CN108346191A - Work attendance method, device, computer equipment and storage medium - Google Patents

Work attendance method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108346191A
CN108346191A CN201810119751.3A CN201810119751A CN108346191A CN 108346191 A CN108346191 A CN 108346191A CN 201810119751 A CN201810119751 A CN 201810119751A CN 108346191 A CN108346191 A CN 108346191A
Authority
CN
China
Prior art keywords
attendance
address
information
white lists
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810119751.3A
Other languages
Chinese (zh)
Other versions
CN108346191B (en
Inventor
陈靖东
刘谟春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201810119751.3A priority Critical patent/CN108346191B/en
Publication of CN108346191A publication Critical patent/CN108346191A/en
Application granted granted Critical
Publication of CN108346191B publication Critical patent/CN108346191B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves a kind of Work attendance method, device, computer equipment and storage mediums.The method includes:The attendance information that user terminal is sent is received, attendance information includes user identifier and corresponding attendance facial image and attendance IP address;Corresponding benchmark face image is obtained according to user identifier, the similarity of attendance facial image and benchmark face image is calculated, is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;Whether attendance IP address is really verified according to preset rules;When similarity reaches threshold value, and attendance IP address is true and when belonging to IP white lists, and the successful checking-in result of attendance is back to user terminal.Attendance cost can be lowered using this method, improve attendance efficiency.

Description

Work attendance method, device, computer equipment and storage medium
Technical field
This application involves fields of communication technology, are situated between more particularly to a kind of Work attendance method, device, computer equipment and storage Matter.
Background technology
Enterprise is rigid demand to staff attendance, at present majority enterprises use Work attendance method be using fingerprint attendance machine, The dedicated Work attendance device such as face recognition attendance recorder or radio frequency attendance card carries out attendance.But above-mentioned Work attendance method needs user to arrive Up to progress attendance in place's where Work attendance device, attendance efficiency is low, when unit personnel is more, be susceptible to concentration check card cause it is crowded The case where.Traditional approach to solve the above-mentioned problems, can only add more Work attendance devices, but this mode is not only increased and examined Diligent cost can also carry out checking-in result statistics to enterprise and bring inconvenience, final to influence attendance efficiency.
Invention content
Based on this, it is necessary to which in view of the above technical problems, attendance cost can be lowered but also improve attendance effect by providing one kind Work attendance method, device, computer equipment and the storage medium of rate.
A kind of Work attendance method, the method includes:
The attendance information that user terminal is sent is received, the attendance information includes user identifier and corresponding attendance face Image and attendance IP address;Corresponding benchmark face image is obtained according to the user identifier, calculates the attendance facial image With the similarity of the benchmark face image, verified to whether the similarity reaches threshold value;Obtain the white names of preset IP Single, the IP white lists include multiple IP address;It is verified to whether the attendance IP address belongs to the IP white lists;It presses Whether the attendance IP address is really verified according to preset rules;When the similarity reaches threshold value, and the attendance IP Address is true and when belonging to the IP white lists, the successful checking-in result of attendance is back to the user terminal.
A kind of Work attendance method, the method includes:
Attendance request is obtained, according to the attendance acquisition request attendance information;The attendance information include user identifier with And corresponding attendance facial image and attendance IP address;The attendance information is sent to attendance server;The attendance is set to take Business device obtains corresponding benchmark face image according to the user identifier, the benchmark for calculating the attendance facial image and getting The similarity of facial image is verified to whether the similarity reaches threshold value;Preset IP white lists are obtained, the IP is white List includes multiple IP address;It is whether true to the attendance IP address according to preset rules, and whether to belong to the IP white List is verified;When the similarity reaches threshold value, and the attendance IP address information is true and belongs to the IP white lists When, generate the successful checking-in result of attendance;The checking-in result that the attendance server returns is received, the checking-in result is carried out Displaying.
A kind of Work attendance device, described device include:
Attendance information parsing module, the attendance information for receiving user terminal transmission, the attendance information includes user Mark and corresponding attendance facial image and attendance IP address;
Attendance information correction verification module, for obtaining corresponding benchmark face image according to the user identifier, described in calculating The similarity of attendance facial image and the benchmark face image is verified to whether the similarity reaches threshold value;It obtains Preset IP white lists, the IP white lists include multiple IP address;Whether the white names of the IP are belonged to the attendance IP address Singly verified;Whether the attendance IP address is really verified according to preset rules;
Checking-in result feedback module reaches threshold value for working as the similarity, and the attendance IP address is true and belongs to When the IP white lists, the successful checking-in result of attendance is back to the user terminal.
A kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor The step of computer program, the processor realizes any of the above-described method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of any of the above-described method is realized when row.
Above-mentioned Work attendance method, device, computer equipment and storage medium, user use user terminal typing attendance information, It can will be sent to attendance service comprising user identifier and the attendance information of corresponding attendance facial image and attendance IP address Device;Attendance server can obtain corresponding benchmark face image according to user identifier, calculate attendance facial image and benchmark people The similarity of face image is verified to whether similarity reaches threshold value;Attendance server has prestored IP white lists, white according to IP Whether list can belong to IP white lists to attendance IP address verifies;According to preset rules can to attendance IP address whether It is forged and is verified;The only attendance when similarity reaches threshold value, and attendance IP address information is not forged and belongs to IP white lists Success;It can not only be reduced since user can directly use user terminal to carry out attendance without adding dedicated Work attendance device Attendance cost can also realize contactless wireless attendance, avoid concentrating crowded situation of checking card, so as to improve attendance Efficiency;Facial image and IP address are combined as attendance foundation, and the true and false information of attendance IP address is verified, is passed through Above-mentioned multi-layer verification can improve the accuracy of checking-in result.
Description of the drawings
Fig. 1 is the application scenario diagram of Work attendance method in one embodiment;
Fig. 2 is the flow diagram of Work attendance method in one embodiment;
Fig. 3 is the flow diagram of Work attendance method in another embodiment;
Fig. 4 is the structure diagram of Work attendance device in one embodiment;
Fig. 5 is the structure diagram of Work attendance device in another embodiment;
Fig. 6 is the internal structure chart of one embodiment Computer equipment;
Fig. 7 is the internal structure chart of another embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Work attendance method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, user terminal 102 It is communicated by network with attendance server 104 by network.Wherein, user terminal 102 can be, but not limited to be various People's computer, laptop, smart mobile phone, tablet computer and portable wearable device, attendance server 104 can be used only The server clusters of the either multiple servers compositions of vertical server is realized.It has been run on user terminal 102 and has been used for attendance APP (Application, application program).User terminal 102 has pre-installed plug-in unit SDK (Software in attendance APP Development Kit, Software Development Kit).IP (Internet have been prestored in attendance server 104 Protocol, procotol) white list.IP white lists include multiple IP address.Attendance server 104 is to the IP of IP white lists Location is updated into Mobile state.
When user needs to carry out attendance, attendance APP can be started in user terminal 102, pass through attendance APP typing attendances Information.Specifically, user logs in attendance APP using pre-registered attendance account in user terminal 102, adopted using attendance APP The attendance facial image for collecting user is used the attendance IP address of user using the plug-in unit SDK in attendance APP, by attendance account, examined Diligent facial image and attendance IP address are sent to attendance server 104 as attendance information.Attendance server 104 is according to default rule Then attendance information is verified.Specifically, attendance server 104 obtains corresponding benchmark face image according to attendance account, The similarity for calculating attendance facial image and benchmark face image, verifies to whether similarity reaches threshold value.Attendance service Device 104 obtains preset IP white lists, is verified to whether attendance IP address belongs to IP white lists.Attendance server 104 is pressed It is verified according to preset rules to whether attendance IP address is forged.It is corresponded to for example, attendance server 104 obtains attendance IP address Network delay, according to network delay identify attendance IP address whether be forged.In another embodiment, attendance APP is also sharp The corresponding location information of attendance IP address is obtained with plug-in unit SDK, attendance server 104 identifies attendance IP address according to location information Whether it is forged.When the similarity of attendance facial image and benchmark face image reaches threshold value, attendance IP address be not forged and When belonging to IP white lists, indicate checking-in result for attendance success;Conversely, indicating that checking-in result fails for attendance.Attendance server Checking-in result is back to user terminal 102 by 104 to be shown.Above-mentioned entire attendance process, user are whole using the user of oneself End carries out attendance can not only reduce attendance cost without adding dedicated Work attendance device, can also realize contactless nothing Line attendance avoids concentrating crowded situation of checking card, so as to improve attendance efficiency;Facial image and IP address are combined as Attendance foundation, and the true and false information of attendance IP address is verified, the accuracy of checking-in result can be improved.
In one embodiment, as shown in Fig. 2, providing a kind of Work attendance method, in this way applied to the attendance in Fig. 1 It illustrates, includes the following steps for server:
Step 202, the attendance information that user terminal is sent is received, attendance information includes user identifier and corresponding attendance Facial image and attendance IP address.
When user needs to carry out attendance, attendance can be carried out by the attendance APP on user terminal.Specifically, user Start attendance APP in user terminal, in the information such as attendance APP typing attendance accounts and password.User terminal by attendance account and Password is sent to attendance server and is verified.When the verification result for receiving the return of attendance server is to be verified, examine Diligent APP shows the attendance page.The attendance page includes attendance button, such as human face scanning button.User can lead in user terminal It crosses the attendance button clicked in attendance APP and initiates attendance request.Attendance APP asks progress facial image to be adopted according to the attendance of user Collection.Specifically, attendance APP is asked according to the attendance of user, man face image acquiring frame and facial image are shown in the attendance page Acquire prompt message.User can according to man face image acquiring information man face image acquiring frame typing facial image (hereinafter referred to as " attendance facial image ").When the success of attendance man face image acquiring, attendance APP shows that information collection is successful in the attendance page Prompt message.
In another embodiment, in order to avoid user carries out attendance cheating using still image, attendance face is being carried out Before Image Acquisition, user needs to carry out certain human face action in man face image acquiring frame, to improve the standard of attendance facial image True property.Specifically, attendance APP is asked according to the attendance of user, show that man face image acquiring frame and face are dynamic in the attendance page Make prompt message.User the actions such as can shake the head, blink or open one's mouth according to human face action information in man face image acquiring frame. User terminal whether there is the human face action information of user according to preset time frequency detecting man face image acquiring frame, work as presence When, the acquisition of attendance facial image is carried out in the manner described above.
Attendance APP is acquired the corresponding end message of user terminal using the plug-in unit SDK of pre-installation.Terminating packet Include IP address (hereinafter referred to as " attendance IP address ") and the location information etc. of user terminal.Wherein, location information can be user's end GPS (Global Positioning System, the global positioning system) location information at end.It is readily appreciated that, end message may be used also To include hardware identification code, IMEI (International Mobile Equipment Identity, international mobile device body Part code) etc., this is not restricted.
Attendance account can be used as user identifier, be used for one user of unique mark.It is readily appreciated that, user identifier can be with It is ID card No., cell-phone number or the employee number etc. of attendance account relating, this is not restricted.When attendance man face image acquiring at When work(, user terminal is using collected user identifier and corresponding attendance facial image and attendance IP address as attendance information It is sent to attendance server.
Step 204, corresponding benchmark face image is obtained according to user identifier, calculates attendance facial image and benchmark face The similarity of image is verified to whether similarity reaches threshold value.
Attendance server has prestored multiple user identifiers and corresponding benchmark face image.Attendance facial image is corresponding Picture size picture size corresponding with benchmark face image may be the same or different, and be examined to provided in this embodiment There is no limit for size of the diligent method to the user terminal for attendance.When receiving the attendance information of user terminal transmission, examine Diligent server obtains corresponding benchmark face image according to the user identifier in attendance information, calculates attendance facial image and benchmark The similarity of facial image.Specifically.Attendance server by attendance facial image and benchmark face compression of images to identical size, Make compressed two facial images that there is the pixel of identical quantity, as (pixels per inch, pixel are every by 32*32PPI Inch).Attendance server generates corresponding face figure using the pixel value of multiple pixels in each facial image as matrix element As corresponding picture element matrix.For a kind of icon of RGB color pattern (color standard), the pixel value of corresponding each pixel Including red (R), green (G), the corresponding R values of blue (B) three Color Channels, G values and B values.
Attendance server according to the corresponding gray value of calculated for pixel values respective pixel point of each pixel in facial image, Using the gray value of multiple pixels in the facial image as matrix element, the corresponding gray matrix of corresponding facial image is generated. Each corresponding gray value of pixel can be the average value of the pixel value of the pixel, i.e. the corresponding R values of three Color Channels, The average value of G values and B values corresponds to coloured image to which the corresponding picture element matrix of facial image is converted to gray matrix Matrix conversion be the corresponding matrix of black white image, it is possible to reduce attendance server calculation amount.
Attendance server calculates the corresponding gray average of the icon according to the gray value of multiple pixels in facial image.Ash Spend the average value that mean value is whole pixel corresponding grey scale values in the corresponding gray matrix of facial image.Attendance server is according to ash Degree mean value is replaced multiple gray values in corresponding grey scale matrix, obtains the corresponding objective matrix of corresponding facial image.Tool Body, attendance server traverses each matrix element in gray matrix, if the corresponding gray value of matrix element is greater than or equal to The corresponding gray value of the matrix element is then set to first object value by gray average;Otherwise, by the corresponding gray scale of the matrix element Value is set to the second desired value, to obtain the corresponding objective matrix of facial image.
Attendance server carries out default patrol to the objective matrix of attendance facial image and the objective matrix of benchmark face image Operation is collected, similarity matrix is obtained.Logic of propositions operation includes XOR operation.Specifically, attendance server is to attendance face figure The objective matrix of picture carries out XOR operation with each matrix element in the objective matrix of benchmark face image.If attendance facial image Objective matrix and benchmark face image objective matrix in, the corresponding gray value phase of matrix element on same matrix coordinate Together, then attendance server is added to the first similar value as the matrix element on same matrix coordinate in similarity matrix;It is no Then, it is added to the second similar value as the matrix element on same matrix coordinate in similarity matrix.Attendance server is to phase It is traversed like degree matrix, the quantity of the first similar value in similarity matrix is calculated, according to the first similar value in similarity matrix Quantity calculate two facial images similarity.
In a specific embodiment, when in gray matrix the corresponding gray value of matrix element be greater than or equal to gray scale it is equal When value, the corresponding gray value of the matrix element is set to 1 by attendance server;Otherwise, the corresponding gray value of the matrix element is set It is 0, using 01 obtained matrix as the corresponding objective matrix of facial image.01 matrix of the attendance server to attendance facial image Exclusive or calculating is carried out with 01 matrix of benchmark face image, using 01 obtained matrix as the corresponding similarity of two facial images Matrix.Attendance server traverses similarity matrix, and two facial images are determined according in similarity matrix 1 quantity Similarity.Similar threshold value can be that demand is freely arranged, such as 9.
The present embodiment calculates the similarity of attendance facial image and benchmark face image, it is only necessary to simply XOR operation and limited Secondary traversal can be calculated, and the complicated image processing process calculation amount of tradition relatively is small, it is possible to reduce to attendance server meter The occupancy for calculating resource, can also improve attendance efficiency.
Step 206, preset IP white lists are obtained, IP white lists include multiple IP address;Whether attendance IP address is belonged to It is verified in IP white lists.
IP white lists have been prestored in attendance server.IP white lists include multiple IP address.IP in IP white lists Address can be that attendance server dynamic acquisition obtains.Specifically, IP white lists have recorded multiple department's marks, and it is each Department identifies corresponding user identifier and IP address, and in other words, IP white lists have recorded IP address of multiple departments for attendance. The IP address can be one, can also be multiple;The IP address can be IP address of internal network, can also be outer net IP address.
Step 208, whether attendance IP address is really verified according to preset rules.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;According to preset rules pair The step of whether attendance IP address is really verified include:According to the multiple departments mark and each department's mark pair to prestore The user identifier and target position information answered determine that the user identifier in attendance information corresponds to the target location letter of department's mark Breath;According to location information and target position information, the distance difference of user terminal corresponding position and target location is calculated;Comparison Whether distance difference is more than preset error range;When distance difference is less than preset error range, with indicating attendance IP Location verification passes through.
The attendance information that user terminal is sent further includes the corresponding location information of attendance IP address.It prestores in attendance server IP white lists in be also recorded for each department and identify corresponding target position information.It should be noted that the IP address corresponds to Target location be not necessarily fixed position in workplace, can also be the temporary position in workplace, can be with right and wrong workplace In designated position.For example, when employee needs that other branch companies is gone to go on business, can complete to examine in other branch companies It is diligent;Or when business personnel needs that specified client's shelter is gone to access, attendance can be completed in specified client's shelter.
Attendance server identifies corresponding user identifier and target according to the multiple departments mark and each department that prestore Location information determines the target position information of the user identifier affiliated function in attendance information.Attendance server is believed according to positioning Breath and target position information calculate the distance difference of user terminal corresponding position and target location.Whether compare distance difference More than preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.Hold Readily understood, attendance server is added to IP white lists IP address when can also be updated in the manner described above to dynamic realtime carries out Legitimacy verifies improve the reliability of IP white lists.The corresponding position of user terminal is to attendance IP when the present embodiment passes through attendance The true or false of address is confirmed, can prevent IP address attendance from practising fraud, and improves checking-in result accuracy.
Step 210, when similarity reaches threshold value, and attendance IP address is true and when belonging to IP white lists, by attendance success Checking-in result be back to user terminal.
Attendance server to attendance information carry out multi-layer verification, only when multi-layer verification respectively by when, indicate to examine Diligent result is attendance success.In other words, when the similarity of attendance facial image and benchmark face image reaches threshold value, attendance IP Location is not true and when belonging to IP white lists, checking-in result is attendance success;Conversely, checking-in result fails for attendance.
In another embodiment, in order to reduce the occupancy to attendance server resource, verification can not be had to by setting The priority level of condition is realized no longer carries out other verifications after a kind of verification failure of verification condition.For example, working as attendance IP address When being not belonging to IP white lists, then whether threshold value is no longer reached to the similarity of attendance facial image and benchmark face image, and Whether attendance IP address is really verified.
In the present embodiment, user uses user terminal typing attendance information, can will include user identifier and corresponding The attendance information of attendance facial image and attendance IP address is sent to attendance server;Attendance server can be according to user identifier Corresponding benchmark face image is obtained, the similarity of attendance facial image and benchmark face image is calculated, whether similarity is reached It is verified to threshold value;Whether attendance server has prestored IP white lists, can be belonged to attendance IP address according to IP white lists IP white lists are verified;Whether attendance IP address can really be verified according to preset rules;Only when similarity reaches Threshold value, attendance IP address information is not true and attendance success when belonging to IP white lists;Since user can directly use user whole End carries out attendance can not only reduce attendance cost without adding dedicated Work attendance device, can also realize contactless nothing Line attendance avoids concentrating crowded situation of checking card, so as to improve attendance efficiency;Facial image and IP address are combined as Attendance foundation, and the true and false information of attendance IP address is verified, checking-in result can be improved by the verification of above-mentioned multi-layer Accuracy.
In one embodiment, the attendance information that user terminal is sent is received;Attendance information includes user identifier and right The step of attendance facial image and attendance IP address for answering includes:Receive user terminal transmission obscures encrypted attendance information, It includes obscuring character string to obscure encrypted attendance information;The corresponding binary numeral of character string is obscured in calculating;According to preset rules The corresponding salt figure of character string is obscured in generation, calculates the corresponding binary numeral of salt figure;By to obscure character string corresponding two into The corresponding binary numeral of numerical value and salt figure processed carries out logic of propositions operation, is decrypted to attendance information, obtains user identifier And corresponding attendance facial image and attendance IP address.
In order to improve the safety of attendance information, user terminal can be encrypted attendance information using plug-in unit SDK.Add Close mode has very much, such as DES (Data Encryption Standard, data encryption standards) symmetric cryptography, salt figure encryption Deng.It will be described so that salt figure is encrypted as an example below.
Attendance information includes multiple fields, such as attendance account, attendance time, attendance IP address or location information, according to Field can be divided into generic field and sensitive field by the importance of field corresponding data information.For example, in the example above, Attendance account, attendance IP address can be sensitive fields;Attendance time, location information can be generic fields.
Salt figure encryption is that the sensitive field showed in attendance information is associated with a n random sequences, and the n random sequence is For " salt figure ".In traditional salt figure cipher mode, sensitive field is converted to readable character string using systems approach.But it uses Systems approach is difficult to ensure that character string converts success rate, once convert failed, then need replacing salt figure, reduces encryption efficiency.More Importantly, when character string convert failed, the problem of sensitive associated salt figure of field is faced with storage, if by salt figure with bright The mode of text, which is built in attendance information, is then unfavorable for cipher round results, and the safety of sensitive field is not still high.
To solve the above-mentioned problems, user terminal obtains the sensitive field in attendance information, dynamic generation sensitivity field pair The salt figure answered is obscured character string according to sensitive field and corresponding salt figure generation, is added to sensitive field using character string is obscured It is close.Specifically, user terminal converts sensitive field to binary numeral.Custom terminal obtains attendance information according to preset rules One or more of field, the multiple fields got are spliced, random string is obtained, to random string carry out Hash conversion generates the corresponding salt figure of sensitivity field.User terminal converts the corresponding salt figure of sensitive field to binary numeral, The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are encrypted respectively, to encrypted sensitive words The corresponding binary numeral of section and the corresponding binary numeral of salt figure carry out logic of propositions operation, obtain object binary numerical value. Logic of propositions operation includes XOR operation.User terminal converts object binary numerical value to hexadecimal values, by this 16 Binary value conduct is obscured character string and is replaced to sensitive field.By obscuring for the data information comprising sensitive field and salt figure Character string is built in attendance information, can be solved sensitive field and be corresponded to the storage problem of salt figure, and obscure the acquisition of character string Simple system conversion is only needed, character string convert failed can be solved the problems, such as, so as to improve the encryption to attendance information Efficiency.
User terminal will obscure encrypted attendance information and be sent to attendance server.Attendance server obtains data attendance Obscure character string in information, be decrypted to obscuring character string, character string will be obscured and be reduced to sensitive field.Specifically, examining Character string of obscuring in attendance information is converted to binary numeral by diligent server.Attendance server generates mixed in the manner described above The corresponding salt figure of character string of confusing obtains multiple fields in attendance information, the multiple fields that will be got according to preset rules Spliced, obtain random string, hash conversion is carried out to random string, the corresponding salt figure of character string is obscured in generation.By In being generated using the field in attendance information according to preset rules, to obscure the salt figure generated when character string decryption with to quick It is identical to feel the salt figure generated when field encryption.Attendance server will obscure the corresponding salt figure of character string and be converted into binary numeral, Logic of propositions operation is carried out to obscuring the corresponding binary numeral of character string and the corresponding binary numeral of salt figure, obtains target two Binary value.Logic of propositions operation includes XOR operation.Attendance server converts object binary numerical value to hexadecimal number Value.It is appreciated that the hexadecimal values are sensitive field.
In the present embodiment, the acquisition of sensitive field only needs simple system to convert, it is possible to reduce attendance server calculates money The occupancy in source can also improve the decryption efficiency to obscuring character string.
In one embodiment, before the step of obtaining preset IP white lists, further include:When according to preset first Between frequency the IP address that frequency of usage reaches first threshold is acquired in attendance data library, utilize collected IP address build IP White list;Attendance record is obtained, acquire the attendance frequency that fails in attendance record according to preset second temporal frequency reaches the The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By with detecting IP Whether location is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will not when verifying failure The IP address being used continuously is deleted from IP white lists.
Initial IP white lists can be that attendance server collects in attendance data library.Specifically, attendance takes Device of being engaged in acquires in attendance data library the IP address that frequency of usage reaches first threshold according to preset first time frequency.Attendance Database can be the database for recording attendance data in traditional attendance mode, to Work attendance method provided in this embodiment It can be very good to dock with traditional Work attendance method, realize that IP white lists automatically create.First time frequency can be one day or one Week etc., the corresponding first threshold of different departments can be different.For example, attendance server can collect each department's use time daily Number is more than the IP address of corresponding first threshold, or collects each department most IP of access times within a preset period of time weekly Address.It is readily appreciated that, other modes can also be acquired for the acquisition mode of IP address, as related personnel matches specified IP address It sets and is added to IP white lists, this is not restricted.The IP address that the present embodiment only frequency of usage reaches first threshold can just add IP white lists are added to, IP white lists can be just added to also just define that only number of users reaches a certain number of IP address As attendance, an individual IP address can't be added into IP white lists, can avoid the IP that will be forged to a certain extent Address is added to IP white lists, can be very good to prevent attendance from practising fraud.
After the establishment for completing initial IP white lists, attendance server can carry out attendance using the IP white lists, and Dynamic realtime update is carried out to IP white lists during attendance.Specifically, attendance server is according to frequency of preset second time Rate acquires the attendance failure frequency in attendance record and reaches the IP address of second threshold wherein, and attendance record refers to the second time frequency The checking-in result of rate corresponding period (hereinafter referred to as " attendance period ") interior different user.Wherein, the attendance period can be each Morning 7 legal workday:00~9:00, evening 5:00~6:00 etc..Attendance record includes the IP used when attendance time, attendance Address and checking-in result.When attendance server detects the presence of the IP that the attendance failure frequency reaches second threshold in the attendance period The IP address is then added to IP white lists by address automatically.For example, if some department has more than the second threshold in some attendance period The user for being worth quantity is failed using the same IP address attendance, in other words, use time of the IP address in some attendance period Number is more than second threshold, but checking-in result is attendance failure, then it represents that the IP address may be the department with carrying out normal IP What location changed.
Due to the identical wireless network of department's generally use similar in geographical location, so as to use identical IP address Attendance is carried out, in other words, the same IP address is possibly used for the attendance of different departments.In order to improve the update effect of IP table name lists Rate, when being updated to the corresponding IP address of some department, attendance server carries out the corresponding IP address of adjacent department same Step update, to allow department similar in geographical location to share IP white lists.
For the workplace network of attendance, there are unstability, and corresponding IP address is nor unalterable.IP white lists It is mainly obtained by attendance server automatic collection approach, is divided into timing acquiring and dynamic realtime update two ways obtains Each department is used for the IP address of attendance.When workplace, network changes, attendance server can automatically meet in real time Corresponding IP address is added in IP white lists after certain condition, it is ensured that will not occur different because of normal workplace network change Often.In fact, present embodiments providing a kind of IP white lists construction method, attendance server loses attendance in each attendance period It loses the frequency and reaches the IP address of second threshold and be automatically added to IP white lists, it can be to avoid the normal IP address transition of department to examining Frequently impact.
In order to improve the accuracy of IP white lists, attendance server adds in IP white list dynamic realtime renewal processes Accuracy to the IP address of IP white lists is verified.Specifically, attendance server can by detect IP address whether by Continuous use, verifies the legitimacy of IP address.Attendance server can also according to the corresponding user identifier of IP address and Location information verifies the legitimacy of IP address.Specifically, attendance server is inquired according to user identifier belonging to the user The target position information of department matches the corresponding location information of newly added IP address with target position information, according to Matching result judges the legitimacy for being dynamically added to the IP address of IP white lists.It should be noted that this programme is will first to meet The IP address of above-mentioned update condition is dynamically added to IP white lists, then carries out legitimacy verifies to IP address.It is readily appreciated that, attendance Server can also advanced legitimacy verifies be added or delete further according to check results, it is without limitation.
In the present embodiment, attendance server automatically creates IP white lists, and according to attendance record to IP white lists into action State real-time update can impact attendance to avoid the normal IP address transition of department;To being added to the IP of IP white lists Location is verified, and can improve the reliability of IP white lists, and then can improve the accuracy of checking-in result.
In one embodiment, attendance information further includes the process operation information on user terminal, and method further includes:According to Whether process has run virtual ip address software in attendance into row information, identification user terminal;It is examined according to recognition result measuring and calculating The corresponding attendance of diligent information is practised fraud value-at-risk;When attendance cheating value-at-risk is more than preset target risk value, attendance letter is generated The prompt message re-typed is ceased, information is will be prompted to and is sent to the user terminal.
When user is when user terminal carries out attendance, attendance APP can also utilize plug-in unit SDK to acquire user on user terminal Process operation information in terminal, to which attendance information further includes carrying out operation information.Specifically, attendance APP utilizes plug-in unit SDK During attendance APP operations, the process operation information on user terminal is acquired.Process operation information includes being currently running Number of processes, process title, process description, EMS memory occupation etc..Attendance server may determine that use according to process operation information Whether family terminal has run virtual ip address software when carrying out attendance, and then is carried out to the attendance of attendance IP address cheating risk Estimation.Virtual ip address software includes that can generate the application program of virtual ip address, virtual wi-fi etc. or can carry out virtual In other words the application program of positioning, including can distort the application program of real IP address or true location information.If user is whole End has run virtual ip address software when carrying out attendance, and attendance server can be according to the class of the virtual ip address software of operation Type, quantity and EMS memory occupation situation etc. calculate the corresponding attendance cheating value-at-risk of attendance information.When attendance cheating value-at-risk is super When crossing preset target risk value, indicate that this attendance information is with a low credibility, attendance server generates attendance information and re-types Prompt message, will be prompted to information and be sent to the user terminal.
In the present embodiment, the process on user terminal is run using preset plug-in SDK when user terminal carries out attendance Information carries out detecting/monitoring;It may determine that user terminal when carrying out attendance with whether having run virtual IP address according to process operation information Location software, and then judge attendance cheating risk, when attendance cheating risk is higher, prompt user to re-start attendance, raising is examined Diligent result accuracy.
In one embodiment, as shown in figure 3, providing a kind of Work attendance method, in this way applied to the user in Fig. 1 It illustrates, includes the following steps for terminal:
Step 302, attendance request is obtained, according to attendance acquisition request attendance information;Attendance information include user identifier with And corresponding attendance facial image and attendance IP address.
Step 304, attendance information is sent to attendance server;Attendance server is set to be obtained according to user identifier corresponding Whether benchmark face image calculates the similarity of attendance facial image and the benchmark face image got, reaches to similarity Threshold value is verified;Preset IP white lists are obtained, IP white lists include multiple IP address;To attendance IP according to preset rules Whether location is true, and whether belongs to IP white lists and verified;When similarity reaches threshold value, and attendance IP address information is true And when belonging to IP white lists, the successful checking-in result of attendance is generated.
Step 306, the checking-in result that attendance server returns is received, checking-in result is shown.
In one embodiment, the step of attendance information being sent to attendance server include:It obtains in attendance information Sensitive field calculates the corresponding binary numeral of sensitivity field;The corresponding salt figure of sensitivity field is generated according to preset rules, is calculated The corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are preset Logical operation obtains obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out Obscure encryption, encrypted attendance information will be obscured and be sent to attendance server.
User terminal obtains the sensitive field in attendance information, the corresponding salt figure of dynamic generation sensitivity field, according to sensitivity Character string is obscured in field and corresponding salt figure generation, and sensitive field is encrypted using character string is obscured.Specifically, user terminal Convert sensitive field to binary numeral.Custom terminal obtains one or more of attendance information word according to preset rules Section, the multiple fields got are spliced, random string is obtained, and are carried out hash conversion to random string, are generated quick Feel the corresponding salt figure of field.User terminal converts the corresponding salt figure of sensitive field to binary numeral, is corresponded to sensitive field Binary numeral and the corresponding binary numeral of salt figure be encrypted respectively, binary system corresponding to encrypted sensitive field Numerical value and the corresponding binary numeral of salt figure carry out logic of propositions operation, obtain object binary numerical value.Logic of propositions operation packet Include XOR operation.User terminal converts object binary numerical value to hexadecimal values, using the hexadecimal values as mixed Character string of confusing is replaced sensitive field.The character string of obscuring of data information comprising sensitive field and salt figure is built in and examines In diligent information, sensitive field can be solved and correspond to the storage problem of salt figure, and the acquisition for obscuring character string only needs simple system Conversion, can solve the problems, such as character string convert failed, so as to improve the encryption efficiency to attendance information.
In the present embodiment, attendance information is encrypted, the safety of attendance information can be improved.Obscure ciphering process profit Salt figure is generated with multiple fields dynamic in attendance information, it is possible to reduce the risk that salt figure is compromised.To include sensitive field and The character string of obscuring of the data information of salt figure is built in attendance information, can solve sensitive field and correspond to the storage of salt figure to ask Topic.Obscuring the acquisition of character string only needs simple system to convert, and can solve the problems, such as character string convert failed, and then can carry Encryption efficiency of the height to sensitive field.
It should be understood that although each step in the flow chart of Fig. 2 or Fig. 3 is shown successively according to the instruction of arrow, But these steps are not the inevitable sequence indicated according to arrow to be executed successively.Unless expressly state otherwise herein, these There is no stringent sequences to limit for the execution of step, these steps can execute in other order.Moreover, in Fig. 2 or Fig. 3 At least part step may include that either these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps One moment executed completion, but can execute at different times, and the execution in these sub-steps or stage sequence is also not necessarily Be carry out successively, but can with other steps either the sub-step of other steps or at least part in stage in turn or Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of Work attendance device, including:Attendance information parsing module 402, Attendance information correction verification module 404 and checking-in result feedback module 406, wherein:
Attendance information parsing module 402, the attendance information for receiving user terminal transmission, attendance information include user's mark Knowledge and corresponding attendance facial image and attendance IP address;
Attendance information correction verification module 404 calculates attendance people for obtaining corresponding benchmark face image according to user identifier The similarity of face image and benchmark face image is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;According to preset rules to examining Whether diligent IP address is really verified;
Checking-in result feedback module 406 reaches threshold value for working as similarity, and attendance IP address is true and belongs to the white names of IP The successful checking-in result of attendance is back to user terminal by Dan Shi.
In one embodiment, attendance information parsing module 402 includes information receiving module 4022 and information deciphering module 4024.Information receiving module 4022 be used for receive user terminal transmission obscure encrypted attendance information, obscure encrypted attendance Information includes obscuring character string;The corresponding binary numeral of character string is obscured in the calculating of information deciphering module 4024;According to default rule It then generates and obscures the corresponding salt figure of character string, calculate the corresponding binary numeral of salt figure;By to obscuring character string corresponding two Binary value and the corresponding binary numeral of salt figure carry out logic of propositions operation, and attendance information is decrypted, and obtain user's mark Knowledge and corresponding attendance facial image and attendance IP address.
In one embodiment, which further includes IP white lists structure module 408, for according to preset first Temporal frequency acquires the IP address that frequency of usage reaches first threshold in attendance data library, is built using collected IP address IP white lists;Attendance record is obtained, the attendance failure frequency is acquired in attendance record according to preset second temporal frequency reaches The IP address of second threshold, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By detecting IP Whether address is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will when verifying failure The IP address not being used continuously is deleted from IP white lists.
In one embodiment, attendance information correction verification module 404 is additionally operable to according to multiple departments mark for prestoring and every A department identifies corresponding user identifier and target position information, determines that the user identifier in attendance information corresponds to department's mark Target position information;According to location information and target position information, calculate the corresponding position of user terminal and target location away from Deviation value;Compare whether distance difference is more than preset error range;When distance difference is less than preset error range, table Show that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal.The Work attendance device also wraps Attendance cheating risk evaluation module 410 is included, for, into row information, whether identification user terminal to run in attendance according to process Virtual ip address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk When more than preset target risk value, the prompt message that attendance information re-types is generated, information is will be prompted to and is sent to user's end End.
In one embodiment, as shown in figure 5, providing a kind of Work attendance device, including:Attendance information recording module 502, Attendance information transmission module 504 and checking-in result display module 506, wherein:
Attendance information recording module 502, for obtaining attendance request, according to attendance acquisition request attendance information;Attendance is believed Breath includes user identifier and corresponding attendance facial image and attendance IP address;
Attendance information transmission module 504, for attendance information to be sent to attendance server;Make attendance server according to Family mark obtains corresponding benchmark face image, calculates the similarity of attendance facial image and the benchmark face image got, It is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include multiple IP address;According to pre- If whether rule is true to attendance IP address, and whether belongs to IP white lists and verified;When similarity reaches threshold value, and examine Diligent IP address information is true and when belonging to IP white lists, generates the successful checking-in result of attendance;
Checking-in result display module 506, the checking-in result for receiving the return of attendance server, opens up checking-in result Show.
In one embodiment, attendance information transmission module 504 is additionally operable to obtain the sensitive field in attendance information, calculates The corresponding binary numeral of sensitive field;The corresponding salt figure of sensitivity field is generated according to preset rules, calculates salt figure corresponding two Binary value;Logic of propositions operation is carried out to the corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure, is obtained To obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out to obscure encryption, it will Obscure encrypted attendance information and is sent to attendance server.
Specific about Work attendance device limits the restriction that may refer to above for Work attendance method, and details are not described herein. Modules in above-mentioned Work attendance device can be realized fully or partially through software, hardware and combinations thereof.Above-mentioned each module can It is embedded in the form of hardware or independently of in the processor in computer equipment, computer can also be stored in a software form and set In memory in standby, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include the processor connected by system bus, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing IP white lists.The network interface of the computer equipment is used to pass through network with external terminal Connection communication.To realize a kind of Work attendance method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize following steps when executing computer program:It is whole to receive user The attendance information sent is held, attendance information includes user identifier and corresponding attendance facial image and attendance IP address;According to User identifier obtains corresponding benchmark face image, the similarity of attendance facial image and benchmark face image is calculated, to similar Whether degree, which reaches threshold value, is verified;Preset IP white lists are obtained, IP white lists include multiple IP address;To attendance IP address Whether belong to IP white lists to be verified;Whether attendance IP address is really verified according to preset rules;When similarity reaches To threshold value, and attendance IP address is true and when belonging to IP white lists, and the successful checking-in result of attendance is back to user terminal.
In one embodiment, following steps are also realized when processor executes computer program:User terminal is received to send Obscure encrypted attendance information, obscure encrypted attendance information include obscure character string;Character string corresponding two is obscured in calculating Binary value;Obscure the corresponding salt figure of character string according to preset rules generation, calculates the corresponding binary numeral of salt figure;By right Obscure the corresponding binary numeral of character string and the corresponding binary numeral of salt figure carry out logic of propositions operation, to attendance information into Row decryption, obtains user identifier and corresponding attendance facial image and attendance IP address.
In one embodiment, following steps are also realized when processor executes computer program:When according to preset first Between frequency the IP address that frequency of usage reaches first threshold is acquired in attendance data library, utilize collected IP address build IP White list;Attendance record is obtained, acquire the attendance frequency that fails in attendance record according to preset second temporal frequency reaches the The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By with detecting IP Whether location is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will not when verifying failure The IP address being used continuously is deleted from IP white lists.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;Processor executes calculating Following steps are also realized when machine program:According to the multiple departments mark to prestore and each department identify corresponding user identifier and Target position information determines that the user identifier in attendance information corresponds to the target position information of department's mark;According to location information With target position information, the distance difference of user terminal corresponding position and target location is calculated;Whether comparison distance difference surpasses Cross preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal, and processor executes calculating Following steps are also realized when machine program:According to process into row information, whether identification user terminal has run virtual IP address in attendance Address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk is more than pre- If target risk value when, generate the prompt message that re-types of attendance information, will be prompted to information and be sent to the user terminal.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 7.The computer equipment includes the processor connected by system bus, memory, network interface, display Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with Realize a kind of Work attendance method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, the meter Calculate machine equipment input unit can be the touch layer covered on display screen, can also be arranged on computer equipment shell by Key, trace ball or Trackpad can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 6 or Fig. 7, only relevant with application scheme The block diagram of part-structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific to calculate Machine equipment may include either combining certain components or with different components than more or fewer components as shown in the figure Arrangement.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize following steps when executing computer program:Attendance is obtained to ask It asks, according to attendance acquisition request attendance information;Attendance information includes user identifier and corresponding attendance facial image and attendance IP address;Attendance information is sent to attendance server;Attendance server is set to obtain corresponding benchmark face according to user identifier Image calculates the similarity of attendance facial image and the benchmark face image got, is carried out to whether similarity reaches threshold value Verification;Preset IP white lists are obtained, IP white lists include multiple IP address;It is whether true to attendance IP address according to preset rules It is real, and whether belong to IP white lists and verified;When similarity reaches threshold value, and attendance IP address information is true and belongs to IP When white list, the successful checking-in result of attendance is generated;The checking-in result that attendance server returns is received, checking-in result is opened up Show.
In one embodiment, following steps are also realized when processor executes computer program:It obtains in attendance information Sensitive field calculates the corresponding binary numeral of sensitivity field;The corresponding salt figure of sensitivity field is generated according to preset rules, is calculated The corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are preset Logical operation obtains obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out Obscure encryption, encrypted attendance information will be obscured and be sent to attendance server.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:The attendance information that user terminal is sent is received, attendance information includes user Mark and corresponding attendance facial image and attendance IP address;Corresponding benchmark face image, meter are obtained according to user identifier The similarity for calculating attendance facial image and benchmark face image, verifies to whether similarity reaches threshold value;It obtains preset IP white lists, IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;According to default Whether rule really verifies attendance IP address;When similarity reaches threshold value, and attendance IP address is true and to belong to IP white When list, the successful checking-in result of attendance is back to user terminal.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive user terminal hair That send obscures encrypted attendance information, and it includes obscuring character string to obscure encrypted attendance information;It is corresponding that character string is obscured in calculating Binary numeral;Obscure the corresponding salt figure of character string according to preset rules generation, calculates the corresponding binary numeral of salt figure;Pass through Logic of propositions operation is carried out to obscuring the corresponding binary numeral of character string and the corresponding binary numeral of salt figure, to attendance information It is decrypted, obtains user identifier and corresponding attendance facial image and attendance IP address.
In one embodiment, following steps are also realized when computer program is executed by processor:According to preset first Temporal frequency acquires the IP address that frequency of usage reaches first threshold in attendance data library, is built using collected IP address IP white lists;Attendance record is obtained, the attendance failure frequency is acquired in attendance record according to preset second temporal frequency reaches The IP address of second threshold, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By detecting IP Whether address is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will when verifying failure The IP address not being used continuously is deleted from IP white lists.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;Computer program is located Reason device also realizes following steps when executing:Corresponding user identifier is identified according to the multiple departments mark and each department that prestore And target position information, determine that the user identifier in attendance information corresponds to the target position information of department's mark;Believed according to positioning Breath and target position information calculate the distance difference of user terminal corresponding position and target location;Whether compare distance difference More than preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal, and computer program is located Reason device also realizes following steps when executing:According to process into row information, whether identification user terminal has run virtually in attendance IP address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk is more than When preset target risk value, the prompt message that attendance information re-types is generated, information is will be prompted to and is sent to the user terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:Attendance request is obtained, according to attendance acquisition request attendance information;Attendance is believed Breath includes user identifier and corresponding attendance facial image and attendance IP address;Attendance information is sent to attendance server; Attendance server is set to obtain corresponding benchmark face image according to user identifier, the benchmark for calculating attendance facial image and getting The similarity of facial image is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include Multiple IP address;It is whether true to attendance IP address according to preset rules, and whether belong to IP white lists and verified;Work as phase Reach threshold value like degree, and attendance IP address information is true and when belonging to IP white lists, generates the successful checking-in result of attendance;It receives The checking-in result that attendance server returns, is shown checking-in result.
In one embodiment, following steps are also realized when computer program is executed by processor:It obtains in attendance information Sensitive field, calculate the corresponding binary numeral of sensitive field;The corresponding salt figure of sensitivity field, meter are generated according to preset rules Calculate the corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are carried out pre- If logical operation, obtain obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, to attendance information into Row obscures encryption, will obscure encrypted attendance information and be sent to attendance server.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Instruct relevant hardware to complete by computer program, computer program can be stored in a non-volatile computer readable It takes in storage medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, this Shen Any reference to memory, storage, database or other media used in each embodiment please provided, may each comprise Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield is all considered to be the range of this specification record.
Above example only expresses the several embodiments of the application, the description thereof is more specific and detailed, but can not Therefore it is construed as limiting the scope of the patent.It should be pointed out that for those of ordinary skill in the art, Under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection domain of the application. Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of Work attendance method, the method includes:
The attendance information that user terminal is sent is received, the attendance information includes user identifier and corresponding attendance facial image With attendance IP address;
Corresponding benchmark face image is obtained according to the user identifier, calculates the attendance facial image and the benchmark face The similarity of image is verified to whether the similarity reaches threshold value;
Preset IP white lists are obtained, the IP white lists include multiple IP address;Whether institute is belonged to the attendance IP address IP white lists are stated to be verified;
Whether the attendance IP address is really verified according to preset rules;
When the similarity reaches threshold value, and the attendance IP address is true and when belonging to the IP white lists, by attendance success Checking-in result be back to the user terminal.
2. according to the method described in claim 1, it is characterized in that, the attendance information for receiving user terminal and sending;It is described Attendance information includes the steps that user identifier and corresponding attendance facial image and attendance IP address includes:Receive user terminal What is sent obscures encrypted attendance information, and described to obscure encrypted attendance information include obscuring character string;
The corresponding binary numeral of character string is obscured described in calculating;
According to preset rules generate described in obscure the corresponding salt figure of character string, calculate the corresponding binary numeral of the salt figure;
By obscuring the corresponding binary numeral of character string and the corresponding binary numeral of the salt figure carries out default patrol to described Operation is collected, the attendance information is decrypted, the user identifier and corresponding attendance facial image and attendance IP are obtained Address.
3. according to the method described in claim 1, it is characterized in that, before the acquisition preset IP white lists the step of, Further include:
The IP address that frequency of usage reaches first threshold is acquired in attendance data library according to preset first time frequency, is utilized Collected IP address builds the IP white lists;
Attendance record is obtained, the attendance frequency that fails acquire in the attendance record according to preset second temporal frequency and reaches the The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to the IP white lists;
By detecting whether IP address is used continuously, the IP address that the IP white lists are added to detection carries out legitimacy school It tests;When verifying failure, the IP address not being used continuously is deleted from the IP white lists.
4. according to the method described in claim 1, it is characterized in that, the attendance information further includes the attendance IP address correspondence Location information;Described the step of whether really being verified to the attendance IP address according to preset rules includes:
Corresponding user identifier and target position information are identified according to the multiple departments mark and each department that prestore, determines institute State the target position information that the user identifier in attendance information corresponds to department's mark;
According to the location information and the target position information, the corresponding position of the user terminal and target location are calculated Distance difference;
Compare whether the distance difference is more than preset error range;
When the distance difference is less than preset error range, indicate that the attendance IP Address Velocity passes through.
5. according to the method described in claim 1, it is characterized in that, the attendance information further include on the user terminal into Journey operation information, the method further include:
According to the process into row information, identify whether the user terminal has run virtual ip address software in attendance;
Calculate the corresponding attendance cheating value-at-risk of the attendance information according to recognition result;
When attendance cheating value-at-risk is more than preset target risk value, the prompt that the attendance information re-types is generated The prompt message is sent to the user terminal by information.
6. a kind of Work attendance method, the method includes:
Attendance request is obtained, according to the attendance acquisition request attendance information;The attendance information includes user identifier and right The attendance facial image and attendance IP address answered;
The attendance information is sent to attendance server;The attendance server is set to be obtained according to the user identifier corresponding Benchmark face image calculates the similarity of the attendance facial image and the benchmark face image got, to the similarity Whether reach threshold value to be verified;Preset IP white lists are obtained, the IP white lists include multiple IP address;According to default rule It is then whether true to the attendance IP address, and whether belong to the IP white lists and verified;When the similarity reaches Threshold value, and the attendance IP address information is true and when belonging to the IP white lists, generates the successful checking-in result of attendance;
The checking-in result that the attendance server returns is received, the checking-in result is shown.
7. according to the method described in claim 1, it is characterized in that, described be sent to attendance server by the attendance information Step includes:
The sensitive field in the attendance information is obtained, the corresponding binary numeral of the sensitive field is calculated;
The corresponding salt figure of the sensitive field is generated according to preset rules, calculates the corresponding binary numeral of the salt figure;
Logic of propositions operation is carried out to the sensitive corresponding binary numeral of field and the corresponding binary numeral of the salt figure, It obtains obscuring character string;
By obscuring character string by described and be replaced to the corresponding sensitive field, the attendance information obscure plus It is close, encrypted attendance information will be obscured and be sent to attendance server.
8. a kind of Work attendance device, which is characterized in that described device includes:
Attendance information parsing module, the attendance information for receiving user terminal transmission, the attendance information includes user identifier And corresponding attendance facial image and attendance IP address;
Attendance information correction verification module calculates the attendance for obtaining corresponding benchmark face image according to the user identifier The similarity of facial image and the benchmark face image is verified to whether the similarity reaches threshold value;It obtains default IP white lists, the IP white lists include multiple IP address;To the attendance IP address whether belong to the IP white lists into Row verification;Whether the attendance IP address is really verified according to preset rules;
Checking-in result feedback module reaches threshold value for working as the similarity, and the attendance IP address is true and belongs to described When IP white lists, the successful checking-in result of attendance is back to the user terminal.
9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, which is characterized in that the processor, which is realized when executing the computer program in claim 1 to 5 or 6 to 7, appoints The step of one the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 5 or 6 to 7 is realized when being executed by processor.
CN201810119751.3A 2018-02-06 2018-02-06 Attendance checking method and device, computer equipment and storage medium Active CN108346191B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810119751.3A CN108346191B (en) 2018-02-06 2018-02-06 Attendance checking method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810119751.3A CN108346191B (en) 2018-02-06 2018-02-06 Attendance checking method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108346191A true CN108346191A (en) 2018-07-31
CN108346191B CN108346191B (en) 2020-08-14

Family

ID=62959935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810119751.3A Active CN108346191B (en) 2018-02-06 2018-02-06 Attendance checking method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108346191B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040281A (en) * 2018-08-22 2018-12-18 深圳市商汤科技有限公司 Content delivery method, terminal device and electronic equipment
CN109241868A (en) * 2018-08-16 2019-01-18 平安科技(深圳)有限公司 Face identification method, device, computer equipment and storage medium
CN109285234A (en) * 2018-09-29 2019-01-29 中国平安人寿保险股份有限公司 Human face identification work-attendance checking method, device, computer installation and storage medium
CN109389366A (en) * 2018-09-26 2019-02-26 平安国际融资租赁有限公司 Work attendance method, device, computer equipment and storage medium
CN109543942A (en) * 2018-10-16 2019-03-29 平安普惠企业管理有限公司 Data verification method, device, computer equipment and storage medium
CN109544721A (en) * 2018-12-04 2019-03-29 北京诺士诚国际工程项目管理有限公司 A kind of long-range punch card method and system
CN109754483A (en) * 2019-02-26 2019-05-14 浙江科技学院 A kind of method of registering based on Bluetooth broadcast technology
CN109829688A (en) * 2019-01-04 2019-05-31 平安科技(深圳)有限公司 Client, server, movable attendance checking method and computer readable storage medium
CN110070190A (en) * 2019-03-16 2019-07-30 平安城市建设科技(深圳)有限公司 Property method for maintaining, maintenance man's terminal, background server and storage medium
CN110111062A (en) * 2018-09-03 2019-08-09 中国平安人寿保险股份有限公司 A kind of camouflage attendance scene recognition method and device based on big data
CN110349284A (en) * 2019-07-03 2019-10-18 浙江好得电气有限公司 Plateau high-pressure PT cabinet with transformer casing overhauls monitoring method, device
CN110598754A (en) * 2019-08-16 2019-12-20 泰致德科技发展(深圳)有限公司 Online monitoring method, device and equipment based on image detection and storage medium
CN110782228A (en) * 2019-10-25 2020-02-11 上海燕汐软件信息科技有限公司 Working duration obtaining method and device, electronic equipment and storage medium
CN111079140A (en) * 2018-10-18 2020-04-28 中国人寿保险股份有限公司 Method, device and system for preventing cheating
CN111400621A (en) * 2020-04-06 2020-07-10 中信银行股份有限公司 Method and device for verifying authenticity of position information and electronic equipment
CN112419681A (en) * 2020-11-19 2021-02-26 杭州云深科技有限公司 Target early warning method, electronic device, and medium
CN112509165A (en) * 2020-11-27 2021-03-16 中国人寿保险股份有限公司 Anti-cheating attendance checking method and system
CN112949667A (en) * 2019-12-09 2021-06-11 北京金山云网络技术有限公司 Image recognition method, system, electronic device and storage medium
CN113240824A (en) * 2021-07-08 2021-08-10 太平金融科技服务(上海)有限公司深圳分公司 Attendance checking method and device, computer equipment and storage medium
CN114360085A (en) * 2021-11-25 2022-04-15 中国人民人寿保险股份有限公司 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080004999A1 (en) * 2006-06-28 2008-01-03 Pamela Ann Miller High-security time-and-attendance data collection system
CN101572701A (en) * 2009-02-10 2009-11-04 中科正阳信息安全技术有限公司 Security gateway system for resisting DDoS attack for DNS service
US20100111377A1 (en) * 2002-11-21 2010-05-06 Monroe David A Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System
CN104168269A (en) * 2014-07-24 2014-11-26 深圳市腾讯计算机***有限公司 Secure connection establishing method, apparatus and system
CN104200535A (en) * 2014-08-30 2014-12-10 中国铁通集团有限公司河南分公司 Tour-inspection sign-in device based on two-dimensional code information
CN104468780A (en) * 2014-12-05 2015-03-25 蓝信工场(北京)科技有限公司 Attendance statistics method and system based on internal network and geographic information uploading
CN104599336A (en) * 2014-12-17 2015-05-06 无锡华海天和信息科技有限公司 Method for automatically checking in and checking out through Wi-Fi
CN104732602A (en) * 2015-02-04 2015-06-24 四川长虹电器股份有限公司 Attendance checking method based on cloud human face and expression recognition
CN105577684A (en) * 2016-01-25 2016-05-11 北京京东尚科信息技术有限公司 Anti-crawling methods, server, client and system
CN105721489A (en) * 2016-03-16 2016-06-29 四川长虹电器股份有限公司 Authentication method and system of IPs in IP white list based on digital certificates
CN107481342A (en) * 2016-06-07 2017-12-15 腾讯科技(深圳)有限公司 Attendance checking system, method, server and terminal

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100111377A1 (en) * 2002-11-21 2010-05-06 Monroe David A Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System
US20080004999A1 (en) * 2006-06-28 2008-01-03 Pamela Ann Miller High-security time-and-attendance data collection system
CN101572701A (en) * 2009-02-10 2009-11-04 中科正阳信息安全技术有限公司 Security gateway system for resisting DDoS attack for DNS service
CN104168269A (en) * 2014-07-24 2014-11-26 深圳市腾讯计算机***有限公司 Secure connection establishing method, apparatus and system
CN104200535A (en) * 2014-08-30 2014-12-10 中国铁通集团有限公司河南分公司 Tour-inspection sign-in device based on two-dimensional code information
CN104468780A (en) * 2014-12-05 2015-03-25 蓝信工场(北京)科技有限公司 Attendance statistics method and system based on internal network and geographic information uploading
CN104599336A (en) * 2014-12-17 2015-05-06 无锡华海天和信息科技有限公司 Method for automatically checking in and checking out through Wi-Fi
CN104732602A (en) * 2015-02-04 2015-06-24 四川长虹电器股份有限公司 Attendance checking method based on cloud human face and expression recognition
CN105577684A (en) * 2016-01-25 2016-05-11 北京京东尚科信息技术有限公司 Anti-crawling methods, server, client and system
CN105721489A (en) * 2016-03-16 2016-06-29 四川长虹电器股份有限公司 Authentication method and system of IPs in IP white list based on digital certificates
CN107481342A (en) * 2016-06-07 2017-12-15 腾讯科技(深圳)有限公司 Attendance checking system, method, server and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姬鸣扬,李林森,李建华: "P2P网贷用户数据脱敏技术研究", 《通信技术》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241868A (en) * 2018-08-16 2019-01-18 平安科技(深圳)有限公司 Face identification method, device, computer equipment and storage medium
CN109040281A (en) * 2018-08-22 2018-12-18 深圳市商汤科技有限公司 Content delivery method, terminal device and electronic equipment
CN110111062A (en) * 2018-09-03 2019-08-09 中国平安人寿保险股份有限公司 A kind of camouflage attendance scene recognition method and device based on big data
CN109389366A (en) * 2018-09-26 2019-02-26 平安国际融资租赁有限公司 Work attendance method, device, computer equipment and storage medium
CN109389366B (en) * 2018-09-26 2024-05-14 平安国际融资租赁有限公司 Attendance checking method, attendance checking device, computer equipment and storage medium
CN109285234A (en) * 2018-09-29 2019-01-29 中国平安人寿保险股份有限公司 Human face identification work-attendance checking method, device, computer installation and storage medium
CN109543942A (en) * 2018-10-16 2019-03-29 平安普惠企业管理有限公司 Data verification method, device, computer equipment and storage medium
CN111079140A (en) * 2018-10-18 2020-04-28 中国人寿保险股份有限公司 Method, device and system for preventing cheating
CN109544721A (en) * 2018-12-04 2019-03-29 北京诺士诚国际工程项目管理有限公司 A kind of long-range punch card method and system
CN109829688A (en) * 2019-01-04 2019-05-31 平安科技(深圳)有限公司 Client, server, movable attendance checking method and computer readable storage medium
CN109754483A (en) * 2019-02-26 2019-05-14 浙江科技学院 A kind of method of registering based on Bluetooth broadcast technology
CN110070190A (en) * 2019-03-16 2019-07-30 平安城市建设科技(深圳)有限公司 Property method for maintaining, maintenance man's terminal, background server and storage medium
CN110349284A (en) * 2019-07-03 2019-10-18 浙江好得电气有限公司 Plateau high-pressure PT cabinet with transformer casing overhauls monitoring method, device
CN110598754A (en) * 2019-08-16 2019-12-20 泰致德科技发展(深圳)有限公司 Online monitoring method, device and equipment based on image detection and storage medium
CN110782228A (en) * 2019-10-25 2020-02-11 上海燕汐软件信息科技有限公司 Working duration obtaining method and device, electronic equipment and storage medium
CN112949667A (en) * 2019-12-09 2021-06-11 北京金山云网络技术有限公司 Image recognition method, system, electronic device and storage medium
CN111400621A (en) * 2020-04-06 2020-07-10 中信银行股份有限公司 Method and device for verifying authenticity of position information and electronic equipment
CN112419681A (en) * 2020-11-19 2021-02-26 杭州云深科技有限公司 Target early warning method, electronic device, and medium
CN112509165A (en) * 2020-11-27 2021-03-16 中国人寿保险股份有限公司 Anti-cheating attendance checking method and system
CN113240824A (en) * 2021-07-08 2021-08-10 太平金融科技服务(上海)有限公司深圳分公司 Attendance checking method and device, computer equipment and storage medium
CN113240824B (en) * 2021-07-08 2021-10-29 太平金融科技服务(上海)有限公司深圳分公司 Attendance checking method and device, computer equipment and storage medium
CN114360085A (en) * 2021-11-25 2022-04-15 中国人民人寿保险股份有限公司 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof

Also Published As

Publication number Publication date
CN108346191B (en) 2020-08-14

Similar Documents

Publication Publication Date Title
CN108346191A (en) Work attendance method, device, computer equipment and storage medium
US9449310B2 (en) Check-in method and system based on two-dimensional code, scanning terminal, and display terminal
CN112257110B (en) Electronic signature management method, management system and computer readable storage medium
CN106952011B (en) Real estate surveying method and system
CN107563712A (en) A kind of mobile terminal punch card method, device, equipment and system
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
CN111556069A (en) Visitor identity authentication method, system, device, computer equipment and storage medium
CN108537028A (en) A kind of computer identity identifying system and method
CN110020526A (en) The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
JP2023139259A (en) Image collection apparatus, server, encryption method, and decryption method
CN108764909A (en) A kind of block chain data monitoring and managing method
CN110300400A (en) One kind is registered method, apparatus, electronic equipment and storage medium
CN112771527A (en) Information processing program, information processing apparatus, and information processing method
CN112231771B (en) Block chain-based electronic contract online signing and security method
CN106230702A (en) Identity information verification method, Apparatus and system
CN108566389A (en) A kind of fingerprint identity validation method and device across application
CN111682955B (en) Tool arrangement device for criminal scene electronic data evidence obtaining
CN113162770A (en) Online signature method and system
CN111242768A (en) Credit card information security obtaining method, device and system
CN115756255A (en) Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium
CN111860726B (en) Two-dimensional code display method, verification method, device and computer readable storage medium
CN108063665A (en) Communication means and terminal device
CN113987506A (en) Test method, device, test equipment and storage medium of authentication system
CN111696227B (en) Unlocking method and device
CN103905376B (en) A kind of method and system that two-way authentication is carried out based on OAUTH agreements

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant