CN109034810A - Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology - Google Patents

Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology Download PDF

Info

Publication number
CN109034810A
CN109034810A CN201811022613.XA CN201811022613A CN109034810A CN 109034810 A CN109034810 A CN 109034810A CN 201811022613 A CN201811022613 A CN 201811022613A CN 109034810 A CN109034810 A CN 109034810A
Authority
CN
China
Prior art keywords
face
key
recognition
module
vivo detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811022613.XA
Other languages
Chinese (zh)
Inventor
吴树军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Flex Information Technology Co Ltd
Original Assignee
Beijing Flex Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Flex Information Technology Co Ltd filed Critical Beijing Flex Information Technology Co Ltd
Priority to CN201811022613.XA priority Critical patent/CN109034810A/en
Publication of CN109034810A publication Critical patent/CN109034810A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present invention provides a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, including controlling processing circuit, show input module, built-in camera, Cloud Server communication module, face identification system, built-in camera obtains the image of trade user and its nearby sphere in real time, and the face identification system in Cloud Server is uploaded to by Cloud Server communication module, carry out recognition of face and In vivo detection, refresh the key assignments on keyboard when camera detects the face in addition to trade user each time, the setting of key assignments is calculated by the host computer being connected with control processing circuit, refresh host computer each time and one group of key mapping is generated according to hash algorithm, key mapping input and the computing circuit being transmitted in control processing circuit, until user inputs careful code by display input module, into account.The key assignments of dynamics change of the present invention ensures the safety of code keyboard.

Description

Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology
Technical field
It is related to the keyboard of secured inputting method the present invention relates to a kind of, is based on recognition of face and living body more particularly, to one kind The dynamic Hash code keyboard of detection technique.
Background technique
Code keyboard is that a kind of be widely used in outside financial, securities industry customer transaction Password Input computer sets It is standby.Its essence is the computer peripheral equipment being coupled by interface circuit with host computer, and wherein host computer can be that PC machine can also To be cloud server.When using code keyboard, keyboard can operate the key entry of user according to default rule trade user It is converted into corresponding key assignments (generally binary string), is transmitted to the Cloud Server of host computer.
Current most of code keyboards are imprinted on character on plastics keycap, similar to the keyboard of computer, each Character and key mapping on key are fixed.When trade user is when inputting password, meeting is according to key fixed on key (character i.e. on key) keys in oneself preset password.But there is very big security risk in this input mode, violate Guilty molecule can peep the code content of trade user input in closer distance easily very much, even if distance is farther out, The movement of hand and position, deduce user password when can also input password by peeping user.What is more, can also be in the dark Installation microcam achievees the purpose that above illegal.To solve the above-mentioned problems, there are the passive-types such as shield, one-meter line Anti-peeping means, but effect is unsatisfactory always.Once offender can be easily more it is a risk that password is stolen Ground takes debt away in ATM machine, does not need to carry out other verifyings.
With the development of artificial intelligence technology, the technologies such as recognition of face are gradually applied in some commercial fields.By right The training of deep learning network, face identification system can relatively accurately identify the matching of face in input face and database Degree.Based on this technology, transaction system can relatively accurately identify trade user whether be account owner, be greatly reduced close Risk after code is stolen.But there is also some technical leaks for recognition of face, if criminal takes the photo of account owner to go to complete Recognition of face is possible to crack system.So also needing monitored in vivo technology, judge to input whether face is true people Face.In addition to this, the input key mapping and sequence of criminal's snooping password in order to prevent, can use hash algorithm dynamic generation password The key assignments of keyboard constantly refreshes the arrangement of code keyboard key mapping according to regular, person of peeping is allowed to have no way of recording.
Summary of the invention
The present invention provides a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, solves use Family is when inputting account password, the problem of preventing the input key mapping and sequence of criminal's snooping password, its technical solution is as follows institute It states:
A kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, including control processing circuit and divide Not coupled display input module, built-in camera, Cloud Server communication module, further include face identification system, institute The image that built-in camera obtains trade user and its nearby sphere in real time is stated, and cloud is uploaded to by Cloud Server communication module Face identification system in server carries out recognition of face and In vivo detection, when camera is detected each time except trade user Refresh the key assignments on keyboard when face in addition, the setting of key assignments is counted by the host computer being connected with control processing circuit It calculates, refreshes host computer each time according to hash algorithm and generate one group of key mapping, key mapping input and the fortune being transmitted in control processing circuit Circuit is calculated, until user inputs careful code by display input module, into account.
The identification of face identification system is related to two parts database: the User Information Database of bank and Ministry of Public Security's networking Black list database.
The display input module includes liquid crystal key display, control of the liquid crystal key display in control processing circuit Lower display 0-9 10 numeric keys code and corrigendum key, clear key;Show that input module further includes corresponding with liquid crystal key display Key assignments input unit, corrigendum key, clear key.
The liquid crystal key display is provided with independent liquid crystal film, is respectively used to display 0-9 10 numeric keys code and more Positive key, clear key, key assignments input unit are independent switch device, and each liquid crystal film independent switch device corresponding with one matches It closes, the independent switch device is mechanical button, capacitance switch or conductive rubber switch.
The key mapping input unit is 3 × 4 matrix circuits by key connecting, and the line of matrix circuit is with single-chip microcontroller IC1's Input pin connection, single-chip microcontroller IC1 are used to scan the matrix circuit of keyboard and handle accordingly when by key pressing.
The built-in camera is located at code keyboard front, and bottom is equipped with angle adjustment device, can be according to actually answering Angle, the frame per second 30fps of built-in camera, resolution ratio 640x480, using cmos sensor are adjusted with environment.
The face identification system includes the face detection module successively handled, face alignment module, recognition of face Module and In vivo detection module, wherein face detection module, face alignment module, face recognition module realize recognition of face step Suddenly, In vivo detection module is for realizing In vivo detection step.
The Cloud Server communication module includes data transmission blocks, data inquiry module, feedback reception module, the number The two-dimension human face data that built-in camera captures are transferred in Cloud Server according to sending module;The data inquiry module energy It is enough that mankind's recognition result is inquired, while the Ministry of Public Security's blacklist networked with Cloud Server is inquired;The feedback Receiving module is for obtaining face recognition result, the activating pin keyboard circuit if as a result meeting the requirements, and otherwise locks cryptographic key Disk.
Keyboard workflow the following steps are included:
(1) user prepares operation password keyboard;
(2) built-in camera acquires facial image;
(3) the collected data of built-in camera are transferred in Cloud Server by Cloud Server communication module;
(4) face identification system in Cloud Server carries out information comparison, including carries out recognition of face and In vivo detection;
(5) consistent with householder's face to open keyboard, otherwise lock keyboard;
(6) built-in camera transmits real-time imaging, and input process detects other faces, then refreshes key mapping, host computer root Dynamic key position is generated according to hash algorithm, then user inputs password;
(7) user enters account, completes operation.
Further, in step (4), if user's face in the User Information Database of the face and bank that recognize Match, then Cloud Server sends a message to display input module, and trade user is allowed to be inputted;If recognition result and bank-user Face mismatches in database, then locks display input module, avoids bank card from being stolen by criminal and brushes;If the face recognized, Face matches in the black list database networked with the Ministry of Public Security, then triggers alarm.
The keyboard provided by the invention can obtain the face of trade user by built-in camera, pass through integrated communicaton mould Block is compared by banking data base in itself and Cloud Server, and with the face in the black list database of Ministry of Public Security networking, and In vivo detection is carried out, if with user information successful matching in banking data base and In vivo detection result is real human face, it can be with Input password is traded, and code keyboard or triggering alarm are otherwise locked.When inputting password, it is more than whenever being detected in camera When one face, the key assignments arrangement of keyboard can change once, and the key assignments of dynamics change ensures the safety of code keyboard.To protect The objectivity and randomness of key assignments arrangement are demonstrate,proved, the present invention generates the arrangement of each group key assignments using hash algorithm.In the above manner, this Invention can well solve the stolen rear stolen brush of bank card of password, and key mapping and input sequence are peeped when input password The safe coefficient of transaction is substantially improved in problem.In addition, be provided with blacklist query function in Cloud Server, directly and the Ministry of Public Security Database association, if the face recognized in blacklist can trigger alarm.
Detailed description of the invention
Fig. 1 is the functional module structure figure in the present invention;
Fig. 2 is system flow chart of the invention;
Fig. 3 is face identification system flow chart;
Fig. 4 is deep learning network training flow chart;
Fig. 5 is Cloud Server communication module operational flow diagram;
Fig. 6 is that code keyboard dynamic key position generates operational flow diagram.
Specific embodiment
As shown in Figure 1, the dynamic Hash code keyboard packet provided by the invention based on recognition of face Yu In vivo detection technology It includes display input module, control processing circuit, built-in camera, face identification system and Cloud Server communication module five accordingly Part.Display input module is made of liquid crystal key display and corresponding key assignments input unit, corrigendum key, clear key; It controls processing circuit controls liquid crystal key display and shows 0-9 10 numeric keys code and corrigendum key, clear key, key assignments input unit Key assignments corresponding to selected button is then sent into control processing circuit, is transmitted to host computer after processing.Built-in camera can be real When obtain the image of trade user and its nearby sphere, and the face in Cloud Server is uploaded to by Cloud Server communication module Identifying system carries out recognition of face and In vivo detection.
In the present invention, identification is related to two parts database: the black name of the User Information Database of bank and Ministry of Public Security's networking Single database.If user's face matches in the User Information Database of the face and bank that recognize, display is sent a message to Input module allows trade user to be inputted, if face mismatches in recognition result and bank-user database, locks aobvious Show input module, avoids bank card from being stolen by criminal and brush.If the face recognized, with the Ministry of Public Security networking black list database in Face matches, then triggers alarm.
The liquid crystal key display includes ten independent liquid crystal films of 0-9, and key assignments input unit is independent switch device, Each liquid crystal film independent switch device corresponding with one matches.Independent switch device is mechanical button, capacitance switch or leads Electric elastomeric switch.Corrigendum key, clear key are also so correspondingly arranged.
The control processing circuit includes key mapping input and computing circuit, and key mapping input unit is 3 × 4 squares by key connecting Battle array circuit, the line of matrix circuit couple with the input pin of single-chip microcontroller IC1, and the effect of single-chip microcontroller IC1 is to keyboard matrix circuit It scans and handles accordingly when by key pressing.The setting of key assignments is calculated by host computer, refreshes calculated according to Hash each time Method generates one group of key mapping, is transmitted to key mapping matrix circuit.The brush when camera detects the face in addition to trade user each time New key assignments.
Built-in camera is located at code keyboard front, angle can be adjusted according to actual application environment, to obtain effective field of view. Camera frame per second 30fps, resolution ratio 640x480, using cmos sensor.
Corresponding dynamic key value generation method, it is first determined random number value, 10 for 0-9 are whole in the present invention Number;This 10 integers are stored in array, position are randomly assigned to this 10 integers by Hash table, to reach random generation The purpose of password key mapping, prevents password from being speculated by criminal.
The submodule that corresponding face identification system is successively operated by four forms, and is respectively: Face datection (Face Detection), face are aligned (Face Alignment), recognition of face (Face Recognition) and living body inspection It surveys.
The part Face datection (Face Detection), the real-time imaging that system is transmitted by built-in camera detect picture Face in face, and the quantity of face in entire picture is recorded, if it exceeds a face, then refresh a key mapping.Through remarkable Face detecting step can separate the face in picture with picture other parts, then be aligned (Face by face Alignment) each key point of face is labeled by technology, such as canthus, nose, the corners of the mouth, can pass through these keys Point determines face and facial contour.Pre-treatment step more than can carry out recognition of face (Face Recognition).
The present invention uses the convolutional neural networks framework of GoogLeNet, this framework is nearly 2 years popular depth The network architecture is practised, it is fine for processing recognition of face and some classification problem effects.This system has carried out Fine- on its basis Tune training, training use CASIA face database.GoogLeNet network shares 22 layers, and another there are three full articulamentums, originally System is extracted face characteristic for identification at the 21st layer, and accuracy rate can accurately judge that transaction is used up to 99+% very much Whether family real-time imaging matches with the user image (such as identity card picture) stored in database.
The last one step is In vivo detection, for avoiding the photo of criminal's trade user from coping with recognition of face inspection It surveys.System can allow trade user completion the operation such as blink, nod, shaking the head at random, by built-in camera acquisition real-time imaging into Row analysis, face identification system can distinguish photo and face according to eyes or the isotonic conjunction state situation of change of mouth.It is verified, Face In vivo detection module of the invention can be found that illegal input face (human face photo, video etc.).
Corresponding Cloud Server communication module is by data transmission blocks, data inquiry module, feedback reception module group At.The two-dimension human face data that camera captures are transferred in Cloud Server by data transmission blocks;Data inquiry module can be right Mankind's recognition result is inquired, while being inquired the Ministry of Public Security's blacklist networked with Cloud Server;Feedback reception module Face recognition result is then obtained, otherwise the activating pin keyboard circuit if as a result meeting the requirements locks code keyboard.
In conclusion the present invention is added to recognition of face and In vivo detection function on the basis of conventional cipher keyboard, lead to It crosses and is compared with the data in Cloud Server, can be very good to judge whether trade user is householder, avoid bank card The property losses such as stolen brush.If face recognition result is overlapped with blacklist in Ministry of Public Security's networking data library, alarm can be triggered. Meanwhile the present invention devises dynamic password function with hash algorithm, refreshes key mapping when occurring a suspect in camera picture, It effectively prevent password leakage caused by peeping due to criminal.
Invention example one: workflow of the present invention is as shown in Figure 2.When user prepares to operate keyboard before sales counter, camera shooting Head can acquire first the facial image of operator, and be uploaded in Cloud Server by communication module.Face in Cloud Server Collected facial image can be compared with database images for identifying system, and database is divided into the user information data of bank The black list database in library and Ministry of Public Security's networking.If user's face in the User Information Database of the face and bank that recognize Match, then send a message to display input module, trade user is allowed to be inputted, if in recognition result and bank-user database Face mismatches, then locks display input module, avoids bank card from being stolen by criminal and brushes.If the face recognized, with the Ministry of Public Security Face matches in the black list database of networking, then triggers alarm.Code keyboard is arranged by hash algorithm dynamic generation key mapping Column, if detecting other faces in user's input process, refresh one group of new key mapping, until user inputs careful code, into Enter account.
Invention example two: face identification system operational process of the present invention is as shown in Figure 3.Firstly, system is built in The real-time imaging of thecamera head detects the face in picture, and records the quantity of face in entire picture, if it exceeds one Face then refreshes a key mapping.By face datection step, the face in picture can be separated with picture other parts, Each key point of face is labeled by face alignment techniques again, to determine face and facial contour.By above Pre-treatment step can carry out face recognition operation, send pretreated human face data as input into convolutional neural networks, instruction The network perfected can retrieve matched householder's facial image in database.If convolutional neural networks are not found in the database Corresponding face, then operator is not householder.If convolutional neural networks are found in Ministry of Public Security's networking black list database Corresponding face then triggers alarm.
Invention example three: deep learning network training process of the present invention is as shown in Figure 4.The present invention uses The convolutional neural networks framework of GoogLeNet, and Fine-tune training has been carried out on its basis.GoogLeNet network is shared 22 layers, another there are three full articulamentums.One is inputted first and passes through pretreated facial image, will do it one in the first layer of network Secondary normalization operation.Multiple convolution calculating can be successively carried out later, and the 12nd layer of section of pond result is as shown in the figure in a network.Pond Continue multiple convolution calculating after change, be extracted face characteristic for identification at the 21st layer, accuracy rate up to 99% or more, Can accurately judge very much trade user real-time imaging whether with the user image (such as identity card picture) that is stored in database Match.
Invention example four: Cloud Server communication module operational flow diagram of the present invention is as shown in Figure 5.Firstly, by imaging Head acquisition operator's facial image, is sent to Cloud Server by data transmission blocks.In Cloud Server, by data inquiry module Face information is identified in the database, and query result sends back code keyboard through feedback reception module, decides whether to open keyboard Lock.
Invention example five: it is as shown in Figure 6 that code keyboard dynamic key position of the present invention generates operational flow diagram.Firstly, building Random number array is found, is 10 key assignments of 0-9 in the present invention.Later, random place allocation is carried out to 10 key assignments with Hash table, with Obtain random key assignments arrangement.The key assignments arranged can be sent to LCD MODULE and user is waited to operate in next step.Meanwhile key mapping Generation module can monitor the information from face identification system, if face identification system recognizes in camera view more than one A face then sends instruction and refreshes a key mapping.
The keyboard provided by the invention can obtain the face of trade user by built-in camera, pass through integrated communicaton mould Block is compared by banking data base in itself and Cloud Server, and with the face in the black list database of Ministry of Public Security networking, and In vivo detection is carried out, if with user information successful matching in banking data base and In vivo detection result is real human face, it can be with Input password is traded, and code keyboard or triggering alarm are otherwise locked.When inputting password, it is more than whenever being detected in camera When one face, the key assignments arrangement of keyboard can change once, and the key assignments of dynamics change ensures the safety of code keyboard.To protect The objectivity and randomness of key assignments arrangement are demonstrate,proved, the present invention generates the arrangement of each group key assignments using hash algorithm.In the above manner, this Invention can well solve the stolen rear stolen brush of bank card of password, and key mapping and input sequence are peeped when input password The safe coefficient of transaction is substantially improved in problem.In addition, be provided with blacklist query function in Cloud Server, directly and the Ministry of Public Security Database association, if the face recognized in blacklist can trigger alarm.

Claims (10)

1. a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, it is characterised in that: at control Circuit and display input module coupled respectively, built-in camera, Cloud Server communication module are managed, further includes that face is known Other system, the built-in camera obtains the image of trade user and its nearby sphere in real time, and communicates mould by Cloud Server Block is uploaded to the face identification system in Cloud Server, recognition of face and In vivo detection is carried out, when camera detects each time Refresh the key assignments on keyboard when face in addition to trade user, the setting of key assignments is upper by being connected with control processing circuit Position machine calculates, and refreshes host computer each time according to hash algorithm and generates one group of key mapping, the key mapping being transmitted in control processing circuit Input and computing circuit, until user inputs careful code by display input module, into account.
2. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be: the identification of face identification system is related to two parts database: the User Information Database of bank and Ministry of Public Security's networking it is black List data library.
3. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be: the display input module includes liquid crystal key display, and liquid crystal key display is under the control of control processing circuit Show 0-9 10 numeric keys code and corrigendum key, clear key;Show that input module further includes key corresponding with liquid crystal key display It is worth input unit, corrigendum key, clear key.
4. the dynamic Hash code keyboard according to claim 3 based on recognition of face Yu In vivo detection technology, feature Be: the liquid crystal key display is provided with independent liquid crystal film, is respectively used to display 0-9 10 numeric keys code and corrigendum Key, clear key, key assignments input unit are independent switch device, and each liquid crystal film independent switch device corresponding with one matches It closes, the independent switch device is mechanical button, capacitance switch or conductive rubber switch.
5. the dynamic Hash code keyboard according to claim 4 based on recognition of face Yu In vivo detection technology, feature Be: the key mapping input unit is 3 × 4 matrix circuits, the input of the line and single-chip microcontroller IC1 of matrix circuit by key connecting Foot connection, single-chip microcontroller IC1 are used to scan the matrix circuit of keyboard and handle accordingly when by key pressing.
6. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be: the built-in camera is located at code keyboard front, and bottom is equipped with angle adjustment device, can be according to practical application ring Border adjusts angle, the frame per second 30fps of built-in camera, resolution ratio 640x480, using cmos sensor.
7. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be: the face identification system includes the face detection module successively handled, face alignment module, face recognition module With In vivo detection module, wherein face detection module, face alignment module, face recognition module realize recognition of face step, living Body detection module is for realizing In vivo detection step.
8. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be: the Cloud Server communication module includes data transmission blocks, data inquiry module, feedback reception module, the data The two-dimension human face data that built-in camera captures are transferred in Cloud Server by sending module;The data inquiry module can Mankind's recognition result is inquired, while the Ministry of Public Security's blacklist networked with Cloud Server is inquired;The feedback connects Module is received for obtaining face recognition result, otherwise the activating pin keyboard circuit if as a result meeting the requirements locks code keyboard.
9. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature Be, keyboard workflow the following steps are included:
(1) user prepares operation password keyboard;
(2) built-in camera acquires facial image;
(3) the collected data of built-in camera are transferred in Cloud Server by Cloud Server communication module;
(4) face identification system in Cloud Server carries out information comparison, including carries out recognition of face and In vivo detection;
(5) consistent with householder's face to open keyboard, otherwise lock keyboard;
(6) built-in camera transmits real-time imaging, and input process detects other faces, then refreshes key mapping, host computer is according to Kazakhstan Uncommon algorithm generates dynamic key position, and then user inputs password;
(7) user enters account, completes operation.
10. the dynamic Hash code keyboard according to claim 9 based on recognition of face Yu In vivo detection technology, feature It is, in step (4), if user's face matches in the User Information Database of the face and bank that recognize, Cloud Server Display input module is sent a message to, trade user is allowed to be inputted;If face in recognition result and bank-user database It mismatches, then locks display input module, avoid bank card from being stolen by criminal and brush;If the face recognized, network with the Ministry of Public Security Black list database in face match, then trigger alarm.
CN201811022613.XA 2018-09-03 2018-09-03 Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology Pending CN109034810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811022613.XA CN109034810A (en) 2018-09-03 2018-09-03 Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811022613.XA CN109034810A (en) 2018-09-03 2018-09-03 Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology

Publications (1)

Publication Number Publication Date
CN109034810A true CN109034810A (en) 2018-12-18

Family

ID=64623082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811022613.XA Pending CN109034810A (en) 2018-09-03 2018-09-03 Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology

Country Status (1)

Country Link
CN (1) CN109034810A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046492A (en) * 2019-03-28 2019-07-23 莆田学院 A kind of safe information interaction method and system
CN110069917A (en) * 2019-03-28 2019-07-30 莆田学院 A kind of method of password authentication and system
CN110688946A (en) * 2019-09-26 2020-01-14 上海依图信息技术有限公司 Public cloud silence in-vivo detection device and method based on picture identification
CN111292508A (en) * 2019-09-27 2020-06-16 深圳市威富视界有限公司 Bank safety warning system and warning method thereof
CN112836550A (en) * 2019-11-22 2021-05-25 杭州海康威视数字技术股份有限公司 Method, device, system, equipment and storage medium for detecting password peeping behavior
CN113179246A (en) * 2021-03-19 2021-07-27 重庆扬成大数据科技有限公司 Working method for carrying out government affair data fusion safety through four-in-one network
CN113268144A (en) * 2021-05-27 2021-08-17 浪潮电子信息产业股份有限公司 Peep-proof keyboard and use method thereof
CN114513605A (en) * 2022-01-25 2022-05-17 重庆医药高等专科学校 Big data storage system for image shooting
CN114513593A (en) * 2022-01-25 2022-05-17 重庆医药高等专科学校 Mass image acquisition working method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN105353891A (en) * 2015-12-08 2016-02-24 恒宝股份有限公司 Mechanical dynamic password peep prevention keyboard
CN206684828U (en) * 2017-01-04 2017-11-28 广西安辰信息产业股份有限公司 The anti-pry Orderless keyboards of ATM
KR20180077554A (en) * 2016-12-29 2018-07-09 주식회사 에이치앤비트 Key input security method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN105353891A (en) * 2015-12-08 2016-02-24 恒宝股份有限公司 Mechanical dynamic password peep prevention keyboard
KR20180077554A (en) * 2016-12-29 2018-07-09 주식회사 에이치앤비트 Key input security method
CN206684828U (en) * 2017-01-04 2017-11-28 广西安辰信息产业股份有限公司 The anti-pry Orderless keyboards of ATM

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046492A (en) * 2019-03-28 2019-07-23 莆田学院 A kind of safe information interaction method and system
CN110069917A (en) * 2019-03-28 2019-07-30 莆田学院 A kind of method of password authentication and system
CN110688946A (en) * 2019-09-26 2020-01-14 上海依图信息技术有限公司 Public cloud silence in-vivo detection device and method based on picture identification
CN111292508A (en) * 2019-09-27 2020-06-16 深圳市威富视界有限公司 Bank safety warning system and warning method thereof
CN112836550A (en) * 2019-11-22 2021-05-25 杭州海康威视数字技术股份有限公司 Method, device, system, equipment and storage medium for detecting password peeping behavior
CN113179246A (en) * 2021-03-19 2021-07-27 重庆扬成大数据科技有限公司 Working method for carrying out government affair data fusion safety through four-in-one network
CN113268144A (en) * 2021-05-27 2021-08-17 浪潮电子信息产业股份有限公司 Peep-proof keyboard and use method thereof
CN114513605A (en) * 2022-01-25 2022-05-17 重庆医药高等专科学校 Big data storage system for image shooting
CN114513593A (en) * 2022-01-25 2022-05-17 重庆医药高等专科学校 Mass image acquisition working method
CN114513605B (en) * 2022-01-25 2024-03-05 重庆医药高等专科学校 Big data storage system for image shooting
CN114513593B (en) * 2022-01-25 2024-04-16 重庆医药高等专科学校 Mass picture acquisition working method

Similar Documents

Publication Publication Date Title
CN109034810A (en) Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology
Negin et al. An iris biometric system for public and personal use
US7039221B1 (en) Facial image verification utilizing smart-card with integrated video camera
US6914517B2 (en) Fingerprint sensor with feature authentication
CN101523444B (en) System and method for traceless biometric identification
US7986816B1 (en) Methods and systems for multiple factor authentication using gaze tracking and iris scanning
US7212655B2 (en) Fingerprint verification system
EP3786820B1 (en) Authentication system, authentication device, authentication method, and program
US7091845B2 (en) Data entry systems with biometric devices for security access control
KR20190008474A (en) Electronic safe box having secure function of biometric data
CN112862491B (en) Face payment security method and platform based on security unit and trusted execution environment
Chuah et al. The Assistance of Eye Blink Detection for Two-Factor Authentication
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
SM et al. Development of personal identification number authorization algorithm using real-time eye tracking & dynamic keypad generation
Himaga et al. Finger vein authentication technology and financial applications
JP6891355B1 (en) Authentication system, authentication device, authentication method, and program
CN114065163A (en) Display mainboard and terminal with face identification and identity verification functions
Zhou et al. A Survey on Biometrics Authentication
Suma et al. Women safety by real-time eye tracking for password testimony
Lakkoju et al. Detection of Fingerprints in Advanced Biometric System Design
More et al. Survey paper on door level security using face recognition
WO2023199455A1 (en) Identification system, entry/exit management system, and pos system
WO2021192150A1 (en) Authentication system, user terminal, authentication method, and program
Abirami et al. Retina based E-voting system using fuzzy logic and hamming distance
Benlamri et al. Secure human face authentication for mobile e-government transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218

RJ01 Rejection of invention patent application after publication