Facial recognition-based secure printing audition system

A facial recognition and secure printing technology, applied in the input/output process of digital output to printing unit, calculation, data processing, etc., can solve the problems of unrecognized, low recognition rate, and unstable biological characteristics of recognition, and achieve complexity Humanized and, reduce the risk of management and control, the effect of simple complexity

Active Publication Date: 2016-03-23
AVICIT CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security printing audit solutions currently on the market usually use smart IC cards or fingerprint solutions to identify user identities. These two identification methods have the following problems: (1) It is impossible to prevent malicious users from illegally holding other people's smart IC cards , pretending to be a legitimate user for identity authentication, the audit system cannot identify the user as an illegal user; (2) The fingerprint authentication method is a biometric authentication method. Although the security is higher than that of the smart IC card, but because of its relatively unstable identification biological characteristics, therefore, Usually, users are required to register multiple fingerprints for backup identification. Once this vulnerability is exploited by a malicious user, two people will register or associate fingerprints with a user account, and the audit system will not be able to identify the real identity of the user, resulting in the inability to identify the real operation. (3) Ordinary facial recognition algorithms are inefficient and have a low recognition rate, and cannot capture dynamic and fast facial information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Facial recognition-based secure printing audition system
  • Facial recognition-based secure printing audition system
  • Facial recognition-based secure printing audition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Such as figure 1 As shown, the present invention includes a camera group 1, an infrared camera 1-1, a high-definition camera 1-2, a touch screen host 2, an authentication terminal 3, a printer 4, a user information database 5, a print job database 6, a user facial information database 7, a printing Job audit database 8, identity authentication module 9, print behavior audit module 10, print job scheduling module 11, audit server 12, print job control agent 13, PC terminal 14, print audit management console 15, PC terminal 16, two-dimensional Code input (scanning) device 17. The camera group 1 is connected to the authentication terminal 3, the authentication terminal 3 is connected to the printer 4, the authentication terminal 3 is connected to the audit server 12, the PC terminal 14 is connected to the audit server 12, the PC terminal 16 is connected to the audit server 12, and the PC terminal 16 is connected to the two-dimensional Code input (scanning) device 17 is conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a facial recognition-based secure printing audition system. The facial recognition-based secure printing audition system is connected with an identity authentication terminal, a printing audition server, a printer and a terminal computer through an Ethernet framework, and comprises an identity authentication module, a printing operation control module and a printing behavior audition module. The facial recognition-based secure printing audition system is used for decreasing the risk and threat caused by the operation of carrying out printing output by illegal users which pretends to be legal users in the sensitive carrier production process, realizing the printing identity authentication and behavior audition in a real-name system at a price as small as possible, decreasing the chances of unauthorized sensitive data output leakage of malicious users and tracing the faces of the real printing output personnel and the panorama photos of the operators, so as to ensure the security of the sensitive information and the reliable audition of the information.

Description

technical field [0001] The invention relates to the government, military enterprises and the fields of information security and secrecy that require high protection of sensitive data, and is especially suitable for monitoring, auditing and monitoring systems that require real-name registration, independent controllable and safe printing. Background technique [0002] The secure printing audit technology forms a complete chain of audit evidence for printing events by recording and monitoring a series of events such as user submission of print requests, printer job monitoring, and user identification. Through effective auditing of users' printing behavior, abnormal media production behavior of users can be discovered in time, thereby reducing the risk of sensitive data being produced and leaked at will within the unit or enterprise. However, the current secure printing audit solutions on the market usually use smart IC cards or fingerprint solutions to identify user identities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/12G06F21/32
CPCG06F3/1203G06F3/1222G06F21/32
Inventor 王亮张强刘娟
Owner AVICIT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products