CN202503545U - Account security application system - Google Patents
Account security application system Download PDFInfo
- Publication number
- CN202503545U CN202503545U CN2012201193949U CN201220119394U CN202503545U CN 202503545 U CN202503545 U CN 202503545U CN 2012201193949 U CN2012201193949 U CN 2012201193949U CN 201220119394 U CN201220119394 U CN 201220119394U CN 202503545 U CN202503545 U CN 202503545U
- Authority
- CN
- China
- Prior art keywords
- real
- face image
- account
- time face
- facial image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
Disclosed is an account security application system which comprises a server side. The server side comprises a first information receiving and transmitting device, a digital processor and an alarm device. The first information receiving and transmitting device is used for receiving login request information and a real-time face image sent by a client side, wherein the user login request information includes an account and a corresponding password. The digital processor is connected with the first information receiving and transmitting device, and is used for comparing the real-time face image and a face image associated with the account in a face image feature database to see whether the two face images are similar and then comparing the real-time face image and suspected account thief face images in a suspected account thief face image feature database when the two face images are not similar. The alarm device is connected with the digital processor and is used for issuing an alarm command when the number of the suspected account thief face images similar to the real-time face image exceeds a first preset number. According to the scheme of the utility model, convenience is provided for account owners to timely know about the use condition of their accounts and to safeguard their legal rights.
Description
Technical field
The utility model relates to the computer communication technology field, particularly a kind of account number safety application system.
Background technology
Development along with the fabrication technology; The present widely used bank card that comprises deposit card, credit card etc.; For the consumer provides the means of payment easily, more and more users is got used on ATM, extracting cash and carrying out reimbursement of expense in consumption with bank card, credit card etc.The offender usually utilizes the weakness of bank card on safety to steal other people bank card information and consumption password, usurps its number of the account and therefrom obtains wealth, has caused enormous economic loss to the victim but in recent years.Simultaneously, popularizing day by day of the Internet brings us more networking products, and the number of the account that need apply to is also more and more, comprises ecommerce number of the account, online payment number of the account, instant messaging number of the account, social networks number of the account of shopping at network or the like.The thing followed is; The stolen situation of internet account number is also more serious; The lawless person steals the proprietary privacy information of number of the account on the one hand through deliberately falsely using or steal other people number of the account, on the other hand through this number of the account issue invalid message; Bring the loss of aspects such as vivid fame to everyone; More serious even get in touch through this number of the account and the possessory good friend of number of the account, through deception or swindle means unlawful profit-makings such as " borrowing money ", " asking for help ", bring injury for possessory relatives of number of the account and friend.
So; No matter be that numbers of the account such as bank card or network number of the account are usurped by the people; It is even economic loss that the capital band number of the account owner makes troubles, and especially after the increasing network platform was carried out the registration system of real name, all there was user's real information in each number of the account; In case falsely used or usurp, consequence is hardly imaginable.
The utility model content
Based on this, to the problem that exists in the above-mentioned prior art, the purpose of the utility model is to provide a kind of account number safety application system, and it can make things convenient for the number of the account owner in time to understand the operating position of own account, and makes things convenient for right-safeguarding.
For achieving the above object, the utility model adopts following technical scheme:
A kind of account number safety application system comprises service end, and said service end comprises: receive the first information R-T unit of logining solicited message and real-time face image that client is sent, said user logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with said number of the account in said real-time face image and facial image property data base digital processing unit whether similar, that the doubtful steal-number person's facial image in said real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with said first information R-T unit;
And be connected with said digital processing unit, have first preset number at doubtful steal-number person's facial image and open the warning device that sends alarm command when above with said real-time face image similarity.
According to above-mentioned the utility model scheme; It not only uses traditional password to land number of the account, also will be somebody's turn to do the facial image that is associated with this number of the account in the real-time face image gathered in real time and the facial image property data base and compare, if comparison gets nowhere; Then judge the doubtful steal-number person's facial image that whether has in doubtful steal-number person's facial image property data base with this real-time face image similarity; And having first preset number to open under the situation of above doubtful steal-number person's facial image, and explain that this person often attempts to usurp other people number of the account, send alarm command; Thereby can make things convenient for the number of the account owner in time to understand the operating position of own number of the account in view of the above, and be convenient to right-safeguarding.
Description of drawings
Fig. 1 is the structural representation of the account number safety application system embodiment one of the utility model;
Fig. 2 is the structural representation of the account number safety application system embodiment two of the utility model.
Embodiment
Preferred embodiments below in conjunction with is wherein set forth the utility model scheme in detail.
The structural representation of the account number safety application system embodiment one of the utility model has been shown among Fig. 1, and as shown in Figure 1, the system in the present embodiment one comprises service end 101, and wherein, this service end comprises:
Receive the first information R-T unit 1011 of logining solicited message and real-time face image that client 102 is sent, wherein, the user here logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with number of the account in real-time face image and facial image property data base digital processing unit 1012 whether similar, that the doubtful steal-number person's facial image in real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with above-mentioned first information R-T unit 1011;
And be connected with digital processing unit 1012, have first preset number at doubtful steal-number person's facial image and open the warning device 1013 that sends alarm command when above with said real-time face image similarity.
According to above-mentioned the utility model scheme; It not only uses traditional password to land number of the account; Also will be somebody's turn to do the facial image that is associated with this number of the account in the real-time face image gathered in real time and the facial image property data base compares; If comparison is unsuccessful, then judges the doubtful steal-number person's facial image that whether has in doubtful steal-number person's facial image property data base with this real-time face image similarity, and have first preset number to open under the above situation at doubtful steal-number person's facial image similarly; Explain that this person often attempts to usurp other people number of the account; Send alarm command, thereby can make things convenient for the number of the account owner in time to understand the operating position of own number of the account in view of the above, and be convenient to right-safeguarding.
Use the system of the utility model scheme; Login except using traditional password; Can also adopt other traditional modes such as identifying code, encryption to come to login the login that solicited message realizes number of the account through the user simultaneously, concrete implementation does not repeat them here.
Wherein, the system of the utility model can also comprise the client 102 shown in Fig. 1, and wherein, this client 102 specifically can comprise:
Receive the user interaction unit 1021 that the user logins solicited message;
Be connected, control the control device 1022 that camera head 1020 is taken current user's real-time face image with user interaction unit 1021;
Be connected with user interaction unit 1021, control device 1022, and this logined solicited message and real-time face image second information transceiving device 1023 to said service end transmission.
In a concrete course of work, the course of work of the system of the utility model can be to be described below:
Wherein, Above-mentioned digital processing unit 1012; When comparison judges that the real-time face image is similar with the facial image that is associated, can also this real-time face image be added to the facial image property data base that this number of the account corresponds to, to realize real-time update to the facial image property data base.
In addition, when digital processing unit 1012 is compared the facial image dissmilarity of judging the real-time face images and being associated, can also this real-time face image be added to doubtful steal-number person's facial image property data base, so that be that follow-up judgement provides the basis.
Wherein, In shown in Figure 1; Be to be that example describes as the part of client 102 with the camera head 1020 of above-mentioned shooting real-time face image; The for example camera of the camera of notebook computer, mobile phone, ATM equipment camera or the like, promptly above-mentioned client 102 can comprise this camera head 1020.According to actual needs; Client 102 itself also can not have this camera head, and camera head can be used as these client 102 external equipment and uses, and is as shown in Figure 2; As long as client 102 can be controlled camera head and take pictures to obtain the real-time face image, do not repeat them here.
The 102 pairs of camera heads of client are taken the control of real-time face image, in a kind of therein implementation, when user interaction unit 1021 detects the user and gets into log-in interface; Control device 1022 can be controlled automatically and launch this camera head 1020; Realization is to the shooting of real-time face image, and the process that this camera head 1020 is taken pictures can be to carry out on the backstage, on the other hand; Also can be after user interaction unit 1021 detects the user and gets into log-in interface; When the user inputed number of the account and password, control device 1022 this camera head 1020 of control startup was automatically taken, therefore; Use the imperceptible camera of number of the account user of client 102 taking pictures, the process that obtains people's face realtime graphic of taking pictures can not have any impact to user's flow process yet.And; In the case; Because to take pictures be when the user gets into log-in interface, when number of the account and password are landed in input, carry out; Therefore, no matter the user whether correct input password and whether successfully login can both trigger camera function, can find the information of attempting to want to falsely use or usurp the people of own number of the account in view of the above.
When control device 1022 is taken pictures at startup camera head 1020; For example for the equipment such as other mobile phones of PC end, Android mobile phone end, iPhone mobile phone end, ATM end, band camera; Can adopt existing mode to call its existing interface starts; Realization will not be added to give unnecessary details at this to the shooting of real-time face image.
In a kind of therein implementation; Control device 1022 is after the 1020 continuous shootings of control filming apparatus obtain many facial images; Can analyze through definition, therefrom select the highest facial image of definition as the real-time face image to each facial image.Can adopt in the prior art existing mode to carry out according to the mode of the highest facial image of definition screening definition, not repeat them here.
In other a kind of implementation; Control device 1022 is after the 1020 continuous shootings of control filming apparatus obtain many facial images; Can make up these many facial images; Obtain a clear face image after the combination, concrete making up obtain the mode of clear face image can prior art in or improved on this basis any mode carry out.
According to the scheme of the utility model shown in Figure 1, number of the account and corresponding password authentification through and real-time face image and facial image property data base under the similar situation of the facial image that is associated with this number of the account, service end 101 can allow the user to login.In order to let the number of the account owner in time understand the operating position of own number of the account; Password authentification through and the comparison case of successful under; Can also confirm that current user confirms the geographical location information at client place, and this geographical location information is sent to the corresponding communication terminal of the number of the account owner with this real-time face image combination back through first information R-T unit 1011.
In practical application; For fear of the interference that causes the user; Can set the when information after the user sends real-time face image and geographical location information combination of first information R-T unit 1011 according to actual needs; For example compare to have in similarity success back, the unsuccessful back of comparison similarity or the doubtful steal-number person's facial image property data base when opening (for example two) above doubtful steal-number person's facial image with first preset number of real-time face image similarity and just send or the like; Not only can reduce the user bothered hommization more.Certainly, from security consideration, or the factors such as erroneous judgement that fault caused that might take place in the taking into account system use, the information after all sending combination under the various situation also is fine.
In wherein a kind of implementation; The client 102 of installing for entity, ATM cash dispenser or the like for example can be when client 102 be installed; For it is provided with corresponding geographical position information; Second information transceiving device 1023 of client 102 can read self the geographical location information that is disposed automatically when sending the real-time face images to service end 101 and logining solicited message, and self geographical location information is sent to service end 101; In this implementation; Be provided with the information combination digital processing unit 1014 that geographical location information and real-time face image are made up in the service end 101, the information after will being made up by first information R-T unit 1013 sends to the corresponding communication terminal of the number of the account owner with various possible modes, for example through multimedia message, little letter, 3G radio communication or the like.
In other a kind of implementation; The geographical position at client 102 place is likely and changes at any time, for example PC end, mobile phone end or the like, at this moment; Be provided with the positioner 1015 of the geographical location information of confirming client in the above-mentioned service end 101; Confirm the geographical location information at these clients 102 places by this positioner 1015, positioner 1015 is confirmed the mode of the geographical location information of these clients 102, can adopt in the prior art existing mode to carry out.In addition; In service end 101; Also be provided with the information combination digital processing unit 1014 that geographical location information and real-time face image are made up; Information after will being made up by first information R-T unit 1013 sends to the corresponding communication terminal of the number of the account owner with various possible modes, for example through multimedia message, little letter, 3G radio communication or the like.
Consider the problem of communication network traffic, the picture that sends to communication terminal is unsuitable excessive, as long as can from picture, pick out people's face.Therefore; Before first information R-T unit 1013 is with geographical location information and real-time face image combination transmission; Can also carry out suitable compression to picture; Service end 101 can also include the compression set 1016 that is connected between information combination digital processing unit 1014 and the first information R-T unit 1013, and concrete compression process does not repeat them here.Finding through experiment, is also can carry out identification roughly to people's face under the situation of 32 pixels at length and width.
On the other hand, picture is converted into the JPG form can significantly reduces its size, and the JPG picture there is a mass parameter; Can be set to 1-100, the big more quality of numerical value is good more, and in fact; Quality be 60 with quality be that 100 picture is very little in the naked eyes difference, almost do not have difference, can not influence the effect of distinguishing of people's face; And size can reduce 1/3, therefore, can select with the mode of JPG picture picture to be sent to communication terminal.
After the user receives through communication terminal; If think that picture is too small; Can answer information specific to service end 101 through communication terminal, service end 101 is sent an a little bigger picture to user terminal according to this information specific more again, thereby makes the user can obtain bigger picture; Better the people's face in the picture is carried out identification, for example length and width is 50 picture.
The account number safety application system of above-mentioned the utility model can also comprise above-mentioned facial image property data base 103, above-mentioned doubtful steal-number person's facial image property data base 104 any or the combination of the two in the two.
Mentioned number of the account in above-mentioned the utility model scheme can be the number of the account of any type, for example bank card account number, network payment number of the account, personal network space number of the account or the like.
The above embodiment has only expressed several kinds of execution modes of the utility model, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the utility model claim.Should be pointed out that for the person of ordinary skill of the art under the prerequisite that does not break away from the utility model design, can also make some distortion and improvement, these all belong to the protection range of the utility model.Therefore, the protection range of the utility model patent should be as the criterion with accompanying claims.
Claims (10)
1. account number safety application system; It is characterized in that; Comprise service end, said service end comprises: receive the first information R-T unit of logining solicited message and real-time face image that client is sent, said user logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with said number of the account in said real-time face image and facial image property data base digital processing unit whether similar, that the doubtful steal-number person's facial image in said real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with said first information R-T unit;
And be connected with said digital processing unit, have first preset number at doubtful steal-number person's facial image and open the warning device that sends alarm command when above with said real-time face image similarity.
2. account number safety application system according to claim 1 is characterized in that, also comprises client, and said client comprises:
Receive the user interaction unit that the user logins solicited message,
Be connected, control the control device that camera head is taken current user's real-time face image with said user interaction unit;
Be connected with said user interaction unit, said control device, and this logined solicited message and real-time face image second information transceiving device to said service end transmission.
3. account number safety application system according to claim 2 is characterized in that: also comprise the said camera head that is connected with said client.
4. account number safety application system according to claim 2 is characterized in that said client also comprises said camera head.
5. according to any described account number safety application system of claim 1 to 4, it is characterized in that: also comprise said facial image property data base.
6. according to any described account number safety application system of claim 1 to 4, it is characterized in that, also comprise said doubtful steal-number person's facial image property data base.
7. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said digital processing unit is for adding to said real-time face image the digital processing unit of this facial image property data base when real-time face image and the facial image that is associated are similar;
And/or
Said digital processing unit adds to said real-time face image during for the facial image dissmilarity that is associated with said at said real-time face image the digital processing unit of said doubtful steal-number person's facial image property data base.
8. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said real-time face image is the highest facial image of definition in the continuous facial image of taking more than two of said filming apparatus;
Perhaps
The facial image that said real-time face image combines for the facial image more than two of being taken current user by said filming apparatus.
9. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said second information transceiving device sends to said service end with this client geographic location information;
Said service end also comprises: with the information combination digital processing unit of this geographical location information and the combination of said real-time face image, the information after said first information R-T unit will make up sends to the service end of the corresponding communication terminal of the number of the account owner;
Perhaps
Said service end also comprises: the positioner of confirming the geographical location information of said client; With the information combination digital processing unit of this geographical location information and the combination of said real-time face image, the information after said first information R-T unit will make up sends to the service end of the corresponding communication terminal of the number of the account owner.
10. account number safety application system according to claim 10 is characterized in that, also comprises the compression set that is connected between said information combination digital processing unit and the said first information R-T unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012201193949U CN202503545U (en) | 2012-03-26 | 2012-03-26 | Account security application system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012201193949U CN202503545U (en) | 2012-03-26 | 2012-03-26 | Account security application system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202503545U true CN202503545U (en) | 2012-10-24 |
Family
ID=47040142
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012201193949U Expired - Lifetime CN202503545U (en) | 2012-03-26 | 2012-03-26 | Account security application system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202503545U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105976519A (en) * | 2016-04-29 | 2016-09-28 | 江苏诚创信息技术研发有限公司 | ATM preventing bank card from being stolen and operating method thereof |
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
CN109871677A (en) * | 2019-03-19 | 2019-06-11 | 苏州迈荣祥信息科技有限公司 | Intelligent switch control system and method |
-
2012
- 2012-03-26 CN CN2012201193949U patent/CN202503545U/en not_active Expired - Lifetime
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105976519A (en) * | 2016-04-29 | 2016-09-28 | 江苏诚创信息技术研发有限公司 | ATM preventing bank card from being stolen and operating method thereof |
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
CN109871677A (en) * | 2019-03-19 | 2019-06-11 | 苏州迈荣祥信息科技有限公司 | Intelligent switch control system and method |
CN109871677B (en) * | 2019-03-19 | 2022-10-25 | 珠海微褀科技有限公司 | Intelligent switch control system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102663444B (en) | Method for preventing account number from being stolen and system thereof | |
CN106506442A (en) | A kind of smart home multi-user identification and its Rights Management System | |
EP3035226A1 (en) | Security system, apparatus and method using additional code | |
CN107292150A (en) | Save user identification confirmation method and apparatus in information processing from damage | |
US11074327B2 (en) | Methods and systems for ensuring that an individual is authorized to conduct an activity | |
CN105160742A (en) | Method and system for carrying out judgment, alarming and information shielding on forced unlocking | |
CN105654372A (en) | Identity recognition method for remote account opening and server and system | |
CN105592146A (en) | Equipment control method, device and terminal | |
CN102222368A (en) | Electronic ticket authentication system applying short-distance communication technology and detection method | |
CN110069229B (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
US11521208B2 (en) | System and method for authenticating transactions from a mobile device | |
CN101511085A (en) | Method and apparatus for limiting usage of mobile terminal function by using personal identification | |
CN109245902A (en) | The guard method of instant messaging message authentication codes and device | |
CN105913513A (en) | Control method and system for door lock system | |
CN106686754A (en) | Data interaction method and data interaction system | |
CN104253714A (en) | Monitoring method, system, browser and server | |
CN105635113A (en) | SDK-based remote service processing method and system | |
CN106791627A (en) | Network Video Surveillance and security alarm integrated system and its secure access method for authenticating | |
US9202212B1 (en) | Using mobile device to monitor for electronic bank card communication | |
CN107341376B (en) | Picture mistransmission preventing and peeping preventing method and electronic equipment | |
CN113408006A (en) | Monitoring data access method and device, indoor monitoring system and storage medium | |
CN203204805U (en) | Alarm device | |
CN202503545U (en) | Account security application system | |
CN201435736Y (en) | Real-name registration surfing intelligent monitoring system used in internet bars | |
AU2021282382A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20121024 |
|
CX01 | Expiry of patent term |