CN112149095B - Student data safety management method and system - Google Patents

Student data safety management method and system Download PDF

Info

Publication number
CN112149095B
CN112149095B CN202011151606.7A CN202011151606A CN112149095B CN 112149095 B CN112149095 B CN 112149095B CN 202011151606 A CN202011151606 A CN 202011151606A CN 112149095 B CN112149095 B CN 112149095B
Authority
CN
China
Prior art keywords
user
information
data
face contour
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011151606.7A
Other languages
Chinese (zh)
Other versions
CN112149095A (en
Inventor
王鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Squirrel Classroom Artificial Intelligence Technology Co Ltd
Original Assignee
Shanghai Squirrel Classroom Artificial Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Squirrel Classroom Artificial Intelligence Technology Co Ltd filed Critical Shanghai Squirrel Classroom Artificial Intelligence Technology Co Ltd
Priority to CN202011151606.7A priority Critical patent/CN112149095B/en
Publication of CN112149095A publication Critical patent/CN112149095A/en
Application granted granted Critical
Publication of CN112149095B publication Critical patent/CN112149095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a student data security management method and a student data security management system, which can preprocess student data information, encrypt the student data information meeting a preset priority condition, and carry out double analysis on whether a current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of the normal verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.

Description

Student data safety management method and system
Technical Field
The invention relates to the technical field of intelligent education, in particular to a student data safety management method and system.
Background
In order to facilitate management of students, schools are provided with corresponding student databases, which include various data about students, such as student personal identity data and student examination score data, which all relate to personal privacy of students. The existing access authority verification is realized by adopting a password login verification mode, and the mode is easy to crack the password by an intruder instead of illegally accessing the student database, so that the student database has larger potential safety hazard of data. It is thus seen that there is a need in the art for a data management approach that enables high security level and dual access verification of student data.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a student data security management method and a system, which acquire the priority level of each student data information by preprocessing the student data information and determining the data priority level, extract the student data information meeting the preset priority level condition, encrypt the extracted student data information to form corresponding encrypted student data information, acquire the user face profile information corresponding to the user who currently requests to access the encrypted student data information, compare the user face profile information with a preset face profile information base, enter another access request for judgment if the user face profile information is matched with one of the student face profile information contained in the preset face profile information base, otherwise intercept the access request of the user to the encrypted student data information, judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
The invention provides a student data safety management method which is characterized by comprising the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the current access request of the user to the encrypted student data information;
step S3, according to the password input state information under the condition of wrong input of the access password when the user requests to access the encrypted student data information, judging whether the current access request of the user is an abnormal access request, and according to the judgment result, making a corresponding response to the current access request of the user;
further, in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, so as to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure GDA0003073857550000031
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iExtracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings;
further, in step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information included in the preset face contour information base, entering step S3, otherwise, intercepting the request of the user currently requesting to access the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, obtaining corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming the preset face contour information base according to the face contour structure representation values;
step S202, obtaining a face image of a user currently requesting to access the encrypted student data information, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
Figure GDA0003073857550000041
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
step S203, comparing the representation value W of the user' S facial contour structure with the representation values of the facial contour structure contained in the preset facial contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
Figure GDA0003073857550000042
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison result is less than or equal to the preset comparison threshold, the next step S3 is entered, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed;
further, in step S3, according to the password input state information when the access password is incorrectly input when the user requests to access the encrypted student data information, determining whether the current access request of the user is an abnormal access request, and according to the result of the determination, making a corresponding response to the current access request of the user specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
Figure GDA0003073857550000051
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure GDA0003073857550000052
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continue inputting an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continue inputting the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
The invention also provides a student data security management system which is characterized by comprising a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information;
the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information currently, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one piece of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting a current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result;
further, the data preprocessing and priority level determining module performs preprocessing and data priority level determining processing on the student data information, so as to obtain the priority level of each piece of student data information specifically includes:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about student identities and the visited frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure GDA0003073857550000061
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the splitting of all data strings contained in the data string array matrix according to the information characteristicsThe number of data strings in the ith characteristic sub-data string of the n characteristic sub-data strings, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iExtracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings;
further, the first access request analysis module obtains user face profile information corresponding to a user who requests to access the encrypted student data information currently, compares the user face profile information with a preset face profile information base, and instructs the access request analysis module to perform analysis processing if the user face profile information matches with one of student face profile information contained in the preset face profile information base, otherwise, intercepting the current access request of the user to the encrypted student data information specifically includes:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values;
and acquiring a face image of a user who requests to access the encrypted student data information at present, acquiring user face contour shape information of the user according to the face image, and acquiring a user face contour structure representation value W of the user according to the user face contour shape information and a following formula (2):
Figure GDA0003073857550000071
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
comparing the representation value W of the user face contour structure with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
Figure GDA0003073857550000081
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the current access request is smaller than or equal to a preset comparison threshold, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted feature subdata string, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation;
further, the second access request analysis module, according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, judges whether the current access request of the user is an abnormal access request, and according to the judgment result, makes a corresponding response to the current access request of the user specifically includes:
determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string according to the following formula (4):
Figure GDA0003073857550000082
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
and determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure GDA0003073857550000083
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
Compared with the prior art, the student data security management method and the system have the advantages that the student data information is preprocessed and the data priority level is determined, so that the priority level of each student data information is obtained, the student data information meeting the preset priority level condition is extracted, the extracted student data information is encrypted, the corresponding encrypted student data information is formed, the user face contour information corresponding to the user who requests to access the encrypted student data information at present is obtained, the user face contour information is compared with the preset face contour information base, if the user face contour information is matched with one of the student face contour information contained in the preset face contour information base, the other access request is entered for judgment, and if not, the access request of the user to the encrypted student data information at present is intercepted, judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a student data safety management method provided by the invention.
Fig. 2 is a schematic structural diagram of the student data safety management system provided by the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a student data security management method according to an embodiment of the present invention. The student data safety management method comprises the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining the user face contour information corresponding to the user who requests to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one of the student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the access request of the user to the encrypted student data information;
step S3, determining whether the current access request of the user is an abnormal access request according to the password input status information when the access password is incorrect when the user requests to access the encrypted student data information, and responding to the current access request of the user according to the result of the determination.
The beneficial effects of the above technical scheme are: the student data security management method can preprocess student data information, encrypt the student data information meeting the preset priority condition, and carry out double analysis on whether the current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normal verification on the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Preferably, in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure GDA0003073857550000111
in the above formula (1), Qt,iThe data priority level value of the data string belonging to the t year time in the ith characteristic subdata string is represented, D represents the number of all data strings contained in the data string array matrix, and P represents the number of the data stringsiRepresenting the number of data strings in the ith characteristic subdata string in which all data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iAnd extracting the characteristic sub-data string smaller than or equal to a preset data priority level threshold, and encrypting the extracted characteristic sub-data string to form a corresponding encrypted characteristic sub-data string, wherein the preset data priority level threshold can be, but is not limited to, 0.5.
The beneficial effects of the above technical scheme are: through carrying out computer coding conversion processing to this student data information converts this student data information into computer-recognizable data string array matrix, can be convenient for convert student data information who has mixed and disorderly chapter data structure into computer-recognizable data string array matrix that has regular data structure, with this convenience that improves follow-up data processing, and calculate the data priority value that obtains different characteristic data strings through above-mentioned (1), can be convenient for carry out comprehensive and effectual screening to the characteristic data string, with this characteristic data string of selecting to have higher importance carries out encryption processing, thereby under the condition of guaranteeing student data information validity, reduce its data volume and improve the treatment effeciency of data.
Preferably, in step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information contained in the preset face contour information base, then entering step S3, otherwise, intercepting the current access request of the user to the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, acquiring corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming a preset face contour information base according to the face contour structure representation values, wherein each face contour structure representation value contained in the preset face contour information base is obtained by calculating the face contour shape information of all students according to the following formula (2);
step S202, obtaining the face image of the user who requests to access the encrypted student data information at present, obtaining the user face contour shape information of the user according to the face image, and obtaining the user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
Figure GDA0003073857550000131
in the above formula (2), π represents the circumference ratio, TmaxA maximum curvature value T representing the face contour of the user contained in the face contour shape informationminA minimum curvature value representing a user face contour contained in the user face contour shape information;
step S203, comparing the representation value W of the face contour structure of the user with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
Figure GDA0003073857550000132
in the above formula(3) In (D)aRepresenting the characterization value W of the user's facial contour structure and the a-th facial contour structure characterization value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresents the maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting the minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison threshold is less than or equal to the preset comparison threshold, the next step S3 is performed, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to the cloud server and corresponding alarm operation is performed, where the preset comparison threshold may be, but is not limited to, 0.1.
The beneficial effects of the above technical scheme are: the user face contour structure characteristic value and the comparison value obtained by comparing the user face contour structure characteristic value with the face contour structure characteristic value contained in the preset face contour information base are respectively obtained through calculation of the formulas (2) and (3), and the identity identification authentication can be carried out on the user according to the face appearance characteristics of the user, so that the user who requests access at present is effectively preliminarily screened and the access of illegal users is avoided.
Preferably, in step S3, determining whether the current access request of the user is an abnormal access request according to the password input status information in the case of an access password input error when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the result of the determination specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
Figure GDA0003073857550000141
in the formula (4), R represents the number of characters included in the correct access password for accessing the sub-data string of the encryption characteristic;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure GDA0003073857550000142
in the above formula (5), R represents the number of characters included in the correct access password corresponding to the sub-data string with the encryption characteristics, q represents the number of continuous errors in password input when the user requests to access the sub-data string with the encryption characteristics, and RcThe number of characters contained in the error password input at the c-th time when the user requests to access the encrypted characteristic subdata string is represented;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
The beneficial effects of the above technical scheme are: the probability of the access password input error when the user requests to access the encrypted feature sub-data string and the access state evaluation value corresponding to the current access request of the user are respectively calculated through the formulas (4) and (5), so that the access request of the user can be effectively and accurately judged whether the access request behavior of the current user is abnormal or not and effective access interception and alarm are carried out on the user with abnormal access from the level of inputting the access password by the user, and the safety of student data information is improved to the maximum extent.
Fig. 2 is a schematic structural diagram of a student data safety management system according to an embodiment of the present invention. The student data security management system comprises a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information;
the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information at present, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result.
The beneficial effects of the above technical scheme are: the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority condition, and carry out double analysis on whether the current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Preferably, the data preprocessing and priority level determining module performs preprocessing and data priority level determining processing on the student data information, so as to obtain the priority level of each piece of student data information specifically includes:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about the identity of students and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining the data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure GDA0003073857550000161
in the above formula (1), Qt,iThe data priority level value of the data string belonging to the t year time in the ith characteristic subdata string is represented, D represents the number of all data strings contained in the data string array matrix, and P represents the number of the data stringsiRepresenting the number of data strings in the ith characteristic subdata string in which all data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iCharacteristic subdata progression smaller than or equal to preset data priority level thresholdAnd extracting lines, and encrypting the extracted characteristic sub-data string to form a corresponding encrypted characteristic sub-data string, wherein the preset data priority level threshold may be, but is not limited to, 0.5.
The beneficial effects of the above technical scheme are: through carrying out computer coding conversion processing to this student data information converts this student data information into computer-recognizable data string array matrix, can be convenient for convert student data information who has mixed and disorderly chapter data structure into computer-recognizable data string array matrix that has regular data structure, with this convenience that improves follow-up data processing, and calculate the data priority value that obtains different characteristic data strings through above-mentioned (1), can be convenient for carry out comprehensive and effectual screening to the characteristic data string, with this characteristic data string of selecting to have higher importance carries out encryption processing, thereby under the condition of guaranteeing student data information validity, reduce its data volume and improve the treatment effeciency of data.
Preferably, the first access request analysis module obtains user face profile information corresponding to a user currently requesting to access the encrypted student data information, compares the user face profile information with a preset face profile information base, instructs the access request analysis module to perform analysis processing if the user face profile information matches with one of student face profile information contained in the preset face profile information base, and otherwise, intercepts a current access request of the user for the encrypted student data information specifically includes:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values, wherein each facial contour structure representation value contained in the preset facial contour information base is obtained by calculating the facial contour shape information of all students according to the following formula (2);
and obtaining a face image of a user who requests to access the encrypted student data information at present, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
Figure GDA0003073857550000171
in the above formula (2), π represents the circumference ratio, TmaxA maximum curvature value T representing the face contour of the user contained in the face contour shape informationminA minimum curvature value representing a user face contour contained in the user face contour shape information;
and comparing the representation value W of the face contour structure of the user with the representation value W of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
Figure GDA0003073857550000181
in the above formula (3), DaRepresenting the characterization value W of the user's facial contour structure and the a-th facial contour structure characterization value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresents the maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting the minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison threshold value is smaller than or equal to the preset comparison threshold value, the second access request analysis module is instructed to perform analysis processing, otherwise, the current access request of the user to the encrypted feature subdata string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed, wherein the preset comparison threshold value can be but is not limited to 0.1.
The beneficial effects of the above technical scheme are: the user face contour structure characteristic value and the comparison value obtained by comparing the user face contour structure characteristic value with the face contour structure characteristic value contained in the preset face contour information base are respectively obtained through calculation of the formulas (2) and (3), and the identity identification authentication can be carried out on the user according to the face appearance characteristics of the user, so that the user who requests access at present is effectively preliminarily screened and the access of illegal users is avoided.
Preferably, the second access request analysis module determines whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and makes a corresponding response to the current access request of the user according to the result of the determination specifically includes:
determining the probability P of the wrong input of the access password when the user requests to access the encrypted feature sub-data string according to the following formula (4):
Figure GDA0003073857550000182
in the formula (4), R represents the number of characters included in the correct access password for accessing the sub-data string of the encryption characteristic;
and determines an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure GDA0003073857550000191
in the above formula (5), R represents the number of characters included in the correct access password corresponding to the sub-data string with the encryption characteristics, q represents the number of continuous errors in password input when the user requests to access the sub-data string with the encryption characteristics, and RcThe number of characters contained in the error password input at the c-th time when the user requests to access the encrypted characteristic subdata string is represented;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
The beneficial effects of the above technical scheme are: the probability of the access password input error when the user requests to access the encrypted feature sub-data string and the access state evaluation value corresponding to the current access request of the user are respectively calculated through the formulas (4) and (5), so that the access request of the user can be effectively and accurately judged whether the access request behavior of the current user is abnormal or not and effective access interception and alarm are carried out on the user with abnormal access from the level of inputting the access password by the user, and the safety of student data information is improved to the maximum extent.
From the content of the above embodiment, the student data security management method and system obtains the priority level of each student data information by preprocessing the student data information and determining the data priority level, extracts the student data information meeting the preset priority level condition, encrypts the extracted student data information to form corresponding encrypted student data information, obtains the user face profile information corresponding to the user currently requesting to access the encrypted student data information, compares the user face profile information with the preset face profile information base, enters another access request judgment if the user face profile information is matched with one of the student face profile information contained in the preset face profile information base, otherwise intercepts the current access request of the user to the encrypted student data information, judging whether the current access request of the user is an abnormal access request according to password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (6)

1. The student data safety management method is characterized by comprising the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the current access request of the user to the encrypted student data information;
step S3, according to the password input state information under the condition of wrong input of the access password when the user requests to access the encrypted student data information, judging whether the current access request of the user is an abnormal access request, and according to the judgment result, making a corresponding response to the current access request of the user;
in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, so as to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure FDA0003073857540000021
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iAnd extracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings.
2. The student data safety governance method according to claim 1, wherein:
in step S2, obtaining user face contour information corresponding to a user currently requesting access to the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information included in a preset face contour information base, entering step S3, otherwise, intercepting the access request of the user to the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, obtaining corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming the preset face contour information base according to the face contour structure representation values;
step S202, obtaining a face image of a user currently requesting to access the encrypted student data information, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
Figure FDA0003073857540000031
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting the user's facial contourThe shape information contains a minimum curvature value of the user's face contour;
step S203, comparing the representation value W of the user' S facial contour structure with the representation values of the facial contour structure contained in the preset facial contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
Figure FDA0003073857540000032
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison result is less than or equal to the preset comparison threshold, the next step S3 is entered, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed.
3. The student data safety governance method according to claim 2, wherein:
in step S3, determining whether the current access request of the user is an abnormal access request according to the password input state information when the access password is incorrectly input when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the determination result specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
Figure FDA0003073857540000041
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure FDA0003073857540000042
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continue inputting an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continue inputting the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
4. The student data security management system is characterized by comprising a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information; the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information currently, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one piece of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting a current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result;
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level, so that the step of obtaining the priority level of each piece of student data information specifically comprises the following steps:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about student identities and the visited frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
Figure FDA0003073857540000061
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iAnd extracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings.
5. The student data security management system of claim 4 wherein:
the first access request analysis module obtains user face contour information corresponding to a user who requests to access the encrypted student data information at present, compares the user face contour information with a preset face contour information base, instructs the access request analysis module to perform analysis processing if the user face contour information is matched with one of student face contour information contained in the preset face contour information base, and otherwise, specifically comprises the following steps of:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values;
and acquiring a face image of a user who requests to access the encrypted student data information at present, acquiring user face contour shape information of the user according to the face image, and acquiring a user face contour structure representation value W of the user according to the user face contour shape information and a following formula (2):
Figure FDA0003073857540000071
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
comparing the representation value W of the user face contour structure with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
Figure FDA0003073857540000072
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminThe preset face contour information library comprisesIs determined by the minimum face contour structure representation value of (c),
if D is presentaAnd if the comparison result is less than or equal to a preset comparison threshold, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted feature subdata string, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
6. The student data security management system of claim 5 wherein:
the second access request analysis module judges whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and makes a corresponding response to the current access request of the user according to the judgment result specifically comprises the following steps:
determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string according to the following formula (4):
Figure FDA0003073857540000081
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
and determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
Figure FDA0003073857540000082
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresents the aboveThe number of characters contained in the error password input for the c time when the user requests to access the encrypted feature subdata string;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
CN202011151606.7A 2020-10-26 2020-10-26 Student data safety management method and system Active CN112149095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011151606.7A CN112149095B (en) 2020-10-26 2020-10-26 Student data safety management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011151606.7A CN112149095B (en) 2020-10-26 2020-10-26 Student data safety management method and system

Publications (2)

Publication Number Publication Date
CN112149095A CN112149095A (en) 2020-12-29
CN112149095B true CN112149095B (en) 2021-06-29

Family

ID=73954937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011151606.7A Active CN112149095B (en) 2020-10-26 2020-10-26 Student data safety management method and system

Country Status (1)

Country Link
CN (1) CN112149095B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04115372A (en) * 1990-09-05 1992-04-16 A T R Tsushin Syst Kenkyusho:Kk Device for extracting face feature point
CN101339612B (en) * 2008-08-19 2010-06-16 陈建峰 Face contour checking and classification method
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment
CN103455763B (en) * 2013-07-29 2016-08-31 孙伟力 A kind of internet log record system and method protecting individual subscriber privacy
JP2015215878A (en) * 2014-04-21 2015-12-03 株式会社リコー Image processor and image processing system
CN104469767B (en) * 2014-10-28 2017-12-26 杭州电子科技大学 The implementation method of integrated form security protection subsystem in a set of mobile office system
CN104715236A (en) * 2015-03-06 2015-06-17 广东欧珀移动通信有限公司 Face beautifying photographing method and device
CN104794386A (en) * 2015-04-08 2015-07-22 天脉聚源(北京)传媒科技有限公司 Data processing method and device based on face recognition
CN104809375A (en) * 2015-04-15 2015-07-29 广东欧珀移动通信有限公司 Mobile terminal unlocking method and device
CN105069365A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Data processing method and mobile terminal
CN111626572A (en) * 2020-05-08 2020-09-04 深圳市中壬银兴信息技术有限公司 Digital intelligent wind control method and related product
CN111666553A (en) * 2020-07-17 2020-09-15 江苏荣泽信息科技股份有限公司 Block chain identity authority management method based on distributed PKI
CN112016425B (en) * 2020-08-21 2021-04-27 上海松鼠课堂人工智能科技有限公司 Handwritten answer recognition method and system based on deep learning

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition

Also Published As

Publication number Publication date
CN112149095A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN109644183B (en) Remote use of locally stored biometric authentication data
CN112182519B (en) Computer storage system security access method and access system
US20210056186A1 (en) Systems and methods for improving kba identity authentication questions
TWI592820B (en) Man-machine recognition method and system
US20070112775A1 (en) Method for user biometric artifical authentication
CN112464117A (en) Request processing method and device, computer equipment and storage medium
CN109871673A (en) Based on the lasting identity identifying method and system in different context environmentals
CN112465513A (en) Network security system and method based on identity authentication
US10771965B1 (en) Systems and methods for photo recognition-based identity authentication
CN112464200A (en) Authentication risk detection method and system
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
WO2010028517A1 (en) System and method for generating/ identifying cipher code via artificial neural network
CN117540355A (en) Zero trust access control system based on collaborative risk assessment model
Guo et al. Verifying in the dark: Verifiable machine unlearning by using invisible backdoor triggers
CN112149095B (en) Student data safety management method and system
CN114666164B (en) Computer network user identity login verification system and method
CN110445790A (en) A kind of account method for detecting abnormality logging in behavior based on user
CN112272195B (en) Dynamic detection authentication system and method thereof
CN105678157B (en) A kind of data property right protection system and method based on application environment identification
Adesina et al. An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time.
CN112149089A (en) Computer login authentication management system based on Internet of things
CN106650349B (en) A kind of pair of identity card uses the safe method being monitored
CN117240607B (en) Security authentication method based on security computer
CN115396225B (en) Data platform user identity authentication method and device
CN117494092B (en) Scenic spot ticket non-inductive verification method, system and medium based on living organism identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20221020

Granted publication date: 20210629