CN112149095B - Student data safety management method and system - Google Patents
Student data safety management method and system Download PDFInfo
- Publication number
- CN112149095B CN112149095B CN202011151606.7A CN202011151606A CN112149095B CN 112149095 B CN112149095 B CN 112149095B CN 202011151606 A CN202011151606 A CN 202011151606A CN 112149095 B CN112149095 B CN 112149095B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- data
- face contour
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 29
- 238000004458 analytical method Methods 0.000 claims abstract description 42
- 239000011159 matrix material Substances 0.000 claims description 52
- 230000001815 facial effect Effects 0.000 claims description 49
- 238000011156 evaluation Methods 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 26
- 230000002159 abnormal effect Effects 0.000 claims description 25
- 238000007781 pre-processing Methods 0.000 claims description 23
- 238000006243 chemical reaction Methods 0.000 claims description 8
- 239000000284 extract Substances 0.000 claims description 5
- 238000000034 method Methods 0.000 claims 2
- 238000012795 verification Methods 0.000 abstract description 27
- 238000013523 data management Methods 0.000 abstract description 7
- 230000009286 beneficial effect Effects 0.000 description 8
- 238000012512 characterization method Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Strategic Management (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- Tourism & Hospitality (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a student data security management method and a student data security management system, which can preprocess student data information, encrypt the student data information meeting a preset priority condition, and carry out double analysis on whether a current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of the normal verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Description
Technical Field
The invention relates to the technical field of intelligent education, in particular to a student data safety management method and system.
Background
In order to facilitate management of students, schools are provided with corresponding student databases, which include various data about students, such as student personal identity data and student examination score data, which all relate to personal privacy of students. The existing access authority verification is realized by adopting a password login verification mode, and the mode is easy to crack the password by an intruder instead of illegally accessing the student database, so that the student database has larger potential safety hazard of data. It is thus seen that there is a need in the art for a data management approach that enables high security level and dual access verification of student data.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a student data security management method and a system, which acquire the priority level of each student data information by preprocessing the student data information and determining the data priority level, extract the student data information meeting the preset priority level condition, encrypt the extracted student data information to form corresponding encrypted student data information, acquire the user face profile information corresponding to the user who currently requests to access the encrypted student data information, compare the user face profile information with a preset face profile information base, enter another access request for judgment if the user face profile information is matched with one of the student face profile information contained in the preset face profile information base, otherwise intercept the access request of the user to the encrypted student data information, judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
The invention provides a student data safety management method which is characterized by comprising the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the current access request of the user to the encrypted student data information;
step S3, according to the password input state information under the condition of wrong input of the access password when the user requests to access the encrypted student data information, judging whether the current access request of the user is an abnormal access request, and according to the judgment result, making a corresponding response to the current access request of the user;
further, in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, so as to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iExtracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings;
further, in step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information included in the preset face contour information base, entering step S3, otherwise, intercepting the request of the user currently requesting to access the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, obtaining corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming the preset face contour information base according to the face contour structure representation values;
step S202, obtaining a face image of a user currently requesting to access the encrypted student data information, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
step S203, comparing the representation value W of the user' S facial contour structure with the representation values of the facial contour structure contained in the preset facial contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison result is less than or equal to the preset comparison threshold, the next step S3 is entered, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed;
further, in step S3, according to the password input state information when the access password is incorrectly input when the user requests to access the encrypted student data information, determining whether the current access request of the user is an abnormal access request, and according to the result of the determination, making a corresponding response to the current access request of the user specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continue inputting an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continue inputting the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
The invention also provides a student data security management system which is characterized by comprising a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information;
the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information currently, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one piece of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting a current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result;
further, the data preprocessing and priority level determining module performs preprocessing and data priority level determining processing on the student data information, so as to obtain the priority level of each piece of student data information specifically includes:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about student identities and the visited frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the splitting of all data strings contained in the data string array matrix according to the information characteristicsThe number of data strings in the ith characteristic sub-data string of the n characteristic sub-data strings, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iExtracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings;
further, the first access request analysis module obtains user face profile information corresponding to a user who requests to access the encrypted student data information currently, compares the user face profile information with a preset face profile information base, and instructs the access request analysis module to perform analysis processing if the user face profile information matches with one of student face profile information contained in the preset face profile information base, otherwise, intercepting the current access request of the user to the encrypted student data information specifically includes:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values;
and acquiring a face image of a user who requests to access the encrypted student data information at present, acquiring user face contour shape information of the user according to the face image, and acquiring a user face contour structure representation value W of the user according to the user face contour shape information and a following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
comparing the representation value W of the user face contour structure with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the current access request is smaller than or equal to a preset comparison threshold, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted feature subdata string, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation;
further, the second access request analysis module, according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, judges whether the current access request of the user is an abnormal access request, and according to the judgment result, makes a corresponding response to the current access request of the user specifically includes:
determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string according to the following formula (4):
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
and determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
Compared with the prior art, the student data security management method and the system have the advantages that the student data information is preprocessed and the data priority level is determined, so that the priority level of each student data information is obtained, the student data information meeting the preset priority level condition is extracted, the extracted student data information is encrypted, the corresponding encrypted student data information is formed, the user face contour information corresponding to the user who requests to access the encrypted student data information at present is obtained, the user face contour information is compared with the preset face contour information base, if the user face contour information is matched with one of the student face contour information contained in the preset face contour information base, the other access request is entered for judgment, and if not, the access request of the user to the encrypted student data information at present is intercepted, judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a student data safety management method provided by the invention.
Fig. 2 is a schematic structural diagram of the student data safety management system provided by the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a student data security management method according to an embodiment of the present invention. The student data safety management method comprises the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining the user face contour information corresponding to the user who requests to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one of the student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the access request of the user to the encrypted student data information;
step S3, determining whether the current access request of the user is an abnormal access request according to the password input status information when the access password is incorrect when the user requests to access the encrypted student data information, and responding to the current access request of the user according to the result of the determination.
The beneficial effects of the above technical scheme are: the student data security management method can preprocess student data information, encrypt the student data information meeting the preset priority condition, and carry out double analysis on whether the current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normal verification on the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Preferably, in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iThe data priority level value of the data string belonging to the t year time in the ith characteristic subdata string is represented, D represents the number of all data strings contained in the data string array matrix, and P represents the number of the data stringsiRepresenting the number of data strings in the ith characteristic subdata string in which all data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iAnd extracting the characteristic sub-data string smaller than or equal to a preset data priority level threshold, and encrypting the extracted characteristic sub-data string to form a corresponding encrypted characteristic sub-data string, wherein the preset data priority level threshold can be, but is not limited to, 0.5.
The beneficial effects of the above technical scheme are: through carrying out computer coding conversion processing to this student data information converts this student data information into computer-recognizable data string array matrix, can be convenient for convert student data information who has mixed and disorderly chapter data structure into computer-recognizable data string array matrix that has regular data structure, with this convenience that improves follow-up data processing, and calculate the data priority value that obtains different characteristic data strings through above-mentioned (1), can be convenient for carry out comprehensive and effectual screening to the characteristic data string, with this characteristic data string of selecting to have higher importance carries out encryption processing, thereby under the condition of guaranteeing student data information validity, reduce its data volume and improve the treatment effeciency of data.
Preferably, in step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information contained in the preset face contour information base, then entering step S3, otherwise, intercepting the current access request of the user to the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, acquiring corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming a preset face contour information base according to the face contour structure representation values, wherein each face contour structure representation value contained in the preset face contour information base is obtained by calculating the face contour shape information of all students according to the following formula (2);
step S202, obtaining the face image of the user who requests to access the encrypted student data information at present, obtaining the user face contour shape information of the user according to the face image, and obtaining the user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA maximum curvature value T representing the face contour of the user contained in the face contour shape informationminA minimum curvature value representing a user face contour contained in the user face contour shape information;
step S203, comparing the representation value W of the face contour structure of the user with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
in the above formula(3) In (D)aRepresenting the characterization value W of the user's facial contour structure and the a-th facial contour structure characterization value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresents the maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting the minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison threshold is less than or equal to the preset comparison threshold, the next step S3 is performed, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to the cloud server and corresponding alarm operation is performed, where the preset comparison threshold may be, but is not limited to, 0.1.
The beneficial effects of the above technical scheme are: the user face contour structure characteristic value and the comparison value obtained by comparing the user face contour structure characteristic value with the face contour structure characteristic value contained in the preset face contour information base are respectively obtained through calculation of the formulas (2) and (3), and the identity identification authentication can be carried out on the user according to the face appearance characteristics of the user, so that the user who requests access at present is effectively preliminarily screened and the access of illegal users is avoided.
Preferably, in step S3, determining whether the current access request of the user is an abnormal access request according to the password input status information in the case of an access password input error when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the result of the determination specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
in the formula (4), R represents the number of characters included in the correct access password for accessing the sub-data string of the encryption characteristic;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the above formula (5), R represents the number of characters included in the correct access password corresponding to the sub-data string with the encryption characteristics, q represents the number of continuous errors in password input when the user requests to access the sub-data string with the encryption characteristics, and RcThe number of characters contained in the error password input at the c-th time when the user requests to access the encrypted characteristic subdata string is represented;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
The beneficial effects of the above technical scheme are: the probability of the access password input error when the user requests to access the encrypted feature sub-data string and the access state evaluation value corresponding to the current access request of the user are respectively calculated through the formulas (4) and (5), so that the access request of the user can be effectively and accurately judged whether the access request behavior of the current user is abnormal or not and effective access interception and alarm are carried out on the user with abnormal access from the level of inputting the access password by the user, and the safety of student data information is improved to the maximum extent.
Fig. 2 is a schematic structural diagram of a student data safety management system according to an embodiment of the present invention. The student data security management system comprises a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information;
the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information at present, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result.
The beneficial effects of the above technical scheme are: the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority condition, and carry out double analysis on whether the current access request of a user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
Preferably, the data preprocessing and priority level determining module performs preprocessing and data priority level determining processing on the student data information, so as to obtain the priority level of each piece of student data information specifically includes:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about the identity of students and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining the data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iThe data priority level value of the data string belonging to the t year time in the ith characteristic subdata string is represented, D represents the number of all data strings contained in the data string array matrix, and P represents the number of the data stringsiRepresenting the number of data strings in the ith characteristic subdata string in which all data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iCharacteristic subdata progression smaller than or equal to preset data priority level thresholdAnd extracting lines, and encrypting the extracted characteristic sub-data string to form a corresponding encrypted characteristic sub-data string, wherein the preset data priority level threshold may be, but is not limited to, 0.5.
The beneficial effects of the above technical scheme are: through carrying out computer coding conversion processing to this student data information converts this student data information into computer-recognizable data string array matrix, can be convenient for convert student data information who has mixed and disorderly chapter data structure into computer-recognizable data string array matrix that has regular data structure, with this convenience that improves follow-up data processing, and calculate the data priority value that obtains different characteristic data strings through above-mentioned (1), can be convenient for carry out comprehensive and effectual screening to the characteristic data string, with this characteristic data string of selecting to have higher importance carries out encryption processing, thereby under the condition of guaranteeing student data information validity, reduce its data volume and improve the treatment effeciency of data.
Preferably, the first access request analysis module obtains user face profile information corresponding to a user currently requesting to access the encrypted student data information, compares the user face profile information with a preset face profile information base, instructs the access request analysis module to perform analysis processing if the user face profile information matches with one of student face profile information contained in the preset face profile information base, and otherwise, intercepts a current access request of the user for the encrypted student data information specifically includes:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values, wherein each facial contour structure representation value contained in the preset facial contour information base is obtained by calculating the facial contour shape information of all students according to the following formula (2);
and obtaining a face image of a user who requests to access the encrypted student data information at present, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA maximum curvature value T representing the face contour of the user contained in the face contour shape informationminA minimum curvature value representing a user face contour contained in the user face contour shape information;
and comparing the representation value W of the face contour structure of the user with the representation value W of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
in the above formula (3), DaRepresenting the characterization value W of the user's facial contour structure and the a-th facial contour structure characterization value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresents the maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting the minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison threshold value is smaller than or equal to the preset comparison threshold value, the second access request analysis module is instructed to perform analysis processing, otherwise, the current access request of the user to the encrypted feature subdata string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed, wherein the preset comparison threshold value can be but is not limited to 0.1.
The beneficial effects of the above technical scheme are: the user face contour structure characteristic value and the comparison value obtained by comparing the user face contour structure characteristic value with the face contour structure characteristic value contained in the preset face contour information base are respectively obtained through calculation of the formulas (2) and (3), and the identity identification authentication can be carried out on the user according to the face appearance characteristics of the user, so that the user who requests access at present is effectively preliminarily screened and the access of illegal users is avoided.
Preferably, the second access request analysis module determines whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and makes a corresponding response to the current access request of the user according to the result of the determination specifically includes:
determining the probability P of the wrong input of the access password when the user requests to access the encrypted feature sub-data string according to the following formula (4):
in the formula (4), R represents the number of characters included in the correct access password for accessing the sub-data string of the encryption characteristic;
and determines an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the above formula (5), R represents the number of characters included in the correct access password corresponding to the sub-data string with the encryption characteristics, q represents the number of continuous errors in password input when the user requests to access the sub-data string with the encryption characteristics, and RcThe number of characters contained in the error password input at the c-th time when the user requests to access the encrypted characteristic subdata string is represented;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
The beneficial effects of the above technical scheme are: the probability of the access password input error when the user requests to access the encrypted feature sub-data string and the access state evaluation value corresponding to the current access request of the user are respectively calculated through the formulas (4) and (5), so that the access request of the user can be effectively and accurately judged whether the access request behavior of the current user is abnormal or not and effective access interception and alarm are carried out on the user with abnormal access from the level of inputting the access password by the user, and the safety of student data information is improved to the maximum extent.
From the content of the above embodiment, the student data security management method and system obtains the priority level of each student data information by preprocessing the student data information and determining the data priority level, extracts the student data information meeting the preset priority level condition, encrypts the extracted student data information to form corresponding encrypted student data information, obtains the user face profile information corresponding to the user currently requesting to access the encrypted student data information, compares the user face profile information with the preset face profile information base, enters another access request judgment if the user face profile information is matched with one of the student face profile information contained in the preset face profile information base, otherwise intercepts the current access request of the user to the encrypted student data information, judging whether the current access request of the user is an abnormal access request according to password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result; therefore, the student data security management method and the student data security management system can preprocess student data information, encrypt the student data information meeting the preset priority level condition, and carry out double analysis on whether the current access request of the user is normal or not through two different verification modes, namely face contour information comparison verification and password input state information verification, so that the accuracy of normality verification of the access request of the user is greatly improved, and the access security and the data management efficiency of the student data information are effectively improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (6)
1. The student data safety management method is characterized by comprising the following steps:
step S1, preprocessing the student data information and determining the data priority level, so as to obtain the priority level of each student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, thereby forming corresponding encrypted student data information;
step S2, obtaining user face contour information corresponding to a user currently requesting to access the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information is matched with one student face contour information contained in the preset face contour information base, entering the following step S3, otherwise, intercepting the current access request of the user to the encrypted student data information;
step S3, according to the password input state information under the condition of wrong input of the access password when the user requests to access the encrypted student data information, judging whether the current access request of the user is an abnormal access request, and according to the judgment result, making a corresponding response to the current access request of the user;
in step S1, the preprocessing and data priority level determining processing on the student data information to obtain the priority level of each piece of student data information, extracting the student data information meeting the preset priority level condition, and then encrypting the extracted student data information, so as to form corresponding encrypted student data information specifically includes:
step S101, performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words related to student identities and the accessed frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
step S102, determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
step S103, corresponding data priority level value Qt,iAnd extracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings.
2. The student data safety governance method according to claim 1, wherein:
in step S2, obtaining user face contour information corresponding to a user currently requesting access to the encrypted student data information, comparing the user face contour information with a preset face contour information base, if the user face contour information matches with one of student face contour information included in a preset face contour information base, entering step S3, otherwise, intercepting the access request of the user to the encrypted student data information specifically includes:
step S201, acquiring face images of all students corresponding to the student data information, obtaining corresponding face contour shape information according to the face images, forming corresponding face contour structure representation values according to the face contour shape information, and finally forming the preset face contour information base according to the face contour structure representation values;
step S202, obtaining a face image of a user currently requesting to access the encrypted student data information, obtaining user face contour shape information of the user according to the face image, and obtaining a user face contour structure representation value W of the user according to the user face contour shape information and the following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting the user's facial contourThe shape information contains a minimum curvature value of the user's face contour;
step S203, comparing the representation value W of the user' S facial contour structure with the representation values of the facial contour structure contained in the preset facial contour information base one by one according to the following formula (3), so as to obtain corresponding comparison values:
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminRepresenting a minimum face contour structure representation value contained in the preset face contour information base,
if D is presentaIf the comparison result is less than or equal to the preset comparison threshold, the next step S3 is entered, otherwise, the current access request of the user to the encrypted feature sub data string is intercepted, and meanwhile, the identity information of the user is uploaded to a cloud server and corresponding alarm operation is performed.
3. The student data safety governance method according to claim 2, wherein:
in step S3, determining whether the current access request of the user is an abnormal access request according to the password input state information when the access password is incorrectly input when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the determination result specifically includes:
step S301, according to the following formula (4), determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string:
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
step S302, determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresenting the number of characters contained in the error password input at the c-th time when the user requests to access the encrypted feature sub-data string;
step S303, comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continue inputting an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continue inputting the access password, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
4. The student data security management system is characterized by comprising a data preprocessing and priority level determining module, a data encryption module, a first access request analysis module and a second access request analysis module; wherein,
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level so as to obtain the priority level of each student data information; the data encryption module is used for extracting student data information meeting a preset priority condition and then encrypting the extracted student data information to form corresponding encrypted student data information;
the first access request analysis module is used for acquiring user face contour information corresponding to a user who requests to access the encrypted student data information currently, comparing the user face contour information with a preset face contour information base, and if the user face contour information is matched with one piece of student face contour information contained in the preset face contour information base, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting a current access request of the user to the encrypted student data information;
the second access request analysis module is used for judging whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and making a corresponding response to the current access request of the user according to the judgment result;
the data preprocessing and priority level determining module is used for preprocessing the student data information and determining the data priority level, so that the step of obtaining the priority level of each piece of student data information specifically comprises the following steps:
performing computer coding conversion processing on the student data information so as to convert the student data information into a data string array matrix which can be identified by a computer, wherein the data string array matrix comprises a plurality of data strings with different information characteristics, the different information characteristics refer to whether the data strings contain sensitive words about student identities and the visited frequency of the data strings, and the data string array matrix is split into a plurality of characteristic subdata strings according to the information characteristics;
and determining a data priority level value corresponding to the characteristic sub-data string according to the following formula (1):
in the above formula (1), Qt,iRepresenting the data priority level value of the data string belonging to the t year time in the ith characteristic subdata string, D representing the number of all data strings contained in the data string array matrix, PiRepresenting the number of data strings in the ith characteristic subdata string in which all the data strings contained in the data string array matrix are split into n characteristic subdata strings according to the information characteristics, Bt,iThe number of data strings belonging to the t-th year time in the ith characteristic subdata array matrix is represented, n represents the total number of the characteristic subdata strings after all the data strings contained in the data string array matrix are split into the characteristic subdata strings according to the information characteristics, and u represents the total number of the year time of all the data strings contained in the data string array matrix;
and the number of the first and second groups,
the data encryption module extracts student data information meeting preset priority conditions, and then encrypts the extracted student data information, so that the corresponding encrypted student data information is formed and specifically comprises the following steps:
corresponding data priority level value Qt,iAnd extracting the characteristic subdata strings smaller than or equal to the preset data priority level threshold value, and encrypting the extracted characteristic subdata strings to form corresponding encrypted characteristic subdata strings.
5. The student data security management system of claim 4 wherein:
the first access request analysis module obtains user face contour information corresponding to a user who requests to access the encrypted student data information at present, compares the user face contour information with a preset face contour information base, instructs the access request analysis module to perform analysis processing if the user face contour information is matched with one of student face contour information contained in the preset face contour information base, and otherwise, specifically comprises the following steps of:
acquiring facial images of all students corresponding to the student data information, acquiring corresponding facial contour shape information according to the facial images, forming corresponding facial contour structure representation values according to the facial contour shape information, and finally forming the preset facial contour information base according to the facial contour structure representation values;
and acquiring a face image of a user who requests to access the encrypted student data information at present, acquiring user face contour shape information of the user according to the face image, and acquiring a user face contour structure representation value W of the user according to the user face contour shape information and a following formula (2):
in the above formula (2), π represents the circumference ratio, TmaxA value T representing a maximum curvature of a face contour of the user included in the face contour shape information of the userminRepresenting a minimum curvature value of a user face contour contained in the user face contour shape information;
comparing the representation value W of the user face contour structure with the representation values of the face contour structure contained in the preset face contour information base one by one according to the following formula (3) to obtain corresponding comparison values:
in the above formula (3), DaRepresenting the characteristic value W of the facial contour structure of the user and the a-th facial contour structure characteristic value W contained in the preset facial contour information baseaA comparison value, W, obtained by comparisonmaxRepresenting a maximum face contour structure representation value, W, contained in the preset face contour information baseminThe preset face contour information library comprisesIs determined by the minimum face contour structure representation value of (c),
if D is presentaAnd if the comparison result is less than or equal to a preset comparison threshold, indicating the second access request analysis module to perform analysis processing, otherwise, intercepting the current access request of the user to the encrypted feature subdata string, and simultaneously uploading the identity information of the user to a cloud server and performing corresponding alarm operation.
6. The student data security management system of claim 5 wherein:
the second access request analysis module judges whether the current access request of the user is an abnormal access request according to the password input state information under the condition that the access password is input incorrectly when the user requests to access the encrypted student data information, and makes a corresponding response to the current access request of the user according to the judgment result specifically comprises the following steps:
determining the probability P of an access password input error when the user requests to access the encrypted feature sub-data string according to the following formula (4):
in the formula (4), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string;
and determining an access state evaluation value E corresponding to the current access request of the user according to the following formula (5):
in the formula (5), R represents the number of characters included in the correct access password corresponding to the access to the encrypted feature sub-data string, q represents the number of consecutive errors in password input when the user requests to access the encrypted feature sub-data string, and RcRepresents the aboveThe number of characters contained in the error password input for the c time when the user requests to access the encrypted feature subdata string;
and comparing the access state evaluation value E with a preset access state evaluation threshold, if the access state evaluation value E is smaller than or equal to the preset access state evaluation threshold, judging that the current access request of the user is a normal access request and allowing the user to continuously input an access password, otherwise, judging that the current access request of the user is an abnormal access request and forbidding the user to continuously input the access password, and simultaneously uploading the identity information of the user to a cloud server and carrying out corresponding alarm operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011151606.7A CN112149095B (en) | 2020-10-26 | 2020-10-26 | Student data safety management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011151606.7A CN112149095B (en) | 2020-10-26 | 2020-10-26 | Student data safety management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112149095A CN112149095A (en) | 2020-12-29 |
CN112149095B true CN112149095B (en) | 2021-06-29 |
Family
ID=73954937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011151606.7A Active CN112149095B (en) | 2020-10-26 | 2020-10-26 | Student data safety management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112149095B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111416809A (en) * | 2020-03-13 | 2020-07-14 | 国网河北省电力有限公司信息通信分公司 | Continuous authentication method and device based on keystroke recognition |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04115372A (en) * | 1990-09-05 | 1992-04-16 | A T R Tsushin Syst Kenkyusho:Kk | Device for extracting face feature point |
CN101339612B (en) * | 2008-08-19 | 2010-06-16 | 陈建峰 | Face contour checking and classification method |
CN102930221A (en) * | 2011-08-09 | 2013-02-13 | 三星电子(中国)研发中心 | Method for protecting data in handheld equipment |
CN103455763B (en) * | 2013-07-29 | 2016-08-31 | 孙伟力 | A kind of internet log record system and method protecting individual subscriber privacy |
JP2015215878A (en) * | 2014-04-21 | 2015-12-03 | 株式会社リコー | Image processor and image processing system |
CN104469767B (en) * | 2014-10-28 | 2017-12-26 | 杭州电子科技大学 | The implementation method of integrated form security protection subsystem in a set of mobile office system |
CN104715236A (en) * | 2015-03-06 | 2015-06-17 | 广东欧珀移动通信有限公司 | Face beautifying photographing method and device |
CN104794386A (en) * | 2015-04-08 | 2015-07-22 | 天脉聚源(北京)传媒科技有限公司 | Data processing method and device based on face recognition |
CN104809375A (en) * | 2015-04-15 | 2015-07-29 | 广东欧珀移动通信有限公司 | Mobile terminal unlocking method and device |
CN105069365A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Data processing method and mobile terminal |
CN111626572A (en) * | 2020-05-08 | 2020-09-04 | 深圳市中壬银兴信息技术有限公司 | Digital intelligent wind control method and related product |
CN111666553A (en) * | 2020-07-17 | 2020-09-15 | 江苏荣泽信息科技股份有限公司 | Block chain identity authority management method based on distributed PKI |
CN112016425B (en) * | 2020-08-21 | 2021-04-27 | 上海松鼠课堂人工智能科技有限公司 | Handwritten answer recognition method and system based on deep learning |
-
2020
- 2020-10-26 CN CN202011151606.7A patent/CN112149095B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111416809A (en) * | 2020-03-13 | 2020-07-14 | 国网河北省电力有限公司信息通信分公司 | Continuous authentication method and device based on keystroke recognition |
Also Published As
Publication number | Publication date |
---|---|
CN112149095A (en) | 2020-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109644183B (en) | Remote use of locally stored biometric authentication data | |
CN112182519B (en) | Computer storage system security access method and access system | |
US20210056186A1 (en) | Systems and methods for improving kba identity authentication questions | |
TWI592820B (en) | Man-machine recognition method and system | |
US20070112775A1 (en) | Method for user biometric artifical authentication | |
CN112464117A (en) | Request processing method and device, computer equipment and storage medium | |
CN109871673A (en) | Based on the lasting identity identifying method and system in different context environmentals | |
CN112465513A (en) | Network security system and method based on identity authentication | |
US10771965B1 (en) | Systems and methods for photo recognition-based identity authentication | |
CN112464200A (en) | Authentication risk detection method and system | |
CN112084474A (en) | Enterprise archive management method, system, storage medium and electronic equipment | |
WO2010028517A1 (en) | System and method for generating/ identifying cipher code via artificial neural network | |
CN117540355A (en) | Zero trust access control system based on collaborative risk assessment model | |
Guo et al. | Verifying in the dark: Verifiable machine unlearning by using invisible backdoor triggers | |
CN112149095B (en) | Student data safety management method and system | |
CN114666164B (en) | Computer network user identity login verification system and method | |
CN110445790A (en) | A kind of account method for detecting abnormality logging in behavior based on user | |
CN112272195B (en) | Dynamic detection authentication system and method thereof | |
CN105678157B (en) | A kind of data property right protection system and method based on application environment identification | |
Adesina et al. | An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time. | |
CN112149089A (en) | Computer login authentication management system based on Internet of things | |
CN106650349B (en) | A kind of pair of identity card uses the safe method being monitored | |
CN117240607B (en) | Security authentication method based on security computer | |
CN115396225B (en) | Data platform user identity authentication method and device | |
CN117494092B (en) | Scenic spot ticket non-inductive verification method, system and medium based on living organism identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right | ||
PP01 | Preservation of patent right |
Effective date of registration: 20221020 Granted publication date: 20210629 |