CN108346191A - Work attendance method, device, computer equipment and storage medium - Google Patents
Work attendance method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108346191A CN108346191A CN201810119751.3A CN201810119751A CN108346191A CN 108346191 A CN108346191 A CN 108346191A CN 201810119751 A CN201810119751 A CN 201810119751A CN 108346191 A CN108346191 A CN 108346191A
- Authority
- CN
- China
- Prior art keywords
- attendance
- address
- information
- white lists
- user terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application involves a kind of Work attendance method, device, computer equipment and storage mediums.The method includes:The attendance information that user terminal is sent is received, attendance information includes user identifier and corresponding attendance facial image and attendance IP address;Corresponding benchmark face image is obtained according to user identifier, the similarity of attendance facial image and benchmark face image is calculated, is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;Whether attendance IP address is really verified according to preset rules;When similarity reaches threshold value, and attendance IP address is true and when belonging to IP white lists, and the successful checking-in result of attendance is back to user terminal.Attendance cost can be lowered using this method, improve attendance efficiency.
Description
Technical field
This application involves fields of communication technology, are situated between more particularly to a kind of Work attendance method, device, computer equipment and storage
Matter.
Background technology
Enterprise is rigid demand to staff attendance, at present majority enterprises use Work attendance method be using fingerprint attendance machine,
The dedicated Work attendance device such as face recognition attendance recorder or radio frequency attendance card carries out attendance.But above-mentioned Work attendance method needs user to arrive
Up to progress attendance in place's where Work attendance device, attendance efficiency is low, when unit personnel is more, be susceptible to concentration check card cause it is crowded
The case where.Traditional approach to solve the above-mentioned problems, can only add more Work attendance devices, but this mode is not only increased and examined
Diligent cost can also carry out checking-in result statistics to enterprise and bring inconvenience, final to influence attendance efficiency.
Invention content
Based on this, it is necessary to which in view of the above technical problems, attendance cost can be lowered but also improve attendance effect by providing one kind
Work attendance method, device, computer equipment and the storage medium of rate.
A kind of Work attendance method, the method includes:
The attendance information that user terminal is sent is received, the attendance information includes user identifier and corresponding attendance face
Image and attendance IP address;Corresponding benchmark face image is obtained according to the user identifier, calculates the attendance facial image
With the similarity of the benchmark face image, verified to whether the similarity reaches threshold value;Obtain the white names of preset IP
Single, the IP white lists include multiple IP address;It is verified to whether the attendance IP address belongs to the IP white lists;It presses
Whether the attendance IP address is really verified according to preset rules;When the similarity reaches threshold value, and the attendance IP
Address is true and when belonging to the IP white lists, the successful checking-in result of attendance is back to the user terminal.
A kind of Work attendance method, the method includes:
Attendance request is obtained, according to the attendance acquisition request attendance information;The attendance information include user identifier with
And corresponding attendance facial image and attendance IP address;The attendance information is sent to attendance server;The attendance is set to take
Business device obtains corresponding benchmark face image according to the user identifier, the benchmark for calculating the attendance facial image and getting
The similarity of facial image is verified to whether the similarity reaches threshold value;Preset IP white lists are obtained, the IP is white
List includes multiple IP address;It is whether true to the attendance IP address according to preset rules, and whether to belong to the IP white
List is verified;When the similarity reaches threshold value, and the attendance IP address information is true and belongs to the IP white lists
When, generate the successful checking-in result of attendance;The checking-in result that the attendance server returns is received, the checking-in result is carried out
Displaying.
A kind of Work attendance device, described device include:
Attendance information parsing module, the attendance information for receiving user terminal transmission, the attendance information includes user
Mark and corresponding attendance facial image and attendance IP address;
Attendance information correction verification module, for obtaining corresponding benchmark face image according to the user identifier, described in calculating
The similarity of attendance facial image and the benchmark face image is verified to whether the similarity reaches threshold value;It obtains
Preset IP white lists, the IP white lists include multiple IP address;Whether the white names of the IP are belonged to the attendance IP address
Singly verified;Whether the attendance IP address is really verified according to preset rules;
Checking-in result feedback module reaches threshold value for working as the similarity, and the attendance IP address is true and belongs to
When the IP white lists, the successful checking-in result of attendance is back to the user terminal.
A kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor
The step of computer program, the processor realizes any of the above-described method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of any of the above-described method is realized when row.
Above-mentioned Work attendance method, device, computer equipment and storage medium, user use user terminal typing attendance information,
It can will be sent to attendance service comprising user identifier and the attendance information of corresponding attendance facial image and attendance IP address
Device;Attendance server can obtain corresponding benchmark face image according to user identifier, calculate attendance facial image and benchmark people
The similarity of face image is verified to whether similarity reaches threshold value;Attendance server has prestored IP white lists, white according to IP
Whether list can belong to IP white lists to attendance IP address verifies;According to preset rules can to attendance IP address whether
It is forged and is verified;The only attendance when similarity reaches threshold value, and attendance IP address information is not forged and belongs to IP white lists
Success;It can not only be reduced since user can directly use user terminal to carry out attendance without adding dedicated Work attendance device
Attendance cost can also realize contactless wireless attendance, avoid concentrating crowded situation of checking card, so as to improve attendance
Efficiency;Facial image and IP address are combined as attendance foundation, and the true and false information of attendance IP address is verified, is passed through
Above-mentioned multi-layer verification can improve the accuracy of checking-in result.
Description of the drawings
Fig. 1 is the application scenario diagram of Work attendance method in one embodiment;
Fig. 2 is the flow diagram of Work attendance method in one embodiment;
Fig. 3 is the flow diagram of Work attendance method in another embodiment;
Fig. 4 is the structure diagram of Work attendance device in one embodiment;
Fig. 5 is the structure diagram of Work attendance device in another embodiment;
Fig. 6 is the internal structure chart of one embodiment Computer equipment;
Fig. 7 is the internal structure chart of another embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Work attendance method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, user terminal 102
It is communicated by network with attendance server 104 by network.Wherein, user terminal 102 can be, but not limited to be various
People's computer, laptop, smart mobile phone, tablet computer and portable wearable device, attendance server 104 can be used only
The server clusters of the either multiple servers compositions of vertical server is realized.It has been run on user terminal 102 and has been used for attendance
APP (Application, application program).User terminal 102 has pre-installed plug-in unit SDK (Software in attendance APP
Development Kit, Software Development Kit).IP (Internet have been prestored in attendance server 104
Protocol, procotol) white list.IP white lists include multiple IP address.Attendance server 104 is to the IP of IP white lists
Location is updated into Mobile state.
When user needs to carry out attendance, attendance APP can be started in user terminal 102, pass through attendance APP typing attendances
Information.Specifically, user logs in attendance APP using pre-registered attendance account in user terminal 102, adopted using attendance APP
The attendance facial image for collecting user is used the attendance IP address of user using the plug-in unit SDK in attendance APP, by attendance account, examined
Diligent facial image and attendance IP address are sent to attendance server 104 as attendance information.Attendance server 104 is according to default rule
Then attendance information is verified.Specifically, attendance server 104 obtains corresponding benchmark face image according to attendance account,
The similarity for calculating attendance facial image and benchmark face image, verifies to whether similarity reaches threshold value.Attendance service
Device 104 obtains preset IP white lists, is verified to whether attendance IP address belongs to IP white lists.Attendance server 104 is pressed
It is verified according to preset rules to whether attendance IP address is forged.It is corresponded to for example, attendance server 104 obtains attendance IP address
Network delay, according to network delay identify attendance IP address whether be forged.In another embodiment, attendance APP is also sharp
The corresponding location information of attendance IP address is obtained with plug-in unit SDK, attendance server 104 identifies attendance IP address according to location information
Whether it is forged.When the similarity of attendance facial image and benchmark face image reaches threshold value, attendance IP address be not forged and
When belonging to IP white lists, indicate checking-in result for attendance success;Conversely, indicating that checking-in result fails for attendance.Attendance server
Checking-in result is back to user terminal 102 by 104 to be shown.Above-mentioned entire attendance process, user are whole using the user of oneself
End carries out attendance can not only reduce attendance cost without adding dedicated Work attendance device, can also realize contactless nothing
Line attendance avoids concentrating crowded situation of checking card, so as to improve attendance efficiency;Facial image and IP address are combined as
Attendance foundation, and the true and false information of attendance IP address is verified, the accuracy of checking-in result can be improved.
In one embodiment, as shown in Fig. 2, providing a kind of Work attendance method, in this way applied to the attendance in Fig. 1
It illustrates, includes the following steps for server:
Step 202, the attendance information that user terminal is sent is received, attendance information includes user identifier and corresponding attendance
Facial image and attendance IP address.
When user needs to carry out attendance, attendance can be carried out by the attendance APP on user terminal.Specifically, user
Start attendance APP in user terminal, in the information such as attendance APP typing attendance accounts and password.User terminal by attendance account and
Password is sent to attendance server and is verified.When the verification result for receiving the return of attendance server is to be verified, examine
Diligent APP shows the attendance page.The attendance page includes attendance button, such as human face scanning button.User can lead in user terminal
It crosses the attendance button clicked in attendance APP and initiates attendance request.Attendance APP asks progress facial image to be adopted according to the attendance of user
Collection.Specifically, attendance APP is asked according to the attendance of user, man face image acquiring frame and facial image are shown in the attendance page
Acquire prompt message.User can according to man face image acquiring information man face image acquiring frame typing facial image (hereinafter referred to as
" attendance facial image ").When the success of attendance man face image acquiring, attendance APP shows that information collection is successful in the attendance page
Prompt message.
In another embodiment, in order to avoid user carries out attendance cheating using still image, attendance face is being carried out
Before Image Acquisition, user needs to carry out certain human face action in man face image acquiring frame, to improve the standard of attendance facial image
True property.Specifically, attendance APP is asked according to the attendance of user, show that man face image acquiring frame and face are dynamic in the attendance page
Make prompt message.User the actions such as can shake the head, blink or open one's mouth according to human face action information in man face image acquiring frame.
User terminal whether there is the human face action information of user according to preset time frequency detecting man face image acquiring frame, work as presence
When, the acquisition of attendance facial image is carried out in the manner described above.
Attendance APP is acquired the corresponding end message of user terminal using the plug-in unit SDK of pre-installation.Terminating packet
Include IP address (hereinafter referred to as " attendance IP address ") and the location information etc. of user terminal.Wherein, location information can be user's end
GPS (Global Positioning System, the global positioning system) location information at end.It is readily appreciated that, end message may be used also
To include hardware identification code, IMEI (International Mobile Equipment Identity, international mobile device body
Part code) etc., this is not restricted.
Attendance account can be used as user identifier, be used for one user of unique mark.It is readily appreciated that, user identifier can be with
It is ID card No., cell-phone number or the employee number etc. of attendance account relating, this is not restricted.When attendance man face image acquiring at
When work(, user terminal is using collected user identifier and corresponding attendance facial image and attendance IP address as attendance information
It is sent to attendance server.
Step 204, corresponding benchmark face image is obtained according to user identifier, calculates attendance facial image and benchmark face
The similarity of image is verified to whether similarity reaches threshold value.
Attendance server has prestored multiple user identifiers and corresponding benchmark face image.Attendance facial image is corresponding
Picture size picture size corresponding with benchmark face image may be the same or different, and be examined to provided in this embodiment
There is no limit for size of the diligent method to the user terminal for attendance.When receiving the attendance information of user terminal transmission, examine
Diligent server obtains corresponding benchmark face image according to the user identifier in attendance information, calculates attendance facial image and benchmark
The similarity of facial image.Specifically.Attendance server by attendance facial image and benchmark face compression of images to identical size,
Make compressed two facial images that there is the pixel of identical quantity, as (pixels per inch, pixel are every by 32*32PPI
Inch).Attendance server generates corresponding face figure using the pixel value of multiple pixels in each facial image as matrix element
As corresponding picture element matrix.For a kind of icon of RGB color pattern (color standard), the pixel value of corresponding each pixel
Including red (R), green (G), the corresponding R values of blue (B) three Color Channels, G values and B values.
Attendance server according to the corresponding gray value of calculated for pixel values respective pixel point of each pixel in facial image,
Using the gray value of multiple pixels in the facial image as matrix element, the corresponding gray matrix of corresponding facial image is generated.
Each corresponding gray value of pixel can be the average value of the pixel value of the pixel, i.e. the corresponding R values of three Color Channels,
The average value of G values and B values corresponds to coloured image to which the corresponding picture element matrix of facial image is converted to gray matrix
Matrix conversion be the corresponding matrix of black white image, it is possible to reduce attendance server calculation amount.
Attendance server calculates the corresponding gray average of the icon according to the gray value of multiple pixels in facial image.Ash
Spend the average value that mean value is whole pixel corresponding grey scale values in the corresponding gray matrix of facial image.Attendance server is according to ash
Degree mean value is replaced multiple gray values in corresponding grey scale matrix, obtains the corresponding objective matrix of corresponding facial image.Tool
Body, attendance server traverses each matrix element in gray matrix, if the corresponding gray value of matrix element is greater than or equal to
The corresponding gray value of the matrix element is then set to first object value by gray average;Otherwise, by the corresponding gray scale of the matrix element
Value is set to the second desired value, to obtain the corresponding objective matrix of facial image.
Attendance server carries out default patrol to the objective matrix of attendance facial image and the objective matrix of benchmark face image
Operation is collected, similarity matrix is obtained.Logic of propositions operation includes XOR operation.Specifically, attendance server is to attendance face figure
The objective matrix of picture carries out XOR operation with each matrix element in the objective matrix of benchmark face image.If attendance facial image
Objective matrix and benchmark face image objective matrix in, the corresponding gray value phase of matrix element on same matrix coordinate
Together, then attendance server is added to the first similar value as the matrix element on same matrix coordinate in similarity matrix;It is no
Then, it is added to the second similar value as the matrix element on same matrix coordinate in similarity matrix.Attendance server is to phase
It is traversed like degree matrix, the quantity of the first similar value in similarity matrix is calculated, according to the first similar value in similarity matrix
Quantity calculate two facial images similarity.
In a specific embodiment, when in gray matrix the corresponding gray value of matrix element be greater than or equal to gray scale it is equal
When value, the corresponding gray value of the matrix element is set to 1 by attendance server;Otherwise, the corresponding gray value of the matrix element is set
It is 0, using 01 obtained matrix as the corresponding objective matrix of facial image.01 matrix of the attendance server to attendance facial image
Exclusive or calculating is carried out with 01 matrix of benchmark face image, using 01 obtained matrix as the corresponding similarity of two facial images
Matrix.Attendance server traverses similarity matrix, and two facial images are determined according in similarity matrix 1 quantity
Similarity.Similar threshold value can be that demand is freely arranged, such as 9.
The present embodiment calculates the similarity of attendance facial image and benchmark face image, it is only necessary to simply XOR operation and limited
Secondary traversal can be calculated, and the complicated image processing process calculation amount of tradition relatively is small, it is possible to reduce to attendance server meter
The occupancy for calculating resource, can also improve attendance efficiency.
Step 206, preset IP white lists are obtained, IP white lists include multiple IP address;Whether attendance IP address is belonged to
It is verified in IP white lists.
IP white lists have been prestored in attendance server.IP white lists include multiple IP address.IP in IP white lists
Address can be that attendance server dynamic acquisition obtains.Specifically, IP white lists have recorded multiple department's marks, and it is each
Department identifies corresponding user identifier and IP address, and in other words, IP white lists have recorded IP address of multiple departments for attendance.
The IP address can be one, can also be multiple;The IP address can be IP address of internal network, can also be outer net IP address.
Step 208, whether attendance IP address is really verified according to preset rules.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;According to preset rules pair
The step of whether attendance IP address is really verified include:According to the multiple departments mark and each department's mark pair to prestore
The user identifier and target position information answered determine that the user identifier in attendance information corresponds to the target location letter of department's mark
Breath;According to location information and target position information, the distance difference of user terminal corresponding position and target location is calculated;Comparison
Whether distance difference is more than preset error range;When distance difference is less than preset error range, with indicating attendance IP
Location verification passes through.
The attendance information that user terminal is sent further includes the corresponding location information of attendance IP address.It prestores in attendance server
IP white lists in be also recorded for each department and identify corresponding target position information.It should be noted that the IP address corresponds to
Target location be not necessarily fixed position in workplace, can also be the temporary position in workplace, can be with right and wrong workplace
In designated position.For example, when employee needs that other branch companies is gone to go on business, can complete to examine in other branch companies
It is diligent;Or when business personnel needs that specified client's shelter is gone to access, attendance can be completed in specified client's shelter.
Attendance server identifies corresponding user identifier and target according to the multiple departments mark and each department that prestore
Location information determines the target position information of the user identifier affiliated function in attendance information.Attendance server is believed according to positioning
Breath and target position information calculate the distance difference of user terminal corresponding position and target location.Whether compare distance difference
More than preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.Hold
Readily understood, attendance server is added to IP white lists IP address when can also be updated in the manner described above to dynamic realtime carries out
Legitimacy verifies improve the reliability of IP white lists.The corresponding position of user terminal is to attendance IP when the present embodiment passes through attendance
The true or false of address is confirmed, can prevent IP address attendance from practising fraud, and improves checking-in result accuracy.
Step 210, when similarity reaches threshold value, and attendance IP address is true and when belonging to IP white lists, by attendance success
Checking-in result be back to user terminal.
Attendance server to attendance information carry out multi-layer verification, only when multi-layer verification respectively by when, indicate to examine
Diligent result is attendance success.In other words, when the similarity of attendance facial image and benchmark face image reaches threshold value, attendance IP
Location is not true and when belonging to IP white lists, checking-in result is attendance success;Conversely, checking-in result fails for attendance.
In another embodiment, in order to reduce the occupancy to attendance server resource, verification can not be had to by setting
The priority level of condition is realized no longer carries out other verifications after a kind of verification failure of verification condition.For example, working as attendance IP address
When being not belonging to IP white lists, then whether threshold value is no longer reached to the similarity of attendance facial image and benchmark face image, and
Whether attendance IP address is really verified.
In the present embodiment, user uses user terminal typing attendance information, can will include user identifier and corresponding
The attendance information of attendance facial image and attendance IP address is sent to attendance server;Attendance server can be according to user identifier
Corresponding benchmark face image is obtained, the similarity of attendance facial image and benchmark face image is calculated, whether similarity is reached
It is verified to threshold value;Whether attendance server has prestored IP white lists, can be belonged to attendance IP address according to IP white lists
IP white lists are verified;Whether attendance IP address can really be verified according to preset rules;Only when similarity reaches
Threshold value, attendance IP address information is not true and attendance success when belonging to IP white lists;Since user can directly use user whole
End carries out attendance can not only reduce attendance cost without adding dedicated Work attendance device, can also realize contactless nothing
Line attendance avoids concentrating crowded situation of checking card, so as to improve attendance efficiency;Facial image and IP address are combined as
Attendance foundation, and the true and false information of attendance IP address is verified, checking-in result can be improved by the verification of above-mentioned multi-layer
Accuracy.
In one embodiment, the attendance information that user terminal is sent is received;Attendance information includes user identifier and right
The step of attendance facial image and attendance IP address for answering includes:Receive user terminal transmission obscures encrypted attendance information,
It includes obscuring character string to obscure encrypted attendance information;The corresponding binary numeral of character string is obscured in calculating;According to preset rules
The corresponding salt figure of character string is obscured in generation, calculates the corresponding binary numeral of salt figure;By to obscure character string corresponding two into
The corresponding binary numeral of numerical value and salt figure processed carries out logic of propositions operation, is decrypted to attendance information, obtains user identifier
And corresponding attendance facial image and attendance IP address.
In order to improve the safety of attendance information, user terminal can be encrypted attendance information using plug-in unit SDK.Add
Close mode has very much, such as DES (Data Encryption Standard, data encryption standards) symmetric cryptography, salt figure encryption
Deng.It will be described so that salt figure is encrypted as an example below.
Attendance information includes multiple fields, such as attendance account, attendance time, attendance IP address or location information, according to
Field can be divided into generic field and sensitive field by the importance of field corresponding data information.For example, in the example above,
Attendance account, attendance IP address can be sensitive fields;Attendance time, location information can be generic fields.
Salt figure encryption is that the sensitive field showed in attendance information is associated with a n random sequences, and the n random sequence is
For " salt figure ".In traditional salt figure cipher mode, sensitive field is converted to readable character string using systems approach.But it uses
Systems approach is difficult to ensure that character string converts success rate, once convert failed, then need replacing salt figure, reduces encryption efficiency.More
Importantly, when character string convert failed, the problem of sensitive associated salt figure of field is faced with storage, if by salt figure with bright
The mode of text, which is built in attendance information, is then unfavorable for cipher round results, and the safety of sensitive field is not still high.
To solve the above-mentioned problems, user terminal obtains the sensitive field in attendance information, dynamic generation sensitivity field pair
The salt figure answered is obscured character string according to sensitive field and corresponding salt figure generation, is added to sensitive field using character string is obscured
It is close.Specifically, user terminal converts sensitive field to binary numeral.Custom terminal obtains attendance information according to preset rules
One or more of field, the multiple fields got are spliced, random string is obtained, to random string carry out
Hash conversion generates the corresponding salt figure of sensitivity field.User terminal converts the corresponding salt figure of sensitive field to binary numeral,
The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are encrypted respectively, to encrypted sensitive words
The corresponding binary numeral of section and the corresponding binary numeral of salt figure carry out logic of propositions operation, obtain object binary numerical value.
Logic of propositions operation includes XOR operation.User terminal converts object binary numerical value to hexadecimal values, by this 16
Binary value conduct is obscured character string and is replaced to sensitive field.By obscuring for the data information comprising sensitive field and salt figure
Character string is built in attendance information, can be solved sensitive field and be corresponded to the storage problem of salt figure, and obscure the acquisition of character string
Simple system conversion is only needed, character string convert failed can be solved the problems, such as, so as to improve the encryption to attendance information
Efficiency.
User terminal will obscure encrypted attendance information and be sent to attendance server.Attendance server obtains data attendance
Obscure character string in information, be decrypted to obscuring character string, character string will be obscured and be reduced to sensitive field.Specifically, examining
Character string of obscuring in attendance information is converted to binary numeral by diligent server.Attendance server generates mixed in the manner described above
The corresponding salt figure of character string of confusing obtains multiple fields in attendance information, the multiple fields that will be got according to preset rules
Spliced, obtain random string, hash conversion is carried out to random string, the corresponding salt figure of character string is obscured in generation.By
In being generated using the field in attendance information according to preset rules, to obscure the salt figure generated when character string decryption with to quick
It is identical to feel the salt figure generated when field encryption.Attendance server will obscure the corresponding salt figure of character string and be converted into binary numeral,
Logic of propositions operation is carried out to obscuring the corresponding binary numeral of character string and the corresponding binary numeral of salt figure, obtains target two
Binary value.Logic of propositions operation includes XOR operation.Attendance server converts object binary numerical value to hexadecimal number
Value.It is appreciated that the hexadecimal values are sensitive field.
In the present embodiment, the acquisition of sensitive field only needs simple system to convert, it is possible to reduce attendance server calculates money
The occupancy in source can also improve the decryption efficiency to obscuring character string.
In one embodiment, before the step of obtaining preset IP white lists, further include:When according to preset first
Between frequency the IP address that frequency of usage reaches first threshold is acquired in attendance data library, utilize collected IP address build IP
White list;Attendance record is obtained, acquire the attendance frequency that fails in attendance record according to preset second temporal frequency reaches the
The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By with detecting IP
Whether location is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will not when verifying failure
The IP address being used continuously is deleted from IP white lists.
Initial IP white lists can be that attendance server collects in attendance data library.Specifically, attendance takes
Device of being engaged in acquires in attendance data library the IP address that frequency of usage reaches first threshold according to preset first time frequency.Attendance
Database can be the database for recording attendance data in traditional attendance mode, to Work attendance method provided in this embodiment
It can be very good to dock with traditional Work attendance method, realize that IP white lists automatically create.First time frequency can be one day or one
Week etc., the corresponding first threshold of different departments can be different.For example, attendance server can collect each department's use time daily
Number is more than the IP address of corresponding first threshold, or collects each department most IP of access times within a preset period of time weekly
Address.It is readily appreciated that, other modes can also be acquired for the acquisition mode of IP address, as related personnel matches specified IP address
It sets and is added to IP white lists, this is not restricted.The IP address that the present embodiment only frequency of usage reaches first threshold can just add
IP white lists are added to, IP white lists can be just added to also just define that only number of users reaches a certain number of IP address
As attendance, an individual IP address can't be added into IP white lists, can avoid the IP that will be forged to a certain extent
Address is added to IP white lists, can be very good to prevent attendance from practising fraud.
After the establishment for completing initial IP white lists, attendance server can carry out attendance using the IP white lists, and
Dynamic realtime update is carried out to IP white lists during attendance.Specifically, attendance server is according to frequency of preset second time
Rate acquires the attendance failure frequency in attendance record and reaches the IP address of second threshold wherein, and attendance record refers to the second time frequency
The checking-in result of rate corresponding period (hereinafter referred to as " attendance period ") interior different user.Wherein, the attendance period can be each
Morning 7 legal workday:00~9:00, evening 5:00~6:00 etc..Attendance record includes the IP used when attendance time, attendance
Address and checking-in result.When attendance server detects the presence of the IP that the attendance failure frequency reaches second threshold in the attendance period
The IP address is then added to IP white lists by address automatically.For example, if some department has more than the second threshold in some attendance period
The user for being worth quantity is failed using the same IP address attendance, in other words, use time of the IP address in some attendance period
Number is more than second threshold, but checking-in result is attendance failure, then it represents that the IP address may be the department with carrying out normal IP
What location changed.
Due to the identical wireless network of department's generally use similar in geographical location, so as to use identical IP address
Attendance is carried out, in other words, the same IP address is possibly used for the attendance of different departments.In order to improve the update effect of IP table name lists
Rate, when being updated to the corresponding IP address of some department, attendance server carries out the corresponding IP address of adjacent department same
Step update, to allow department similar in geographical location to share IP white lists.
For the workplace network of attendance, there are unstability, and corresponding IP address is nor unalterable.IP white lists
It is mainly obtained by attendance server automatic collection approach, is divided into timing acquiring and dynamic realtime update two ways obtains
Each department is used for the IP address of attendance.When workplace, network changes, attendance server can automatically meet in real time
Corresponding IP address is added in IP white lists after certain condition, it is ensured that will not occur different because of normal workplace network change
Often.In fact, present embodiments providing a kind of IP white lists construction method, attendance server loses attendance in each attendance period
It loses the frequency and reaches the IP address of second threshold and be automatically added to IP white lists, it can be to avoid the normal IP address transition of department to examining
Frequently impact.
In order to improve the accuracy of IP white lists, attendance server adds in IP white list dynamic realtime renewal processes
Accuracy to the IP address of IP white lists is verified.Specifically, attendance server can by detect IP address whether by
Continuous use, verifies the legitimacy of IP address.Attendance server can also according to the corresponding user identifier of IP address and
Location information verifies the legitimacy of IP address.Specifically, attendance server is inquired according to user identifier belonging to the user
The target position information of department matches the corresponding location information of newly added IP address with target position information, according to
Matching result judges the legitimacy for being dynamically added to the IP address of IP white lists.It should be noted that this programme is will first to meet
The IP address of above-mentioned update condition is dynamically added to IP white lists, then carries out legitimacy verifies to IP address.It is readily appreciated that, attendance
Server can also advanced legitimacy verifies be added or delete further according to check results, it is without limitation.
In the present embodiment, attendance server automatically creates IP white lists, and according to attendance record to IP white lists into action
State real-time update can impact attendance to avoid the normal IP address transition of department;To being added to the IP of IP white lists
Location is verified, and can improve the reliability of IP white lists, and then can improve the accuracy of checking-in result.
In one embodiment, attendance information further includes the process operation information on user terminal, and method further includes:According to
Whether process has run virtual ip address software in attendance into row information, identification user terminal;It is examined according to recognition result measuring and calculating
The corresponding attendance of diligent information is practised fraud value-at-risk;When attendance cheating value-at-risk is more than preset target risk value, attendance letter is generated
The prompt message re-typed is ceased, information is will be prompted to and is sent to the user terminal.
When user is when user terminal carries out attendance, attendance APP can also utilize plug-in unit SDK to acquire user on user terminal
Process operation information in terminal, to which attendance information further includes carrying out operation information.Specifically, attendance APP utilizes plug-in unit SDK
During attendance APP operations, the process operation information on user terminal is acquired.Process operation information includes being currently running
Number of processes, process title, process description, EMS memory occupation etc..Attendance server may determine that use according to process operation information
Whether family terminal has run virtual ip address software when carrying out attendance, and then is carried out to the attendance of attendance IP address cheating risk
Estimation.Virtual ip address software includes that can generate the application program of virtual ip address, virtual wi-fi etc. or can carry out virtual
In other words the application program of positioning, including can distort the application program of real IP address or true location information.If user is whole
End has run virtual ip address software when carrying out attendance, and attendance server can be according to the class of the virtual ip address software of operation
Type, quantity and EMS memory occupation situation etc. calculate the corresponding attendance cheating value-at-risk of attendance information.When attendance cheating value-at-risk is super
When crossing preset target risk value, indicate that this attendance information is with a low credibility, attendance server generates attendance information and re-types
Prompt message, will be prompted to information and be sent to the user terminal.
In the present embodiment, the process on user terminal is run using preset plug-in SDK when user terminal carries out attendance
Information carries out detecting/monitoring;It may determine that user terminal when carrying out attendance with whether having run virtual IP address according to process operation information
Location software, and then judge attendance cheating risk, when attendance cheating risk is higher, prompt user to re-start attendance, raising is examined
Diligent result accuracy.
In one embodiment, as shown in figure 3, providing a kind of Work attendance method, in this way applied to the user in Fig. 1
It illustrates, includes the following steps for terminal:
Step 302, attendance request is obtained, according to attendance acquisition request attendance information;Attendance information include user identifier with
And corresponding attendance facial image and attendance IP address.
Step 304, attendance information is sent to attendance server;Attendance server is set to be obtained according to user identifier corresponding
Whether benchmark face image calculates the similarity of attendance facial image and the benchmark face image got, reaches to similarity
Threshold value is verified;Preset IP white lists are obtained, IP white lists include multiple IP address;To attendance IP according to preset rules
Whether location is true, and whether belongs to IP white lists and verified;When similarity reaches threshold value, and attendance IP address information is true
And when belonging to IP white lists, the successful checking-in result of attendance is generated.
Step 306, the checking-in result that attendance server returns is received, checking-in result is shown.
In one embodiment, the step of attendance information being sent to attendance server include:It obtains in attendance information
Sensitive field calculates the corresponding binary numeral of sensitivity field;The corresponding salt figure of sensitivity field is generated according to preset rules, is calculated
The corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are preset
Logical operation obtains obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out
Obscure encryption, encrypted attendance information will be obscured and be sent to attendance server.
User terminal obtains the sensitive field in attendance information, the corresponding salt figure of dynamic generation sensitivity field, according to sensitivity
Character string is obscured in field and corresponding salt figure generation, and sensitive field is encrypted using character string is obscured.Specifically, user terminal
Convert sensitive field to binary numeral.Custom terminal obtains one or more of attendance information word according to preset rules
Section, the multiple fields got are spliced, random string is obtained, and are carried out hash conversion to random string, are generated quick
Feel the corresponding salt figure of field.User terminal converts the corresponding salt figure of sensitive field to binary numeral, is corresponded to sensitive field
Binary numeral and the corresponding binary numeral of salt figure be encrypted respectively, binary system corresponding to encrypted sensitive field
Numerical value and the corresponding binary numeral of salt figure carry out logic of propositions operation, obtain object binary numerical value.Logic of propositions operation packet
Include XOR operation.User terminal converts object binary numerical value to hexadecimal values, using the hexadecimal values as mixed
Character string of confusing is replaced sensitive field.The character string of obscuring of data information comprising sensitive field and salt figure is built in and examines
In diligent information, sensitive field can be solved and correspond to the storage problem of salt figure, and the acquisition for obscuring character string only needs simple system
Conversion, can solve the problems, such as character string convert failed, so as to improve the encryption efficiency to attendance information.
In the present embodiment, attendance information is encrypted, the safety of attendance information can be improved.Obscure ciphering process profit
Salt figure is generated with multiple fields dynamic in attendance information, it is possible to reduce the risk that salt figure is compromised.To include sensitive field and
The character string of obscuring of the data information of salt figure is built in attendance information, can solve sensitive field and correspond to the storage of salt figure to ask
Topic.Obscuring the acquisition of character string only needs simple system to convert, and can solve the problems, such as character string convert failed, and then can carry
Encryption efficiency of the height to sensitive field.
It should be understood that although each step in the flow chart of Fig. 2 or Fig. 3 is shown successively according to the instruction of arrow,
But these steps are not the inevitable sequence indicated according to arrow to be executed successively.Unless expressly state otherwise herein, these
There is no stringent sequences to limit for the execution of step, these steps can execute in other order.Moreover, in Fig. 2 or Fig. 3
At least part step may include that either these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps
One moment executed completion, but can execute at different times, and the execution in these sub-steps or stage sequence is also not necessarily
Be carry out successively, but can with other steps either the sub-step of other steps or at least part in stage in turn or
Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of Work attendance device, including:Attendance information parsing module 402,
Attendance information correction verification module 404 and checking-in result feedback module 406, wherein:
Attendance information parsing module 402, the attendance information for receiving user terminal transmission, attendance information include user's mark
Knowledge and corresponding attendance facial image and attendance IP address;
Attendance information correction verification module 404 calculates attendance people for obtaining corresponding benchmark face image according to user identifier
The similarity of face image and benchmark face image is verified to whether similarity reaches threshold value;Preset IP white lists are obtained,
IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;According to preset rules to examining
Whether diligent IP address is really verified;
Checking-in result feedback module 406 reaches threshold value for working as similarity, and attendance IP address is true and belongs to the white names of IP
The successful checking-in result of attendance is back to user terminal by Dan Shi.
In one embodiment, attendance information parsing module 402 includes information receiving module 4022 and information deciphering module
4024.Information receiving module 4022 be used for receive user terminal transmission obscure encrypted attendance information, obscure encrypted attendance
Information includes obscuring character string;The corresponding binary numeral of character string is obscured in the calculating of information deciphering module 4024;According to default rule
It then generates and obscures the corresponding salt figure of character string, calculate the corresponding binary numeral of salt figure;By to obscuring character string corresponding two
Binary value and the corresponding binary numeral of salt figure carry out logic of propositions operation, and attendance information is decrypted, and obtain user's mark
Knowledge and corresponding attendance facial image and attendance IP address.
In one embodiment, which further includes IP white lists structure module 408, for according to preset first
Temporal frequency acquires the IP address that frequency of usage reaches first threshold in attendance data library, is built using collected IP address
IP white lists;Attendance record is obtained, the attendance failure frequency is acquired in attendance record according to preset second temporal frequency reaches
The IP address of second threshold, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By detecting IP
Whether address is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will when verifying failure
The IP address not being used continuously is deleted from IP white lists.
In one embodiment, attendance information correction verification module 404 is additionally operable to according to multiple departments mark for prestoring and every
A department identifies corresponding user identifier and target position information, determines that the user identifier in attendance information corresponds to department's mark
Target position information;According to location information and target position information, calculate the corresponding position of user terminal and target location away from
Deviation value;Compare whether distance difference is more than preset error range;When distance difference is less than preset error range, table
Show that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal.The Work attendance device also wraps
Attendance cheating risk evaluation module 410 is included, for, into row information, whether identification user terminal to run in attendance according to process
Virtual ip address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk
When more than preset target risk value, the prompt message that attendance information re-types is generated, information is will be prompted to and is sent to user's end
End.
In one embodiment, as shown in figure 5, providing a kind of Work attendance device, including:Attendance information recording module 502,
Attendance information transmission module 504 and checking-in result display module 506, wherein:
Attendance information recording module 502, for obtaining attendance request, according to attendance acquisition request attendance information;Attendance is believed
Breath includes user identifier and corresponding attendance facial image and attendance IP address;
Attendance information transmission module 504, for attendance information to be sent to attendance server;Make attendance server according to
Family mark obtains corresponding benchmark face image, calculates the similarity of attendance facial image and the benchmark face image got,
It is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include multiple IP address;According to pre-
If whether rule is true to attendance IP address, and whether belongs to IP white lists and verified;When similarity reaches threshold value, and examine
Diligent IP address information is true and when belonging to IP white lists, generates the successful checking-in result of attendance;
Checking-in result display module 506, the checking-in result for receiving the return of attendance server, opens up checking-in result
Show.
In one embodiment, attendance information transmission module 504 is additionally operable to obtain the sensitive field in attendance information, calculates
The corresponding binary numeral of sensitive field;The corresponding salt figure of sensitivity field is generated according to preset rules, calculates salt figure corresponding two
Binary value;Logic of propositions operation is carried out to the corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure, is obtained
To obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out to obscure encryption, it will
Obscure encrypted attendance information and is sent to attendance server.
Specific about Work attendance device limits the restriction that may refer to above for Work attendance method, and details are not described herein.
Modules in above-mentioned Work attendance device can be realized fully or partially through software, hardware and combinations thereof.Above-mentioned each module can
It is embedded in the form of hardware or independently of in the processor in computer equipment, computer can also be stored in a software form and set
In memory in standby, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 6.The computer equipment include the processor connected by system bus, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing IP white lists.The network interface of the computer equipment is used to pass through network with external terminal
Connection communication.To realize a kind of Work attendance method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor realize following steps when executing computer program:It is whole to receive user
The attendance information sent is held, attendance information includes user identifier and corresponding attendance facial image and attendance IP address;According to
User identifier obtains corresponding benchmark face image, the similarity of attendance facial image and benchmark face image is calculated, to similar
Whether degree, which reaches threshold value, is verified;Preset IP white lists are obtained, IP white lists include multiple IP address;To attendance IP address
Whether belong to IP white lists to be verified;Whether attendance IP address is really verified according to preset rules;When similarity reaches
To threshold value, and attendance IP address is true and when belonging to IP white lists, and the successful checking-in result of attendance is back to user terminal.
In one embodiment, following steps are also realized when processor executes computer program:User terminal is received to send
Obscure encrypted attendance information, obscure encrypted attendance information include obscure character string;Character string corresponding two is obscured in calculating
Binary value;Obscure the corresponding salt figure of character string according to preset rules generation, calculates the corresponding binary numeral of salt figure;By right
Obscure the corresponding binary numeral of character string and the corresponding binary numeral of salt figure carry out logic of propositions operation, to attendance information into
Row decryption, obtains user identifier and corresponding attendance facial image and attendance IP address.
In one embodiment, following steps are also realized when processor executes computer program:When according to preset first
Between frequency the IP address that frequency of usage reaches first threshold is acquired in attendance data library, utilize collected IP address build IP
White list;Attendance record is obtained, acquire the attendance frequency that fails in attendance record according to preset second temporal frequency reaches the
The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By with detecting IP
Whether location is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will not when verifying failure
The IP address being used continuously is deleted from IP white lists.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;Processor executes calculating
Following steps are also realized when machine program:According to the multiple departments mark to prestore and each department identify corresponding user identifier and
Target position information determines that the user identifier in attendance information corresponds to the target position information of department's mark;According to location information
With target position information, the distance difference of user terminal corresponding position and target location is calculated;Whether comparison distance difference surpasses
Cross preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal, and processor executes calculating
Following steps are also realized when machine program:According to process into row information, whether identification user terminal has run virtual IP address in attendance
Address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk is more than pre-
If target risk value when, generate the prompt message that re-types of attendance information, will be prompted to information and be sent to the user terminal.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 7.The computer equipment includes the processor connected by system bus, memory, network interface, display
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with
Realize a kind of Work attendance method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, the meter
Calculate machine equipment input unit can be the touch layer covered on display screen, can also be arranged on computer equipment shell by
Key, trace ball or Trackpad can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 6 or Fig. 7, only relevant with application scheme
The block diagram of part-structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific to calculate
Machine equipment may include either combining certain components or with different components than more or fewer components as shown in the figure
Arrangement.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor realize following steps when executing computer program:Attendance is obtained to ask
It asks, according to attendance acquisition request attendance information;Attendance information includes user identifier and corresponding attendance facial image and attendance
IP address;Attendance information is sent to attendance server;Attendance server is set to obtain corresponding benchmark face according to user identifier
Image calculates the similarity of attendance facial image and the benchmark face image got, is carried out to whether similarity reaches threshold value
Verification;Preset IP white lists are obtained, IP white lists include multiple IP address;It is whether true to attendance IP address according to preset rules
It is real, and whether belong to IP white lists and verified;When similarity reaches threshold value, and attendance IP address information is true and belongs to IP
When white list, the successful checking-in result of attendance is generated;The checking-in result that attendance server returns is received, checking-in result is opened up
Show.
In one embodiment, following steps are also realized when processor executes computer program:It obtains in attendance information
Sensitive field calculates the corresponding binary numeral of sensitivity field;The corresponding salt figure of sensitivity field is generated according to preset rules, is calculated
The corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are preset
Logical operation obtains obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, attendance information is carried out
Obscure encryption, encrypted attendance information will be obscured and be sent to attendance server.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:The attendance information that user terminal is sent is received, attendance information includes user
Mark and corresponding attendance facial image and attendance IP address;Corresponding benchmark face image, meter are obtained according to user identifier
The similarity for calculating attendance facial image and benchmark face image, verifies to whether similarity reaches threshold value;It obtains preset
IP white lists, IP white lists include multiple IP address;It is verified to whether attendance IP address belongs to IP white lists;According to default
Whether rule really verifies attendance IP address;When similarity reaches threshold value, and attendance IP address is true and to belong to IP white
When list, the successful checking-in result of attendance is back to user terminal.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive user terminal hair
That send obscures encrypted attendance information, and it includes obscuring character string to obscure encrypted attendance information;It is corresponding that character string is obscured in calculating
Binary numeral;Obscure the corresponding salt figure of character string according to preset rules generation, calculates the corresponding binary numeral of salt figure;Pass through
Logic of propositions operation is carried out to obscuring the corresponding binary numeral of character string and the corresponding binary numeral of salt figure, to attendance information
It is decrypted, obtains user identifier and corresponding attendance facial image and attendance IP address.
In one embodiment, following steps are also realized when computer program is executed by processor:According to preset first
Temporal frequency acquires the IP address that frequency of usage reaches first threshold in attendance data library, is built using collected IP address
IP white lists;Attendance record is obtained, the attendance failure frequency is acquired in attendance record according to preset second temporal frequency reaches
The IP address of second threshold, the IP address that the attendance failure frequency is reached to second threshold are added to IP white lists;By detecting IP
Whether address is used continuously, and the IP address that IP white lists are added to detection carries out legitimacy verifies;It, will when verifying failure
The IP address not being used continuously is deleted from IP white lists.
In one embodiment, attendance information further includes the corresponding location information of attendance IP address;Computer program is located
Reason device also realizes following steps when executing:Corresponding user identifier is identified according to the multiple departments mark and each department that prestore
And target position information, determine that the user identifier in attendance information corresponds to the target position information of department's mark;Believed according to positioning
Breath and target position information calculate the distance difference of user terminal corresponding position and target location;Whether compare distance difference
More than preset error range;When distance difference is less than preset error range, indicate that attendance IP Address Velocity passes through.
In one embodiment, attendance information further includes the process operation information on user terminal, and computer program is located
Reason device also realizes following steps when executing:According to process into row information, whether identification user terminal has run virtually in attendance
IP address software;Calculate the corresponding attendance cheating value-at-risk of attendance information according to recognition result;When attendance cheating value-at-risk is more than
When preset target risk value, the prompt message that attendance information re-types is generated, information is will be prompted to and is sent to the user terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:Attendance request is obtained, according to attendance acquisition request attendance information;Attendance is believed
Breath includes user identifier and corresponding attendance facial image and attendance IP address;Attendance information is sent to attendance server;
Attendance server is set to obtain corresponding benchmark face image according to user identifier, the benchmark for calculating attendance facial image and getting
The similarity of facial image is verified to whether similarity reaches threshold value;Preset IP white lists are obtained, IP white lists include
Multiple IP address;It is whether true to attendance IP address according to preset rules, and whether belong to IP white lists and verified;Work as phase
Reach threshold value like degree, and attendance IP address information is true and when belonging to IP white lists, generates the successful checking-in result of attendance;It receives
The checking-in result that attendance server returns, is shown checking-in result.
In one embodiment, following steps are also realized when computer program is executed by processor:It obtains in attendance information
Sensitive field, calculate the corresponding binary numeral of sensitive field;The corresponding salt figure of sensitivity field, meter are generated according to preset rules
Calculate the corresponding binary numeral of salt figure;The corresponding binary numeral of sensitive field and the corresponding binary numeral of salt figure are carried out pre-
If logical operation, obtain obscuring character string;Corresponding sensitive field is replaced by the way that character string will be obscured, to attendance information into
Row obscures encryption, will obscure encrypted attendance information and be sent to attendance server.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Instruct relevant hardware to complete by computer program, computer program can be stored in a non-volatile computer readable
It takes in storage medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, this Shen
Any reference to memory, storage, database or other media used in each embodiment please provided, may each comprise
Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield is all considered to be the range of this specification record.
Above example only expresses the several embodiments of the application, the description thereof is more specific and detailed, but can not
Therefore it is construed as limiting the scope of the patent.It should be pointed out that for those of ordinary skill in the art,
Under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection domain of the application.
Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of Work attendance method, the method includes:
The attendance information that user terminal is sent is received, the attendance information includes user identifier and corresponding attendance facial image
With attendance IP address;
Corresponding benchmark face image is obtained according to the user identifier, calculates the attendance facial image and the benchmark face
The similarity of image is verified to whether the similarity reaches threshold value;
Preset IP white lists are obtained, the IP white lists include multiple IP address;Whether institute is belonged to the attendance IP address
IP white lists are stated to be verified;
Whether the attendance IP address is really verified according to preset rules;
When the similarity reaches threshold value, and the attendance IP address is true and when belonging to the IP white lists, by attendance success
Checking-in result be back to the user terminal.
2. according to the method described in claim 1, it is characterized in that, the attendance information for receiving user terminal and sending;It is described
Attendance information includes the steps that user identifier and corresponding attendance facial image and attendance IP address includes:Receive user terminal
What is sent obscures encrypted attendance information, and described to obscure encrypted attendance information include obscuring character string;
The corresponding binary numeral of character string is obscured described in calculating;
According to preset rules generate described in obscure the corresponding salt figure of character string, calculate the corresponding binary numeral of the salt figure;
By obscuring the corresponding binary numeral of character string and the corresponding binary numeral of the salt figure carries out default patrol to described
Operation is collected, the attendance information is decrypted, the user identifier and corresponding attendance facial image and attendance IP are obtained
Address.
3. according to the method described in claim 1, it is characterized in that, before the acquisition preset IP white lists the step of,
Further include:
The IP address that frequency of usage reaches first threshold is acquired in attendance data library according to preset first time frequency, is utilized
Collected IP address builds the IP white lists;
Attendance record is obtained, the attendance frequency that fails acquire in the attendance record according to preset second temporal frequency and reaches the
The IP address of two threshold values, the IP address that the attendance failure frequency is reached to second threshold are added to the IP white lists;
By detecting whether IP address is used continuously, the IP address that the IP white lists are added to detection carries out legitimacy school
It tests;When verifying failure, the IP address not being used continuously is deleted from the IP white lists.
4. according to the method described in claim 1, it is characterized in that, the attendance information further includes the attendance IP address correspondence
Location information;Described the step of whether really being verified to the attendance IP address according to preset rules includes:
Corresponding user identifier and target position information are identified according to the multiple departments mark and each department that prestore, determines institute
State the target position information that the user identifier in attendance information corresponds to department's mark;
According to the location information and the target position information, the corresponding position of the user terminal and target location are calculated
Distance difference;
Compare whether the distance difference is more than preset error range;
When the distance difference is less than preset error range, indicate that the attendance IP Address Velocity passes through.
5. according to the method described in claim 1, it is characterized in that, the attendance information further include on the user terminal into
Journey operation information, the method further include:
According to the process into row information, identify whether the user terminal has run virtual ip address software in attendance;
Calculate the corresponding attendance cheating value-at-risk of the attendance information according to recognition result;
When attendance cheating value-at-risk is more than preset target risk value, the prompt that the attendance information re-types is generated
The prompt message is sent to the user terminal by information.
6. a kind of Work attendance method, the method includes:
Attendance request is obtained, according to the attendance acquisition request attendance information;The attendance information includes user identifier and right
The attendance facial image and attendance IP address answered;
The attendance information is sent to attendance server;The attendance server is set to be obtained according to the user identifier corresponding
Benchmark face image calculates the similarity of the attendance facial image and the benchmark face image got, to the similarity
Whether reach threshold value to be verified;Preset IP white lists are obtained, the IP white lists include multiple IP address;According to default rule
It is then whether true to the attendance IP address, and whether belong to the IP white lists and verified;When the similarity reaches
Threshold value, and the attendance IP address information is true and when belonging to the IP white lists, generates the successful checking-in result of attendance;
The checking-in result that the attendance server returns is received, the checking-in result is shown.
7. according to the method described in claim 1, it is characterized in that, described be sent to attendance server by the attendance information
Step includes:
The sensitive field in the attendance information is obtained, the corresponding binary numeral of the sensitive field is calculated;
The corresponding salt figure of the sensitive field is generated according to preset rules, calculates the corresponding binary numeral of the salt figure;
Logic of propositions operation is carried out to the sensitive corresponding binary numeral of field and the corresponding binary numeral of the salt figure,
It obtains obscuring character string;
By obscuring character string by described and be replaced to the corresponding sensitive field, the attendance information obscure plus
It is close, encrypted attendance information will be obscured and be sent to attendance server.
8. a kind of Work attendance device, which is characterized in that described device includes:
Attendance information parsing module, the attendance information for receiving user terminal transmission, the attendance information includes user identifier
And corresponding attendance facial image and attendance IP address;
Attendance information correction verification module calculates the attendance for obtaining corresponding benchmark face image according to the user identifier
The similarity of facial image and the benchmark face image is verified to whether the similarity reaches threshold value;It obtains default
IP white lists, the IP white lists include multiple IP address;To the attendance IP address whether belong to the IP white lists into
Row verification;Whether the attendance IP address is really verified according to preset rules;
Checking-in result feedback module reaches threshold value for working as the similarity, and the attendance IP address is true and belongs to described
When IP white lists, the successful checking-in result of attendance is back to the user terminal.
9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor
Calculation machine program, which is characterized in that the processor, which is realized when executing the computer program in claim 1 to 5 or 6 to 7, appoints
The step of one the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claim 1 to 5 or 6 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810119751.3A CN108346191B (en) | 2018-02-06 | 2018-02-06 | Attendance checking method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810119751.3A CN108346191B (en) | 2018-02-06 | 2018-02-06 | Attendance checking method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108346191A true CN108346191A (en) | 2018-07-31 |
CN108346191B CN108346191B (en) | 2020-08-14 |
Family
ID=62959935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810119751.3A Active CN108346191B (en) | 2018-02-06 | 2018-02-06 | Attendance checking method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108346191B (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040281A (en) * | 2018-08-22 | 2018-12-18 | 深圳市商汤科技有限公司 | Content delivery method, terminal device and electronic equipment |
CN109241868A (en) * | 2018-08-16 | 2019-01-18 | 平安科技(深圳)有限公司 | Face identification method, device, computer equipment and storage medium |
CN109285234A (en) * | 2018-09-29 | 2019-01-29 | 中国平安人寿保险股份有限公司 | Human face identification work-attendance checking method, device, computer installation and storage medium |
CN109389366A (en) * | 2018-09-26 | 2019-02-26 | 平安国际融资租赁有限公司 | Work attendance method, device, computer equipment and storage medium |
CN109543942A (en) * | 2018-10-16 | 2019-03-29 | 平安普惠企业管理有限公司 | Data verification method, device, computer equipment and storage medium |
CN109544721A (en) * | 2018-12-04 | 2019-03-29 | 北京诺士诚国际工程项目管理有限公司 | A kind of long-range punch card method and system |
CN109754483A (en) * | 2019-02-26 | 2019-05-14 | 浙江科技学院 | A kind of method of registering based on Bluetooth broadcast technology |
CN109829688A (en) * | 2019-01-04 | 2019-05-31 | 平安科技(深圳)有限公司 | Client, server, movable attendance checking method and computer readable storage medium |
CN110070190A (en) * | 2019-03-16 | 2019-07-30 | 平安城市建设科技(深圳)有限公司 | Property method for maintaining, maintenance man's terminal, background server and storage medium |
CN110111062A (en) * | 2018-09-03 | 2019-08-09 | 中国平安人寿保险股份有限公司 | A kind of camouflage attendance scene recognition method and device based on big data |
CN110349284A (en) * | 2019-07-03 | 2019-10-18 | 浙江好得电气有限公司 | Plateau high-pressure PT cabinet with transformer casing overhauls monitoring method, device |
CN110598754A (en) * | 2019-08-16 | 2019-12-20 | 泰致德科技发展(深圳)有限公司 | Online monitoring method, device and equipment based on image detection and storage medium |
CN110782228A (en) * | 2019-10-25 | 2020-02-11 | 上海燕汐软件信息科技有限公司 | Working duration obtaining method and device, electronic equipment and storage medium |
CN111079140A (en) * | 2018-10-18 | 2020-04-28 | 中国人寿保险股份有限公司 | Method, device and system for preventing cheating |
CN111400621A (en) * | 2020-04-06 | 2020-07-10 | 中信银行股份有限公司 | Method and device for verifying authenticity of position information and electronic equipment |
CN112419681A (en) * | 2020-11-19 | 2021-02-26 | 杭州云深科技有限公司 | Target early warning method, electronic device, and medium |
CN112509165A (en) * | 2020-11-27 | 2021-03-16 | 中国人寿保险股份有限公司 | Anti-cheating attendance checking method and system |
CN112949667A (en) * | 2019-12-09 | 2021-06-11 | 北京金山云网络技术有限公司 | Image recognition method, system, electronic device and storage medium |
CN113240824A (en) * | 2021-07-08 | 2021-08-10 | 太平金融科技服务(上海)有限公司深圳分公司 | Attendance checking method and device, computer equipment and storage medium |
CN114360085A (en) * | 2021-11-25 | 2022-04-15 | 中国人民人寿保险股份有限公司 | Method for identifying attendance cheating behaviors, service system and terminal equipment thereof |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080004999A1 (en) * | 2006-06-28 | 2008-01-03 | Pamela Ann Miller | High-security time-and-attendance data collection system |
CN101572701A (en) * | 2009-02-10 | 2009-11-04 | 中科正阳信息安全技术有限公司 | Security gateway system for resisting DDoS attack for DNS service |
US20100111377A1 (en) * | 2002-11-21 | 2010-05-06 | Monroe David A | Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System |
CN104168269A (en) * | 2014-07-24 | 2014-11-26 | 深圳市腾讯计算机***有限公司 | Secure connection establishing method, apparatus and system |
CN104200535A (en) * | 2014-08-30 | 2014-12-10 | 中国铁通集团有限公司河南分公司 | Tour-inspection sign-in device based on two-dimensional code information |
CN104468780A (en) * | 2014-12-05 | 2015-03-25 | 蓝信工场(北京)科技有限公司 | Attendance statistics method and system based on internal network and geographic information uploading |
CN104599336A (en) * | 2014-12-17 | 2015-05-06 | 无锡华海天和信息科技有限公司 | Method for automatically checking in and checking out through Wi-Fi |
CN104732602A (en) * | 2015-02-04 | 2015-06-24 | 四川长虹电器股份有限公司 | Attendance checking method based on cloud human face and expression recognition |
CN105577684A (en) * | 2016-01-25 | 2016-05-11 | 北京京东尚科信息技术有限公司 | Anti-crawling methods, server, client and system |
CN105721489A (en) * | 2016-03-16 | 2016-06-29 | 四川长虹电器股份有限公司 | Authentication method and system of IPs in IP white list based on digital certificates |
CN107481342A (en) * | 2016-06-07 | 2017-12-15 | 腾讯科技(深圳)有限公司 | Attendance checking system, method, server and terminal |
-
2018
- 2018-02-06 CN CN201810119751.3A patent/CN108346191B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100111377A1 (en) * | 2002-11-21 | 2010-05-06 | Monroe David A | Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System |
US20080004999A1 (en) * | 2006-06-28 | 2008-01-03 | Pamela Ann Miller | High-security time-and-attendance data collection system |
CN101572701A (en) * | 2009-02-10 | 2009-11-04 | 中科正阳信息安全技术有限公司 | Security gateway system for resisting DDoS attack for DNS service |
CN104168269A (en) * | 2014-07-24 | 2014-11-26 | 深圳市腾讯计算机***有限公司 | Secure connection establishing method, apparatus and system |
CN104200535A (en) * | 2014-08-30 | 2014-12-10 | 中国铁通集团有限公司河南分公司 | Tour-inspection sign-in device based on two-dimensional code information |
CN104468780A (en) * | 2014-12-05 | 2015-03-25 | 蓝信工场(北京)科技有限公司 | Attendance statistics method and system based on internal network and geographic information uploading |
CN104599336A (en) * | 2014-12-17 | 2015-05-06 | 无锡华海天和信息科技有限公司 | Method for automatically checking in and checking out through Wi-Fi |
CN104732602A (en) * | 2015-02-04 | 2015-06-24 | 四川长虹电器股份有限公司 | Attendance checking method based on cloud human face and expression recognition |
CN105577684A (en) * | 2016-01-25 | 2016-05-11 | 北京京东尚科信息技术有限公司 | Anti-crawling methods, server, client and system |
CN105721489A (en) * | 2016-03-16 | 2016-06-29 | 四川长虹电器股份有限公司 | Authentication method and system of IPs in IP white list based on digital certificates |
CN107481342A (en) * | 2016-06-07 | 2017-12-15 | 腾讯科技(深圳)有限公司 | Attendance checking system, method, server and terminal |
Non-Patent Citations (1)
Title |
---|
姬鸣扬,李林森,李建华: "P2P网贷用户数据脱敏技术研究", 《通信技术》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109241868A (en) * | 2018-08-16 | 2019-01-18 | 平安科技(深圳)有限公司 | Face identification method, device, computer equipment and storage medium |
CN109040281A (en) * | 2018-08-22 | 2018-12-18 | 深圳市商汤科技有限公司 | Content delivery method, terminal device and electronic equipment |
CN110111062A (en) * | 2018-09-03 | 2019-08-09 | 中国平安人寿保险股份有限公司 | A kind of camouflage attendance scene recognition method and device based on big data |
CN109389366A (en) * | 2018-09-26 | 2019-02-26 | 平安国际融资租赁有限公司 | Work attendance method, device, computer equipment and storage medium |
CN109389366B (en) * | 2018-09-26 | 2024-05-14 | 平安国际融资租赁有限公司 | Attendance checking method, attendance checking device, computer equipment and storage medium |
CN109285234A (en) * | 2018-09-29 | 2019-01-29 | 中国平安人寿保险股份有限公司 | Human face identification work-attendance checking method, device, computer installation and storage medium |
CN109543942A (en) * | 2018-10-16 | 2019-03-29 | 平安普惠企业管理有限公司 | Data verification method, device, computer equipment and storage medium |
CN111079140A (en) * | 2018-10-18 | 2020-04-28 | 中国人寿保险股份有限公司 | Method, device and system for preventing cheating |
CN109544721A (en) * | 2018-12-04 | 2019-03-29 | 北京诺士诚国际工程项目管理有限公司 | A kind of long-range punch card method and system |
CN109829688A (en) * | 2019-01-04 | 2019-05-31 | 平安科技(深圳)有限公司 | Client, server, movable attendance checking method and computer readable storage medium |
CN109754483A (en) * | 2019-02-26 | 2019-05-14 | 浙江科技学院 | A kind of method of registering based on Bluetooth broadcast technology |
CN110070190A (en) * | 2019-03-16 | 2019-07-30 | 平安城市建设科技(深圳)有限公司 | Property method for maintaining, maintenance man's terminal, background server and storage medium |
CN110349284A (en) * | 2019-07-03 | 2019-10-18 | 浙江好得电气有限公司 | Plateau high-pressure PT cabinet with transformer casing overhauls monitoring method, device |
CN110598754A (en) * | 2019-08-16 | 2019-12-20 | 泰致德科技发展(深圳)有限公司 | Online monitoring method, device and equipment based on image detection and storage medium |
CN110782228A (en) * | 2019-10-25 | 2020-02-11 | 上海燕汐软件信息科技有限公司 | Working duration obtaining method and device, electronic equipment and storage medium |
CN112949667A (en) * | 2019-12-09 | 2021-06-11 | 北京金山云网络技术有限公司 | Image recognition method, system, electronic device and storage medium |
CN111400621A (en) * | 2020-04-06 | 2020-07-10 | 中信银行股份有限公司 | Method and device for verifying authenticity of position information and electronic equipment |
CN112419681A (en) * | 2020-11-19 | 2021-02-26 | 杭州云深科技有限公司 | Target early warning method, electronic device, and medium |
CN112509165A (en) * | 2020-11-27 | 2021-03-16 | 中国人寿保险股份有限公司 | Anti-cheating attendance checking method and system |
CN113240824A (en) * | 2021-07-08 | 2021-08-10 | 太平金融科技服务(上海)有限公司深圳分公司 | Attendance checking method and device, computer equipment and storage medium |
CN113240824B (en) * | 2021-07-08 | 2021-10-29 | 太平金融科技服务(上海)有限公司深圳分公司 | Attendance checking method and device, computer equipment and storage medium |
CN114360085A (en) * | 2021-11-25 | 2022-04-15 | 中国人民人寿保险股份有限公司 | Method for identifying attendance cheating behaviors, service system and terminal equipment thereof |
Also Published As
Publication number | Publication date |
---|---|
CN108346191B (en) | 2020-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108346191A (en) | Work attendance method, device, computer equipment and storage medium | |
US9449310B2 (en) | Check-in method and system based on two-dimensional code, scanning terminal, and display terminal | |
CN112257110B (en) | Electronic signature management method, management system and computer readable storage medium | |
CN106952011B (en) | Real estate surveying method and system | |
CN107563712A (en) | A kind of mobile terminal punch card method, device, equipment and system | |
CN111935349B (en) | Terminal-based information display method and device, terminal and storage medium | |
CN111556069A (en) | Visitor identity authentication method, system, device, computer equipment and storage medium | |
CN108537028A (en) | A kind of computer identity identifying system and method | |
CN110020526A (en) | The measures and procedures for the examination and approval, device and storage medium based on block chain authentication | |
JP2023139259A (en) | Image collection apparatus, server, encryption method, and decryption method | |
CN108764909A (en) | A kind of block chain data monitoring and managing method | |
CN110300400A (en) | One kind is registered method, apparatus, electronic equipment and storage medium | |
CN112771527A (en) | Information processing program, information processing apparatus, and information processing method | |
CN112231771B (en) | Block chain-based electronic contract online signing and security method | |
CN106230702A (en) | Identity information verification method, Apparatus and system | |
CN108566389A (en) | A kind of fingerprint identity validation method and device across application | |
CN111682955B (en) | Tool arrangement device for criminal scene electronic data evidence obtaining | |
CN113162770A (en) | Online signature method and system | |
CN111242768A (en) | Credit card information security obtaining method, device and system | |
CN115756255A (en) | Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium | |
CN111860726B (en) | Two-dimensional code display method, verification method, device and computer readable storage medium | |
CN108063665A (en) | Communication means and terminal device | |
CN113987506A (en) | Test method, device, test equipment and storage medium of authentication system | |
CN111696227B (en) | Unlocking method and device | |
CN103905376B (en) | A kind of method and system that two-way authentication is carried out based on OAUTH agreements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |