CN109034810A - Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology - Google Patents
Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology Download PDFInfo
- Publication number
- CN109034810A CN109034810A CN201811022613.XA CN201811022613A CN109034810A CN 109034810 A CN109034810 A CN 109034810A CN 201811022613 A CN201811022613 A CN 201811022613A CN 109034810 A CN109034810 A CN 109034810A
- Authority
- CN
- China
- Prior art keywords
- face
- key
- recognition
- module
- vivo detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The present invention provides a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, including controlling processing circuit, show input module, built-in camera, Cloud Server communication module, face identification system, built-in camera obtains the image of trade user and its nearby sphere in real time, and the face identification system in Cloud Server is uploaded to by Cloud Server communication module, carry out recognition of face and In vivo detection, refresh the key assignments on keyboard when camera detects the face in addition to trade user each time, the setting of key assignments is calculated by the host computer being connected with control processing circuit, refresh host computer each time and one group of key mapping is generated according to hash algorithm, key mapping input and the computing circuit being transmitted in control processing circuit, until user inputs careful code by display input module, into account.The key assignments of dynamics change of the present invention ensures the safety of code keyboard.
Description
Technical field
It is related to the keyboard of secured inputting method the present invention relates to a kind of, is based on recognition of face and living body more particularly, to one kind
The dynamic Hash code keyboard of detection technique.
Background technique
Code keyboard is that a kind of be widely used in outside financial, securities industry customer transaction Password Input computer sets
It is standby.Its essence is the computer peripheral equipment being coupled by interface circuit with host computer, and wherein host computer can be that PC machine can also
To be cloud server.When using code keyboard, keyboard can operate the key entry of user according to default rule trade user
It is converted into corresponding key assignments (generally binary string), is transmitted to the Cloud Server of host computer.
Current most of code keyboards are imprinted on character on plastics keycap, similar to the keyboard of computer, each
Character and key mapping on key are fixed.When trade user is when inputting password, meeting is according to key fixed on key
(character i.e. on key) keys in oneself preset password.But there is very big security risk in this input mode, violate
Guilty molecule can peep the code content of trade user input in closer distance easily very much, even if distance is farther out,
The movement of hand and position, deduce user password when can also input password by peeping user.What is more, can also be in the dark
Installation microcam achievees the purpose that above illegal.To solve the above-mentioned problems, there are the passive-types such as shield, one-meter line
Anti-peeping means, but effect is unsatisfactory always.Once offender can be easily more it is a risk that password is stolen
Ground takes debt away in ATM machine, does not need to carry out other verifyings.
With the development of artificial intelligence technology, the technologies such as recognition of face are gradually applied in some commercial fields.By right
The training of deep learning network, face identification system can relatively accurately identify the matching of face in input face and database
Degree.Based on this technology, transaction system can relatively accurately identify trade user whether be account owner, be greatly reduced close
Risk after code is stolen.But there is also some technical leaks for recognition of face, if criminal takes the photo of account owner to go to complete
Recognition of face is possible to crack system.So also needing monitored in vivo technology, judge to input whether face is true people
Face.In addition to this, the input key mapping and sequence of criminal's snooping password in order to prevent, can use hash algorithm dynamic generation password
The key assignments of keyboard constantly refreshes the arrangement of code keyboard key mapping according to regular, person of peeping is allowed to have no way of recording.
Summary of the invention
The present invention provides a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, solves use
Family is when inputting account password, the problem of preventing the input key mapping and sequence of criminal's snooping password, its technical solution is as follows institute
It states:
A kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, including control processing circuit and divide
Not coupled display input module, built-in camera, Cloud Server communication module, further include face identification system, institute
The image that built-in camera obtains trade user and its nearby sphere in real time is stated, and cloud is uploaded to by Cloud Server communication module
Face identification system in server carries out recognition of face and In vivo detection, when camera is detected each time except trade user
Refresh the key assignments on keyboard when face in addition, the setting of key assignments is counted by the host computer being connected with control processing circuit
It calculates, refreshes host computer each time according to hash algorithm and generate one group of key mapping, key mapping input and the fortune being transmitted in control processing circuit
Circuit is calculated, until user inputs careful code by display input module, into account.
The identification of face identification system is related to two parts database: the User Information Database of bank and Ministry of Public Security's networking
Black list database.
The display input module includes liquid crystal key display, control of the liquid crystal key display in control processing circuit
Lower display 0-9 10 numeric keys code and corrigendum key, clear key;Show that input module further includes corresponding with liquid crystal key display
Key assignments input unit, corrigendum key, clear key.
The liquid crystal key display is provided with independent liquid crystal film, is respectively used to display 0-9 10 numeric keys code and more
Positive key, clear key, key assignments input unit are independent switch device, and each liquid crystal film independent switch device corresponding with one matches
It closes, the independent switch device is mechanical button, capacitance switch or conductive rubber switch.
The key mapping input unit is 3 × 4 matrix circuits by key connecting, and the line of matrix circuit is with single-chip microcontroller IC1's
Input pin connection, single-chip microcontroller IC1 are used to scan the matrix circuit of keyboard and handle accordingly when by key pressing.
The built-in camera is located at code keyboard front, and bottom is equipped with angle adjustment device, can be according to actually answering
Angle, the frame per second 30fps of built-in camera, resolution ratio 640x480, using cmos sensor are adjusted with environment.
The face identification system includes the face detection module successively handled, face alignment module, recognition of face
Module and In vivo detection module, wherein face detection module, face alignment module, face recognition module realize recognition of face step
Suddenly, In vivo detection module is for realizing In vivo detection step.
The Cloud Server communication module includes data transmission blocks, data inquiry module, feedback reception module, the number
The two-dimension human face data that built-in camera captures are transferred in Cloud Server according to sending module;The data inquiry module energy
It is enough that mankind's recognition result is inquired, while the Ministry of Public Security's blacklist networked with Cloud Server is inquired;The feedback
Receiving module is for obtaining face recognition result, the activating pin keyboard circuit if as a result meeting the requirements, and otherwise locks cryptographic key
Disk.
Keyboard workflow the following steps are included:
(1) user prepares operation password keyboard;
(2) built-in camera acquires facial image;
(3) the collected data of built-in camera are transferred in Cloud Server by Cloud Server communication module;
(4) face identification system in Cloud Server carries out information comparison, including carries out recognition of face and In vivo detection;
(5) consistent with householder's face to open keyboard, otherwise lock keyboard;
(6) built-in camera transmits real-time imaging, and input process detects other faces, then refreshes key mapping, host computer root
Dynamic key position is generated according to hash algorithm, then user inputs password;
(7) user enters account, completes operation.
Further, in step (4), if user's face in the User Information Database of the face and bank that recognize
Match, then Cloud Server sends a message to display input module, and trade user is allowed to be inputted;If recognition result and bank-user
Face mismatches in database, then locks display input module, avoids bank card from being stolen by criminal and brushes;If the face recognized,
Face matches in the black list database networked with the Ministry of Public Security, then triggers alarm.
The keyboard provided by the invention can obtain the face of trade user by built-in camera, pass through integrated communicaton mould
Block is compared by banking data base in itself and Cloud Server, and with the face in the black list database of Ministry of Public Security networking, and
In vivo detection is carried out, if with user information successful matching in banking data base and In vivo detection result is real human face, it can be with
Input password is traded, and code keyboard or triggering alarm are otherwise locked.When inputting password, it is more than whenever being detected in camera
When one face, the key assignments arrangement of keyboard can change once, and the key assignments of dynamics change ensures the safety of code keyboard.To protect
The objectivity and randomness of key assignments arrangement are demonstrate,proved, the present invention generates the arrangement of each group key assignments using hash algorithm.In the above manner, this
Invention can well solve the stolen rear stolen brush of bank card of password, and key mapping and input sequence are peeped when input password
The safe coefficient of transaction is substantially improved in problem.In addition, be provided with blacklist query function in Cloud Server, directly and the Ministry of Public Security
Database association, if the face recognized in blacklist can trigger alarm.
Detailed description of the invention
Fig. 1 is the functional module structure figure in the present invention;
Fig. 2 is system flow chart of the invention;
Fig. 3 is face identification system flow chart;
Fig. 4 is deep learning network training flow chart;
Fig. 5 is Cloud Server communication module operational flow diagram;
Fig. 6 is that code keyboard dynamic key position generates operational flow diagram.
Specific embodiment
As shown in Figure 1, the dynamic Hash code keyboard packet provided by the invention based on recognition of face Yu In vivo detection technology
It includes display input module, control processing circuit, built-in camera, face identification system and Cloud Server communication module five accordingly
Part.Display input module is made of liquid crystal key display and corresponding key assignments input unit, corrigendum key, clear key;
It controls processing circuit controls liquid crystal key display and shows 0-9 10 numeric keys code and corrigendum key, clear key, key assignments input unit
Key assignments corresponding to selected button is then sent into control processing circuit, is transmitted to host computer after processing.Built-in camera can be real
When obtain the image of trade user and its nearby sphere, and the face in Cloud Server is uploaded to by Cloud Server communication module
Identifying system carries out recognition of face and In vivo detection.
In the present invention, identification is related to two parts database: the black name of the User Information Database of bank and Ministry of Public Security's networking
Single database.If user's face matches in the User Information Database of the face and bank that recognize, display is sent a message to
Input module allows trade user to be inputted, if face mismatches in recognition result and bank-user database, locks aobvious
Show input module, avoids bank card from being stolen by criminal and brush.If the face recognized, with the Ministry of Public Security networking black list database in
Face matches, then triggers alarm.
The liquid crystal key display includes ten independent liquid crystal films of 0-9, and key assignments input unit is independent switch device,
Each liquid crystal film independent switch device corresponding with one matches.Independent switch device is mechanical button, capacitance switch or leads
Electric elastomeric switch.Corrigendum key, clear key are also so correspondingly arranged.
The control processing circuit includes key mapping input and computing circuit, and key mapping input unit is 3 × 4 squares by key connecting
Battle array circuit, the line of matrix circuit couple with the input pin of single-chip microcontroller IC1, and the effect of single-chip microcontroller IC1 is to keyboard matrix circuit
It scans and handles accordingly when by key pressing.The setting of key assignments is calculated by host computer, refreshes calculated according to Hash each time
Method generates one group of key mapping, is transmitted to key mapping matrix circuit.The brush when camera detects the face in addition to trade user each time
New key assignments.
Built-in camera is located at code keyboard front, angle can be adjusted according to actual application environment, to obtain effective field of view.
Camera frame per second 30fps, resolution ratio 640x480, using cmos sensor.
Corresponding dynamic key value generation method, it is first determined random number value, 10 for 0-9 are whole in the present invention
Number;This 10 integers are stored in array, position are randomly assigned to this 10 integers by Hash table, to reach random generation
The purpose of password key mapping, prevents password from being speculated by criminal.
The submodule that corresponding face identification system is successively operated by four forms, and is respectively: Face datection
(Face Detection), face are aligned (Face Alignment), recognition of face (Face Recognition) and living body inspection
It surveys.
The part Face datection (Face Detection), the real-time imaging that system is transmitted by built-in camera detect picture
Face in face, and the quantity of face in entire picture is recorded, if it exceeds a face, then refresh a key mapping.Through remarkable
Face detecting step can separate the face in picture with picture other parts, then be aligned (Face by face
Alignment) each key point of face is labeled by technology, such as canthus, nose, the corners of the mouth, can pass through these keys
Point determines face and facial contour.Pre-treatment step more than can carry out recognition of face (Face Recognition).
The present invention uses the convolutional neural networks framework of GoogLeNet, this framework is nearly 2 years popular depth
The network architecture is practised, it is fine for processing recognition of face and some classification problem effects.This system has carried out Fine- on its basis
Tune training, training use CASIA face database.GoogLeNet network shares 22 layers, and another there are three full articulamentums, originally
System is extracted face characteristic for identification at the 21st layer, and accuracy rate can accurately judge that transaction is used up to 99+% very much
Whether family real-time imaging matches with the user image (such as identity card picture) stored in database.
The last one step is In vivo detection, for avoiding the photo of criminal's trade user from coping with recognition of face inspection
It surveys.System can allow trade user completion the operation such as blink, nod, shaking the head at random, by built-in camera acquisition real-time imaging into
Row analysis, face identification system can distinguish photo and face according to eyes or the isotonic conjunction state situation of change of mouth.It is verified,
Face In vivo detection module of the invention can be found that illegal input face (human face photo, video etc.).
Corresponding Cloud Server communication module is by data transmission blocks, data inquiry module, feedback reception module group
At.The two-dimension human face data that camera captures are transferred in Cloud Server by data transmission blocks;Data inquiry module can be right
Mankind's recognition result is inquired, while being inquired the Ministry of Public Security's blacklist networked with Cloud Server;Feedback reception module
Face recognition result is then obtained, otherwise the activating pin keyboard circuit if as a result meeting the requirements locks code keyboard.
In conclusion the present invention is added to recognition of face and In vivo detection function on the basis of conventional cipher keyboard, lead to
It crosses and is compared with the data in Cloud Server, can be very good to judge whether trade user is householder, avoid bank card
The property losses such as stolen brush.If face recognition result is overlapped with blacklist in Ministry of Public Security's networking data library, alarm can be triggered.
Meanwhile the present invention devises dynamic password function with hash algorithm, refreshes key mapping when occurring a suspect in camera picture,
It effectively prevent password leakage caused by peeping due to criminal.
Invention example one: workflow of the present invention is as shown in Figure 2.When user prepares to operate keyboard before sales counter, camera shooting
Head can acquire first the facial image of operator, and be uploaded in Cloud Server by communication module.Face in Cloud Server
Collected facial image can be compared with database images for identifying system, and database is divided into the user information data of bank
The black list database in library and Ministry of Public Security's networking.If user's face in the User Information Database of the face and bank that recognize
Match, then send a message to display input module, trade user is allowed to be inputted, if in recognition result and bank-user database
Face mismatches, then locks display input module, avoids bank card from being stolen by criminal and brushes.If the face recognized, with the Ministry of Public Security
Face matches in the black list database of networking, then triggers alarm.Code keyboard is arranged by hash algorithm dynamic generation key mapping
Column, if detecting other faces in user's input process, refresh one group of new key mapping, until user inputs careful code, into
Enter account.
Invention example two: face identification system operational process of the present invention is as shown in Figure 3.Firstly, system is built in
The real-time imaging of thecamera head detects the face in picture, and records the quantity of face in entire picture, if it exceeds one
Face then refreshes a key mapping.By face datection step, the face in picture can be separated with picture other parts,
Each key point of face is labeled by face alignment techniques again, to determine face and facial contour.By above
Pre-treatment step can carry out face recognition operation, send pretreated human face data as input into convolutional neural networks, instruction
The network perfected can retrieve matched householder's facial image in database.If convolutional neural networks are not found in the database
Corresponding face, then operator is not householder.If convolutional neural networks are found in Ministry of Public Security's networking black list database
Corresponding face then triggers alarm.
Invention example three: deep learning network training process of the present invention is as shown in Figure 4.The present invention uses
The convolutional neural networks framework of GoogLeNet, and Fine-tune training has been carried out on its basis.GoogLeNet network is shared
22 layers, another there are three full articulamentums.One is inputted first and passes through pretreated facial image, will do it one in the first layer of network
Secondary normalization operation.Multiple convolution calculating can be successively carried out later, and the 12nd layer of section of pond result is as shown in the figure in a network.Pond
Continue multiple convolution calculating after change, be extracted face characteristic for identification at the 21st layer, accuracy rate up to 99% or more,
Can accurately judge very much trade user real-time imaging whether with the user image (such as identity card picture) that is stored in database
Match.
Invention example four: Cloud Server communication module operational flow diagram of the present invention is as shown in Figure 5.Firstly, by imaging
Head acquisition operator's facial image, is sent to Cloud Server by data transmission blocks.In Cloud Server, by data inquiry module
Face information is identified in the database, and query result sends back code keyboard through feedback reception module, decides whether to open keyboard
Lock.
Invention example five: it is as shown in Figure 6 that code keyboard dynamic key position of the present invention generates operational flow diagram.Firstly, building
Random number array is found, is 10 key assignments of 0-9 in the present invention.Later, random place allocation is carried out to 10 key assignments with Hash table, with
Obtain random key assignments arrangement.The key assignments arranged can be sent to LCD MODULE and user is waited to operate in next step.Meanwhile key mapping
Generation module can monitor the information from face identification system, if face identification system recognizes in camera view more than one
A face then sends instruction and refreshes a key mapping.
The keyboard provided by the invention can obtain the face of trade user by built-in camera, pass through integrated communicaton mould
Block is compared by banking data base in itself and Cloud Server, and with the face in the black list database of Ministry of Public Security networking, and
In vivo detection is carried out, if with user information successful matching in banking data base and In vivo detection result is real human face, it can be with
Input password is traded, and code keyboard or triggering alarm are otherwise locked.When inputting password, it is more than whenever being detected in camera
When one face, the key assignments arrangement of keyboard can change once, and the key assignments of dynamics change ensures the safety of code keyboard.To protect
The objectivity and randomness of key assignments arrangement are demonstrate,proved, the present invention generates the arrangement of each group key assignments using hash algorithm.In the above manner, this
Invention can well solve the stolen rear stolen brush of bank card of password, and key mapping and input sequence are peeped when input password
The safe coefficient of transaction is substantially improved in problem.In addition, be provided with blacklist query function in Cloud Server, directly and the Ministry of Public Security
Database association, if the face recognized in blacklist can trigger alarm.
Claims (10)
1. a kind of dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology, it is characterised in that: at control
Circuit and display input module coupled respectively, built-in camera, Cloud Server communication module are managed, further includes that face is known
Other system, the built-in camera obtains the image of trade user and its nearby sphere in real time, and communicates mould by Cloud Server
Block is uploaded to the face identification system in Cloud Server, recognition of face and In vivo detection is carried out, when camera detects each time
Refresh the key assignments on keyboard when face in addition to trade user, the setting of key assignments is upper by being connected with control processing circuit
Position machine calculates, and refreshes host computer each time according to hash algorithm and generates one group of key mapping, the key mapping being transmitted in control processing circuit
Input and computing circuit, until user inputs careful code by display input module, into account.
2. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be: the identification of face identification system is related to two parts database: the User Information Database of bank and Ministry of Public Security's networking it is black
List data library.
3. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be: the display input module includes liquid crystal key display, and liquid crystal key display is under the control of control processing circuit
Show 0-9 10 numeric keys code and corrigendum key, clear key;Show that input module further includes key corresponding with liquid crystal key display
It is worth input unit, corrigendum key, clear key.
4. the dynamic Hash code keyboard according to claim 3 based on recognition of face Yu In vivo detection technology, feature
Be: the liquid crystal key display is provided with independent liquid crystal film, is respectively used to display 0-9 10 numeric keys code and corrigendum
Key, clear key, key assignments input unit are independent switch device, and each liquid crystal film independent switch device corresponding with one matches
It closes, the independent switch device is mechanical button, capacitance switch or conductive rubber switch.
5. the dynamic Hash code keyboard according to claim 4 based on recognition of face Yu In vivo detection technology, feature
Be: the key mapping input unit is 3 × 4 matrix circuits, the input of the line and single-chip microcontroller IC1 of matrix circuit by key connecting
Foot connection, single-chip microcontroller IC1 are used to scan the matrix circuit of keyboard and handle accordingly when by key pressing.
6. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be: the built-in camera is located at code keyboard front, and bottom is equipped with angle adjustment device, can be according to practical application ring
Border adjusts angle, the frame per second 30fps of built-in camera, resolution ratio 640x480, using cmos sensor.
7. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be: the face identification system includes the face detection module successively handled, face alignment module, face recognition module
With In vivo detection module, wherein face detection module, face alignment module, face recognition module realize recognition of face step, living
Body detection module is for realizing In vivo detection step.
8. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be: the Cloud Server communication module includes data transmission blocks, data inquiry module, feedback reception module, the data
The two-dimension human face data that built-in camera captures are transferred in Cloud Server by sending module;The data inquiry module can
Mankind's recognition result is inquired, while the Ministry of Public Security's blacklist networked with Cloud Server is inquired;The feedback connects
Module is received for obtaining face recognition result, otherwise the activating pin keyboard circuit if as a result meeting the requirements locks code keyboard.
9. the dynamic Hash code keyboard according to claim 1 based on recognition of face Yu In vivo detection technology, feature
Be, keyboard workflow the following steps are included:
(1) user prepares operation password keyboard;
(2) built-in camera acquires facial image;
(3) the collected data of built-in camera are transferred in Cloud Server by Cloud Server communication module;
(4) face identification system in Cloud Server carries out information comparison, including carries out recognition of face and In vivo detection;
(5) consistent with householder's face to open keyboard, otherwise lock keyboard;
(6) built-in camera transmits real-time imaging, and input process detects other faces, then refreshes key mapping, host computer is according to Kazakhstan
Uncommon algorithm generates dynamic key position, and then user inputs password;
(7) user enters account, completes operation.
10. the dynamic Hash code keyboard according to claim 9 based on recognition of face Yu In vivo detection technology, feature
It is, in step (4), if user's face matches in the User Information Database of the face and bank that recognize, Cloud Server
Display input module is sent a message to, trade user is allowed to be inputted;If face in recognition result and bank-user database
It mismatches, then locks display input module, avoid bank card from being stolen by criminal and brush;If the face recognized, network with the Ministry of Public Security
Black list database in face match, then trigger alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811022613.XA CN109034810A (en) | 2018-09-03 | 2018-09-03 | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811022613.XA CN109034810A (en) | 2018-09-03 | 2018-09-03 | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109034810A true CN109034810A (en) | 2018-12-18 |
Family
ID=64623082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811022613.XA Pending CN109034810A (en) | 2018-09-03 | 2018-09-03 | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109034810A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110046492A (en) * | 2019-03-28 | 2019-07-23 | 莆田学院 | A kind of safe information interaction method and system |
CN110069917A (en) * | 2019-03-28 | 2019-07-30 | 莆田学院 | A kind of method of password authentication and system |
CN110688946A (en) * | 2019-09-26 | 2020-01-14 | 上海依图信息技术有限公司 | Public cloud silence in-vivo detection device and method based on picture identification |
CN111292508A (en) * | 2019-09-27 | 2020-06-16 | 深圳市威富视界有限公司 | Bank safety warning system and warning method thereof |
CN112836550A (en) * | 2019-11-22 | 2021-05-25 | 杭州海康威视数字技术股份有限公司 | Method, device, system, equipment and storage medium for detecting password peeping behavior |
CN113179246A (en) * | 2021-03-19 | 2021-07-27 | 重庆扬成大数据科技有限公司 | Working method for carrying out government affair data fusion safety through four-in-one network |
CN113268144A (en) * | 2021-05-27 | 2021-08-17 | 浪潮电子信息产业股份有限公司 | Peep-proof keyboard and use method thereof |
CN114513605A (en) * | 2022-01-25 | 2022-05-17 | 重庆医药高等专科学校 | Big data storage system for image shooting |
CN114513593A (en) * | 2022-01-25 | 2022-05-17 | 重庆医药高等专科学校 | Mass image acquisition working method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335633A (en) * | 2015-10-08 | 2016-02-17 | 广东欧珀移动通信有限公司 | Mobile terminal anti-peeping method and mobile terminal |
CN105353891A (en) * | 2015-12-08 | 2016-02-24 | 恒宝股份有限公司 | Mechanical dynamic password peep prevention keyboard |
CN206684828U (en) * | 2017-01-04 | 2017-11-28 | 广西安辰信息产业股份有限公司 | The anti-pry Orderless keyboards of ATM |
KR20180077554A (en) * | 2016-12-29 | 2018-07-09 | 주식회사 에이치앤비트 | Key input security method |
-
2018
- 2018-09-03 CN CN201811022613.XA patent/CN109034810A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335633A (en) * | 2015-10-08 | 2016-02-17 | 广东欧珀移动通信有限公司 | Mobile terminal anti-peeping method and mobile terminal |
CN105353891A (en) * | 2015-12-08 | 2016-02-24 | 恒宝股份有限公司 | Mechanical dynamic password peep prevention keyboard |
KR20180077554A (en) * | 2016-12-29 | 2018-07-09 | 주식회사 에이치앤비트 | Key input security method |
CN206684828U (en) * | 2017-01-04 | 2017-11-28 | 广西安辰信息产业股份有限公司 | The anti-pry Orderless keyboards of ATM |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110046492A (en) * | 2019-03-28 | 2019-07-23 | 莆田学院 | A kind of safe information interaction method and system |
CN110069917A (en) * | 2019-03-28 | 2019-07-30 | 莆田学院 | A kind of method of password authentication and system |
CN110688946A (en) * | 2019-09-26 | 2020-01-14 | 上海依图信息技术有限公司 | Public cloud silence in-vivo detection device and method based on picture identification |
CN111292508A (en) * | 2019-09-27 | 2020-06-16 | 深圳市威富视界有限公司 | Bank safety warning system and warning method thereof |
CN112836550A (en) * | 2019-11-22 | 2021-05-25 | 杭州海康威视数字技术股份有限公司 | Method, device, system, equipment and storage medium for detecting password peeping behavior |
CN113179246A (en) * | 2021-03-19 | 2021-07-27 | 重庆扬成大数据科技有限公司 | Working method for carrying out government affair data fusion safety through four-in-one network |
CN113268144A (en) * | 2021-05-27 | 2021-08-17 | 浪潮电子信息产业股份有限公司 | Peep-proof keyboard and use method thereof |
CN114513605A (en) * | 2022-01-25 | 2022-05-17 | 重庆医药高等专科学校 | Big data storage system for image shooting |
CN114513593A (en) * | 2022-01-25 | 2022-05-17 | 重庆医药高等专科学校 | Mass image acquisition working method |
CN114513605B (en) * | 2022-01-25 | 2024-03-05 | 重庆医药高等专科学校 | Big data storage system for image shooting |
CN114513593B (en) * | 2022-01-25 | 2024-04-16 | 重庆医药高等专科学校 | Mass picture acquisition working method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034810A (en) | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology | |
Negin et al. | An iris biometric system for public and personal use | |
US7039221B1 (en) | Facial image verification utilizing smart-card with integrated video camera | |
US6914517B2 (en) | Fingerprint sensor with feature authentication | |
CN101523444B (en) | System and method for traceless biometric identification | |
US7986816B1 (en) | Methods and systems for multiple factor authentication using gaze tracking and iris scanning | |
US7212655B2 (en) | Fingerprint verification system | |
EP3786820B1 (en) | Authentication system, authentication device, authentication method, and program | |
US7091845B2 (en) | Data entry systems with biometric devices for security access control | |
KR20190008474A (en) | Electronic safe box having secure function of biometric data | |
CN112862491B (en) | Face payment security method and platform based on security unit and trusted execution environment | |
Chuah et al. | The Assistance of Eye Blink Detection for Two-Factor Authentication | |
Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
SM et al. | Development of personal identification number authorization algorithm using real-time eye tracking & dynamic keypad generation | |
Himaga et al. | Finger vein authentication technology and financial applications | |
JP6891355B1 (en) | Authentication system, authentication device, authentication method, and program | |
CN114065163A (en) | Display mainboard and terminal with face identification and identity verification functions | |
Zhou et al. | A Survey on Biometrics Authentication | |
Suma et al. | Women safety by real-time eye tracking for password testimony | |
Lakkoju et al. | Detection of Fingerprints in Advanced Biometric System Design | |
More et al. | Survey paper on door level security using face recognition | |
WO2023199455A1 (en) | Identification system, entry/exit management system, and pos system | |
WO2021192150A1 (en) | Authentication system, user terminal, authentication method, and program | |
Abirami et al. | Retina based E-voting system using fuzzy logic and hamming distance | |
Benlamri et al. | Secure human face authentication for mobile e-government transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |
|
RJ01 | Rejection of invention patent application after publication |