Continuous authentication security prevention system and method

A security protection and subsystem technology, applied in the field of information security and security, can solve problems such as hidden dangers of user data and information security, and achieve the effect of protecting security

Inactive Publication Date: 2017-06-13
浙江智贝信息科技有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current identity authentication method based on face recognition technology is generally only applicable to the user registration and user login stages, and adopts a one-time method for user identity identificat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous authentication security prevention system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0027] Please refer to figure 1 As shown, the preferred embodiment of the continuous authentication security protection system of the present invention. The continuous authentication security protection system is installed on the client, including the face image real-time acquisition subsystem S10, the face recognition subsystem S30, the face continuous recognition subsystem S50, the continuous authority execution subsystem S70, and the face learning and training subsystem. System S20, specifically includes the following contents:

[0028] The user performs the fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a continuous authentication security prevention system and method. The system comprises a face image real-time obtaining subsystem, a face identification subsystem, a face continuous identification subsystem and a continuous authority performing subsystem. A user carries out a face login authentication process through the face image real-time obtaining subsystem and the face identification subsystem. The face continuous identification subsystem automatically and continuously carries out user face real-time identification authentication in a set time interval. If face authentication is successful, the continuous authority performing subsystem allocates the right to use a client to the user. If the face authentication is unsuccessful and a failure exceeds a stated time interval, the continuous authority performing subsystem does not allocate the right to use the client to the user, and the user cannot uses the client normally. The face continuous identification subsystem automatically and continuously carries out user face real-time identification authentication in the set time interval. According to the system and the method, the security of the data of the client can be continuously protected, and the system and the method have wide application prospect.

Description

technical field [0001] The invention relates to the technical fields of information security and security, and in particular to a continuous authentication security protection system and a method thereof. Background technique [0002] With the development of computer network and communication technology, issues such as network information security, intellectual property protection and identity authentication have become an important and urgent research topic. In the prior art, the common data security protection technology is mainly to encrypt / decrypt electronic information data through passwords and external keys (such as: U disk, dongle, etc.). In the protection mechanism using passwords, the confidentiality effect on data is limited, and the passwords used have a high probability of being cracked, and it is not easy to remember; in the protection mechanism using external keys, physical objects, namely external keys, are used as Identity certificates are used to replace p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0815H04L9/3231H04L63/0861
Inventor 曹耀和
Owner 浙江智贝信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products