CN116938594B - Multi-level identity verification system based on high-speed encryption technology - Google Patents
Multi-level identity verification system based on high-speed encryption technology Download PDFInfo
- Publication number
- CN116938594B CN116938594B CN202311154543.4A CN202311154543A CN116938594B CN 116938594 B CN116938594 B CN 116938594B CN 202311154543 A CN202311154543 A CN 202311154543A CN 116938594 B CN116938594 B CN 116938594B
- Authority
- CN
- China
- Prior art keywords
- data
- value
- key
- pixel
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 37
- 238000005516 engineering process Methods 0.000 title claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 24
- 238000007726 management method Methods 0.000 claims abstract description 12
- 238000013524 data verification Methods 0.000 claims abstract description 7
- 238000013500 data storage Methods 0.000 claims abstract description 4
- 230000004044 response Effects 0.000 claims abstract description 4
- 238000000034 method Methods 0.000 claims description 17
- 239000002131 composite material Substances 0.000 claims description 10
- 239000012634 fragment Substances 0.000 claims description 6
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 4
- 241000282326 Felis catus Species 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007781 pre-processing Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a multi-level identity verification system based on a high-speed encryption technology, which comprises an input and login module, a management account generation module and a management module, wherein the input and login module is configured to input initial data and generate a unique identification code of the initial data, construct an index of the initial data and the unique identification code, and generate a management account according to the index; the data acquisition module is configured to acquire a data verification request initiated by a requester, respond to and acquire basic data provided by the requester, and at least comprise a unique identification code; the data processing module is configured to verify the initial data and execute key call; the key storage module is configured to update a key in response to the fact that the same management account is verified once by the input and login module, and is configured to store the key and distribute the key to a requester when managing account indexes; and the data storage module is configured to backup and store the initial data and the basic data. The invention realizes the heterogeneous verification under the same verification information.
Description
Technical Field
The invention belongs to the technical field of data processing systems, and particularly relates to a multi-level identity verification system based on a high-speed encryption technology.
Background
With the rapid development of the information industry of China, the China has data as a non-negligible part of national resources, the data transaction is like money transaction, and the data transaction business behavior needs to be systematically solved and is endless and ubiquitous, so that the fourth business mode of the Internet except advertisements, electronic commerce and games, namely the data transaction business mode, of the information Internet is created.
In view of this, the invention forms multiple heterogeneous identity verification systems based on multiple different levels of different scenes according to the characteristics of data attributes, and has important significance for the development of the future data transaction industry.
Disclosure of Invention
Therefore, the invention provides a multi-level identity verification system based on a high-speed encryption technology, so as to realize multiple heterogeneous identity verification and encryption in the equipment access process.
In a first aspect of the present invention, there is provided a multi-level authentication system based on a high-speed encryption technique, comprising:
an entry and login module configured to,
inputting initial data and generating a unique identification code of the initial data, constructing an index of the initial data and the unique identification code, and generating a management account according to the index;
a data acquisition module configured to,
acquiring a data verification request initiated by a requester, responding to and acquiring basic data provided by the requester, wherein the basic data at least comprises a unique identification code;
a data processing module configured to,
the initial data is checked and a key call is performed,
and simultaneously, when the data acquisition module acquires the unique identifier, the method comprises the following steps of:
if the acquired basic data except the unique identification code is empty, the authentication fails;
if the acquired basic data is the same as the data quantity and the data type in the initial data, executing direct access call, calling a secret key and passing authentication;
if the acquired basic data is different from the data amount and/or the data type in the initial data, executing indirect access calling, sequentially executing multiple link relation verification on each type of data and each data contained in the initial data according to the number of the data types in the basic data, and if the verification passes under the condition of a first threshold value and/or a second threshold value in the multiple verification, calling a secret key and passing the authentication;
a key storage module configured to store, in association with the key,
the input and login module updates the key through the response after one verification pass of the same management account, and is configured to store the key and distribute the key to a requester when managing account indexes;
a data storage module configured to store, at least in part,
and backing up and storing the initial data and the basic data.
Further, the initial data includes at least one of text data, image data, and audio data, and when entered, includes multiple sets of data packets of at least one data.
Further, the data processing module respectively executes encryption on various types of data in the input initial data and/or the basic data according to data types, and generates sub-keys on the basis of the keys.
Further, when encrypting the text data,
constructing a character value library, wherein the character values comprise characters, characters and numbers, and simultaneously constructing a first-generation dictionary of the character values;
performing encryption processing on a first code corresponding to each character value in the first code dictionary by adopting a preset encryption rule to obtain a first subkey;
constructing a unit value dictionary, which comprises a unit value label and unit value information corresponding to the unit value label;
and injecting the first subkey with the unit value label into a phoneme value library and/or a pixel value library, and writing in a phoneme value and/or a pixel value corresponding to the unit value.
Further, when encrypting the audio data,
storing a voiceprint recognition model and constructing a phoneme value library;
after the voiceprint recognition model recognizes the audio of the initial data and/or the basic data, dividing the audio into audio fragments according to preset length, recognizing phoneme units in each audio fragment one by one, sequencing the phoneme units according to the track time, and establishing a unit time tag;
constructing a second code dictionary related to the phoneme unit, converting the code into a second subkey and then injecting the second subkey into the unit time tag;
and injecting the second subkey with the unit time tag into a text value library and/or a pixel value library, and writing the text value and/or the pixel value corresponding to the phoneme value.
Further, when the image data is encrypted,
verifying the type of the image data, wherein the type of the image data comprises a single-frame image, a multi-frame image and a composite image; the composite image at least comprises at least two combinations of a single-frame image, a multi-frame image, audio data and text data;
constructing a pixel value library and a third generation number dictionary;
the following steps are performed for each frame of image:
obtaining a chromaticity gradient boundary of a pixel value to obtain a pixel value boundary according to each minimum pixel value in a frame image, and obtaining a pixel unit image according to the pixel value boundary;
establishing a unit pixel label according to the number of pixel values contained in the pixel unit image, and establishing an index value between the unit pixel label and the pixel unit image;
encrypting the index value according to the third-generation number dictionary to obtain a third subkey;
injecting the unit pixel tag into the third subkey;
and injecting the third subkey with the unit pixel label into a text value library and/or a phoneme value library, and writing the text value and/or the phoneme value corresponding to the pixel unit.
Further, the first threshold condition is that after the threshold number of data types are checked and passed, the basic data directly corresponds to the initial data to be checked and passed;
and the second threshold condition is that the threshold passing rate of the data in the text value library, the phoneme value library or the pixel value library, which are called by the first code key, the second code key or the third code key for requesting verification, is verified.
In a second aspect of the present invention, a computer-readable storage medium is provided.
In a third aspect of the invention, an electronic device is provided.
Compared with the prior art, the technical scheme provided by the invention has the following advantages:
the invention acquires a data verification request initiated by a requester through a data acquisition module, and acquires basic data provided by the requester, wherein the basic data at least comprises a unique identification code; the data processing module is configured to encrypt the text data, the audio data and the image data recorded in the recording module; the verification module is configured to verify the text data, the audio data and the image data acquired in the data acquisition module and execute key calling according to the data; meanwhile, the system is configured to directly return to refuse access if the acquired data is empty when the unique identification code is acquired in the data acquisition module; if the collected data type is the same as the initial data type, executing direct access call, calling a secret key and accessing the secret key; and if the acquired data type is different from the initial data type, executing indirect access call, sequentially executing multiple times of verification on the data in the data type according to the total quantity of the link relations among different data, and if the data in the preset threshold value is passed in the multiple times of verification, executing access by verifying and calling a secret key. The decryption process of the same secret key through different data sources is realized, and the multi-level identity authentication of a single user is realized.
Drawings
FIG. 1 is a schematic diagram of a system provided by an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and techniques of the disclosed embodiments can be understood in more detail, a more particular description of the embodiments of the disclosure, briefly summarized below, may be had by reference to the appended drawings, which are not intended to be limiting of the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may still be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawing.
Example 1
The embodiment provides a multi-level identity verification system based on a high-speed encryption technology, which comprises an input and login module, a data acquisition module, a data processing module and a key storage module as shown in fig. 1.
The input and login module of the embodiment of the disclosure is configured to input initial data and generate a unique identification code of the initial data, construct an index of the initial data and the unique identification code, and generate a management account according to the index.
The data acquisition module is configured to acquire a data verification request initiated by a requester, respond to and acquire basic data provided by the requester, and at least comprise a unique identification code.
The data processing module is configured to verify the initial data and execute key calling, and simultaneously, when the data acquisition module acquires the unique identification code, the data processing module is configured to execute the following steps:
if the acquired basic data except the unique identification code is empty, the authentication fails;
if the acquired basic data is the same as the data quantity and the data type in the initial data, executing direct access call, calling a secret key and passing authentication;
and if the acquired basic data is different from the data amount and/or the data type in the initial data, executing indirect access calling, sequentially executing multiple link relation verification on each type of data and each data contained in the initial data according to the number of the data types in the basic data, and if the verification passes under the condition of a first threshold value and/or a second threshold value in the multiple verification, calling a secret key and passing the authentication.
And the key storage module is configured to update the key according to the response of the input and login module after one verification pass of the same management account, and is also configured to store the key and distribute the key to a requester when managing account indexes.
And the data storage module is configured to backup and store the initial data and the basic data.
In the embodiment of the disclosure, composite verification or single verification under a first threshold condition and a second threshold condition is provided, wherein the first threshold condition is that after a threshold number of data types are verified, basic data directly corresponds to the initial data verification; and the second threshold condition is that the threshold passing rate of the data in the text value library, the phoneme value library or the pixel value library, which are called by the first code key, the second code key or the third code key for requesting verification, is verified.
The data processing module processes the data types, wherein the initial data or the basic data comprises text data, audio data and image data, and the input and login module performs initial sampling to at least one of the text data, the audio data or the audio data, and comprises a plurality of groups of data packets corresponding to the data types.
The data processing module then performs encryption on each data of the entered initial data type separately and provides sub-keys for authentication use on the basis of the keys, and the sub-keys are also stored and distributed by the key storage module to the corresponding management accounts.
When encrypting the text data, the embodiment of the disclosure constructs a text value library, wherein the text value comprises characters, characters and numbers, and simultaneously constructs a first-generation dictionary of the text value;
performing encryption processing on a first code corresponding to each character value in the first code dictionary by adopting a preset encryption rule to obtain a first subkey;
constructing a unit value dictionary, which comprises a unit value label and unit value information corresponding to the unit value label; the unit value information is index information between code numbers and text values.
And injecting the first subkey with the unit value label into a phoneme value library and/or a pixel value library, and writing in a phoneme value and/or a pixel value corresponding to the unit value.
It should be noted that, in the embodiment of the present disclosure, the unit value label and the code number are preset values, which are stored in the corresponding dictionary in advance, and when each text value or unit value information is newly created, the text value or the unit value information is indexed to the preset position of the corresponding dictionary, so as to complete the indexing.
When the embodiment of the disclosure encrypts the audio data, storing a voiceprint recognition model and constructing a phoneme value library;
after the voiceprint recognition model recognizes the audio of the initial data and/or the basic data, dividing the audio into audio fragments according to preset length, recognizing phoneme units in each audio fragment one by one, sequencing the phoneme units according to the track time, and establishing a unit time tag;
constructing a second code dictionary related to the phoneme unit, converting the code into a second subkey and then injecting the second subkey into the unit time tag;
and injecting the second subkey with the unit time tag into a text value library and/or a pixel value library, and writing the text value and/or the pixel value corresponding to the phoneme value.
When the image data is encrypted, the type of the image data is checked, wherein the type of the image data comprises a single-frame image, a multi-frame image and a composite image; the composite image at least comprises at least two combinations of a single-frame image, a multi-frame image, audio data and text data;
constructing a pixel value library and a third generation number dictionary;
the following steps are performed for each frame of image:
obtaining a chromaticity gradient boundary of a pixel value to obtain a pixel value boundary according to each minimum pixel value in a frame image, and obtaining a pixel unit image according to the pixel value boundary;
establishing a unit pixel label according to the number of pixel values contained in the pixel unit image, and establishing an index value between the unit pixel label and the pixel unit image;
encrypting the index value according to the third-generation number dictionary to obtain a third subkey;
injecting the unit pixel tag into the third subkey;
and injecting the third subkey with the unit pixel label into a text value library and/or a phoneme value library, and writing the text value and/or the phoneme value corresponding to the pixel unit.
It should be noted that, for a multi-frame image, after each frame of image is processed, calculating the overlap ratio of the pixel boundary of the image after each frame of image is overlapped, and writing the overlap ratio of the pixel boundary into the third subkey; for the composite image, if the audio is present in the composite image, the processing of the audio is executed, if the text is present in the composite image, the text pixel frame is acquired according to the pixel boundary and is compared with the word stock to generate a corresponding word value, and the text value acquired during the processing of the image data is directly injected into the pre-processing of the first subkey without injecting the information into the pre-processing of the third subkey.
Through the processing of the data processing module in the embodiment of the present disclosure, each generated phoneme value, text value or pixel value is indexed together by the first subkey, the second subkey and the third subkey, and a correlation between heterogeneous data is established. In the embodiment of the present disclosure, the injection relationship between the subkey and the value is a semantic relationship, and in the embodiment of the present disclosure, audio data is taken as an example, when a user inputs audio data in the first input process, since in the embodiment, it is unclear to the user of the input person that the input audio is processed to form specific plaintext data of a phoneme value, and the representation of the audio input is understood as a text meaning of the audio. For example, when a user records for the first time, the recorded audio is "cat", and for the recorder, the user understands the visual image of the cat, so that in order to facilitate multiple verification, the application needs to establish at least two sets of different types of recorded requests or multiple sets of data packets of one type of data according to the recorder, and when the recorder establishes two sets of different types of recorded requests, if semantic relevance exists between the two different types of recorded requests, initial relevance and corresponding relevance indexes of the two different types of recorded requests are established.
Meanwhile, in an embodiment of the present disclosure, the data processing module is further configured to establish an association index between the text value library, the phoneme value library, and the pixel value library; values within any library can be called and indexed to corresponding values within other libraries. In the embodiment of the disclosure, when different types of data are collected, due to source differences among the different types of data, one type of data is difficult to verify by the different types of data, so that the embodiment injects values among different libraries to construct the relevance among the different types of data, and performs matching and calling through different unit tags and subkeys of the different types of data, thereby avoiding the leakage of a plaintext link relation among the different types of data.
Meanwhile, in the embodiment of the disclosure, for the invocation of the sub-keys, after the initial data is input by the inputter, the corresponding key invocation is performed according to the initial data, and after the inputter completes the verification acquisition of the basic data, a plurality of sub-keys are generated, and the sub-keys are invoked for collaborative verification in the follow-up verification. Since the total amount and similarity of data are limited, the number of sub-keys thereof is also limited.
As another implementation mode of the embodiment of the disclosure, the data processing module provides an upper limit number threshold value of the subkeys under the same management account, so that the condition that the number of the subkeys generated by data verification is too large due to repeated submission of useless data for verification is avoided, and various value bases of the embodiment of the disclosure are polluted.
It should be noted that, in the embodiment of the present disclosure, initial verification needs to be performed before initial data is entered, the data processing module verifies that the processed initial data is in all stored data, and matches one by one whether the initial data passes all the verification after being processed by the data processing module of the present embodiment according to the association index between all data types, if all the verification passes, the entry of the initial data is not performed, and login authentication performed by the data processing module is performed.
Example two
Referring to fig. 2, an embodiment of the present disclosure provides a multi-level authentication system based on a high-speed encryption technology, which includes a processor (processor) 30 and a memory (memory) 31. Optionally, the electronic device may also include a communication interface (communication interface) 32 and a bus 33. The processor 30, the communication interface 32, and the memory 31 may communicate with each other via the bus 33. The communication interface 32 may be used for information transfer. Processor 30 may invoke logic instructions in memory 31 to perform the methods of the high-speed encryption technology based multi-level authentication system of the above embodiments.
Embodiments of the present disclosure provide a storage medium storing computer-executable instructions configured to perform the method in a multi-level authentication system based on high-speed encryption techniques described above.
The storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium. A non-transitory storage medium comprising: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and acts are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in this application, the terms "comprises," "comprising," and/or "includes," and variations thereof, mean that the stated features, integers, steps, operations, elements, and/or components are present, but that the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof is not precluded. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.
Claims (5)
1. A multi-level authentication system based on high-speed encryption technology, comprising:
an entry and login module configured to,
inputting initial data and generating a unique identification code of the initial data, constructing an index of the initial data and the unique identification code, and generating a management account according to the index;
the initial data comprises at least one of text data, image data and audio data, and when entered, comprises a plurality of sets of data packets of at least one data;
a data acquisition module configured to,
acquiring a data verification request initiated by a requester, responding to and acquiring basic data provided by the requester, wherein the basic data at least comprises a unique identification code;
a data processing module configured to,
the initial data is checked and a key call is performed,
the method is also configured to establish an associated index among a text value library, a phoneme value library and a pixel value library, and the values in any library can be called and indexed to the corresponding values in other libraries;
and simultaneously configured to perform the following steps when the unique identification code is acquired by the data acquisition module:
if the acquired basic data except the unique identification code is empty, the authentication fails;
if the acquired basic data is the same as the data quantity and the data type in the initial data, executing direct access call, calling a secret key and passing authentication;
if the acquired basic data is different from the data amount and/or the data type in the initial data, executing indirect access calling, sequentially executing multiple link relation verification on each type of data and each data contained in the initial data according to the number of the data types in the basic data, and if the verification passes under the condition of a first threshold value and/or a second threshold value in the multiple verification, calling a secret key and passing the authentication;
the first threshold condition is that after the threshold number of data types are checked and passed, the basic data directly corresponds to the initial data to be checked and passed;
the second threshold condition is that the threshold passing rate of data in a word value library, a phoneme value library or a pixel value library, which are called by a first code key, a second code key or a third code key which are requested to be checked, is checked to pass;
a key storage module configured to store, in association with the key,
the input and login module updates the key through the response after one verification pass of the same management account, and is configured to store the key and distribute the key to a requester when managing account indexes;
a data storage module configured to store, at least in part,
and backing up and storing the initial data and the basic data.
2. A multi-level authentication system based on high-speed encryption technology according to claim 1, wherein the data processing module performs encryption on each type of data in the entered initial data and/or basic data, respectively, in data type, and generates a subkey based on the key.
3. The multi-level authentication system based on high-speed encryption technology as set forth in claim 2, wherein, when encrypting the text data,
constructing a character value library, wherein the character values comprise characters, characters and numbers, and simultaneously constructing a first-generation dictionary of the character values;
performing encryption processing on a first code corresponding to each character value in the first code dictionary by adopting a preset encryption rule to obtain a first subkey;
constructing a unit value dictionary, which comprises a unit value label and unit value information corresponding to the unit value label;
and injecting the first subkey with the unit value label into a phoneme value library and/or a pixel value library, and writing in a phoneme value and/or a pixel value corresponding to the unit value.
4. A multi-level authentication system based on high-speed encryption technology as set forth in claim 3, wherein, when encrypting the audio data,
storing a voiceprint recognition model and constructing a phoneme value library;
after the voiceprint recognition model recognizes the audio of the initial data and/or the basic data, dividing the audio into audio fragments according to preset length, recognizing phoneme units in each audio fragment one by one, sequencing the phoneme units according to the track time, and establishing a unit time tag;
constructing a second code dictionary related to the phoneme unit, converting the code into a second subkey and then injecting the second subkey into the unit time tag;
and injecting the second subkey with the unit time tag into a text value library and/or a pixel value library, and writing the text value and/or the pixel value corresponding to the phoneme value.
5. The multi-level authentication system based on high-speed encryption technology as set forth in claim 4, wherein, when encrypting the image data,
verifying the type of the image data, wherein the type of the image data comprises a single-frame image, a multi-frame image and a composite image; the composite image at least comprises at least two combinations of a single-frame image, a multi-frame image, audio data and text data;
constructing a pixel value library and a third generation number dictionary;
the following steps are performed for each frame of image:
obtaining a chromaticity gradient boundary of a pixel value to obtain a pixel value boundary according to each minimum pixel value in a frame image, and obtaining a pixel unit image according to the pixel value boundary;
establishing a unit pixel label according to the number of pixel values contained in the pixel unit image, and establishing an index value between the unit pixel label and the pixel unit image;
encrypting the index value according to the third-generation number dictionary to obtain a third subkey;
injecting the unit pixel tag into the third subkey;
and injecting the third subkey with the unit pixel label into a text value library and/or a phoneme value library, and writing the text value and/or the phoneme value corresponding to the pixel unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311154543.4A CN116938594B (en) | 2023-09-08 | 2023-09-08 | Multi-level identity verification system based on high-speed encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311154543.4A CN116938594B (en) | 2023-09-08 | 2023-09-08 | Multi-level identity verification system based on high-speed encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116938594A CN116938594A (en) | 2023-10-24 |
CN116938594B true CN116938594B (en) | 2024-03-22 |
Family
ID=88386311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311154543.4A Active CN116938594B (en) | 2023-09-08 | 2023-09-08 | Multi-level identity verification system based on high-speed encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116938594B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19946004A1 (en) * | 1999-09-03 | 2001-07-19 | Sc Info & Inno Gmbh & Co | Verifying integrity, authorship of and encoding/decoding text involves using one-time algorithm and/or symmetrical crypto algorithm dependent on one secret code |
CN101504690A (en) * | 2009-03-26 | 2009-08-12 | 北京航空航天大学 | Real-time simulation validation system and method for communication system integrated circuit design |
WO2016131083A1 (en) * | 2015-02-20 | 2016-08-25 | S2D Pty Ltd | Identity verification. method and system for online users |
WO2018233487A1 (en) * | 2017-06-22 | 2018-12-27 | 腾讯科技(深圳)有限公司 | Identity authentication method, terminal and storage medium |
CN110572601A (en) * | 2019-09-29 | 2019-12-13 | 青岛希望鸟科技有限公司 | Double-recording video recording system with real-time checking function |
CN110610074A (en) * | 2019-09-23 | 2019-12-24 | 深圳宇德金昌贸易有限公司 | Multi-dimensional information-based identity verification system for trading platform |
WO2019246626A1 (en) * | 2018-06-22 | 2019-12-26 | Mshift, Inc. | Decentralized identity verification platforms |
CN111783075A (en) * | 2020-06-28 | 2020-10-16 | 平安普惠企业管理有限公司 | Authority management method, device and medium based on secret key and electronic equipment |
CN114860855A (en) * | 2022-05-10 | 2022-08-05 | 江苏阳光智慧城市科技有限公司 | Internet mobile terminal inputting system based on data management |
WO2022170810A1 (en) * | 2021-02-09 | 2022-08-18 | 苏宁易购集团股份有限公司 | Method and apparatus for processing cloud storage data, and computer system |
WO2022206349A1 (en) * | 2021-04-02 | 2022-10-06 | 腾讯科技(深圳)有限公司 | Information verification method, related apparatus, device, and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113935070B (en) * | 2021-12-16 | 2022-06-07 | 北京百度网讯科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
-
2023
- 2023-09-08 CN CN202311154543.4A patent/CN116938594B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19946004A1 (en) * | 1999-09-03 | 2001-07-19 | Sc Info & Inno Gmbh & Co | Verifying integrity, authorship of and encoding/decoding text involves using one-time algorithm and/or symmetrical crypto algorithm dependent on one secret code |
CN101504690A (en) * | 2009-03-26 | 2009-08-12 | 北京航空航天大学 | Real-time simulation validation system and method for communication system integrated circuit design |
WO2016131083A1 (en) * | 2015-02-20 | 2016-08-25 | S2D Pty Ltd | Identity verification. method and system for online users |
WO2018233487A1 (en) * | 2017-06-22 | 2018-12-27 | 腾讯科技(深圳)有限公司 | Identity authentication method, terminal and storage medium |
WO2019246626A1 (en) * | 2018-06-22 | 2019-12-26 | Mshift, Inc. | Decentralized identity verification platforms |
CN110610074A (en) * | 2019-09-23 | 2019-12-24 | 深圳宇德金昌贸易有限公司 | Multi-dimensional information-based identity verification system for trading platform |
CN110572601A (en) * | 2019-09-29 | 2019-12-13 | 青岛希望鸟科技有限公司 | Double-recording video recording system with real-time checking function |
CN111783075A (en) * | 2020-06-28 | 2020-10-16 | 平安普惠企业管理有限公司 | Authority management method, device and medium based on secret key and electronic equipment |
WO2022170810A1 (en) * | 2021-02-09 | 2022-08-18 | 苏宁易购集团股份有限公司 | Method and apparatus for processing cloud storage data, and computer system |
WO2022206349A1 (en) * | 2021-04-02 | 2022-10-06 | 腾讯科技(深圳)有限公司 | Information verification method, related apparatus, device, and storage medium |
CN114860855A (en) * | 2022-05-10 | 2022-08-05 | 江苏阳光智慧城市科技有限公司 | Internet mobile terminal inputting system based on data management |
Non-Patent Citations (2)
Title |
---|
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure;Soumya Prakash Otta;《Future Internet》;20230401;全文 * |
基于监听和过滤器技术的Web服务身份验证;龙鹏飞;《计算机技术与发展》;20060310;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116938594A (en) | 2023-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230205610A1 (en) | Systems and methods for removing identifiable information | |
US11663460B2 (en) | Data exchange method, data exchange device and computing device | |
CN108848058A (en) | Intelligent contract processing method and block catenary system | |
CN111026858B (en) | Project information processing method and device based on project recommendation model | |
CN111625809A (en) | Data authorization method and device, electronic equipment and storage medium | |
CN113382017B (en) | Permission control method and device based on white list, electronic equipment and storage medium | |
US8677149B2 (en) | Method and system for protecting intellectual property in software | |
CN108055585A (en) | Data processing method, set top box upgrading method, terminal and set-top box | |
CN112734050A (en) | Text model training method, text model recognition device, text model equipment and storage medium | |
CN114201532A (en) | Data query method, device, medium and equipment based on ESOP system | |
CN110704875B (en) | Method, device, system, medium and electronic equipment for processing client sensitive information | |
CN114756887A (en) | Method and device for encrypting and storing sensitive information block in file | |
CN115712909A (en) | Text watermark embedding method, tracing method and system based on block chain | |
WO2022151888A1 (en) | Data sharing method and apparatus | |
US20230274023A1 (en) | Data management computer, data management system including the data management computer, and method thereof | |
US11734445B2 (en) | Document access control based on document component layouts | |
CN116938594B (en) | Multi-level identity verification system based on high-speed encryption technology | |
CN117669582A (en) | Engineering consultation processing method and device based on deep learning and electronic equipment | |
CN117436047A (en) | Verification code generation method, device, computer equipment and storage medium | |
CN115879157A (en) | Data security search method and device, equipment, medium and product thereof | |
Merdassi et al. | Private security for the cloud mobile via a strong authentication method | |
CN117009683A (en) | Codeword data processing method and device, electronic equipment and storage medium | |
CN116049783A (en) | Enterprise bill management method and system based on secure hardware carrier | |
CN111597453B (en) | User image drawing method, device, computer equipment and computer readable storage medium | |
CN112187909B (en) | Financing information generation system and method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 901, 9th Floor, Building 7, Yard 8, Automobile Museum East Road, Fengtai District, Beijing, 100160 Applicant after: Shudun Information Technology Co.,Ltd. Address before: 100000 901, Floor 9, Building 7, Yard 8, Auto Museum East Road, Fengtai District, Beijing Applicant before: BEIJING SHUDUN INFORMATION TECHNOLOGY CO.,LTD. Country or region before: China |
|
GR01 | Patent grant | ||
GR01 | Patent grant |