CN204680024U - Computer security based on dynamic human face recognition technology is taken precautions against and early warning system - Google Patents

Computer security based on dynamic human face recognition technology is taken precautions against and early warning system Download PDF

Info

Publication number
CN204680024U
CN204680024U CN201520402091.1U CN201520402091U CN204680024U CN 204680024 U CN204680024 U CN 204680024U CN 201520402091 U CN201520402091 U CN 201520402091U CN 204680024 U CN204680024 U CN 204680024U
Authority
CN
China
Prior art keywords
module
early warning
computer
human face
usb flash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520402091.1U
Other languages
Chinese (zh)
Inventor
程俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhiyifang Science & Technology Co Ltd
Original Assignee
Wuhan Zhiyifang Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhiyifang Science & Technology Co Ltd filed Critical Wuhan Zhiyifang Science & Technology Co Ltd
Priority to CN201520402091.1U priority Critical patent/CN204680024U/en
Application granted granted Critical
Publication of CN204680024U publication Critical patent/CN204680024U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model discloses a kind of computer security based on dynamic human face recognition technology to take precautions against and early warning system, comprise managed computer, system server, USB flash disk encryption and decryption device, the network switch and binocular face acquisition camera, a kind of computer security based on dynamic human face recognition technology that the utility model provides is taken precautions against and early warning system, by recognition of face, operated from a distance controls, USB flash disk encryption and decryption, computing machine mates with mobile terminal, the technology such as user behavior record combine together, the computer security defining multistage many measures is taken precautions against and early warning system system, greatly improve computer security and secrecy grade, both the safe and secret measure of enterprise computer can have been strengthened, reduce the risk that company information is divulged a secret, also divulge a secret crash analysis and responsibility judgment can be supported.

Description

Computer security based on dynamic human face recognition technology is taken precautions against and early warning system
Technical field
The utility model belongs to computer security and secrecy management domain, particularly relates to and adopts the computer security of face recognition technology to take precautions against and early warning system.
Background technology
Computing machine has been the indispensable nucleus equipment of enterprise, and the work such as data management, project management, file administration all be unable to do without computing machine.Computing machine is enterprises and individuals's work efficiency " multiplier ", is also the informationalized important embodiments of all trades and professions.The safety management problem of computing machine obtains the attention of all trades and professions day by day, market also exists instrument or the system of some safety precautions and audit, main adopts password or the safety of method the comes protection calculation machine such as fingerprint logs in, system port controls, could not get on to the Net.
There is following subject matter in above scheme:
1. the mode secrecy provision that logs in of password and fingerprint is strong, and password is easily decoded, and fingerprint is easy to fake by the mode of finger print, and safety precaution grade is low;
2. after computing machine is copied by USB flash disk, be not encrypted information, computing machine does not mate with USB flash disk, and USB flash disk is lost, and the data in USB flash disk exists the risk of divulging a secret;
3. do not carry out record to the operation overall process of computing machine, once there is the problem of secrets disclosed by computer, cannot reappear computer operation use procedure, the accident investigations such as historical tracking, accident fix duty, evidence-gathering are very difficult, are difficult to determine concrete person liable.
Utility model content
The utility model is intended to one of technical matters existed in solution prior art, for this reason, an object of the present utility model there are provided a kind of computer security based on dynamic human face recognition technology and takes precautions against and early warning system, by recognition of face, operated from a distance controls, USB flash disk encryption and decryption, computing machine mates with mobile terminal, the technology such as user behavior record combine together, the computer security defining multistage many measures is taken precautions against and early warning system system, greatly improve computer security and secrecy grade, both the safe and secret measure of enterprise computer can have been strengthened, reduce the risk that company information is divulged a secret, also divulge a secret crash analysis and responsibility judgment can be supported.
It should be noted that, the utility model completes based on the following discovery of inventor:
According to an aspect of the present utility model, the utility model provides a kind of computer security based on dynamic human face recognition technology and takes precautions against and early warning system, comprise managed computer, system server, USB flash disk encryption and decryption device, the network switch and binocular face acquisition camera
Managed computer is connected with binocular face acquisition camera by signal wire;
Managed computer is connected with USB flash disk encryption and decryption device by signal wire;
The network switch is connected with system server and managed computer respectively by signal wire;
Managed computer comprises system users proxy module and video acquisition and respond module;
System server includes remote control device control module, system early warning alarm module, operation behavior logging modle, behaviortrace module, dynamic human face identification module, and computer security is taken precautions against and early warning system information management platform and face database.
In addition, according to the utility model above-described embodiment, the computer security based on dynamic human face recognition technology is taken precautions against can also have following additional technical characteristic with early warning system:
The quantity of described managed computer is greater than or equal to 1.
Described USB flash disk encryption and decryption device comprises USB flash disk encrypting module and USB flash disk deciphering module.
Described managed computer comprises: video acquisition and respond module, sends to dynamic human face identification module for user's face video binocular face acquisition camera periodically gathered; According to the result of dynamic human face identification module identification, control managed computer operating system and whether log in or lock; System users proxy module, for collection system duty, the instruction according to remote control device control module, system early warning alarm module, operation behavior logging modle, behaviortrace module controls managed computer operating system.
Described system server comprises: remote control device control module, forbids for the long-range hardware device to managed computer and starts, and computing machine or program limit are arranged, and computer module load or unload manages; System early warning alarm module, for system boot, system core, insertion USB flash disk, unloading USB flash disk, USB flash disk copy, insert CD, operation early warning or the alarm such as printed information, scanning, online, network cannot connect, FTP, receiving and dispatching mail; Operation behavior logging modle, for recording documents editing, document reading, u dish copy, receiving and dispatching mail, file printout, file scan, document facsimile, CD burning, surf the web, chat on line, receiving and dispatching mail, the operation behavior record such as to play games; Behaviortrace module, for single managed computer or multiple managed computer historical operation behavior playback and statistical study; Dynamic human face identification module, for information such as the shape of face according to user of service, eyes, nose, faces, extracts dynamic human face feature, completes face characteristic identification, to video acquisition and the respond module information that sends that it fails to match; Computer security is taken precautions against and early warning system information management platform, inquires about, checks, the information management such as download for system history information, user management, user authority setting, division management, computer management; Face database, for the face information of store and management user
The utility model adopts dynamic human face recognition technology, guarantees that login user is authority user; And between computing machine and USB flash disk, inputoutput data must pass through USB flash disk encryption and decryption device, guarantee the data encryption in USB flash disk, and computing machine can mate use with USB flash disk; Meanwhile, Multi-path synchronous record and the use procedure of playback computing machine, user of service's video and panoramic video, not only know that computing machine is at " What for ", and know " who dry " and can clear logger computer user of service carry out documents editing, document reading, u dish copy, receiving and dispatching mail, file printout, file scan, document facsimile, CD burning, surf the web, chat on line, receiving and dispatching mail, the use procedure such as to play games; Support synchronous recording or the playback of single managed computer or multiple managed computer use procedure; Can the use procedure of reservation recording certain one or more computing machine of time period following; The information of record is real-time transmitted to far-end server, avoids user of service to damage " evidence "; Enterprises Leader or security management person check the service condition of all relating computers at any time by browser, complete security management work.
Technique effect of the present utility model is:
1) extracted the dynamic human face image of user of service by binocular camera, adopt dynamic human face recognition technology, guarantee that computer user is authority user, safety precaution grade is high;
2) adopt USB flash disk encryption and decryption device, between computing machine and USB flash disk, inputoutput data must pass through USB flash disk encryption and decryption device, guarantee the data encryption in USB flash disk, and computing machine can mate use with USB flash disk;
3), when user uses computing machine, real time record subscriber computer operation overall process, once secrets disclosed by computer, gets final product playback history data, guarantees that the accident investigations such as historical tracking, accident fix duty, evidence-gathering are easy.
Additional aspect of the present utility model and advantage will part provide in the following description, and part will become obvious from the following description, or be recognized by practice of the present utility model.
Accompanying drawing explanation
The computer security based on dynamic human face recognition technology that Fig. 1 provides for the utility model takes precautions against the structural representation with early warning system
The computer security based on dynamic human face recognition technology that Fig. 2 provides for the utility model takes precautions against the workflow diagram with early warning system
The computer security based on dynamic human face recognition technology that Fig. 3 provides for the utility model is taken precautions against and the image recognition of early warning system and computing machine coordinated signals process flow diagram
Embodiment
Embodiment of the present utility model is described below in detail.Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the utility model, and can not being interpreted as restriction of the present utility model.
Computer security that the utility model provides take precautions against with the structural representation of early warning system as shown in Figure 1, wherein
1) video acquisition and respond module: user's face video that binocular face acquisition camera periodically gathers is sent to dynamic human face identification module; According to the result of dynamic human face identification module identification, control managed computer operating system and whether log in or lock.
2) dynamic human face identification module: according to the information such as shape of face, eyes, nose, face of user of service, extract dynamic human face feature, compare with the face characteristic information in face database, calculate matching similarity (mode according to number percent); According to the matching threshold (∞) of setting, if similarity is in matching threshold (∞), to video acquisition and the respond module information that sends that the match is successful; If similarity in matching threshold (∞) outward, to video acquisition and the respond module information that sends that it fails to match;
3) system users proxy module: collection system duty, the instruction according to remote control device control module, system early warning alarm module, operation behavior logging modle, behaviortrace module controls managed computer operating system;
4) USB flash disk encryption/decryption module: the information of input and output is encrypted or is deciphered.From the data that managed computer exports, after USB flash disk dongle, be converted to enciphered data; Similarly, from the data that USB flash disk exports, after USB flash disk dongle, data decryption is converted to;
5) remote control device control module: the long-range hardware device to managed computer is forbidden and starts, computing machine or program limit are arranged, and computer module load or unload manages;
6) system early warning alarm module: system boot, system core, insertion USB flash disk, unloading USB flash disk, USB flash disk copy, insert CD, operation early warning or the alarm such as printed information, scanning, online, network cannot connect, FTP, receiving and dispatching mail;
7) operation behavior logging modle: for recording documents editing, document reading, u dish copy, receiving and dispatching mail, file printout, file scan, document facsimile, CD burning, surf the web, chat on line, receiving and dispatching mail, the operation behavior record such as to play games;
8) behaviortrace module: for single managed computer or multiple managed computer historical operation behavior playback and statistical study;
9) computer security is taken precautions against and early warning system information management platform: inquire about for system history information, check, the information management such as download, user management, user authority setting, division management, computer management.
10) face database: for the face information of store and management user.
Computer security based on dynamic human face recognition technology is taken precautions against and is mainly divided into following five steps with early warning system workflow, refers to Fig. 2:
The first step: user logs in, dynamic human face identification
When user logs in, binocular face video acquisition camera periodically gathers user's face video, video is sent to dynamic human face identification software; Dynamic human face identification software, according to the information such as shape of face, eyes, nose, face of user of service, extracts dynamic human face feature, compares with the face characteristic information in face database, calculates matching similarity (mode according to number percent); According to the matching threshold (∞) of setting, if similarity is in matching threshold (∞), to video acquisition and the response software information that sends that the match is successful; If similarity in matching threshold (∞) outward, to video acquisition and the response software information that sends that it fails to match; Video acquisition and response software are according to dynamic human face identification software recognition result, and whether control system logs in or lock.
Second step: user operation behavior Long-distance Control, User Violations behavior early warning or alarm
When user uses computing machine, keeper can be forbidden and start by the long-range hardware device to compromised slave, and computing machine or program limit are arranged, and computer software compression and decompression manages; Keeper to system boot in violation of rules and regulations, system core, insertion USB flash disk, unloading USB flash disk, USB flash disk copy, insert CD, the operation such as printed information, scanning, online, network cannot connect, FTP, receiving and dispatching mail carries out early warning or alarm.
3rd step: USB flash disk encryption or deciphering
When user possesses authority use USB flash disk, the data exported from managed computer are converted to enciphered data after USB flash disk encryption and decryption device, and are stored in USB flash disk; Similarly, from the data that USB flash disk exports, after USB flash disk encryption and decryption device, be converted to data decryption, and be stored in managed computer.
4th step: user behavior record
When user uses computing machine, record is carried out to the operation behavior of user, possess comprise documents editing, document reading, USB flash disk copy, receiving and dispatching mail, file printout, file scan, document facsimile, CD burning, surf the web, chat on line, receiving and dispatching mail, the operation behavior such as to play games.
5th step: user behavior is followed the trail of
According to the playback condition of keeper, carry out single computing machine or the playback of multiple history of computers operation behavior and statistical study, track user behavior, for historical tracking, accident fix duty and evidence-gathering are produced evidence.
When in binocular face acquisition camera range of video during nobody, system processing policy following steps, refer to accompanying drawing 3:
The first step: judge whether mouse or keyboard equipment state change.If mouse or keyboard equipment state change, system early warning alarm software sends to system users agent software and closes managed computer instruction, and system users agent software closes managed computer;
Second step: judge whether network traffics change.If network traffics occur abnormal, system early warning alarm software sends to system users agent software and closes managed computer instruction, and system users agent software closes managed computer;
3rd step: judged whether that office software is opened.If there are the documents such as DOC, PPT, PDF to open, system early warning alarm software enters Entered state instruction to system users agent software transmitting system, and system users agent software control system enters system Entered state.
In the description of this instructions, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
Although illustrate and described embodiment of the present utility model, those having ordinary skill in the art will appreciate that: can carry out multiple change, amendment, replacement and modification to these embodiments when not departing from principle of the present utility model and aim, scope of the present utility model is by claim and equivalents thereof.

Claims (5)

1. the computer security based on dynamic human face recognition technology is taken precautions against and an early warning system, comprises managed computer, system server, USB flash disk encryption and decryption device and the network switch, it is characterized in that, also comprise binocular face acquisition camera,
Managed computer is connected with binocular face acquisition camera by signal wire;
Managed computer is connected with USB flash disk encryption and decryption device by signal wire;
The network switch is connected with system server and managed computer respectively by signal wire;
Managed computer comprises system users proxy module and video acquisition and respond module;
System server includes remote control device control module, system early warning alarm module, operation behavior logging modle, behaviortrace module, dynamic human face identification module, and computer security is taken precautions against and early warning system information management platform and face database.
2. the computer security based on dynamic human face recognition technology according to claim 1 is taken precautions against and early warning system, and it is characterized in that, the quantity of described managed computer is greater than or equal to 1.
3. the computer security based on dynamic human face recognition technology according to claim 1 is taken precautions against and early warning system, and it is characterized in that, described USB flash disk encryption and decryption device comprises USB flash disk encrypting module and USB flash disk deciphering module.
4. the computer security based on dynamic human face recognition technology according to claim 1 is taken precautions against and early warning system, and it is characterized in that, described managed computer comprises:
Video acquisition and respond module, send to dynamic human face identification module for user's face video binocular face acquisition camera periodically gathered; According to the result of dynamic human face identification module identification, control managed computer operating system and whether log in or lock;
System users proxy module, for collection system duty, the instruction according to remote control device control module, system early warning alarm module, operation behavior logging modle, behaviortrace module controls managed computer operating system.
5. the computer security based on dynamic human face recognition technology according to claim 1 is taken precautions against and early warning system, and it is characterized in that, described system server comprises:
Remote control device control module, forbids for the long-range hardware device to managed computer and starts, and computing machine or program limit are arranged, and computer module load or unload manages;
System early warning alarm module, for system boot, system core, insertion USB flash disk, unloading USB flash disk, USB flash disk copy, insert CD, operation early warning or the alarm such as printed information, scanning, online, network cannot connect, FTP, receiving and dispatching mail;
Operation behavior logging modle, for recording documents editing, document reading, u dish copy, receiving and dispatching mail, file printout, file scan, document facsimile, CD burning, surf the web, chat on line, receiving and dispatching mail, the operation behavior record such as to play games;
Behaviortrace module, for single managed computer or multiple managed computer historical operation behavior playback and statistical study;
Dynamic human face identification module, for information such as the shape of face according to user of service, eyes, nose, faces, extracts dynamic human face feature, completes face characteristic identification, to video acquisition and the respond module information that sends that it fails to match;
Computer security is taken precautions against and early warning system information management platform, inquires about, checks, the information management such as download for system history information, user management, user authority setting, division management, computer management;
Face database, for the face information of store and management user.
CN201520402091.1U 2015-06-11 2015-06-11 Computer security based on dynamic human face recognition technology is taken precautions against and early warning system Expired - Fee Related CN204680024U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520402091.1U CN204680024U (en) 2015-06-11 2015-06-11 Computer security based on dynamic human face recognition technology is taken precautions against and early warning system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520402091.1U CN204680024U (en) 2015-06-11 2015-06-11 Computer security based on dynamic human face recognition technology is taken precautions against and early warning system

Publications (1)

Publication Number Publication Date
CN204680024U true CN204680024U (en) 2015-09-30

Family

ID=54179699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520402091.1U Expired - Fee Related CN204680024U (en) 2015-06-11 2015-06-11 Computer security based on dynamic human face recognition technology is taken precautions against and early warning system

Country Status (1)

Country Link
CN (1) CN204680024U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664813A (en) * 2018-08-30 2018-10-16 赵崇标 A kind of greeting card approaches to IM based on facial recognition techniques and apply its management system
CN109034064A (en) * 2018-07-26 2018-12-18 长沙舍同智能科技有限责任公司 Near-infrared face identification method, device and realization device
CN111597520A (en) * 2020-05-18 2020-08-28 贵州电网有限责任公司 Computer USB interface information security prevention and control method and system
CN112418717A (en) * 2020-12-07 2021-02-26 国网山东省电力公司经济技术研究院 Engineering field personnel behavior early warning method and system based on artificial intelligence

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109034064A (en) * 2018-07-26 2018-12-18 长沙舍同智能科技有限责任公司 Near-infrared face identification method, device and realization device
CN109034064B (en) * 2018-07-26 2021-01-08 长沙舍同智能科技有限责任公司 Near-infrared face recognition method, device and implementation device
CN108664813A (en) * 2018-08-30 2018-10-16 赵崇标 A kind of greeting card approaches to IM based on facial recognition techniques and apply its management system
CN111597520A (en) * 2020-05-18 2020-08-28 贵州电网有限责任公司 Computer USB interface information security prevention and control method and system
CN111597520B (en) * 2020-05-18 2023-10-17 贵州电网有限责任公司 Computer USB interface information security prevention and control method and system
CN112418717A (en) * 2020-12-07 2021-02-26 国网山东省电力公司经济技术研究院 Engineering field personnel behavior early warning method and system based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
CN107577939B (en) Data leakage prevention method based on keyword technology
CN108428141B (en) Food traceability information management system based on ERP system and block chain
CN204680024U (en) Computer security based on dynamic human face recognition technology is taken precautions against and early warning system
CN103942478A (en) Method and device for identity verification and authority management
CN103455744B (en) A kind of data security protection method based on vein identification technology and system
CN103413088A (en) Computer document operational safety audit system
CN102227116B (en) Safe local area network management method and local area network
CN107871081A (en) A kind of computer information safe system
CN110222498A (en) A kind of supervision management system and method based on mobile interchange cloud
CN103530559A (en) Integrity protection system of Android system
CN112257007B (en) Enterprise financial information management system
CN204465588U (en) A kind of host monitor based on server architecture and auditing system
CN110535895A (en) A kind of machine room monitoring system based on technology of Internet of things
CN110543761A (en) big data analysis method applied to information security field
CN106250778B (en) A kind of data security protection method of business management software
CN108390857B (en) Method and device for exporting file from high-sensitivity network to low-sensitivity network
CN111046405B (en) Data processing method, device, equipment and storage medium
CN111666591A (en) Online underwriting data security processing method, system, equipment and storage medium
JP5334739B2 (en) Log monitoring program, log monitoring system
CN110321704A (en) A kind of computer information safe stocking system
CN101408955A (en) Method and system determining obligation base on tactic
CN113032354A (en) Data sharing and real-time high-frequency interaction method between internal and external network applications
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN113110354B (en) Ferry-based industrial data security system and method

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150930

Termination date: 20190611