Multimedia signature recognition methods and systemTechnical field
Identification field, particularly a kind of multimedia signature recognition methods and system that is applicable to the system that needs digital signature and safety identification the present invention relates to sign.
Background technology
Along with scientific and technological development, digital signature is widely used.So-called electronic signature, refers in electronic message contained, appended for identifying signer's identity and showing that signer approves the wherein data of content with electronic form.But the existing safety identification based on electronic signature, is all the infringement that the single security algorithm combined with hardware encryption lock by software prevents virus, wooden horse.The judgement that user's identification is only limited to password, security is not high enough.
Summary of the invention
Fundamental purpose of the present invention is to overcome the identification to user in prior art and only limits to the judgement of password, and the shortcoming that security is not high enough, proposes a kind of safe multimedia signature recognition methods and system.
The present invention adopts following technical scheme:
Multimedia signature recognition methods, for needing the system of digital signature and safety identification, is characterized in that: comprise the steps
1) first, judge whether user has the authority that database is read, if so, enter step 2); Be prohibited from entering if not system;
2) secondly, judge whether it has the authority of database write, if so, authorize data base read-write authority, the e-file information that user can check and more sign in new database, enters step 3); If not, the data message that user can only reading database;
3) user carries out e-file signature.
Further, in step 1), by gathering user's finger print information, and compare with the finger print information in database, judge whether to there is the authority that database is read.
Further, in step 2) in, by gathering user's face information, and compare with the face information that database middle finger is determined fingerprint entries, judge whether it has the authority of database write.
Further, described appointment fingerprint entries refers to, the finger print information place entry in step 1) in the database corresponding with the user fingerprints information collecting.
Further, in step 3), when user carries out e-file signature, the handwriting trace of signer is carried out real time record and is stored to database.
Multimedia signature recognition system, is characterized in that: comprise
One fingerprint identification device, for gathering user's finger print information and being stored to database, and carries out to user the authority judgement that database is read;
One face recognition device, for gathering user's face information and being stored to database, and the authority that user is write judgement;
One digital signature equipment, for digital signature, and stores user's digital signature information and this information and the face information collecting is linked and binding;
One human-computer interaction device, is connected with above-mentioned fingerprint identification device, face recognition device and digital signature equipment by interface API, for controlling above-mentioned each equipment collaboration work.
Further, described fingerprint identification device is fingerprint machine or PC or mobile communication terminal.
Further, described face recognition device is PC or mobile communication terminal.
Further, described digital signature equipment is touch-control/handwriting input device.
Further, human-computer interaction device comprises the software controlling fingerprint identification device and carry out the authority judgement that user reads, controls face recognition device and carry out the software of the authority judgement that user writes and the software that control figure signature equipment carries out digital signature verification.
From the above-mentioned description of this invention, compared with prior art, the present invention has following beneficial effect:
Multimedia signature recognition methods of the present invention and system, be applicable to the various fields that need digital signature and safety identification, as mathematic for business assistant, long-range Business agreement etc.; According to strict database access rule, user is read the judgement of authority, user's identity is carried out to the identification of uniqueness, adhere to the classification of access and the Permission Levels that continuity, maintenance application program are accessed, thereby positively ensured user's demand for security; The multimedia equipment that can easily be easy to get in conjunction with people and software application platform, the API that provides friendly multimedia to access, carries out fingerprint recognition and recognition of face etc. by pattern analysis processing, thereby reaches uniqueness and the accuracy of identity data.
In addition, the present invention realizes by the track to user's signature and with the record of vigour of style in literary composition degree the omnidistance raw readings that is to hand-written command line.Handwritten signature unique, continuous, not reproducible, the characteristic such as can not distort and there is the whole process of reappearing its signature and write behavior and scene key element, the final text of generation has incontrovertible evidence value and proof.
Brief description of the drawings
Fig. 1 is method flow diagram of the present invention;
Fig. 2 is system architecture diagram of the present invention.
Embodiment
Below by embodiment, the invention will be further described.
With reference to Fig. 1, multimedia signature recognition methods of the present invention, for needing the system of digital signature and safety identification, specifically comprises the steps
1) first, gather user's finger print information.
Gather the finger print information that post analysis collects, carry out user's identification.The process of identification is the finger print information in the finger print information of collection and database to be carried out to training in rotation compare.Judge whether to give the mandate of reading of subscriber data file.Authorize and do not pass through, be prohibited from entering system.
2) secondly, gather user's face information.
Obtain reading after authority of data file user, gather user's identity information by face identification system.Analyze the identity information gathering and carry out secondary identification.
Analytic process is to compare collecting the face information of wanting face information and date storehouse middle finger to determine fingerprint entries.If secondary identification is not passed through, user is not authorized the authority of database write.The data message that user can only reading database preserves.But can not change any information in database.Secondary identification is passed through, and system is authorized user the highest reading and writing data authority, the e-file information that user can check and more sign in new database.
3) last, user carries out e-file signature on digital signature equipment.
User obtains after the highest reading and writing data authority, and user carries out e-file signature on digital signature equipment, in signature, the handwriting trace of signer is carried out to real time record, and the data that record is obtained are stored.
The multimedia of the present invention signature recognition methods access rule of strictly controlling database, adheres to classification and the continuity of access, keeps the Permission Levels of application program, safe.
With reference to Fig. 2, based on above-mentioned multimedia signature recognition methods, the present invention also proposes a kind of multimedia signature recognition system, comprises
One fingerprint identification device, for gathering user's finger print information and being stored to database, and carries out to user the authority judgement that database is read.Can adopt fingerprint machine or the PC with camera function or mobile communication terminal (as mobile phone etc.).
One face recognition device, for gathering user's face information and being stored to database, and the authority that user is write judgement.Can adopt PC or mobile communication terminal (as mobile phone etc.) with camera function.
One digital signature equipment, for digital signature, and stores user's digital signature information and this information and the face information collecting is linked and binding.Can adopt touch-control input equipment or other handwriting input device, comprise and write display module, need the e-file of signature to show by obtaining; Write real time record module, in signer signature, the handwriting trace of signer is carried out to real time record, the data that record is obtained are stored.Realize by the track to user's signature and with the record of vigour of style in literary composition degree the omnidistance raw readings that is to hand-written command line.Handwritten signature unique, continuous, not reproducible, the characteristic such as can not distort and there is the whole process of reappearing its signature and write behavior and scene key element, the final text of generation has incontrovertible evidence value and proof.
One human-computer interaction device, is connected with above-mentioned fingerprint identification device, face recognition device and digital signature equipment by interface API, for controlling above-mentioned each equipment collaboration work.Human-computer interaction device comprises the software controlling fingerprint identification device and carry out the authority judgement that user reads, control face recognition device carries out the software of the authority judgement that user writes and the software that control figure signature equipment carries out digital signature verification.
Its principle of work is as follows:
User is input operation order on human-computer interaction device, application software A on human-computer interaction device controls fingerprint identification device and carries out the authority judgement that user reads, fingerprint identification device gathers user's finger print information and carries out contrast judgement, judged result is fed back to human-computer interaction device, human-computer interaction device receives this feedback information, if feedback information is Y (YES), open application software B(and be the software of controlling face recognition device and carrying out the authority judgement that user writes), if N(is no) forbid that user carries out next step operation.
Application program B on human-computer interaction device points to face recognition device by an interface API.Application software B controls face recognition device and carries out face seizure, and the data analysis in the face information and date storehouse capturing is checked and approved, and judged result is fed back to human-computer interaction device, human-computer interaction device receives this feedback information, if feedback information is Y (YES), opening application program C(is the software that control figure signature equipment carries out digital signature verification), if N(is no) forbid that user carries out next operation.
Application software C on human-computer interaction device points to digital signature equipment by an interface API; application software C control figure signature equipment carries out digital signature verification; the data analysis in the digital signature check information receiving and database is checked and approved in digital signature identification; judged result is fed back on human-computer interaction device; human-computer interaction device receives opening application program D after this feedback information; this application program D is the system that need to carry out digital signature and safety identification, also needs protected application program.
Above are only a specific embodiment of the present invention, but design concept of the present invention is not limited to this, allly utilizes this design to carry out the change of unsubstantiality to the present invention, all should belong to the behavior of invading protection domain of the present invention.