification system in real time.
8. A method of using a zero trust network secure biometric device including a zero trust network secure biometric device according to claim 1, comprising the steps of:
the first step is as follows: the method comprises the steps of carrying out image acquisition, processing and identification on a person through an image system (1), carrying out fingerprint comparison through a fingerprint identification system (2), carrying out dynamic verification through a dynamic verification module (3), and carrying out static verification through a static verification module (4);
the second step: the image system (1), the fingerprint identification system (2), the dynamic verification module (3) and the static verification module (4) transmit data information to the central processing module (6) through the data acquisition system (5);
the third step: comparing the faces of the persons through a brightness improving module (11) and a face recognition module (12);
the fourth step: the trust judgment module (13) carries out comprehensive trust judgment on the face comparison result, the fingerprint comparison result, the dynamic verification result and the static verification result, and when the trust judgment module (13) judges that the personnel does not pass the trust judgment, the trust judgment module (13) transmits information to the safety alarm module (8) and gives an alarm;
when the trust judgment module (13) judges that the person passes the credit judgment, the person can continue the access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211498511.1A CN115967541A (en) | 2022-11-28 | 2022-11-28 | Zero-trust network security biometric identification device and use method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211498511.1A CN115967541A (en) | 2022-11-28 | 2022-11-28 | Zero-trust network security biometric identification device and use method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115967541A true CN115967541A (en) | 2023-04-14 |
Family
ID=87353941
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211498511.1A Withdrawn CN115967541A (en) | 2022-11-28 | 2022-11-28 | Zero-trust network security biometric identification device and use method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115967541A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201867835U (en) * | 2010-12-13 | 2011-06-15 | 徐勇 | System combining fingerprint identification with near-infrared face identification |
CN107045744A (en) * | 2017-04-14 | 2017-08-15 | 特斯联(北京)科技有限公司 | A kind of intelligent villa entrance guard authentication method and system |
CN112437050A (en) * | 2020-11-09 | 2021-03-02 | 南昌工学院 | Computer network safety protection system |
CN114360132A (en) * | 2022-01-04 | 2022-04-15 | 云南电网有限责任公司信息中心 | Method and system for network security identity recognition |
-
2022
- 2022-11-28 CN CN202211498511.1A patent/CN115967541A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201867835U (en) * | 2010-12-13 | 2011-06-15 | 徐勇 | System combining fingerprint identification with near-infrared face identification |
CN107045744A (en) * | 2017-04-14 | 2017-08-15 | 特斯联(北京)科技有限公司 | A kind of intelligent villa entrance guard authentication method and system |
CN112437050A (en) * | 2020-11-09 | 2021-03-02 | 南昌工学院 | Computer network safety protection system |
CN114360132A (en) * | 2022-01-04 | 2022-04-15 | 云南电网有限责任公司信息中心 | Method and system for network security identity recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104834849B (en) | Dual-factor identity authentication method and system based on Application on Voiceprint Recognition and recognition of face | |
US6963659B2 (en) | Fingerprint verification system utilizing a facial image-based heuristic search method | |
CN1972186B (en) | A mobile identity authentication system and its authentication method | |
CN105261105A (en) | Safety access control method | |
CN105069340B (en) | Examination paper secrecy system and method with physical identification password and the control of living things feature recognition cryptosync | |
CN106981119A (en) | Entrance guard management system and method based on body shape | |
CN109410407A (en) | A kind of face and fingerprint recognition access control system | |
CN111831995A (en) | Trusted identity authentication method and system based on eID and human body biological information | |
CN114218543A (en) | Encryption and unlocking system and method based on multi-scene expression recognition | |
CN111429638B (en) | Access control method based on voice recognition and face recognition | |
CN112491844A (en) | Voiceprint and face recognition verification system and method based on trusted execution environment | |
CN111611437A (en) | Method and device for preventing face voiceprint verification and replacement attack | |
CN112862491B (en) | Face payment security method and platform based on security unit and trusted execution environment | |
CN115967541A (en) | Zero-trust network security biometric identification device and use method thereof | |
CN116612570A (en) | Personnel circulation management system and management method based on intelligent face recognition | |
CN206788947U (en) | Access control system based on body shape | |
CN115879091A (en) | Dynamic and static identity authentication fusion system based on zero trust | |
CN112769872B (en) | Conference system access method and system based on audio and video feature fusion | |
CN211124082U (en) | Face recognition system based on multispectral information acquisition technology | |
CN114926930A (en) | Intelligent building monitoring system with multiple identity verifications and method thereof | |
CN212160789U (en) | Face recognition access control system based on raspberry group | |
CN112669511A (en) | User registration and authentication method, system and equipment based on face voiceprint | |
JP2007011710A (en) | Authentication device and authentication method | |
CN115424383B (en) | Intelligent access control management system and method | |
CN118212667B (en) | Dynamic identification method and system for palm vein of living body |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20230414 |