CN202503545U - Account security application system - Google Patents

Account security application system Download PDF

Info

Publication number
CN202503545U
CN202503545U CN2012201193949U CN201220119394U CN202503545U CN 202503545 U CN202503545 U CN 202503545U CN 2012201193949 U CN2012201193949 U CN 2012201193949U CN 201220119394 U CN201220119394 U CN 201220119394U CN 202503545 U CN202503545 U CN 202503545U
Authority
CN
China
Prior art keywords
real
face image
account
time face
facial image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2012201193949U
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU SHANGJING NETWORK TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU SHANGJING NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU SHANGJING NETWORK TECHNOLOGY Co Ltd filed Critical GUANGZHOU SHANGJING NETWORK TECHNOLOGY Co Ltd
Priority to CN2012201193949U priority Critical patent/CN202503545U/en
Application granted granted Critical
Publication of CN202503545U publication Critical patent/CN202503545U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

Disclosed is an account security application system which comprises a server side. The server side comprises a first information receiving and transmitting device, a digital processor and an alarm device. The first information receiving and transmitting device is used for receiving login request information and a real-time face image sent by a client side, wherein the user login request information includes an account and a corresponding password. The digital processor is connected with the first information receiving and transmitting device, and is used for comparing the real-time face image and a face image associated with the account in a face image feature database to see whether the two face images are similar and then comparing the real-time face image and suspected account thief face images in a suspected account thief face image feature database when the two face images are not similar. The alarm device is connected with the digital processor and is used for issuing an alarm command when the number of the suspected account thief face images similar to the real-time face image exceeds a first preset number. According to the scheme of the utility model, convenience is provided for account owners to timely know about the use condition of their accounts and to safeguard their legal rights.

Description

The account number safety application system
Technical field
The utility model relates to the computer communication technology field, particularly a kind of account number safety application system.
Background technology
Development along with the fabrication technology; The present widely used bank card that comprises deposit card, credit card etc.; For the consumer provides the means of payment easily, more and more users is got used on ATM, extracting cash and carrying out reimbursement of expense in consumption with bank card, credit card etc.The offender usually utilizes the weakness of bank card on safety to steal other people bank card information and consumption password, usurps its number of the account and therefrom obtains wealth, has caused enormous economic loss to the victim but in recent years.Simultaneously, popularizing day by day of the Internet brings us more networking products, and the number of the account that need apply to is also more and more, comprises ecommerce number of the account, online payment number of the account, instant messaging number of the account, social networks number of the account of shopping at network or the like.The thing followed is; The stolen situation of internet account number is also more serious; The lawless person steals the proprietary privacy information of number of the account on the one hand through deliberately falsely using or steal other people number of the account, on the other hand through this number of the account issue invalid message; Bring the loss of aspects such as vivid fame to everyone; More serious even get in touch through this number of the account and the possessory good friend of number of the account, through deception or swindle means unlawful profit-makings such as " borrowing money ", " asking for help ", bring injury for possessory relatives of number of the account and friend.
So; No matter be that numbers of the account such as bank card or network number of the account are usurped by the people; It is even economic loss that the capital band number of the account owner makes troubles, and especially after the increasing network platform was carried out the registration system of real name, all there was user's real information in each number of the account; In case falsely used or usurp, consequence is hardly imaginable.
The utility model content
Based on this, to the problem that exists in the above-mentioned prior art, the purpose of the utility model is to provide a kind of account number safety application system, and it can make things convenient for the number of the account owner in time to understand the operating position of own account, and makes things convenient for right-safeguarding.
For achieving the above object, the utility model adopts following technical scheme:
A kind of account number safety application system comprises service end, and said service end comprises: receive the first information R-T unit of logining solicited message and real-time face image that client is sent, said user logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with said number of the account in said real-time face image and facial image property data base digital processing unit whether similar, that the doubtful steal-number person's facial image in said real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with said first information R-T unit;
And be connected with said digital processing unit, have first preset number at doubtful steal-number person's facial image and open the warning device that sends alarm command when above with said real-time face image similarity.
According to above-mentioned the utility model scheme; It not only uses traditional password to land number of the account, also will be somebody's turn to do the facial image that is associated with this number of the account in the real-time face image gathered in real time and the facial image property data base and compare, if comparison gets nowhere; Then judge the doubtful steal-number person's facial image that whether has in doubtful steal-number person's facial image property data base with this real-time face image similarity; And having first preset number to open under the situation of above doubtful steal-number person's facial image, and explain that this person often attempts to usurp other people number of the account, send alarm command; Thereby can make things convenient for the number of the account owner in time to understand the operating position of own number of the account in view of the above, and be convenient to right-safeguarding.
Description of drawings
Fig. 1 is the structural representation of the account number safety application system embodiment one of the utility model;
Fig. 2 is the structural representation of the account number safety application system embodiment two of the utility model.
Embodiment
Preferred embodiments below in conjunction with is wherein set forth the utility model scheme in detail.
The structural representation of the account number safety application system embodiment one of the utility model has been shown among Fig. 1, and as shown in Figure 1, the system in the present embodiment one comprises service end 101, and wherein, this service end comprises:
Receive the first information R-T unit 1011 of logining solicited message and real-time face image that client 102 is sent, wherein, the user here logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with number of the account in real-time face image and facial image property data base digital processing unit 1012 whether similar, that the doubtful steal-number person's facial image in real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with above-mentioned first information R-T unit 1011;
And be connected with digital processing unit 1012, have first preset number at doubtful steal-number person's facial image and open the warning device 1013 that sends alarm command when above with said real-time face image similarity.
According to above-mentioned the utility model scheme; It not only uses traditional password to land number of the account; Also will be somebody's turn to do the facial image that is associated with this number of the account in the real-time face image gathered in real time and the facial image property data base compares; If comparison is unsuccessful, then judges the doubtful steal-number person's facial image that whether has in doubtful steal-number person's facial image property data base with this real-time face image similarity, and have first preset number to open under the above situation at doubtful steal-number person's facial image similarly; Explain that this person often attempts to usurp other people number of the account; Send alarm command, thereby can make things convenient for the number of the account owner in time to understand the operating position of own number of the account in view of the above, and be convenient to right-safeguarding.
Use the system of the utility model scheme; Login except using traditional password; Can also adopt other traditional modes such as identifying code, encryption to come to login the login that solicited message realizes number of the account through the user simultaneously, concrete implementation does not repeat them here.
Wherein, the system of the utility model can also comprise the client 102 shown in Fig. 1, and wherein, this client 102 specifically can comprise:
Receive the user interaction unit 1021 that the user logins solicited message;
Be connected, control the control device 1022 that camera head 1020 is taken current user's real-time face image with user interaction unit 1021;
Be connected with user interaction unit 1021, control device 1022, and this logined solicited message and real-time face image second information transceiving device 1023 to said service end transmission.
In a concrete course of work, the course of work of the system of the utility model can be to be described below:
Client 102 through user interaction unit 1021 receive user input login solicited message after; Control device 1022 control camera heads 1020 are taken current user's real-time face image; Second information transceiving device sends the real-time face image of logining solicited message and camera head 1020 shootings that user interaction unit 1021 receives to service end 101; Wherein, The user here logins solicited message and comprises number of the account and corresponding password, according to actual needs, also can include the information that need comprise in traditional login mode such as check code;
Service end 101 is logined solicited message and real-time face image through what first information R-T unit 1011 received that clients 102 send; Digital processing unit 1012 is compared the facial image that is associated with this number of the account in real-time face image and the facial image property data base; Judge whether the two is similar; If it is dissimilar; Search also judges that the doubtful steal-number person's facial image that whether has in doubtful steal-number person's facial image property data base with this real-time face image similarity, warning device 1013 have when opening above doubtful steal-number person's facial image with first predetermined number of this real-time face image similarity, send alarm command in doubtful steal-number person's facial image property data base.
Wherein, Above-mentioned digital processing unit 1012; When comparison judges that the real-time face image is similar with the facial image that is associated, can also this real-time face image be added to the facial image property data base that this number of the account corresponds to, to realize real-time update to the facial image property data base.
In addition, when digital processing unit 1012 is compared the facial image dissmilarity of judging the real-time face images and being associated, can also this real-time face image be added to doubtful steal-number person's facial image property data base, so that be that follow-up judgement provides the basis.
Wherein, In shown in Figure 1; Be to be that example describes as the part of client 102 with the camera head 1020 of above-mentioned shooting real-time face image; The for example camera of the camera of notebook computer, mobile phone, ATM equipment camera or the like, promptly above-mentioned client 102 can comprise this camera head 1020.According to actual needs; Client 102 itself also can not have this camera head, and camera head can be used as these client 102 external equipment and uses, and is as shown in Figure 2; As long as client 102 can be controlled camera head and take pictures to obtain the real-time face image, do not repeat them here.
The 102 pairs of camera heads of client are taken the control of real-time face image, in a kind of therein implementation, when user interaction unit 1021 detects the user and gets into log-in interface; Control device 1022 can be controlled automatically and launch this camera head 1020; Realization is to the shooting of real-time face image, and the process that this camera head 1020 is taken pictures can be to carry out on the backstage, on the other hand; Also can be after user interaction unit 1021 detects the user and gets into log-in interface; When the user inputed number of the account and password, control device 1022 this camera head 1020 of control startup was automatically taken, therefore; Use the imperceptible camera of number of the account user of client 102 taking pictures, the process that obtains people's face realtime graphic of taking pictures can not have any impact to user's flow process yet.And; In the case; Because to take pictures be when the user gets into log-in interface, when number of the account and password are landed in input, carry out; Therefore, no matter the user whether correct input password and whether successfully login can both trigger camera function, can find the information of attempting to want to falsely use or usurp the people of own number of the account in view of the above.
When control device 1022 is taken pictures at startup camera head 1020; For example for the equipment such as other mobile phones of PC end, Android mobile phone end, iPhone mobile phone end, ATM end, band camera; Can adopt existing mode to call its existing interface starts; Realization will not be added to give unnecessary details at this to the shooting of real-time face image.
Control device 1022 is taken when obtaining the real-time face image at control camera head 1020, can only take once, and this facial image that will take is as the above-mentioned real-time face image that needs application.Yet in actual conditions, influences such as place environment, light, angle are only taken one words and possibly can't be watched facial image clearly during owing to shooting, can't from this photo, identify facial image accurately.Therefore; The utility model scheme is when implementing; Control device 1022 can be that control filming apparatus 1020 is taken the facial image of current user more than two continuously; The concrete number of times of taking continuously can be set according to actual needs, determines the real-time face image that above-mentioned needs use according to these many facial images taking continuously then.
In a kind of therein implementation; Control device 1022 is after the 1020 continuous shootings of control filming apparatus obtain many facial images; Can analyze through definition, therefrom select the highest facial image of definition as the real-time face image to each facial image.Can adopt in the prior art existing mode to carry out according to the mode of the highest facial image of definition screening definition, not repeat them here.
In other a kind of implementation; Control device 1022 is after the 1020 continuous shootings of control filming apparatus obtain many facial images; Can make up these many facial images; Obtain a clear face image after the combination, concrete making up obtain the mode of clear face image can prior art in or improved on this basis any mode carry out.
According to the scheme of the utility model shown in Figure 1, number of the account and corresponding password authentification through and real-time face image and facial image property data base under the similar situation of the facial image that is associated with this number of the account, service end 101 can allow the user to login.In order to let the number of the account owner in time understand the operating position of own number of the account; Password authentification through and the comparison case of successful under; Can also confirm that current user confirms the geographical location information at client place, and this geographical location information is sent to the corresponding communication terminal of the number of the account owner with this real-time face image combination back through first information R-T unit 1011.
In practical application; For fear of the interference that causes the user; Can set the when information after the user sends real-time face image and geographical location information combination of first information R-T unit 1011 according to actual needs; For example compare to have in similarity success back, the unsuccessful back of comparison similarity or the doubtful steal-number person's facial image property data base when opening (for example two) above doubtful steal-number person's facial image with first preset number of real-time face image similarity and just send or the like; Not only can reduce the user bothered hommization more.Certainly, from security consideration, or the factors such as erroneous judgement that fault caused that might take place in the taking into account system use, the information after all sending combination under the various situation also is fine.
In wherein a kind of implementation; The client 102 of installing for entity, ATM cash dispenser or the like for example can be when client 102 be installed; For it is provided with corresponding geographical position information; Second information transceiving device 1023 of client 102 can read self the geographical location information that is disposed automatically when sending the real-time face images to service end 101 and logining solicited message, and self geographical location information is sent to service end 101; In this implementation; Be provided with the information combination digital processing unit 1014 that geographical location information and real-time face image are made up in the service end 101, the information after will being made up by first information R-T unit 1013 sends to the corresponding communication terminal of the number of the account owner with various possible modes, for example through multimedia message, little letter, 3G radio communication or the like.
In other a kind of implementation; The geographical position at client 102 place is likely and changes at any time, for example PC end, mobile phone end or the like, at this moment; Be provided with the positioner 1015 of the geographical location information of confirming client in the above-mentioned service end 101; Confirm the geographical location information at these clients 102 places by this positioner 1015, positioner 1015 is confirmed the mode of the geographical location information of these clients 102, can adopt in the prior art existing mode to carry out.In addition; In service end 101; Also be provided with the information combination digital processing unit 1014 that geographical location information and real-time face image are made up; Information after will being made up by first information R-T unit 1013 sends to the corresponding communication terminal of the number of the account owner with various possible modes, for example through multimedia message, little letter, 3G radio communication or the like.
Consider the problem of communication network traffic, the picture that sends to communication terminal is unsuitable excessive, as long as can from picture, pick out people's face.Therefore; Before first information R-T unit 1013 is with geographical location information and real-time face image combination transmission; Can also carry out suitable compression to picture; Service end 101 can also include the compression set 1016 that is connected between information combination digital processing unit 1014 and the first information R-T unit 1013, and concrete compression process does not repeat them here.Finding through experiment, is also can carry out identification roughly to people's face under the situation of 32 pixels at length and width.
On the other hand, picture is converted into the JPG form can significantly reduces its size, and the JPG picture there is a mass parameter; Can be set to 1-100, the big more quality of numerical value is good more, and in fact; Quality be 60 with quality be that 100 picture is very little in the naked eyes difference, almost do not have difference, can not influence the effect of distinguishing of people's face; And size can reduce 1/3, therefore, can select with the mode of JPG picture picture to be sent to communication terminal.
After the user receives through communication terminal; If think that picture is too small; Can answer information specific to service end 101 through communication terminal, service end 101 is sent an a little bigger picture to user terminal according to this information specific more again, thereby makes the user can obtain bigger picture; Better the people's face in the picture is carried out identification, for example length and width is 50 picture.
The account number safety application system of above-mentioned the utility model can also comprise above-mentioned facial image property data base 103, above-mentioned doubtful steal-number person's facial image property data base 104 any or the combination of the two in the two.
Digital processing unit 1012 has in judging doubtful steal-number person's facial image property data base when opening above doubtful steal-number person's facial image with first predetermined number of real-time face image similarity, explains that this person repeatedly attempts to usurp other people number of the account, can send alarm command.The send mode of alarm command can be done different settings according to practical application scene etc., for example starts early warning system, and near the Security Personnel notice client 102 present positions waits the security of be correlated with to handle and perhaps transfers public security organ or the like.With client 102 is that the ATM automatic teller machine is an example; Can be through sending alarm command to number of the account place application system (the for example banking system at bank card account place); Near with pointing out Security Personnel carries out relevant treatment or the like, perhaps also can be the type of alarm that other are arranged.First predetermined number here can be set according to actual needs, can get any one natural number.
Mentioned number of the account in above-mentioned the utility model scheme can be the number of the account of any type, for example bank card account number, network payment number of the account, personal network space number of the account or the like.
The above embodiment has only expressed several kinds of execution modes of the utility model, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the utility model claim.Should be pointed out that for the person of ordinary skill of the art under the prerequisite that does not break away from the utility model design, can also make some distortion and improvement, these all belong to the protection range of the utility model.Therefore, the protection range of the utility model patent should be as the criterion with accompanying claims.

Claims (10)

1. account number safety application system; It is characterized in that; Comprise service end, said service end comprises: receive the first information R-T unit of logining solicited message and real-time face image that client is sent, said user logins solicited message and comprises number of the account and corresponding password;
Be connected, compare the facial image that is associated with said number of the account in said real-time face image and facial image property data base digital processing unit whether similar, that the doubtful steal-number person's facial image in said real-time face image and the doubtful steal-number person's facial image property data base is compared when the dissmilarity with said first information R-T unit;
And be connected with said digital processing unit, have first preset number at doubtful steal-number person's facial image and open the warning device that sends alarm command when above with said real-time face image similarity.
2. account number safety application system according to claim 1 is characterized in that, also comprises client, and said client comprises:
Receive the user interaction unit that the user logins solicited message,
Be connected, control the control device that camera head is taken current user's real-time face image with said user interaction unit;
Be connected with said user interaction unit, said control device, and this logined solicited message and real-time face image second information transceiving device to said service end transmission.
3. account number safety application system according to claim 2 is characterized in that: also comprise the said camera head that is connected with said client.
4. account number safety application system according to claim 2 is characterized in that said client also comprises said camera head.
5. according to any described account number safety application system of claim 1 to 4, it is characterized in that: also comprise said facial image property data base.
6. according to any described account number safety application system of claim 1 to 4, it is characterized in that, also comprise said doubtful steal-number person's facial image property data base.
7. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said digital processing unit is for adding to said real-time face image the digital processing unit of this facial image property data base when real-time face image and the facial image that is associated are similar;
And/or
Said digital processing unit adds to said real-time face image during for the facial image dissmilarity that is associated with said at said real-time face image the digital processing unit of said doubtful steal-number person's facial image property data base.
8. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said real-time face image is the highest facial image of definition in the continuous facial image of taking more than two of said filming apparatus;
Perhaps
The facial image that said real-time face image combines for the facial image more than two of being taken current user by said filming apparatus.
9. according to any described account number safety application system of claim 1 to 4, it is characterized in that:
Said second information transceiving device sends to said service end with this client geographic location information;
Said service end also comprises: with the information combination digital processing unit of this geographical location information and the combination of said real-time face image, the information after said first information R-T unit will make up sends to the service end of the corresponding communication terminal of the number of the account owner;
Perhaps
Said service end also comprises: the positioner of confirming the geographical location information of said client; With the information combination digital processing unit of this geographical location information and the combination of said real-time face image, the information after said first information R-T unit will make up sends to the service end of the corresponding communication terminal of the number of the account owner.
10. account number safety application system according to claim 10 is characterized in that, also comprises the compression set that is connected between said information combination digital processing unit and the said first information R-T unit.
CN2012201193949U 2012-03-26 2012-03-26 Account security application system Expired - Lifetime CN202503545U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012201193949U CN202503545U (en) 2012-03-26 2012-03-26 Account security application system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012201193949U CN202503545U (en) 2012-03-26 2012-03-26 Account security application system

Publications (1)

Publication Number Publication Date
CN202503545U true CN202503545U (en) 2012-10-24

Family

ID=47040142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012201193949U Expired - Lifetime CN202503545U (en) 2012-03-26 2012-03-26 Account security application system

Country Status (1)

Country Link
CN (1) CN202503545U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105976519A (en) * 2016-04-29 2016-09-28 江苏诚创信息技术研发有限公司 ATM preventing bank card from being stolen and operating method thereof
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device
CN109871677A (en) * 2019-03-19 2019-06-11 苏州迈荣祥信息科技有限公司 Intelligent switch control system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105976519A (en) * 2016-04-29 2016-09-28 江苏诚创信息技术研发有限公司 ATM preventing bank card from being stolen and operating method thereof
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device
CN109871677A (en) * 2019-03-19 2019-06-11 苏州迈荣祥信息科技有限公司 Intelligent switch control system and method
CN109871677B (en) * 2019-03-19 2022-10-25 珠海微褀科技有限公司 Intelligent switch control system and method

Similar Documents

Publication Publication Date Title
CN102663444B (en) Method for preventing account number from being stolen and system thereof
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
EP3035226A1 (en) Security system, apparatus and method using additional code
CN107292150A (en) Save user identification confirmation method and apparatus in information processing from damage
US11074327B2 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
CN105160742A (en) Method and system for carrying out judgment, alarming and information shielding on forced unlocking
CN105654372A (en) Identity recognition method for remote account opening and server and system
CN105592146A (en) Equipment control method, device and terminal
CN102222368A (en) Electronic ticket authentication system applying short-distance communication technology and detection method
CN110069229B (en) Screen sharing method, mobile terminal and computer readable storage medium
US11521208B2 (en) System and method for authenticating transactions from a mobile device
CN101511085A (en) Method and apparatus for limiting usage of mobile terminal function by using personal identification
CN109245902A (en) The guard method of instant messaging message authentication codes and device
CN105913513A (en) Control method and system for door lock system
CN106686754A (en) Data interaction method and data interaction system
CN104253714A (en) Monitoring method, system, browser and server
CN105635113A (en) SDK-based remote service processing method and system
CN106791627A (en) Network Video Surveillance and security alarm integrated system and its secure access method for authenticating
US9202212B1 (en) Using mobile device to monitor for electronic bank card communication
CN107341376B (en) Picture mistransmission preventing and peeping preventing method and electronic equipment
CN113408006A (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN203204805U (en) Alarm device
CN202503545U (en) Account security application system
CN201435736Y (en) Real-name registration surfing intelligent monitoring system used in internet bars
AU2021282382A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20121024

CX01 Expiry of patent term