WO2020077890A1 - System security method and apparatus, computer device, and storage medium - Google Patents

System security method and apparatus, computer device, and storage medium Download PDF

Info

Publication number
WO2020077890A1
WO2020077890A1 PCT/CN2019/070374 CN2019070374W WO2020077890A1 WO 2020077890 A1 WO2020077890 A1 WO 2020077890A1 CN 2019070374 W CN2019070374 W CN 2019070374W WO 2020077890 A1 WO2020077890 A1 WO 2020077890A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
neural network
network model
preset
classification result
Prior art date
Application number
PCT/CN2019/070374
Other languages
French (fr)
Chinese (zh)
Inventor
李其刚
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020077890A1 publication Critical patent/WO2020077890A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques

Definitions

  • the embodiments of the present application relate to the field of network security, and particularly to a system security method, device, computer equipment, and storage medium.
  • the method generally adopted to prevent young people from surfing the Internet is to check their identity information before surfing the Internet, and if they are confirmed to be young, they are prohibited from surfing the Internet.
  • Embodiments of the present application provide a system security method, apparatus, computer equipment, and storage medium that can guide users to use computer equipment correctly.
  • a technical solution adopted by the embodiment created by the present application is: to provide a system security method, including the following steps: obtaining a screen shot of a display screen in a display area; and inputting the screen shot into a preset In the first neural network model, and obtain a first classification result of the screen shots output by the first neural network model, where the first classification result is user behavior information represented by the screen shots; the first The classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, it responds to a user instruction of the user.
  • embodiments of the present application also provide a system security device, including: an acquisition module for acquiring a screen shot of a display screen in a display area; and a processing module for inputting the screen shot into a preset first In a neural network model, and obtain the first classification result of the screen shots output by the first neural network model, wherein the first classification result is user behavior information represented by the screen shots; the execution module is used to The first classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, it responds to a user instruction of the user.
  • the embodiments of the present application further provide a computer device, including a memory and a processor, and the memory stores computer-readable instructions.
  • the processor executes the following steps of a system security method: obtaining a screen shot of a display screen in a display area; inputting the screen shot into a preset first neural network model, and obtaining an output of the first neural network model
  • the first classification result of the screenshot of the screen wherein the first classification result is the user behavior information represented by the screenshot; the first classification result is compared with the preset behavior planning information, when the first When a classification result is consistent with the behavior planning information, it responds to the user's user instruction.
  • embodiments of the present application also provide a non-volatile storage medium storing computer-readable instructions, which when executed by one or more processors, cause one or more processes
  • the device performs the following steps of a system security method: obtaining a screen shot of the display screen in the display area; inputting the screen shot into the preset first neural network model, and obtaining the screen output by the first neural network model
  • the first classification result of the screenshot where the first classification result is the user behavior information represented by the screenshot; compare the first classification result with preset behavior planning information, when the first classification When the result is consistent with the behavior planning information, it responds to the user's user instruction.
  • the beneficial effect of the embodiment of the present application is that when the user uses the computer, the user is prompted to fill out the usage plan, and the usage plan includes the operation content performed by the user using the computer.
  • the user When the user officially operates the computer, a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained. Because the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device. By comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, it is possible to determine whether the user is using the computer to perform the behavior operation in the planning, rather than using the computer to perform other operations.
  • FIG. 1 is a schematic flowchart of a system security method in an embodiment of this application
  • FIG. 2 is a schematic diagram of a process of verifying user identity information according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of user biometric verification according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a process for limiting a user's usage time according to an embodiment of this application
  • FIG. 5 is a schematic diagram of a process of restricting online payment by users according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a process of verifying excess payment according to an embodiment of the application.
  • FIG. 7 is a schematic flowchart of obtaining an associated terminal according to an embodiment of the present application.
  • FIG. 8 is a block diagram of a basic structure of a system security device according to an embodiment of this application.
  • FIG. 9 is a block diagram of a basic structure of a computer device according to an embodiment of the present application.
  • terminal and “terminal device” used here include not only devices with wireless signal receivers, but only devices with wireless signal receivers that do not have transmitting capabilities, but also devices that receive and transmit hardware.
  • Such devices may include: cellular or other communication devices with single-line displays or multi-line displays or cellular or other communication devices without multi-line displays; PCS (Personal Communications Services), which can combine voice and data Processing, fax and / or data communication capabilities; PDA (Personal Digital Assistant), which can include radio frequency receivers, pagers, Internet / Intranet access, web browsers, notepads, calendars and / or GPS (Global Positioning System (Global Positioning System) receiver; conventional laptop and / or palmtop computer or other device that has and / or includes a conventional laptop and / or palmtop computer or other device of a radio frequency receiver.
  • GPS Global Positioning System
  • terminal and “terminal equipment” may be portable, transportable, installed in a vehicle (aeronautical, maritime, and / or terrestrial), or suitable and / or configured to operate locally, and / or In a distributed form, it operates at any other location on the earth and / or space.
  • the "terminal” and “terminal device” used herein may also be a communication terminal, an Internet terminal, a music / video playback terminal, for example, may be a PDA, MID (Mobile Internet Device), and / or have music / video playback
  • Functional mobile phones can also be smart TVs, set-top boxes and other devices.
  • FIG. 1 is a schematic diagram of the basic process of the system security method in this embodiment.
  • a system security method includes the following steps:
  • the user When using a computer device, the user obtains a screen shot of the current display screen of the computer device by sending a system screenshot instruction. But it is not limited to this. Depending on the specific application scenario, the capture of screenshots is not limited to this.
  • the computer device has an independent graphics card device, and the computer device only needs to read the graphics card device space when working You can get a screenshot of the screen.
  • the screenshots are acquired at regular intervals.
  • the screenshots are acquired every 3 minutes, but it is not limited to this.
  • the acquisition duration of the screenshots can be any set length of time.
  • the screenshots can also be acquired in real time.
  • the first neural network model can be a convolutional neural network model (CNN), but the first neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN), or the above three networks Deformation model of the model.
  • CNN convolutional neural network model
  • DNN deep neural network model
  • RNN recurrent neural network model
  • the first neural network model is pre-trained to convergence, and is used for feature extraction and classification of the screenshots, and the user behavior information represented by the screenshots.
  • User behavior information includes using a computer (not limited to): playing games, listening to music, doing homework, browsing the web, etc.
  • the user behavior information can also be undesirable behaviors (not limited to) online gambling, watching unhealthy film and television works performed by users using computer equipment, or making transfer payments beyond their capabilities.
  • the training process of the first neural network model is:
  • the training sample set of this embodiment is obtained through a web crawler or an existing image database.
  • the training sample set includes different kinds of computer screenshots.
  • the neural network model uses several training sample sets (for example, 1 million), where each training sample set includes a screenshot of a computer device.
  • each training sample set includes a screenshot of a computer device.
  • the prejudgement can be performed manually. For example, if the content in the screenshot is a game screen, then the result of the calibration prejudgement is "Playing games" can obtain the pre-judgment results of all training sample sets in the above manner. And define the pre-judgment result as the classification judgment information of the screenshot.
  • the training sample set is sequentially input into the first neural network model, and the screen shots sequentially pass through the convolutional layer, the fully connected layer, and the classification layer of the first neural network model.
  • the output result of the classification layer is the classification result of the screenshot of the excitation output of the first neural network model.
  • the classification result of the first neural network model is user behavior information determined by the model.
  • the result of defining the excitation output is classified reference information.
  • the model classification reference information is the excitation data output by the first neural network model according to the input screen shot. Before the first neural network model is trained to converge, the classification reference information is a numerical value with a large discreteness. When the first neural network After the model has not been trained to converge, the classification reference information is relatively stable data.
  • the loss function of the first neural network model determines whether the classification reference information is consistent with the classification judgment information.
  • the loss function is a detection function configured to detect the model classification reference information in the first neural network model and to determine whether the information is consistent with the classification classification expected by people.
  • the weights in the first neural network model need to be corrected by a reverse algorithm, so that the output result of the first neural network model and the classification judgment information The expected result is the same.
  • the weights in the first neural network model need to be corrected, so that the output result of the first neural network model and the classification judgment information expectation The result is the same.
  • multiple training samples are used for training (for example, 1 million screenshots).
  • the correct rate is reached (not limited to ) 99.9%, the training is over.
  • the training of the first neural network model ends, the first neural network model is trained to convergence, and the user behavior information represented by the screenshot can be accurately judged.
  • the first classification result ie, user behavior information
  • the first neural network model trained to the convergence state is compared with the behavior planning information.
  • the comparison is consistent, the user is allowed to continue using the computer, and when the comparison is inconsistent, the execution of user instructions is prohibited.
  • the behavior planning information is that when the user uses the computer device to enter the operation interface, a plan for using the computer appears. The user needs to fill in the actual situation of using the computer in the plan according to his own needs.
  • the format is XX moment-XX moment. "Homework writing", etc. will list the time and matters of using the computer.
  • the computer planning book filled in by the user is defined as behavior planning information.
  • the user's behavior planning information needs to be reviewed. For example, the length of time that the computer equipment is used for entertainment in the planning book should not exceed 1 hour, or the behavior planning information such as watching pornographic movies or Unhealthy information such as gambling.
  • the computer device stops responding to the user ’s operation instruction.
  • the display screen is switched to the screen characterized by the user's behavior planning information, or the application program characterized by the behavior planning information is started, and then, the execution of the user's new instruction is continued. In order to guide users to use computer equipment correctly.
  • the above-mentioned embodiment prompts the user to fill in the usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer.
  • the usage plan includes the operation content performed by the user using the computer.
  • a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained.
  • the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device.
  • FIG. 2 is a schematic diagram of a process of verifying user identity information in this embodiment.
  • step S1100 the following steps are also included:
  • S1011 Collect the face image of the user
  • the first step of verification is to perform the user's authentication through the camera of the computer device or the camera of the peripheral device. Face image collection.
  • the second neural network model is a neural network model trained to a convergence state for judging the similarity of images
  • the collected face image is input into a second neural network model, and the second neural network model is a neural network model trained to a convergence state for judging image similarity.
  • the second neural network model outputs the first judgment result.
  • the first judgment result is the comparison result of the similarity of the face image and the pre-stored ID photo by the second neural network model, or the comparison result of the similarity of the registered avatar retained during the registration of the user image and the face image.
  • the second neural network model can be a convolutional neural network model (CNN), but the second neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN) or the above three networks Deformation model of the model.
  • CNN convolutional neural network model
  • DNN deep neural network model
  • RNN recurrent neural network model
  • the training process of the second neural network model is:
  • the training sample set of this embodiment is obtained through a web crawler or an existing image database.
  • the training sample set includes different kinds of face images.
  • the neural network model uses several training sample sets (for example, 1 million) when training, wherein each training sample set includes a face image data pair, including a face image, and the person A comparison image of face images for comparison, where the comparison image is also a face image, and in the same training sample set, the face image and the comparison image can be the same or different.
  • the pre-judgment can be performed manually. For example, the two pictures in the training sample set are the same person in different periods or spaces When the human face image is determined that the two images are the same, the prediction results of all training sample sets can be obtained in the above manner. And define the pre-judgment result as the classification judgment information of the screenshot.
  • the training sample set is sequentially input into the second neural network model, and the screen shots sequentially pass through the convolutional layer, the fully connected layer, and the classification layer of the second neural network model.
  • the result of the classification layer output is the comparison classification result of the excitation output of the second neural network model.
  • the classification result of the second neural network model is user behavior information determined by the model.
  • the result of defining the excitation output is classified reference information.
  • the classification reference information is the comparison result of the feature vectors of the face image and the comparison image extracted by the second neural network model.
  • the model classification reference information is the excitation data output by the second neural network model according to the input screen shot. Before the second neural network model is trained to converge, the classification reference information is a numerical value with a large discreteness. When the second neural network After the model has not been trained to converge, the classification reference information is relatively stable data.
  • the loss function of the second neural network model determines whether the classification reference information is consistent with the classification judgment information.
  • the loss function is a detection function that is configured to detect model classification reference information in the second neural network model and to determine whether the information is consistent with people's desired classification judgment information.
  • the weights in the second neural network model need to be corrected by a reverse algorithm, so that the output result of the second neural network model and the classification judgment information The expected result is the same.
  • the weights in the second neural network model need to be corrected so that the output result of the second neural network model and the expected result of classification judgment information the same.
  • multiple training samples are used for training (for example, 100 training sample sets are repeatedly trained).
  • the correct rate is reached ( Not limited to) 99.9%, the training is over.
  • the training of the second neural network model ends, and the second neural network model is trained to converge, and the user behavior information represented by the face image can be accurately judged.
  • the computer device prohibits the execution of the user's login request, and the user cannot log in to the operating system interface to control the computer device.
  • FIG. 3 is a schematic flowchart of the user biometric verification according to this embodiment.
  • step S1011 it further includes:
  • S1021 Input the face image into a preset third neural network model, and obtain a second classification result output by the third neural network model, where the third neural network model is trained to a converged state Neural network model for judging the deflection direction and angle of face images;
  • the computer device When collecting the user's face image, the computer device sends an instruction to the user through the built-in impression device or the peripheral audio.
  • the instruction content is to control the angle of the user's face in the camera's field of view, for example, deflect 30 degrees to the left and lift up 45. Degrees or deflection 60 degrees to the right and other commands.
  • the computer device collects the user's face image. And input the face image into the third neural network model.
  • the third neural network model is a neural network model trained to a converged state and used to judge the deflection direction and deflection angle of the face image.
  • the third neural network model can be a convolutional neural network model (CNN), but the third neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN) or the above three networks Deformation model of the model.
  • CNN convolutional neural network model
  • RNN recurrent neural network model
  • the third neural network model is trained in the same way as the first neural network model, but the training sample set is changed from a screenshot to a face image, and the classification result is changed from user behavior information to the deflection direction and deflection of the human head angle.
  • the third neural network model through a large number of training sample sets can accurately determine the deflection direction and deflection angle of the user's human head.
  • S1022 Compare the second classification result with preset instruction information, and when the second classification result is inconsistent with the instruction information, prohibit the user's login request.
  • the second classification result of the output of the third neural network model is compared with the set instruction information, and the instruction information and the information instruction that the computer device controls the rotation of the user's face through the sound. For example, if the command information is "turn 30 ° to the right", the deflection angle of the face judged by the third neural network model is “deflection to the right by 30 degrees”, and if the two match completely, the judgment result will be the same. If the deflection angle of the face judged by the third neural network model is “deflection 0 °”, it indicates that the user has not rotated following the execution. At this time, the comparison result is inconsistent, and the computer device is prohibited from responding to the user ’s login request.
  • the computer device in order to control the time when the user uses the computer device, by counting the length of time the user uses the computer and comparing it with a set time threshold, when the preset time is exceeded, the computer device prohibits responding to the user Any operation instructions to guide the user to use the computer equipment correctly.
  • FIG. 4 is a schematic diagram of a process for limiting user usage time in this embodiment.
  • step S1300 the following steps are also included:
  • the computer device records the startup time of the computer device through a built-in timer, and then checks the usage time in the timer through the method of timing acquisition.
  • the usage time is the duration of the user's user behavior.
  • the acquired duration is compared with the set time threshold, and the time threshold of different user behaviors is different according to different user behaviors.
  • the time threshold for user behavior when playing games is 1 hour
  • the time threshold for user behavior for learning is 2 hours
  • the total online time of users must not exceed 3 hours.
  • the duration of different user behaviors or the total duration of the user's use of the computer device is compared with the corresponding user behavior or total usage threshold.
  • the computer device When the duration of the comparison result is greater than the time threshold, the computer device is prohibited from responding to the operation instructions issued by the user, so as to force the user to stop using the computer device, so as to control the user's use of the computer device overtime.
  • FIG. 5 is a schematic diagram of a process of restricting online payment by a user in this embodiment.
  • the method further includes:
  • the computer device When a user uses a computer device to make a payment, the computer device obtains a screenshot of the screen and inputs the screenshot into the first neural network model. Since the classification result set in the classification result in the first neural network model includes payment behavior, so The classification result of the first neural network model can determine whether the user is paying.
  • the payment amount in the screen shot is extracted through text extraction technology, for example, OCR is used to recognize the image text and the payment amount in the screen shot is extracted.
  • the read payment amount is compared with a preset amount threshold value.
  • the amount threshold value is the maximum consumption amount of minors set by the parent, which can be set by the parent according to their own consumption ability or the amount of the child's consumption control.
  • the computer device prohibits responding to the user's user instruction.
  • the user's spending power can be controlled within a limited range without causing unnecessary trouble to the family because of the user's impulse.
  • in order to prevent the user from avoiding the monitoring of the above technical solutions through multiple payments by monitoring the user's consumption records within a set time period (for example, one day), when the cumulative sum of the consumption records is greater than the amount threshold , Forbid to respond to the user's user instructions.
  • FIG. 6 is a schematic diagram of a process of verifying overpayment in this embodiment.
  • step S1323 the following steps are also included:
  • S1411 Send warning information to a preset associated terminal, where the warning information includes inquiry information about whether to agree to pay;
  • warning information is sent to the associated terminal, and the warning information includes inquiry information. For example, the warning message that user XX pays 5,000 yuan on the XX platform and agrees to pay.
  • the associated terminal is the phone number, mailbox number, or other instant messaging account reserved during registration with administrator authority.
  • the associated terminal refers to the phone number reserved by the user for the payment account or payment bank card used during registration.
  • S1412 Receive response information from the associated terminal in response to the warning information
  • the content of the reply information is whether the user is allowed to pay.
  • the computer device executes the user's payment instruction, and sends the user's payment information to the corresponding server to implement payment. If the content indicated in the reply message is that the payment is not approved, the user's payment operation is prohibited.
  • the user's payment behavior is sent to the corresponding guardian or account holder for more accurate payment.
  • the user makes a payment he needs to find the associated terminal.
  • FIG. 7, is a schematic flowchart of obtaining an associated terminal according to this embodiment.
  • step S1411 the following steps are also included:
  • the administrator when the administrator (parent) performs registration, it will collect all payment card numbers and electronic account information that can be provided at home but does not include the password, and the payment card number and payment terminal number corresponding to the electronic account.
  • the payment terminal number bound to the payment account can be directly obtained through the information of the electronic account.
  • the type of the payment account and the account opening bank or platform are identified. All of the above identifications can be identified through the identification rules of each bank card number, and then send request information to the server system where the registered institution is located to request the payment terminal number bound to the payment account.
  • the terminal represented by the payment terminal number is an associated terminal.
  • the warning information can be sent to the most relevant user terminal, which maximizes the protection of the direct interests of the owner of the payment account.
  • embodiments of the present application also provide a system security device.
  • FIG. 8 is a block diagram of the basic structure of the system security device of this embodiment.
  • a system security device includes: an acquisition module 2100, a processing module 2200, and a processing module 2300.
  • the obtaining module 2100 is used to obtain a screen shot of the display screen in the display area
  • the processing module 2200 is used to input the screen shot into the preset first neural network model and obtain the first screen shot output by the first neural network model Classification results, where the first classification result is user behavior information characterized by screenshots
  • the execution module 2300 is used to compare the first classification result with preset behavior planning information, when the first classification result is inconsistent with the behavior planning information , It is forbidden to respond to user's user instructions.
  • the system security device prompts the user to fill in a usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer.
  • a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained.
  • the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device.
  • the system security device further includes: a first acquisition submodule, a first processing submodule, and a first execution submodule.
  • the first acquisition sub-module is used to collect the user's face image
  • the first processing sub-module is used to input the face image and the preset user's ID image into the preset second neural network model, and obtain the first The first judgment result output by the second neural network model, where the second neural network model is a neural network model trained to a convergence state for judging image similarity
  • the first execution submodule is used when the content characterized by the first judgment result is human When the face image and the certificate image are inconsistent, the user's login request is prohibited.
  • the system security device further includes: a second processing submodule and a second execution submodule.
  • the second processing sub-module is used to input the face image into the preset third neural network model and obtain the second classification result output by the third neural network model, wherein the third neural network model is training to convergence The neural network model whose state is used to judge the deflection direction and deflection angle of the face image; the second execution submodule is used to compare the second classification result with preset instruction information, when the second classification result is inconsistent with the instruction information, The user's login request is prohibited.
  • the system security device further includes: a second acquisition submodule, a third processing submodule, and a third execution submodule.
  • the second acquisition submodule is used to acquire the duration of the user's user behavior
  • the third processing submodule is used to compare the duration with a preset time threshold
  • the third execution submodule is used when the duration is greater than the time At the threshold, it is forbidden to respond to user instructions.
  • the system security device when the user behavior payment behavior is characterized by the user behavior information; the system security device further includes: a first recognition submodule, a fourth processing submodule, and a fourth execution submodule.
  • the first identification submodule is used to identify the payment amount in the screenshot; the fourth processing submodule is used to compare the payment amount with the preset amount threshold; the fourth execution submodule is used when the payment amount is greater than the amount threshold , It is forbidden to respond to user's user instructions.
  • the system security device further includes: a first sending submodule, a first accepting submodule, and a fifth executing submodule.
  • the first sending sub-module is used to send warning information to the preset associated terminal, where the warning information includes inquiry information about whether to agree to pay;
  • the first accepting sub-module is used to receive reply information from the associated terminal to reply to the warning information;
  • Five execution sub-modules are used to execute the user's payment instruction when the response content represented by the response information is to agree to payment.
  • the system security device further includes: a third acquisition submodule, a third acquisition submodule, and a fifth processing submodule.
  • the third obtaining sub-module is used to obtain the payment account used for payment
  • the fifth processing sub-module is used to obtain the payment terminal number bound to the payment account according to the payment account
  • the sixth execution sub-module is used to determine the payment terminal number representation Is the associated terminal.
  • FIG. 9 is a block diagram of the basic structure of the computer device of this embodiment.
  • the computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected through a system bus.
  • the non-volatile storage medium of the computer device stores an operating system, a database, and computer-readable instructions.
  • the database may store a sequence of control information.
  • the processor may implement a A system security method.
  • the processor of the computer device is used to provide computing and control capabilities, and support the operation of the entire computer device.
  • the memory of the computer device may store computer readable instructions. When the computer readable instructions are executed by the processor, the processor may cause the processor to execute a system security method.
  • the network interface of the computer device is used to connect and communicate with the terminal.
  • FIG. 9 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Include more or less components than shown in the figure, or combine certain components, or have a different arrangement of components.
  • the processor is used to perform specific functions of the acquisition module 2100, the processing module 2200, and the execution module 2300 in FIG. 8, and the memory stores program codes and various types of data required to execute the above modules.
  • the network interface is used for data transmission to user terminals or servers.
  • the memory in this embodiment stores the program codes and data required to execute all submodules in the face image key point detection device, and the server can call the server program codes and data to execute the functions of all submodules.
  • the computer device prompts the user to fill in a usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer.
  • a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained.
  • the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device.
  • the present application also provides a storage medium that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the system security method described in any one of the foregoing embodiments A step of.
  • the computer program may be stored in a computer-readable storage medium, When executed, it may include the processes of the foregoing method embodiments.
  • the aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
  • steps in the flowchart of the drawings are displayed in order according to the arrows, the steps are not necessarily executed in the order indicated by the arrows. Unless there is a clear description in this article, there is no strict order limitation for the execution of these steps, and they can be executed in other orders. Moreover, at least a part of the steps in the flowchart of the drawings may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but may be executed at different times, and the order of execution is also It is not necessarily carried out sequentially, but may be executed in turn or alternately with at least a part of other steps or sub-steps or stages of other steps.

Abstract

A system security method and apparatus, a computer device, and a storage medium. The method comprises the following steps: obtaining a screenshot of a display image in a display region (S1100); inputting the screenshot into a preset first neural network model and obtaining a first classification result of the screenshot output by the first neural network model (S1200); and comparing the first classification result with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, responding to a user instruction of the user (S1300). The classification result is user behavior information represented by the screenshot, i.e., a user is using the computer device to perform which operation. Therefore, whether the user uses a computer to perform a planning behavior operation instead of performing other operations can be determined by comparing whether the behavior planning information set when the user uses the computer is consistent with the classification result, thereby achieving a task of helping the user stop the improper use of the computer.

Description

系统安全方法、装置、计算机设备及存储介质System security method, device, computer equipment and storage medium
本申请要求于2018年10月15日提交中国专利局、申请号为201811198452.X,发明名称为“系统安全方法、装置、计算机设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application requires the priority of the Chinese patent application filed on October 15, 2018 in the Chinese Patent Office with the application number 201811198452.X and the invention titled "System Security Methods, Devices, Computer Equipment, and Storage Media." The reference is incorporated in this application.
技术领域Technical field
本申请实施例涉及网络安全领域,尤其是一种系统安全方法、装置、计算机设备及存储介质。The embodiments of the present application relate to the field of network security, and particularly to a system security method, device, computer equipment, and storage medium.
背景技术Background technique
伴随着计算机设备在人们生活中的普及,使用计算机的人群正在迅速的扩大,而青少年人群正是计算机新使用人群主流人群,并且随着计算机普及速度的加快,青少年使用计算机的年龄正在逐年降低。由于,青少年人群缺乏自制能力,过渡上网使用计算机会导致青少年患上“网瘾”,进而使其对学习和生活中其他事项缺乏兴趣,对青少年的成长造成不良影响。With the popularization of computer equipment in people's lives, the number of people using computers is rapidly expanding, and the youth population is the mainstream population of new computer users, and with the acceleration of the popularity of computers, the age of teenagers using computers is decreasing year by year. Due to the lack of self-control ability of the young people, the transition to online use of computers will cause young people to suffer from "Internet addiction", which in turn will make them lack interest in learning and other matters in life, which will adversely affect the growth of young people.
现有技术中,为防止青少年上网一般采用的方式为:在上网之前检查其身份信息,若确认其为青少年则禁止其上网。In the prior art, the method generally adopted to prevent young people from surfing the Internet is to check their identity information before surfing the Internet, and if they are confirmed to be young, they are prohibited from surfing the Internet.
但是本申请创造的发明人在研究中发现,计算机作为现今社会最重要的信息工具之一,完全禁止使用计算机对于青少年的成长不利。而合理的引导用户使用计算机,对青少年的学习和成长均具有帮助。However, the inventors created in this application found in research that computers, as one of the most important information tools in today's society, completely prohibiting the use of computers is detrimental to the growth of young people. It is helpful for young people to learn and grow by reasonably guiding users to use computers.
发明内容Summary of the invention
本申请实施例提供一种能够引导用户正确使用计算机设备的系统安全方法、装置、计算机设备及存储介质。Embodiments of the present application provide a system security method, apparatus, computer equipment, and storage medium that can guide users to use computer equipment correctly.
为解决上述技术问题,本申请创造的实施例采用的一个技术方案是:提供一种系统安全方法,包括下述步骤:获取显示区域显示画面的画面截图;将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。In order to solve the above technical problems, a technical solution adopted by the embodiment created by the present application is: to provide a system security method, including the following steps: obtaining a screen shot of a display screen in a display area; and inputting the screen shot into a preset In the first neural network model, and obtain a first classification result of the screen shots output by the first neural network model, where the first classification result is user behavior information represented by the screen shots; the first The classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, it responds to a user instruction of the user.
为解决上述技术问题,本申请实施例还提供一种系统安全装置,包括:获取模块,用于获取显示区域显示画面的画面截图;处理模块,用于将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;执行模块,用于将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。To solve the above technical problems, embodiments of the present application also provide a system security device, including: an acquisition module for acquiring a screen shot of a display screen in a display area; and a processing module for inputting the screen shot into a preset first In a neural network model, and obtain the first classification result of the screen shots output by the first neural network model, wherein the first classification result is user behavior information represented by the screen shots; the execution module is used to The first classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, it responds to a user instruction of the user.
为解决上述技术问题,本申请实施例还提供一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行一种系统安全方法的下述步骤:获取显示区域显示画面的画面截 图;将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。To solve the above technical problems, the embodiments of the present application further provide a computer device, including a memory and a processor, and the memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, The processor executes the following steps of a system security method: obtaining a screen shot of a display screen in a display area; inputting the screen shot into a preset first neural network model, and obtaining an output of the first neural network model The first classification result of the screenshot of the screen, wherein the first classification result is the user behavior information represented by the screenshot; the first classification result is compared with the preset behavior planning information, when the first When a classification result is consistent with the behavior planning information, it responds to the user's user instruction.
为解决上述技术问题,本申请实施例还提供一种存储有计算机可读指令的非易失性存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行一种系统安全方法的下述步骤:获取显示区域显示画面的画面截图;将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。To solve the above technical problems, embodiments of the present application also provide a non-volatile storage medium storing computer-readable instructions, which when executed by one or more processors, cause one or more processes The device performs the following steps of a system security method: obtaining a screen shot of the display screen in the display area; inputting the screen shot into the preset first neural network model, and obtaining the screen output by the first neural network model The first classification result of the screenshot, where the first classification result is the user behavior information represented by the screenshot; compare the first classification result with preset behavior planning information, when the first classification When the result is consistent with the behavior planning information, it responds to the user's user instruction.
本申请实施例的有益效果是:在用户使用计算机时提示用户填写使用规划,该使用规划中包括用户使用计算机进行的操作内容。当用户正式操作计算机时,获取计算机屏幕显示内容的画面截图,将画面截图输入到预设的第一神经网络模型中,并获取分类结果。由于分类结果为画面截图表征的用户行为信息,即用户正在用计算机设备进行何种操作。通过比对用户在使用计算机时设定的行为规划信息与分类结果是否一致,即能够确定用户是否使用计算机在进行规划中的行为操作,而非使用计算机在进行其他操作内容。当用户计算机在进行其他操作内容时,禁止响应用户的操作指令,迫使用户按规划操作计算机进行响应的工作,达到引导用户正确使用计算机的目的,实现帮助用户戒除不当使用计算机的任务。The beneficial effect of the embodiment of the present application is that when the user uses the computer, the user is prompted to fill out the usage plan, and the usage plan includes the operation content performed by the user using the computer. When the user officially operates the computer, a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained. Because the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device. By comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, it is possible to determine whether the user is using the computer to perform the behavior operation in the planning, rather than using the computer to perform other operations. When the user's computer is performing other operations, it is forbidden to respond to the user's operation instructions, forcing the user to operate the computer to respond as planned, to achieve the purpose of guiding the user to use the computer correctly, and to realize the task of helping the user to avoid improper use of the computer.
附图说明BRIEF DESCRIPTION
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the technical solutions in the embodiments of the present application, the drawings required in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application For those skilled in the art, without paying any creative work, other drawings can also be obtained based on these drawings.
图1为本申请实施例中系统安全方法的基本流程示意图;FIG. 1 is a schematic flowchart of a system security method in an embodiment of this application;
图2为本申请实施例验证用户身份信息的流程示意图;2 is a schematic diagram of a process of verifying user identity information according to an embodiment of the present application;
图3为本申请实施例用户活体验证的流程示意图;FIG. 3 is a schematic flowchart of user biometric verification according to an embodiment of the present application;
图4为本申请实施例限定用户使用时长的流程示意图;4 is a schematic diagram of a process for limiting a user's usage time according to an embodiment of this application;
图5为本申请实施例限制用户线上支付的流程示意图;5 is a schematic diagram of a process of restricting online payment by users according to an embodiment of the present application;
图6为本申请实施例验证超额支付的流程示意图;6 is a schematic diagram of a process of verifying excess payment according to an embodiment of the application;
图7为本申请实施例获取关联终端的流程示意图;7 is a schematic flowchart of obtaining an associated terminal according to an embodiment of the present application;
图8为本申请实施例系统安全装置的基本结构框图;8 is a block diagram of a basic structure of a system security device according to an embodiment of this application;
图9为本申请实施例计算机设备基本结构框图。9 is a block diagram of a basic structure of a computer device according to an embodiment of the present application.
具体实施方式detailed description
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。In order to enable those skilled in the art to better understand the solution of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the drawings in the embodiments of the present application.
在本申请的说明书和权利要求书及上述附图中的描述的一些流程中,包含了按照特定顺序出现的多个操作,但是应该清楚了解,这些操作可以不按照其在本文中出现的顺序来执行或并行执行,操作的序号如101、102等,仅仅是用于区分开各个不同的 操作,序号本身不代表任何的执行顺序。另外,这些流程可以包括更多或更少的操作,并且这些操作可以按顺序执行或并行执行。需要说明的是,本文中的“第一”、“第二”等描述,是用于区分不同的消息、设备、模块等,不代表先后顺序,也不限定“第一”和“第二”是不同的类型。Some processes described in the specification and claims of the present application and the above drawings include multiple operations in a specific order, but it should be clearly understood that these operations may not be in the order in which they appear in this document Execution or parallel execution. The sequence numbers of operations such as 101 and 102 are only used to distinguish different operations. The sequence number itself does not represent any execution sequence. In addition, these processes may include more or fewer operations, and these operations may be performed sequentially or in parallel. It should be noted that the descriptions of "first" and "second" in this article are used to distinguish different messages, devices, modules, etc., and do not represent the order, nor limit "first" and "second". Are different types.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those skilled in the art without making creative work fall within the protection scope of the present application.
本技术领域技术人员可以理解,这里所使用的“终端”、“终端设备”既包括无线信号接收器的设备,其仅具备无发射能力的无线信号接收器的设备,又包括接收和发射硬件的设备,其具有能够在双向通信链路上,执行双向通信的接收和发射硬件的设备。这种设备可以包括:蜂窝或其他通信设备,其具有单线路显示器或多线路显示器或没有多线路显示器的蜂窝或其他通信设备;PCS(Personal Communications Service,个人通信系统),其可以组合语音、数据处理、传真和/或数据通信能力;PDA(Personal Digital Assistant,个人数字助理),其可以包括射频接收器、寻呼机、互联网/内联网访问、网络浏览器、记事本、日历和/或GPS(Global Positioning System,全球定位系统)接收器;常规膝上型和/或掌上型计算机或其他设备,其具有和/或包括射频接收器的常规膝上型和/或掌上型计算机或其他设备。这里所使用的“终端”、“终端设备”可以是便携式、可运输、安装在交通工具(航空、海运和/或陆地)中的,或者适合于和/或配置为在本地运行,和/或以分布形式,运行在地球和/或空间的任何其他位置运行。这里所使用的“终端”、“终端设备”还可以是通信终端、上网终端、音乐/视频播放终端,例如可以是PDA、MID(Mobile Internet Device,移动互联网设备)和/或具有音乐/视频播放功能的移动电话,也可以是智能电视、机顶盒等设备。Those skilled in the art can understand that the term “terminal” and “terminal device” used here include not only devices with wireless signal receivers, but only devices with wireless signal receivers that do not have transmitting capabilities, but also devices that receive and transmit hardware. A device having a device capable of performing reception and transmission hardware of two-way communication on a two-way communication link. Such devices may include: cellular or other communication devices with single-line displays or multi-line displays or cellular or other communication devices without multi-line displays; PCS (Personal Communications Services), which can combine voice and data Processing, fax and / or data communication capabilities; PDA (Personal Digital Assistant), which can include radio frequency receivers, pagers, Internet / Intranet access, web browsers, notepads, calendars and / or GPS (Global Positioning System (Global Positioning System) receiver; conventional laptop and / or palmtop computer or other device that has and / or includes a conventional laptop and / or palmtop computer or other device of a radio frequency receiver. As used herein, "terminal" and "terminal equipment" may be portable, transportable, installed in a vehicle (aeronautical, maritime, and / or terrestrial), or suitable and / or configured to operate locally, and / or In a distributed form, it operates at any other location on the earth and / or space. The "terminal" and "terminal device" used herein may also be a communication terminal, an Internet terminal, a music / video playback terminal, for example, may be a PDA, MID (Mobile Internet Device), and / or have music / video playback Functional mobile phones can also be smart TVs, set-top boxes and other devices.
请参阅图1,图1为本实施例中系统安全方法的基本流程示意图。Please refer to FIG. 1, which is a schematic diagram of the basic process of the system security method in this embodiment.
如图1所示,一种系统安全方法,包括下述步骤:As shown in Figure 1, a system security method includes the following steps:
S1100、获取显示区域显示画面的画面截图;S1100. Acquire a screenshot of the display screen in the display area;
用户在使用计算机设备时,通过发送系统截图指令,获取计算机设备当前显示画面的画面截图。但不限于此,根据具体应用场景的不同,截图画面的获取不局限于此,在一些选择性实施例中,计算机设备具有独立的显卡设备,计算机设备在工作时只需读取显卡设备空间内的渲染图就能得到画面截图。When using a computer device, the user obtains a screen shot of the current display screen of the computer device by sending a system screenshot instruction. But it is not limited to this. Depending on the specific application scenario, the capture of screenshots is not limited to this. In some optional embodiments, the computer device has an independent graphics card device, and the computer device only needs to read the graphics card device space when working You can get a screenshot of the screen.
本实施方式中,画面截图的获取是定时获取的,例如,每隔3分钟获取一次,但不限于此,画面截图的获取时长能够是设定的任一时间长度。在一些选择性实施例中,画面截图的获取还能够是实时进行的。In this embodiment, the screenshots are acquired at regular intervals. For example, the screenshots are acquired every 3 minutes, but it is not limited to this. The acquisition duration of the screenshots can be any set length of time. In some alternative embodiments, the screenshots can also be acquired in real time.
S1200、将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;S1200. Input the screen shot into the preset first neural network model, and obtain a first classification result of the screen shot output by the first neural network model, where the first classification result is the screen User behavior information characterized by screenshots;
将截取得到的画面截图输入到预设的第一神经网络模型中。其中,所述第一神经网络模型能够是卷积神经网络模型(CNN),但是第一神经网络模型还能够是:深度神经网络模型(DNN)、循环神经网络模型(RNN)或者上述三种网络模型的变形模型。Input the captured screen shot into the preset first neural network model. Wherein, the first neural network model can be a convolutional neural network model (CNN), but the first neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN), or the above three networks Deformation model of the model.
本实施方式中,第一神经网络模型被预先训练至收敛,用于通过对画面截图进行特征提取和分类得到,画面截图所表征的用户行为信息。用户行为信息包括使用计算机进行(不限于):打游戏、听音乐、做作业和浏览网页等等。在一些选择性实施例中,用户行为信息还能够是用户使用计算机设备进行的不良行为(不限于)网络赌博、观看不健康影视作品或者进行超出其能力范围的转账支付等行为。In this embodiment, the first neural network model is pre-trained to convergence, and is used for feature extraction and classification of the screenshots, and the user behavior information represented by the screenshots. User behavior information includes using a computer (not limited to): playing games, listening to music, doing homework, browsing the web, etc. In some optional embodiments, the user behavior information can also be undesirable behaviors (not limited to) online gambling, watching unhealthy film and television works performed by users using computer equipment, or making transfer payments beyond their capabilities.
本实施例中,第一神经网络模型的训练过程为:In this embodiment, the training process of the first neural network model is:
通过网络爬虫或者现有的图像数据库获取本实施例的训练样本集。训练样本集中包括不同种类的计算机截图画面。The training sample set of this embodiment is obtained through a web crawler or an existing image database. The training sample set includes different kinds of computer screenshots.
本实施方式中神经网络模型在训练时,采用若干个训练样本集(例如100万张),其中,每个训练样本集包括一张计算机设备的画面截图。在对画面截图进行训练之前,需要对每个训练样本集中的图像表征的用户行为进行预判,预判能够是人工进行的,例如画面截图中的内容为游戏画面时,则标定预判结果为“打游戏”,通过上述的方式能够得所有训练样本集的预判结果。并定义预判结果为该画面截图的分类判断信息。In this embodiment, during training, the neural network model uses several training sample sets (for example, 1 million), where each training sample set includes a screenshot of a computer device. Before training the screenshots, it is necessary to prejudge the user behavior represented by the images in each training sample set. The prejudgement can be performed manually. For example, if the content in the screenshot is a game screen, then the result of the calibration prejudgement is "Playing games" can obtain the pre-judgment results of all training sample sets in the above manner. And define the pre-judgment result as the classification judgment information of the screenshot.
将训练样本集依次输入到第一神经网络模型中,画面截图依次经过第一神经网络模型的卷积层、全连接层和分类层。分类层输出的结果即为第一神经网络模型激励输出的画面截图分类结果。本实施方式中,第一神经网络模型的分类结果即为模型判断的用户行为信息。定义激励输出的结果为分类参照信息。The training sample set is sequentially input into the first neural network model, and the screen shots sequentially pass through the convolutional layer, the fully connected layer, and the classification layer of the first neural network model. The output result of the classification layer is the classification result of the screenshot of the excitation output of the first neural network model. In this embodiment, the classification result of the first neural network model is user behavior information determined by the model. The result of defining the excitation output is classified reference information.
模型分类参照信息是第一神经网络模型根据输入的画面截图而输出的激励数据,在第一神经网络模型未被训练至收敛之前,分类参照信息为离散性较大的数值,当第一神经网络模型未被训练至收敛之后,分类参照信息为相对稳定的数据。The model classification reference information is the excitation data output by the first neural network model according to the input screen shot. Before the first neural network model is trained to converge, the classification reference information is a numerical value with a large discreteness. When the first neural network After the model has not been trained to converge, the classification reference information is relatively stable data.
通过第一神经网络模型的损失函数判断分类参照信息与分类判断信息是否一致。损失函数是被配置为检测第一神经网络模型中模型分类参照信息,与人们期望的分类判断信息是否具有一致性的检测函数。当第一神经网络模型的输出结果与分类判断信息的期望结果不一致时,需要通过反向算法对第一神经网络模型中的权重进行校正,以使第一神经网络模型的输出结果与分类判断信息的期望结果相同。The loss function of the first neural network model determines whether the classification reference information is consistent with the classification judgment information. The loss function is a detection function configured to detect the model classification reference information in the first neural network model and to determine whether the information is consistent with the classification classification expected by people. When the output result of the first neural network model is inconsistent with the expected result of the classification judgment information, the weights in the first neural network model need to be corrected by a reverse algorithm, so that the output result of the first neural network model and the classification judgment information The expected result is the same.
当第一神经网络模型的分类输出输出结果与分类判断信息的期望结果不一致时,需要对第一神经网络模型中的权重进行校正,以使第一神经网络模型的输出结果与分类判断信息的期望结果相同。训练时采用多张训练样本进行训练(例如100万张画面截图),通过反复的训练与校正,当第一神经网络模型输出分类数据与各训练样本的分类参照信息比对正确率达到(不限于)99.9%时,训练结束。此时,第一神经网络模型训练结束,第一神经网络模型被训练至收敛,能够对截图画面表征的用户行为信息进行准确的判断。When the classification output output result of the first neural network model is inconsistent with the expected result of classification judgment information, the weights in the first neural network model need to be corrected, so that the output result of the first neural network model and the classification judgment information expectation The result is the same. During training, multiple training samples are used for training (for example, 1 million screenshots). After repeated training and correction, when the first neural network model outputs classification data and the classification reference information of each training sample, the correct rate is reached (not limited to ) 99.9%, the training is over. At this time, the training of the first neural network model ends, the first neural network model is trained to convergence, and the user behavior information represented by the screenshot can be accurately judged.
S1300、将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。S1300. Compare the first classification result with preset behavior planning information, and respond to a user instruction of the user when the first classification result is consistent with the behavior planning information.
将训练至收敛状态的第一神经网络模型输出的第一分类结果(即用户行为信息)与行为规划信息进行比对。比对一致时则允许用户继续使用计算机,比对不一致时则禁止执行用户指令。The first classification result (ie, user behavior information) output by the first neural network model trained to the convergence state is compared with the behavior planning information. When the comparison is consistent, the user is allowed to continue using the computer, and when the comparison is inconsistent, the execution of user instructions is prohibited.
行为规划信息是用户使用计算机设备进入到操作界面时,出现使用计算机规划书,用户需要根据自生需要将使用计算机的实际情况填写在规划书中,其格式为XX时刻-XX时刻使用计算机进行“网上作业撰写”,等等将使用计算机的时间与事项进行一 一列明。用户填写的使用计算机规划书被定义为行为规划信息。The behavior planning information is that when the user uses the computer device to enter the operation interface, a plan for using the computer appears. The user needs to fill in the actual situation of using the computer in the plan according to his own needs. The format is XX moment-XX moment. "Homework writing", etc. will list the time and matters of using the computer. The computer planning book filled in by the user is defined as behavior planning information.
在一些选择性实施例中,需要对用户的行为规划信息进行审核,例如规划书中使用计算机设备进行娱乐的时间长度不得超过1个小时,或者不能在行为规划信息中填写诸如,看色情电影或者赌博等不健康的信息。In some optional embodiments, the user's behavior planning information needs to be reviewed. For example, the length of time that the computer equipment is used for entertainment in the planning book should not exceed 1 hour, or the behavior planning information such as watching pornographic movies or Unhealthy information such as gambling.
当第一分类结果与行为规划信息不一致时,则表明用户使用计算机设备进行的事项与其填写的规划使用行为不同,此时,计算机设备停止响应用户的操作指令。在一些选择性实施例中,禁止执行用户指令后,将显示画面切换至用户行为规划信息表征的画面中,或者启动行为规划信息表征的应用程序,然后,继续执行用户的新指令。以达到引导用户正确使用计算机设备的目的。When the first classification result is inconsistent with the behavior planning information, it indicates that the user ’s use of the computer device is different from the planned use behavior that the user filled in. At this time, the computer device stops responding to the user ’s operation instruction. In some optional embodiments, after the execution of the user instruction is prohibited, the display screen is switched to the screen characterized by the user's behavior planning information, or the application program characterized by the behavior planning information is started, and then, the execution of the user's new instruction is continued. In order to guide users to use computer equipment correctly.
上述实施方式在用户使用计算机时提示用户填写使用规划,该使用规划中包括用户使用计算机进行的操作内容。当用户正式操作计算机时,获取计算机屏幕显示内容的画面截图,将画面截图输入到预设的第一神经网络模型中,并获取分类结果。由于分类结果为画面截图表征的用户行为信息,即用户正在用计算机设备进行何种操作。通过比对用户在使用计算机时设定的行为规划信息与分类结果是否一致,即能够确定用户是否使用计算机在进行规划中的行为操作,而非使用计算机在进行其他操作内容。当用户计算机在进行其他操作内容时,禁止响应用户的操作指令,迫使用户按规划操作计算机进行响应的工作,达到引导用户正确使用计算机的目的,实现帮助用户戒除不当使用计算机的任务。The above-mentioned embodiment prompts the user to fill in the usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer. When the user officially operates the computer, a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained. Because the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device. By comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, it is possible to determine whether the user is using the computer to perform the behavior operation in the planning, rather than using the computer to perform other operations. When the user's computer is performing other operations, it is forbidden to respond to the user's operation instructions, forcing the user to operate the computer to respond as planned, to achieve the purpose of guiding the user to use the computer correctly, and to realize the task of helping the user to avoid improper computer use.
在一些选择性实施例中,为防止未满足上网年龄的青少年上网,通过验证其身份证件(身份证、户口本或者护照等)的方式限制其上网。但是。部分青少年通过冒用他人身份信息进行上网的事件却屡禁不止,因此,需要对青少年冒用身份进行上网的行为进行限制。请参阅图2,图2为本实施例验证用户身份信息的流程示意图。In some optional embodiments, in order to prevent teenagers who do not meet the age of going online to restrict access to the Internet, they are restricted from accessing the Internet by verifying their identity documents (identity card, household registration book or passport, etc.). but. Some young people use the identity information of others to surf the Internet repeatedly, but the behavior of young people using their identity to surf the Internet needs to be restricted. Please refer to FIG. 2, which is a schematic diagram of a process of verifying user identity information in this embodiment.
如图2所示,步骤S1100之前还包括下述步骤:As shown in FIG. 2, before step S1100, the following steps are also included:
S1011、采集所述用户的人脸图像;S1011: Collect the face image of the user;
用户在使用计算机时,开启计算机设备的电源,在用户进入到操作系统界面时,需要对用户的身份进行验证,验证的第一步是通过计算机设备集成的摄像头或者外设设备的摄像头进行用户的人脸图像采集。When the user uses the computer, the power of the computer device is turned on. When the user enters the operating system interface, the user's identity needs to be verified. The first step of verification is to perform the user's authentication through the camera of the computer device or the camera of the peripheral device. Face image collection.
S1012、将所述人脸图像和预设的所述用户的证件图像输入到预设的第二神经网络模型中,并获取所述第二神经网络模型输出的第一判断结果,其中,所述第二神经网络模型为训练至收敛状态用于判断图像相似度的神经网络模型;S1012. Input the face image and the preset ID image of the user into a preset second neural network model, and obtain a first judgment result output by the second neural network model, where The second neural network model is a neural network model trained to a convergence state for judging the similarity of images;
将采集得到的人脸图像输入到第二神经网络模型中,第二神经网络模型是训练至收敛状态用于判断图像相似度的神经网络模型。将人脸图像输入到第二神经网络模型后,第二神经网络模型输出第一判断结果。第一判断结果是第二神经网络模型对人脸图像和预存储的证件照片相似度的比较结果,或者对人脸图像和预存储的注册用户账号时保留的注册头像相似度的比较结果。The collected face image is input into a second neural network model, and the second neural network model is a neural network model trained to a convergence state for judging image similarity. After the face image is input to the second neural network model, the second neural network model outputs the first judgment result. The first judgment result is the comparison result of the similarity of the face image and the pre-stored ID photo by the second neural network model, or the comparison result of the similarity of the registered avatar retained during the registration of the user image and the face image.
其中,所述第二神经网络模型能够是卷积神经网络模型(CNN),但是第二神经网络模型还能够是:深度神经网络模型(DNN)、循环神经网络模型(RNN)或者上述三种网络模型的变形模型。Wherein, the second neural network model can be a convolutional neural network model (CNN), but the second neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN) or the above three networks Deformation model of the model.
本实施例中,第二神经网络模型的训练过程为:In this embodiment, the training process of the second neural network model is:
通过网络爬虫或者现有的图像数据库获取本实施例的训练样本集。训练样本集中 包括不同种类的人脸图像。The training sample set of this embodiment is obtained through a web crawler or an existing image database. The training sample set includes different kinds of face images.
本实施方式中神经网络模型在训练时,采用若干个训练样本集(例如100万个),其中,每个训练样本集包括一个人脸图像数据对,包括一张人脸图像,以及与该人脸图像进行比对的比对图像,其中比对图像也是人脸图像,且同一个训练样本集中,人脸图像与比对图像能够相同也能够不同。在对画面截图进行训练之前,需要对每个训练样本集中的图像表征的用户行为进行预判,预判能够是人工进行的,例如训练样本集中的两张图片均为同一个人不同时期或者空间内的人脸图像时,判断两张图像相同,通过上述的方式能够得所有训练样本集的预判结果。并定义预判结果为该画面截图的分类判断信息。In this embodiment, the neural network model uses several training sample sets (for example, 1 million) when training, wherein each training sample set includes a face image data pair, including a face image, and the person A comparison image of face images for comparison, where the comparison image is also a face image, and in the same training sample set, the face image and the comparison image can be the same or different. Before training the screenshots, you need to predict the user behavior represented by the images in each training sample set. The pre-judgment can be performed manually. For example, the two pictures in the training sample set are the same person in different periods or spaces When the human face image is determined that the two images are the same, the prediction results of all training sample sets can be obtained in the above manner. And define the pre-judgment result as the classification judgment information of the screenshot.
将训练样本集依次输入到第二神经网络模型中,画面截图依次经过第二神经网络模型的卷积层、全连接层和分类层。分类层输出的结果即为第二神经网络模型激励输出的比对分类结果。本实施方式中,第二神经网络模型的分类结果即为模型判断的用户行为信息。定义激励输出的结果为分类参照信息。分类参照信息是第二神经网络模型提取的人脸图像和比对图像的特征向量的比较结果。The training sample set is sequentially input into the second neural network model, and the screen shots sequentially pass through the convolutional layer, the fully connected layer, and the classification layer of the second neural network model. The result of the classification layer output is the comparison classification result of the excitation output of the second neural network model. In this embodiment, the classification result of the second neural network model is user behavior information determined by the model. The result of defining the excitation output is classified reference information. The classification reference information is the comparison result of the feature vectors of the face image and the comparison image extracted by the second neural network model.
模型分类参照信息是第二神经网络模型根据输入的画面截图而输出的激励数据,在第二神经网络模型未被训练至收敛之前,分类参照信息为离散性较大的数值,当第二神经网络模型未被训练至收敛之后,分类参照信息为相对稳定的数据。The model classification reference information is the excitation data output by the second neural network model according to the input screen shot. Before the second neural network model is trained to converge, the classification reference information is a numerical value with a large discreteness. When the second neural network After the model has not been trained to converge, the classification reference information is relatively stable data.
通过第二神经网络模型的损失函数判断分类参照信息与分类判断信息是否一致。损失函数是被配置为检测第二神经网络模型中模型分类参照信息,与人们期望的分类判断信息是否具有一致性的检测函数。当第二神经网络模型的输出结果与分类判断信息的期望结果不一致时,需要通过反向算法对第二神经网络模型中的权重进行校正,以使第二神经网络模型的输出结果与分类判断信息的期望结果相同。The loss function of the second neural network model determines whether the classification reference information is consistent with the classification judgment information. The loss function is a detection function that is configured to detect model classification reference information in the second neural network model and to determine whether the information is consistent with people's desired classification judgment information. When the output result of the second neural network model is inconsistent with the expected result of the classification judgment information, the weights in the second neural network model need to be corrected by a reverse algorithm, so that the output result of the second neural network model and the classification judgment information The expected result is the same.
当第二神经网络模型的分类输出结果与分类判断信息的期望结果不一致时,需要对第二神经网络模型中的权重进行校正,以使第二神经网络模型的输出结果与分类判断信息的期望结果相同。训练时采用多张训练样本进行训练(例如100个训练样本集反复训练),通过反复的训练与校正,当第二神经网络模型输出分类数据与各训练样本的分类参照信息比对正确率达到(不限于)99.9%时,训练结束。此时,第二神经网络模型训练结束,第二神经网络模型被训练至收敛,能够对人脸图像表征的用户行为信息进行准确的判断。When the classification output of the second neural network model is not consistent with the expected result of classification judgment information, the weights in the second neural network model need to be corrected so that the output result of the second neural network model and the expected result of classification judgment information the same. During training, multiple training samples are used for training (for example, 100 training sample sets are repeatedly trained). Through repeated training and correction, when the second neural network model outputs the classification data and the classification reference information of each training sample, the correct rate is reached ( Not limited to) 99.9%, the training is over. At this time, the training of the second neural network model ends, and the second neural network model is trained to converge, and the user behavior information represented by the face image can be accurately judged.
S1013、当所述第一判断结果表征的内容为所述人脸图像和证件图像不一致时,禁止所述用户的登陆请求。S1013. When the content characterized by the first judgment result is that the face image and the certificate image are inconsistent, prohibit the user's login request.
当第一判断结果表征的内容为所述人脸图像和证件图像不一致时,即判定人脸图像与用户的证件的证件照或者留存的用户图像之间的相似度低,验证结果不一致,此时,计算机设备禁止执行用户的登陆请求,用户无法登陆操作系统界面,控制计算机设备。When the content characterized by the first judgment result is that the face image and the certificate image are inconsistent, it is determined that the similarity between the face image and the certificate photo of the user's certificate or the retained user image is low, and the verification result is inconsistent. The computer device prohibits the execution of the user's login request, and the user cannot log in to the operating system interface to control the computer device.
通过用户图像验证,能够识别用户是否具有合法的使用计算机设备上网的权利。同时,也能够加强计算机设备的使用安全。Through user image verification, it is possible to identify whether the user has the legal right to use a computer device to access the Internet. At the same time, it can also enhance the safety of computer equipment.
在一些实施方式中,为防止用户采用他人的人脸图像照片对计算机进行欺骗,成功解锁登陆操作系统界面,需要在用户登陆时,识别用户是否为活体。请参阅图3,图3为本实施例用户活体验证的流程示意图。In some embodiments, in order to prevent the user from deceiving the computer by using other people's face image photos, and successfully unlock the login operating system interface, it is necessary to identify whether the user is alive when the user logs in. Please refer to FIG. 3, which is a schematic flowchart of the user biometric verification according to this embodiment.
如图3所示,步骤S1011之后还包括:As shown in FIG. 3, after step S1011, it further includes:
S1021、将所述人脸图像输入到预设的第三神经网络模型中,并获取所述第三神经网络模型输出的第二分类结果,其中,所述第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型;S1021: Input the face image into a preset third neural network model, and obtain a second classification result output by the third neural network model, where the third neural network model is trained to a converged state Neural network model for judging the deflection direction and angle of face images;
在采集用户人脸图像时,计算机设备通过内置的印象设备或者外设音响向用户发送指令,指令内容为控制用户人脸在摄像头视界内的角度,例如,向左偏转30度、向上抬起45度或者向右偏转60度等命令。在语音命令发布后,计算机设备采集用户的人脸图像。并将该人脸图像输入到第三神经网络模型中。When collecting the user's face image, the computer device sends an instruction to the user through the built-in impression device or the peripheral audio. The instruction content is to control the angle of the user's face in the camera's field of view, for example, deflect 30 degrees to the left and lift up 45. Degrees or deflection 60 degrees to the right and other commands. After the voice command is issued, the computer device collects the user's face image. And input the face image into the third neural network model.
第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型。其中,所述第三神经网络模型能够是卷积神经网络模型(CNN),但是第三神经网络模型还能够是:深度神经网络模型(DNN)、循环神经网络模型(RNN)或者上述三种网络模型的变形模型。The third neural network model is a neural network model trained to a converged state and used to judge the deflection direction and deflection angle of the face image. Wherein, the third neural network model can be a convolutional neural network model (CNN), but the third neural network model can also be: deep neural network model (DNN), recurrent neural network model (RNN) or the above three networks Deformation model of the model.
本实施方式中,第三神经网络模型与第一神经网络模型的训练方式相同,但是训练的样本集由画面截图更改为人脸图像,分类结果由用户行为信息变化为人体头部的偏转方向及偏转角度。通过大量的训练样本集的第三神经网络模型能够准确的判断用户的人体头部的偏转方向及偏转角度。In this embodiment, the third neural network model is trained in the same way as the first neural network model, but the training sample set is changed from a screenshot to a face image, and the classification result is changed from user behavior information to the deflection direction and deflection of the human head angle. The third neural network model through a large number of training sample sets can accurately determine the deflection direction and deflection angle of the user's human head.
S1022、将所述第二分类结果与预设的指令信息进行比对,当所述第二分类结果与所述指令信息不一致时,禁止所述用户的登陆请求。S1022: Compare the second classification result with preset instruction information, and when the second classification result is inconsistent with the instruction information, prohibit the user's login request.
将第三神经网络模型的输出的第二分类结果与设定的指令信息进行比对,指令信息及计算机设备通过音响控制用户脸部转动的信息指令。例如,指令信息为“向右转动30°”,第三神经网络模型判断得到的人脸偏转角度为“向右偏转30度”,二者完全吻合,则判断结果一直。若第三神经网络模型判断得到的人脸偏转角度为“偏转0°”则表明用户未跟随执行进行旋转,此时,比对结果不一致,计算机设备禁止响应用户的登陆请求。The second classification result of the output of the third neural network model is compared with the set instruction information, and the instruction information and the information instruction that the computer device controls the rotation of the user's face through the sound. For example, if the command information is "turn 30 ° to the right", the deflection angle of the face judged by the third neural network model is "deflection to the right by 30 degrees", and if the two match completely, the judgment result will be the same. If the deflection angle of the face judged by the third neural network model is “deflection 0 °”, it indicates that the user has not rotated following the execution. At this time, the comparison result is inconsistent, and the computer device is prohibited from responding to the user ’s login request.
通过对人脸图像进行活体检测,能够有效的避免非法用户或者不适宜上网的用户通过照片方式欺瞒计算机进行登陆的问题。By performing live detection on the face image, it can effectively avoid the problem of illegal users or users who are not suitable for surfing the Internet by deceiving the computer to log in.
在一些选择性实施例中,为控制用户使用计算机设备的时间,通过统计用户使用计算机的时长,并将其与设定的时长阈值进行比对,当超过预设时长时,计算机设备禁止响应用户的任何操作指令,以引导用户正确使用计算机设备。In some optional embodiments, in order to control the time when the user uses the computer device, by counting the length of time the user uses the computer and comparing it with a set time threshold, when the preset time is exceeded, the computer device prohibits responding to the user Any operation instructions to guide the user to use the computer equipment correctly.
请参阅图4,图4为本实施例限定用户使用时长的流程示意图。Please refer to FIG. 4. FIG. 4 is a schematic diagram of a process for limiting user usage time in this embodiment.
如图4所示,步骤S1300之后还包括下述步骤:As shown in FIG. 4, after step S1300, the following steps are also included:
S1311、获取所述用户的用户行为的持续时长;S1311: Obtain the duration of user behavior of the user;
计算机设备通过内置计时器记录计算机设备的启动时长,然后通过定时获取的方式查看计时器内的使用时长,该使用时长为用户的用户行为的持续时长。The computer device records the startup time of the computer device through a built-in timer, and then checks the usage time in the timer through the method of timing acquisition. The usage time is the duration of the user's user behavior.
S1312、将所述持续时长与预设的时间阈值进行比对;S1312: Compare the duration with a preset time threshold;
将获取的持续时长与设定的时间阈值进行比对,根据用户行为的不同,不同的用户行为的时间阈值也不同。例如,用户行为为打游戏时的时间阈值为1个小时,用户行为为学习的时间阈值为2小时,而用户总的上网时间不得超过3个小时。The acquired duration is compared with the set time threshold, and the time threshold of different user behaviors is different according to different user behaviors. For example, the time threshold for user behavior when playing games is 1 hour, the time threshold for user behavior for learning is 2 hours, and the total online time of users must not exceed 3 hours.
根据不同的用户行为的持续时长或者用户使用计算机设备的总时长,与对应的用户行为或者总使用阈值进行比对。According to the duration of different user behaviors or the total duration of the user's use of the computer device, it is compared with the corresponding user behavior or total usage threshold.
S1313、当所述持续时长大于所述时间阈值时,禁止响应所述用户的用户指令。S1313. When the duration is greater than the time threshold, responding to the user's user instruction is prohibited.
当比对结果持续时长大于时间阈值时,计算机设备禁止响应用户发出的操作指令,以迫使用户停止使用计算机设备,达到控制用户使用计算机设备超时的问题。When the duration of the comparison result is greater than the time threshold, the computer device is prohibited from responding to the operation instructions issued by the user, so as to force the user to stop using the computer device, so as to control the user's use of the computer device overtime.
在一些实施方式中,部分未成年的用户在使用计算机设备时,经常使用家长的信用卡、储蓄卡或者电子账户进行线上消费或者充值。因此,需要额外对未成年用户在线上的消费进行控制。请参阅图5,图5为本实施例限制用户线上支付的流程示意图。In some embodiments, some minor users often use a parent's credit card, debit card or electronic account for online consumption or recharge when using computer devices. Therefore, the online consumption of underage users needs to be additionally controlled. Please refer to FIG. 5, which is a schematic diagram of a process of restricting online payment by a user in this embodiment.
如图5所示,步骤S1300之后还包括:As shown in FIG. 5, after step S1300, the method further includes:
S1321、识别所述画面截图中的支付金额;S1321: Identify the payment amount in the screenshot of the screen;
用户在使用计算机设备进行支付时,计算机设备通过获取画面截图,并将该截图输入至第一神经网络模型中,由于第一神经网络模型中的分类结果中设有的分类结果包含支付行为,因此,通过第一神经网络模型的分类结果能够判断用户是否在支付。When a user uses a computer device to make a payment, the computer device obtains a screenshot of the screen and inputs the screenshot into the first neural network model. Since the classification result set in the classification result in the first neural network model includes payment behavior, so The classification result of the first neural network model can determine whether the user is paying.
确认用户在进行支付后,通过文字提取技术将画面截图中的支付金额进行提取,例如采用OCR对图像文字进行辨识,提取画面截图中的支付金额。After confirming that the user makes a payment, the payment amount in the screen shot is extracted through text extraction technology, for example, OCR is used to recognize the image text and the payment amount in the screen shot is extracted.
S1322、将所述支付金额与预设的金额阈值进行比对;S1322: Compare the payment amount with a preset amount threshold;
将读取到的支付金额与预设的金额阈值进行比对,金额阈值为家长设定的未成年最大的消费金额,能够由家长根据自身消费能力或者对孩子消费管制的额度进行设置。The read payment amount is compared with a preset amount threshold value. The amount threshold value is the maximum consumption amount of minors set by the parent, which can be set by the parent according to their own consumption ability or the amount of the child's consumption control.
S1323、当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令。S1323: When the payment amount is greater than the amount threshold, it is prohibited to respond to the user's user instruction.
当支付金额大于金额阈值时,计算机设备禁止响应所述用户的用户指令。通过控制用户交易金额的上限值,能够控制将用户的消费能力控制在限定的范围内,不会因为用户的冲动给家人带来不必要的麻烦。When the payment amount is greater than the amount threshold, the computer device prohibits responding to the user's user instruction. By controlling the upper limit of the user's transaction amount, the user's spending power can be controlled within a limited range without causing unnecessary trouble to the family because of the user's impulse.
在一些实施方式中,为避免用户通过多次支付的方式躲避上述技术方案的监控,通过对设定时间段(例如,一天)内用户的消费记录,当消费记录的累加之和大于金额阈值时,禁止响应所述用户的用户指令。In some embodiments, in order to prevent the user from avoiding the monitoring of the above technical solutions through multiple payments, by monitoring the user's consumption records within a set time period (for example, one day), when the cumulative sum of the consumption records is greater than the amount threshold , Forbid to respond to the user's user instructions.
在一些实施方式中,当用户进行超额支付时,要得到家长或者监护人的认可后才能够进行执行。请参阅图6,图6为本实施例验证超额支付的流程示意图。In some implementations, when the user makes an overpayment, it cannot be executed until it is approved by the parent or guardian. Please refer to FIG. 6, which is a schematic diagram of a process of verifying overpayment in this embodiment.
如图6所示,步骤S1323之后还包括下述步骤:As shown in FIG. 6, after step S1323, the following steps are also included:
S1411、向预设的关联终端发送警示信息,其中,所述警示信息包括是否同意支付的问询信息;S1411: Send warning information to a preset associated terminal, where the warning information includes inquiry information about whether to agree to pay;
当检测到用户在进行支付行为,且支付的金额大于设定的金额阈值时,向关联的终端发送警示信息,警示信息中包括问询信息。例如,用户XX在XX平台上支付5000元整,是否同意支付的警示信息。When it is detected that the user is making a payment and the amount paid is greater than the set amount threshold, warning information is sent to the associated terminal, and the warning information includes inquiry information. For example, the warning message that user XX pays 5,000 yuan on the XX platform and agrees to pay.
其中关联终端为通过管理员权限注册时预留的电话号码、邮箱号码或者其他即时通讯账号等。在一些实施方式中,关联终端是指用户使用的支付账号或者支付银行卡在注册时预留的电话号码。Among them, the associated terminal is the phone number, mailbox number, or other instant messaging account reserved during registration with administrator authority. In some embodiments, the associated terminal refers to the phone number reserved by the user for the payment account or payment bank card used during registration.
S1412、接收所述关联终端回复所述警示信息的回复信息;S1412: Receive response information from the associated terminal in response to the warning information;
获取到关联终端发送的回复警示信息的回复信息,回复信息的内容为是否同意用户进行支付。Obtaining reply information to reply to the warning information sent by the associated terminal, the content of the reply information is whether the user is allowed to pay.
S1413、当所述回复信息表征的回复内容为同意支付时,执行所述用户的支付指令。S1413. When the reply content represented by the reply information is payment approval, execute the user's payment instruction.
当回复信息的内容表征的回复内容为同意支付时,计算机设备执行用户的支付指令,将用户的支付信息发送至对应的服务器端,实现支付。若回复信息表征的内容为 不同意支付时,则禁止执行用户的支付操作。When the reply content characterized by the content of the reply information is to agree to payment, the computer device executes the user's payment instruction, and sends the user's payment information to the corresponding server to implement payment. If the content indicated in the reply message is that the payment is not approved, the user's payment operation is prohibited.
在一些实施方式中,为更加准确的将用户的支付行为发送对应的监护人或者账户持有者。在用户进行支付时,需要查找关联终端。请参阅图7,图7为本实施例获取关联终端的流程示意图。In some embodiments, the user's payment behavior is sent to the corresponding guardian or account holder for more accurate payment. When the user makes a payment, he needs to find the associated terminal. Please refer to FIG. 7, which is a schematic flowchart of obtaining an associated terminal according to this embodiment.
如图7所示,步骤S1411之前还包括下述步骤:As shown in FIG. 7, before step S1411, the following steps are also included:
S1401、获取所述支付行为使用的支付账号;S1401: Obtain the payment account used by the payment behavior;
获取用户进行支付行为时所使用的支付卡号或者支付使用的电子账号。同时,读取用户使用的支付卡号以及电子账户的支付账号。Obtain the payment card number or electronic account used by the user for payment. At the same time, read the payment card number used by the user and the payment account number of the electronic account.
S1402、根据所述支付账号获取与所述支付账号绑定的支付终端号码;S1402: Obtain the payment terminal number bound to the payment account according to the payment account;
本实施方式中,当管理员(家长)进行注册时,会收集家中能够提供的所有支付卡号以及电子账户的信息但不包括密码,以及支付卡号以及电子账户对应的支付终端号码。通过电子账户的信息能够直接获取到与支付账号绑定的支付终端号码。In this embodiment, when the administrator (parent) performs registration, it will collect all payment card numbers and electronic account information that can be provided at home but does not include the password, and the payment card number and payment terminal number corresponding to the electronic account. The payment terminal number bound to the payment account can be directly obtained through the information of the electronic account.
在一些实施方式中,在获取到支付账号后,识别该支付账号的类型及开户行或者平台。上述识别均能够通过各银行卡号辨识规则进行识别,然后向注册的机构所在的服务器系统发送请求信息,请求获取支付账户绑定的支付终端号码。In some embodiments, after the payment account is obtained, the type of the payment account and the account opening bank or platform are identified. All of the above identifications can be identified through the identification rules of each bank card number, and then send request information to the server system where the registered institution is located to request the payment terminal number bound to the payment account.
S1403、确定所述支付终端号码表征的终端为所述关联终端。S1403. Determine that the terminal represented by the payment terminal number is the associated terminal.
当获取到支付账户绑定的支付终端号码后,确定支付终端号码表征的终端为关联终端。通过关联终端的确认,能够将警示信息发送至最相关的用户终端,最大限度的保护了支付账户所有人的直接利益。After obtaining the payment terminal number bound to the payment account, it is determined that the terminal represented by the payment terminal number is an associated terminal. Through the confirmation of the associated terminal, the warning information can be sent to the most relevant user terminal, which maximizes the protection of the direct interests of the owner of the payment account.
为解决上述技术问题,本申请实施例还提供一种系统安全装置。To solve the above technical problems, embodiments of the present application also provide a system security device.
请参阅图8,图8为本实施例系统安全装置的基本结构框图。Please refer to FIG. 8, which is a block diagram of the basic structure of the system security device of this embodiment.
如图8所示,一种系统安全装置,包括:获取模块2100、处理模块2200和处理模块2300。其中,获取模块2100用于获取显示区域显示画面的画面截图;处理模块2200用于将画面截图输入到预设的第一神经网络模型中,并获取第一神经网络模型输出的画面截图的第一分类结果,其中,第一分类结果为画面截图表征的用户行为信息;执行模块2300用于将第一分类结果与预设的行为规划信息进行比对,当第一分类结果与行为规划信息不一致时,禁止响应用户的用户指令。As shown in FIG. 8, a system security device includes: an acquisition module 2100, a processing module 2200, and a processing module 2300. Wherein, the obtaining module 2100 is used to obtain a screen shot of the display screen in the display area; the processing module 2200 is used to input the screen shot into the preset first neural network model and obtain the first screen shot output by the first neural network model Classification results, where the first classification result is user behavior information characterized by screenshots; the execution module 2300 is used to compare the first classification result with preset behavior planning information, when the first classification result is inconsistent with the behavior planning information , It is forbidden to respond to user's user instructions.
系统安全装置在用户使用计算机时提示用户填写使用规划,该使用规划中包括用户使用计算机进行的操作内容。当用户正式操作计算机时,获取计算机屏幕显示内容的画面截图,将画面截图输入到预设的第一神经网络模型中,并获取分类结果。由于分类结果为画面截图表征的用户行为信息,即用户正在用计算机设备进行何种操作。通过比对用户在使用计算机时设定的行为规划信息与分类结果是否一致,即能够确定用户是否使用计算机在进行规划中的行为操作,而非使用计算机在进行其他操作内容。当用户计算机在进行其他操作内容时,禁止响应用户的操作指令,迫使用户按规划操作计算机进行响应的工作,达到引导用户正确使用计算机的目的,实现帮助用户戒除不当使用计算机的任务。The system security device prompts the user to fill in a usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer. When the user officially operates the computer, a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained. Because the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device. By comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, it is possible to determine whether the user is using the computer to perform the behavior operation in the planning, rather than using the computer to perform other operations. When the user's computer is performing other operations, it is forbidden to respond to the user's operation instructions, forcing the user to operate the computer to respond as planned, to achieve the purpose of guiding the user to use the computer correctly, and to realize the task of helping the user to avoid improper use of the computer.
在一些选择性实施例中,系统安全装置还包括:第一获取子模块、第一处理子模块和第一执行子模块。其中,第一获取子模块用于采集用户的人脸图像;第一处理子模块用于将人脸图像和预设的用户的证件图像输入到预设的第二神经网络模型中,并获取第二神经网络模型输出的第一判断结果,其中,第二神经网络模型为训练至收敛 状态用于判断图像相似度的神经网络模型;第一执行子模块用于当第一判断结果表征的内容为人脸图像和证件图像不一致时,禁止用户的登陆请求。In some optional embodiments, the system security device further includes: a first acquisition submodule, a first processing submodule, and a first execution submodule. Among them, the first acquisition sub-module is used to collect the user's face image; the first processing sub-module is used to input the face image and the preset user's ID image into the preset second neural network model, and obtain the first The first judgment result output by the second neural network model, where the second neural network model is a neural network model trained to a convergence state for judging image similarity; the first execution submodule is used when the content characterized by the first judgment result is human When the face image and the certificate image are inconsistent, the user's login request is prohibited.
在一些选择性实施例中,系统安全装置还包括:第二处理子模块和第二执行子模块。其中,第二处理子模块用于将人脸图像输入到预设的第三神经网络模型中,并获取第三神经网络模型输出的第二分类结果,其中,第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型;第二执行子模块用于将第二分类结果与预设的指令信息进行比对,当第二分类结果与指令信息不一致时,禁止用户的登陆请求。In some optional embodiments, the system security device further includes: a second processing submodule and a second execution submodule. Among them, the second processing sub-module is used to input the face image into the preset third neural network model and obtain the second classification result output by the third neural network model, wherein the third neural network model is training to convergence The neural network model whose state is used to judge the deflection direction and deflection angle of the face image; the second execution submodule is used to compare the second classification result with preset instruction information, when the second classification result is inconsistent with the instruction information, The user's login request is prohibited.
在一些选择性实施例中,系统安全装置还包括:第二获取子模块、第三处理子模块和第三执行子模块。其中,第二获取子模块用于获取用户的用户行为的持续时长;第三处理子模块用于将持续时长与预设的时间阈值进行比对;第三执行子模块用于当持续时长大于时间阈值时,禁止响应用户的用户指令。In some optional embodiments, the system security device further includes: a second acquisition submodule, a third processing submodule, and a third execution submodule. Among them, the second acquisition submodule is used to acquire the duration of the user's user behavior; the third processing submodule is used to compare the duration with a preset time threshold; the third execution submodule is used when the duration is greater than the time At the threshold, it is forbidden to respond to user instructions.
在一些选择性实施例中,当用户行为信息表征的用户行为支付行为时;系统安全装置还包括:第一识别子模块、第四处理子模块和第四执行子模块。其中,第一识别子模块用于识别画面截图中的支付金额;第四处理子模块用于将支付金额与预设的金额阈值进行比对;第四执行子模块用于当支付金额大于金额阈值时,禁止响应用户的用户指令。In some optional embodiments, when the user behavior payment behavior is characterized by the user behavior information; the system security device further includes: a first recognition submodule, a fourth processing submodule, and a fourth execution submodule. Among them, the first identification submodule is used to identify the payment amount in the screenshot; the fourth processing submodule is used to compare the payment amount with the preset amount threshold; the fourth execution submodule is used when the payment amount is greater than the amount threshold , It is forbidden to respond to user's user instructions.
在一些选择性实施例中,系统安全装置还包括:第一发送子模块、第一接受子模块第五执行子模块。其中,第一发送子模块用于向预设的关联终端发送警示信息,其中,警示信息包括是否同意支付的问询信息;第一接受子模块用于接收关联终端回复警示信息的回复信息;第五执行子模块用于当回复信息表征的回复内容为同意支付时,执行用户的支付指令。In some optional embodiments, the system security device further includes: a first sending submodule, a first accepting submodule, and a fifth executing submodule. Among them, the first sending sub-module is used to send warning information to the preset associated terminal, where the warning information includes inquiry information about whether to agree to pay; the first accepting sub-module is used to receive reply information from the associated terminal to reply to the warning information; Five execution sub-modules are used to execute the user's payment instruction when the response content represented by the response information is to agree to payment.
在一些选择性实施例中,系统安全装置还包括:第三获取子模块、第三获取子模块和第五处理子模块。其中,第三获取子模块用于获取支付行为使用的支付账号;第五处理子模块用于根据支付账号获取与支付账号绑定的支付终端号码;第六执行子模块用于确定支付终端号码表征的终端为关联终端。In some optional embodiments, the system security device further includes: a third acquisition submodule, a third acquisition submodule, and a fifth processing submodule. Among them, the third obtaining sub-module is used to obtain the payment account used for payment; the fifth processing sub-module is used to obtain the payment terminal number bound to the payment account according to the payment account; the sixth execution sub-module is used to determine the payment terminal number representation Is the associated terminal.
为解决上述技术问题,本申请实施例还提供计算机设备。具体请参阅图9,图9为本实施例计算机设备基本结构框图。To solve the above technical problems, embodiments of the present application also provide computer equipment. For details, please refer to FIG. 9, which is a block diagram of the basic structure of the computer device of this embodiment.
如图9所示,计算机设备的内部结构示意图。该计算机设备包括通过系统总线连接的处理器、非易失性存储介质、存储器和网络接口。其中,该计算机设备的非易失性存储介质存储有操作系统、数据库和计算机可读指令,数据库中可存储有控件信息序列,该计算机可读指令被处理器执行时,可使得处理器实现一种系统安全方法。该计算机设备的处理器用于提供计算和控制能力,支撑整个计算机设备的运行。该计算机设备的存储器中可存储有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种系统安全方法。该计算机设备的网络接口用于与终端连接通信。本领域技术人员可以理解,图9中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。As shown in FIG. 9, a schematic diagram of the internal structure of the computer device. The computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected through a system bus. The non-volatile storage medium of the computer device stores an operating system, a database, and computer-readable instructions. The database may store a sequence of control information. When the computer-readable instructions are executed by the processor, the processor may implement a A system security method. The processor of the computer device is used to provide computing and control capabilities, and support the operation of the entire computer device. The memory of the computer device may store computer readable instructions. When the computer readable instructions are executed by the processor, the processor may cause the processor to execute a system security method. The network interface of the computer device is used to connect and communicate with the terminal. Those skilled in the art can understand that the structure shown in FIG. 9 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied. The specific computer device may Include more or less components than shown in the figure, or combine certain components, or have a different arrangement of components.
本实施方式中处理器用于执行图8中获取模块2100、处理模块2200和执行模块 2300的具体功能,存储器存储有执行上述模块所需的程序代码和各类数据。网络接口用于向用户终端或服务器之间的数据传输。本实施方式中的存储器存储有人脸图像关键点检测装置中执行所有子模块所需的程序代码及数据,服务器能够调用服务器的程序代码及数据执行所有子模块的功能。In this embodiment, the processor is used to perform specific functions of the acquisition module 2100, the processing module 2200, and the execution module 2300 in FIG. 8, and the memory stores program codes and various types of data required to execute the above modules. The network interface is used for data transmission to user terminals or servers. The memory in this embodiment stores the program codes and data required to execute all submodules in the face image key point detection device, and the server can call the server program codes and data to execute the functions of all submodules.
计算机设备在用户使用计算机时提示用户填写使用规划,该使用规划中包括用户使用计算机进行的操作内容。当用户正式操作计算机时,获取计算机屏幕显示内容的画面截图,将画面截图输入到预设的第一神经网络模型中,并获取分类结果。由于分类结果为画面截图表征的用户行为信息,即用户正在用计算机设备进行何种操作。通过比对用户在使用计算机时设定的行为规划信息与分类结果是否一致,即能够确定用户是否使用计算机在进行规划中的行为操作,而非使用计算机在进行其他操作内容。当用户计算机在进行其他操作内容时,禁止响应用户的操作指令,迫使用户按规划操作计算机进行响应的工作,达到引导用户正确使用计算机的目的,实现帮助用户戒除不当使用计算机的任务。The computer device prompts the user to fill in a usage plan when the user uses the computer, and the usage plan includes the operation content performed by the user using the computer. When the user officially operates the computer, a screenshot of the content displayed on the computer screen is obtained, the screenshot is input into the preset first neural network model, and the classification result is obtained. Because the classification result is the user behavior information represented by the screenshot, that is, what kind of operation the user is using the computer device. By comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, it is possible to determine whether the user is using the computer to perform the behavior operation in the planning, rather than using the computer to perform other operations. When the user's computer is performing other operations, it is forbidden to respond to the user's operation instructions, forcing the user to operate the computer to respond as planned, to achieve the purpose of guiding the user to use the computer correctly, and to realize the task of helping the user to avoid improper use of the computer.
本申请还提供一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述任一实施例所述系统安全方法的步骤。The present application also provides a storage medium that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the system security method described in any one of the foregoing embodiments A step of.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,该计算机程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。A person of ordinary skill in the art may understand that all or part of the processes in the method of the foregoing embodiments may be completed by instructing relevant hardware through a computer program. The computer program may be stored in a computer-readable storage medium, When executed, it may include the processes of the foregoing method embodiments. The aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
应该理解的是,虽然附图的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,附图的流程图中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the steps in the flowchart of the drawings are displayed in order according to the arrows, the steps are not necessarily executed in the order indicated by the arrows. Unless there is a clear description in this article, there is no strict order limitation for the execution of these steps, and they can be executed in other orders. Moreover, at least a part of the steps in the flowchart of the drawings may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but may be executed at different times, and the order of execution is also It is not necessarily carried out sequentially, but may be executed in turn or alternately with at least a part of other steps or sub-steps or stages of other steps.

Claims (20)

  1. 一种系统安全方法,包括下述步骤:A system security method, including the following steps:
    获取显示区域显示画面的画面截图;Get a screenshot of the display screen in the display area;
    将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;Input the screen shot into a preset first neural network model, and obtain a first classification result of the screen shot output by the first neural network model, wherein the first classification result is a representation of the screen shot Of user behavior information;
    将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。Comparing the first classification result with preset behavior planning information, and responding to a user instruction of the user when the first classification result is consistent with the behavior planning information.
  2. 根据权利要求1所述的系统安全方法,所述获取显示区域显示画面的画面截图的步骤之前,还包括下述步骤:According to the system security method of claim 1, before the step of obtaining a screenshot of the display screen of the display area, the method further includes the following steps:
    采集所述用户的人脸图像;Collecting the face image of the user;
    将所述人脸图像和预设的所述用户的证件图像输入到预设的第二神经网络模型中,并获取所述第二神经网络模型输出的第一判断结果,其中,所述第二神经网络模型为训练至收敛状态用于判断图像相似度的神经网络模型;Input the face image and the preset ID image of the user into a preset second neural network model, and obtain a first judgment result output by the second neural network model, wherein the second The neural network model is a neural network model trained to a convergent state for judging the similarity of images;
    当所述第一判断结果表征的内容为所述人脸图像和证件图像不一致时,禁止所述用户的登陆请求。When the content characterized by the first judgment result is that the face image and the certificate image are inconsistent, the user's login request is prohibited.
  3. 根据权利要求2所述的系统安全方法,所述采集所述用户的人脸图像的步骤之后,还包括下述步骤:The system security method according to claim 2, after the step of collecting the user's face image, further comprising the following steps:
    将所述人脸图像输入到预设的第三神经网络模型中,并获取所述第三神经网络模型输出的第二分类结果,其中,所述第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型;Input the face image into a preset third neural network model, and obtain a second classification result output by the third neural network model, wherein the third neural network model is trained to a converged state for Neural network model to judge the deflection direction and deflection angle of face images;
    将所述第二分类结果与预设的指令信息进行比对,当所述第二分类结果与所述指令信息不一致时,禁止所述用户的登陆请求。Comparing the second classification result with preset instruction information, and when the second classification result is inconsistent with the instruction information, prohibiting the user's login request.
  4. 根据权利要求1所述的系统安全方法,所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The system security method according to claim 1, wherein the first classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, responding to the After the steps of the user's instruction, the following steps are also included:
    获取所述用户的用户行为的持续时长;Obtaining the duration of the user's user behavior;
    将所述持续时长与预设的时间阈值进行比对;Compare the duration with a preset time threshold;
    当所述持续时长大于所述时间阈值时,禁止响应所述用户的用户指令。When the duration is greater than the time threshold, it is prohibited to respond to user instructions of the user.
  5. 根据权利要求1所述的系统安全方法,当所述用户行为信息表征的用户行为支付行为时;所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The system security method according to claim 1, when the user behavior payment behavior represented by the user behavior information is compared; the comparison of the first classification result with preset behavior planning information, when the first When the classification result is consistent with the behavior planning information, after the step of responding to the user's user instruction, the following steps are further included:
    识别所述画面截图中的支付金额;Identify the payment amount in the screenshot of the screen;
    将所述支付金额与预设的金额阈值进行比对;Compare the payment amount with a preset amount threshold;
    当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令。When the payment amount is greater than the amount threshold, it is prohibited to respond to the user's user instruction.
  6. 根据权利要求5所述的系统安全方法,The system security method according to claim 5,
    所述当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令的步骤之后,还包括下述步骤:After the step of prohibiting response to the user's user instruction when the payment amount is greater than the amount threshold, the following steps are further included:
    向预设的关联终端发送警示信息,其中,所述警示信息包括是否同意支付的问询信息;Send warning information to a preset associated terminal, where the warning information includes inquiry information about whether to agree to pay;
    接收所述关联终端回复所述警示信息的回复信息;Receiving reply information from the associated terminal replying to the warning information;
    当所述回复信息表征的回复内容为同意支付时,执行所述用户的支付指令。When the reply content represented by the reply information is payment approval, the user's payment instruction is executed.
  7. 根据权利要求6所述的系统安全方法,所述向预设的关联终端发送警示信息的步骤之前,还包括下述步骤:According to the system security method of claim 6, the step of sending warning information to a preset associated terminal further includes the following steps:
    获取所述支付行为使用的支付账号;Obtain the payment account used for the payment;
    根据所述支付账号获取与所述支付账号绑定的支付终端号码;Obtaining the payment terminal number bound to the payment account according to the payment account;
    确定所述支付终端号码表征的终端为所述关联终端。It is determined that the terminal represented by the payment terminal number is the associated terminal.
  8. 一种系统安全装置,包括:A system security device, including:
    获取模块,用于获取显示区域显示画面的画面截图;The acquisition module is used to obtain a screenshot of the display screen in the display area;
    处理模块,用于将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;The processing module is configured to input the screen shot into the preset first neural network model and obtain a first classification result of the screen shot output by the first neural network model, wherein the first classification result is User behavior information represented by the screenshots;
    执行模块,用于将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。The execution module is configured to compare the first classification result with preset behavior planning information, and respond to a user instruction of the user when the first classification result is consistent with the behavior planning information.
  9. 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行一种系统安全方法的下述步骤:A computer device includes a memory and a processor. The memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the processor causes the processor to perform a system security method as described below step:
    获取显示区域显示画面的画面截图;Get a screenshot of the display screen in the display area;
    将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;Input the screen shot into a preset first neural network model, and obtain a first classification result of the screen shot output by the first neural network model, wherein the first classification result is a representation of the screen shot Of user behavior information;
    将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。Comparing the first classification result with preset behavior planning information, and responding to a user instruction of the user when the first classification result is consistent with the behavior planning information.
  10. 根据权利要求9所述的计算机设备,所述获取显示区域显示画面的画面截图的步骤之前,还包括下述步骤:According to the computer device of claim 9, before the step of obtaining a screenshot of the display screen of the display area, the method further comprises the following steps:
    采集所述用户的人脸图像;Collecting the face image of the user;
    将所述人脸图像和预设的所述用户的证件图像输入到预设的第二神经网络模型中,并获取所述第二神经网络模型输出的第一判断结果,其中,所述第二神经网络模型为训练至收敛状态用于判断图像相似度的神经网络模型;Input the face image and the preset ID image of the user into a preset second neural network model, and obtain a first judgment result output by the second neural network model, wherein the second The neural network model is a neural network model trained to a convergent state for judging the similarity of images;
    当所述第一判断结果表征的内容为所述人脸图像和证件图像不一致时,禁止所述用户的登陆请求。When the content characterized by the first judgment result is that the face image and the certificate image are inconsistent, the user's login request is prohibited.
  11. 根据权利要求10所述的计算机设备,所述采集所述用户的人脸图像的步骤之后,还包括下述步骤:The computer device according to claim 10, after the step of collecting the user's face image, further comprising the following steps:
    将所述人脸图像输入到预设的第三神经网络模型中,并获取所述第三神经网络模型输出的第二分类结果,其中,所述第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型;Input the face image into a preset third neural network model and obtain a second classification result output by the third neural network model, wherein the third neural network model is trained to a converged state for Neural network model to judge the deflection direction and deflection angle of face images;
    将所述第二分类结果与预设的指令信息进行比对,当所述第二分类结果与所述指令信息不一致时,禁止所述用户的登陆请求。Comparing the second classification result with preset instruction information, and when the second classification result is inconsistent with the instruction information, prohibiting the user's login request.
  12. 根据权利要求9所述的计算机设备,所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The computer device according to claim 9, wherein the first classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, responding to the user After the steps instructed by the user, the following steps are also included:
    获取所述用户的用户行为的持续时长;Obtaining the duration of the user's user behavior;
    将所述持续时长与预设的时间阈值进行比对;Compare the duration with a preset time threshold;
    当所述持续时长大于所述时间阈值时,禁止响应所述用户的用户指令。When the duration is greater than the time threshold, it is prohibited to respond to user instructions of the user.
  13. 根据权利要求9所述的计算机设备,当所述用户行为信息表征的用户行为支付行为时;所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The computer device according to claim 9, when the user behavior payment behavior represented by the user behavior information is compared; the comparison of the first classification result with preset behavior planning information, when the first classification When the result is consistent with the behavior planning information, after the step of responding to the user's user instruction, the following steps are further included:
    识别所述画面截图中的支付金额;Identify the payment amount in the screenshot of the screen;
    将所述支付金额与预设的金额阈值进行比对;Compare the payment amount with a preset amount threshold;
    当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令。When the payment amount is greater than the amount threshold, it is prohibited to respond to the user's user instruction.
  14. 根据权利要求13所述的计算机设备,所述当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令的步骤之后,还包括下述步骤:The computer device according to claim 13, after the step of prohibiting responding to a user instruction of the user when the payment amount is greater than the amount threshold, further comprising the following steps:
    向预设的关联终端发送警示信息,其中,所述警示信息包括是否同意支付的问询信息;Send warning information to a preset associated terminal, where the warning information includes inquiry information about whether to agree to pay;
    接收所述关联终端回复所述警示信息的回复信息;Receiving reply information from the associated terminal replying to the warning information;
    当所述回复信息表征的回复内容为同意支付时,执行所述用户的支付指令。When the reply content represented by the reply information is payment approval, the user's payment instruction is executed.
  15. 根据权利要求14所述的计算机设备,所述向预设的关联终端发送警示信息的步骤之前,还包括下述步骤:The computer device according to claim 14, before the step of sending warning information to a preset associated terminal, further comprising the following steps:
    获取所述支付行为使用的支付账号;Obtain the payment account used for the payment;
    根据所述支付账号获取与所述支付账号绑定的支付终端号码;Obtaining the payment terminal number bound to the payment account according to the payment account;
    确定所述支付终端号码表征的终端为所述关联终端。It is determined that the terminal represented by the payment terminal number is the associated terminal.
  16. 一种存储有计算机可读指令的非易失性存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行一种系统安全方法的下述步骤:获取显示区域显示画面的画面截图;A non-volatile storage medium storing computer-readable instructions, which when executed by one or more processors, causes the one or more processors to perform the following steps of a system security method: Get a screenshot of the display screen in the display area;
    将所述画面截图输入到预设的第一神经网络模型中,并获取所述第一神经网络模型输出的画面截图的第一分类结果,其中,所述第一分类结果为所述画面截图表征的用户行为信息;Input the screen shot into a preset first neural network model, and obtain a first classification result of the screen shot output by the first neural network model, wherein the first classification result is a representation of the screen shot Of user behavior information;
    将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令。Comparing the first classification result with preset behavior planning information, and responding to a user instruction of the user when the first classification result is consistent with the behavior planning information.
  17. 根据权利要求16所述的非易失性存储介质,所述获取显示区域显示画面的画面截图的步骤之前,还包括下述步骤:According to the non-volatile storage medium of claim 16, before the step of obtaining a screenshot of the display screen of the display area, the method further includes the following steps:
    采集所述用户的人脸图像;Collecting the face image of the user;
    将所述人脸图像和预设的所述用户的证件图像输入到预设的第二神经网络模型中,并获取所述第二神经网络模型输出的第一判断结果,其中,所述第二神经网络模型为训练至收敛状态用于判断图像相似度的神经网络模型;Input the face image and the preset ID image of the user into a preset second neural network model, and obtain a first judgment result output by the second neural network model, wherein the second The neural network model is a neural network model trained to a convergent state for judging the similarity of images;
    当所述第一判断结果表征的内容为所述人脸图像和证件图像不一致时,禁止所述用户的登陆请求。When the content characterized by the first judgment result is that the face image and the certificate image are inconsistent, the user's login request is prohibited.
  18. 根据权利要求17所述的非易失性存储介质,所述采集所述用户的人脸图像的步骤之后,还包括下述步骤:The non-volatile storage medium according to claim 17, after the step of collecting the user's face image, further comprising the following steps:
    将所述人脸图像输入到预设的第三神经网络模型中,并获取所述第三神经网络模型输出的第二分类结果,其中,所述第三神经网络模型为训练至收敛状态用于判断人脸图像偏转方向及偏转角度的神经网络模型;Input the face image into a preset third neural network model, and obtain a second classification result output by the third neural network model, wherein the third neural network model is trained to a converged state for Neural network model to judge the deflection direction and deflection angle of face images;
    将所述第二分类结果与预设的指令信息进行比对,当所述第二分类结果与所述指令信息不一致时,禁止所述用户的登陆请求。Comparing the second classification result with preset instruction information, and when the second classification result is inconsistent with the instruction information, prohibiting the user's login request.
  19. 根据权利要求16所述的非易失性存储介质,所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The non-volatile storage medium according to claim 16, wherein the first classification result is compared with preset behavior planning information, and when the first classification result is consistent with the behavior planning information, After the step of responding to the user instruction of the user, the following steps are further included:
    获取所述用户的用户行为的持续时长;Obtaining the duration of the user's user behavior;
    将所述持续时长与预设的时间阈值进行比对;Compare the duration with a preset time threshold;
    当所述持续时长大于所述时间阈值时,禁止响应所述用户的用户指令。When the duration is greater than the time threshold, it is prohibited to respond to user instructions of the user.
  20. 根据权利要求16所述的非易失性存储介质,当所述用户行为信息表征的用户行为支付行为时;所述将所述第一分类结果与预设的行为规划信息进行比对,当所述第一分类结果与所述行为规划信息一致时,响应所述用户的用户指令的步骤之后,还包括下述步骤:The non-volatile storage medium according to claim 16, when the user behavior payment behavior represented by the user behavior information is compared; the comparing the first classification result with preset behavior planning information, when the When the first classification result is consistent with the behavior planning information, after the step of responding to the user instruction of the user, the method further includes the following steps:
    识别所述画面截图中的支付金额;Identify the payment amount in the screenshot of the screen;
    将所述支付金额与预设的金额阈值进行比对;Compare the payment amount with a preset amount threshold;
    当所述支付金额大于所述金额阈值时,禁止响应所述用户的用户指令。When the payment amount is greater than the amount threshold, it is prohibited to respond to the user's user instruction.
PCT/CN2019/070374 2018-10-15 2019-01-04 System security method and apparatus, computer device, and storage medium WO2020077890A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811198452.XA CN109325335A (en) 2018-10-15 2018-10-15 System safety method, device, computer equipment and storage medium
CN201811198452.X 2018-10-15

Publications (1)

Publication Number Publication Date
WO2020077890A1 true WO2020077890A1 (en) 2020-04-23

Family

ID=65262656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/070374 WO2020077890A1 (en) 2018-10-15 2019-01-04 System security method and apparatus, computer device, and storage medium

Country Status (2)

Country Link
CN (1) CN109325335A (en)
WO (1) WO2020077890A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305049B (en) * 2023-05-11 2023-09-08 深圳市欧度利方科技有限公司 Visual control system and method for tablet personal computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573479A (en) * 2014-12-18 2015-04-29 百度在线网络技术(北京)有限公司 Method and device for use control on user equipment
CN104700231A (en) * 2015-03-27 2015-06-10 福州大学 Desktop screen auditing method based on user behaviors
CN106780048A (en) * 2016-11-28 2017-05-31 中国平安财产保险股份有限公司 A kind of self-service Claims Resolution method of intelligent vehicle insurance, self-service Claims Resolution apparatus and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550876A (en) * 2015-10-30 2016-05-04 东莞酷派软件技术有限公司 Mobile payment monitoring method and system and intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573479A (en) * 2014-12-18 2015-04-29 百度在线网络技术(北京)有限公司 Method and device for use control on user equipment
CN104700231A (en) * 2015-03-27 2015-06-10 福州大学 Desktop screen auditing method based on user behaviors
CN106780048A (en) * 2016-11-28 2017-05-31 中国平安财产保险股份有限公司 A kind of self-service Claims Resolution method of intelligent vehicle insurance, self-service Claims Resolution apparatus and system

Also Published As

Publication number Publication date
CN109325335A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
AU2019202631B2 (en) Toggling biometric authentication
US8881251B1 (en) Electronic authentication using pictures and images
CN104270404B (en) A kind of login method and device based on terminal iidentification
JP6743188B2 (en) Remote contract interview method, electronic device, and computer-readable storage medium
US20180293771A1 (en) Systems and methods for creating, sharing, and performing augmented reality
CN104205721B (en) The adaptive authentication method of context aware and device
US20190236249A1 (en) Systems and methods for authenticating device users through behavioral analysis
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
WO2020034897A1 (en) Methods, apparatuses, storage mediums and terminal devices for authentication
US20090309698A1 (en) Single-Channel Multi-Factor Authentication
US20200293639A1 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
EP3905174A1 (en) Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
US11665153B2 (en) Voice biometric authentication in a virtual assistant
US11755708B2 (en) Methods and systems for facilitating secure authentication of user based on known data
TW201714109A (en) Device, method and computer program product for identity confirmation by video
WO2020228367A1 (en) Mobile payment self-service signing method, device and system
CN109005104A (en) A kind of instant communicating method, device, server and storage medium
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
Goode Digital identity: solving the problem of trust
CN110895602B (en) Identity authentication method and device, electronic equipment and storage medium
WO2020077890A1 (en) System security method and apparatus, computer device, and storage medium
WO2021049234A1 (en) Image analysis device, control method, and program
CN108198305A (en) Airport quick security check method, readable storage medium storing program for executing and quick security check platform
CN110351094B (en) Character verification method, device, computer equipment and storage medium
US11163862B2 (en) Authentication of users based on snapshots thereof taken in corresponding acquisition conditions

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19873973

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 26/07/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19873973

Country of ref document: EP

Kind code of ref document: A1