CN107485858A - A kind of network game indulging verification method - Google Patents
A kind of network game indulging verification method Download PDFInfo
- Publication number
- CN107485858A CN107485858A CN201710750437.0A CN201710750437A CN107485858A CN 107485858 A CN107485858 A CN 107485858A CN 201710750437 A CN201710750437 A CN 201710750437A CN 107485858 A CN107485858 A CN 107485858A
- Authority
- CN
- China
- Prior art keywords
- account
- user
- checking
- verification method
- addiction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012795 verification Methods 0.000 title claims abstract description 28
- 206010012335 Dependence Diseases 0.000 claims abstract description 36
- 238000005516 engineering process Methods 0.000 claims abstract description 9
- 230000003760 hair shine Effects 0.000 claims 1
- 230000006399 behavior Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/71—Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
- A63F13/35—Details of game servers
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/79—Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/55—Details of game data or player data management
- A63F2300/5546—Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to a kind of network game indulging verification method, belong to technical field of network security.The present invention abandons existing network game Anti-addiction rule, mainly for the online game account verified by Anti-addiction of fraud, innovatively introduces the technologies such as image recognition, recognition of face, shows a kind of brand-new network game indulging verification method.The present invention considers in all its bearings, corresponding Anti-addiction verification method is made for different situations, in addition the present invention is applicable not only to computer network game, it is more suitable for electronic equipment of all operation platforms such as mobile phone network game with camera, it substantially avoid online game to negatively affect to caused by minor, fundamentally prevented addiction phenomenon of the minor to online game.
Description
Technical field
The present invention relates to a kind of network game indulging verification method, belong to technical field of network security.
Background technology
Along with the fast development of computer age, the equipment such as computer, smart mobile phone is also widely used.But
While these electronic products bring us and facilitated, many negative effects are also generated, because increasing minor sinks
It is confused in online game, is unfavorable for the development of current age section.
Though game can improve itself intelligence to a certain extent, teenager's self-control is not general high, holds very much
Easily indulge wherein.Present major online game business men has all formulated corresponding indulging system rule, but these rules are all substantially
It is similar, it is to fill in the information such as identification card number nothing but, and these information are faked and are easy to, it is impossible to fundamentally solve minor and sink
It is confused the phenomenon of online game.
Existing patent discloses Application No.:201510453489.2 a kind of network Anti-addiction side based on fingerprint recognition
Method, this method can effectively control the surf time, prevented some online personnel by changing account, the activity such as change planes it is anti-to escape
The problem of indulging control.But this method has the shortcomings that obvious, i.e., only support computation, the ring especially as Internet bar
Border, and the bigger epoch are influenceed on minor for present mobile phone games, and do not apply to.
The content of the invention
The technical problem to be solved in the present invention is the limitation and deficiency for prior art, there is provided a kind of online game is anti-settling
Verification method is confused, innovatively introduces the technologies such as image recognition, recognition of face, is swum with settlement computer online game or cell phone network
The influence to minor's development such as play, has fundamentally prevented addiction phenomenon of the minor to online game.
The technical scheme is that:A kind of network game indulging verification method, is concretely comprised the following steps:
Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and
Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account,
And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;
Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used
The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to.
Step1.3:Camera acquisition user human face photo progress recognition of face is opened according to the rule in Step1.3.1 to test
Demonstrate,prove, the identity card human face photo stored in human face photo and database that server obtains to it carries out recognition of face, and checking is
No is same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If checking
Failure, then log in failure, also prevented steal-number person steals means;
Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases
It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If
Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;
Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need
Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours
System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
The account it is non-I use when verification method step be:
Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time
Identity information in Lu Wuxu matching databases;
Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes
The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present
Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;
Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to
Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3.
Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line,
Verification method is identical with method described in Step2.2, if this time checking still succeeds, without carrying out again three times in this time logging in
Checking;If this time authentication failed, logs in failure, compulsory withdrawal account;
Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line
It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time
Checking still fails, then logs in failure, compulsory withdrawal account.
The account is X days from registration, and can be verified without Anti-addiction can log in success, but user is after line 3 hours
System compulsory withdrawal logs in, and the same day can not log in the account again, once do not carry out account identity yet after x days from registration
Binding, then this account can not be logged in normally before account identity binding is not carried out.
Matching process described in the step Step1.1, first by the technical limit spacing such as image recognition identification card number and name,
Whether access public security system checking identification card number matches with name, then verifies the identity card face uploaded by face recognition technology
Whether the human face photo that photo obtains with camera is same people, if same people, then the match is successful, and otherwise, it fails to match.
The people that camera in step Step1.1, Step1.3, Step2.2, Step2.2.2, Step2.2.3 can not be obtained
Face photo is stored.
The privacy informations such as user's date of birth and the identity card human face photo of database are stored in the step Step1.1 only
Sign-On authentication can be used for, be not useable for other behaviors.
The acquisition of user's date of birth in the step Step1.1, it is right first by the technical limit spacing identification card number such as image recognition
Identification card number 7 ~ 14 is intercepted, you can obtains the date of birth.
The acquisition of user's current age in the step Step1.2, gone out by what current date and user identity card number provided
Phase birthday calculating difference is drawn.
Lawful age described in described step Step1.2, Step1.4, Step2.2.1, refers to the age for reaching adult,
Referred generally to for 18 one full year of life.
The Anti-addiction verification method is applicable not only to computer network game, and suitable for all fortune such as mobile phone network game
Row platform carries the electronic equipment of camera.
The beneficial effects of the invention are as follows:Existing network game Anti-addiction rule is abandoned, is passed through mainly for fraud anti-settling
The online game account of checking is confused, innovatively introduces the technologies such as image recognition, recognition of face, shows a kind of brand-new network trip
Play Anti-addiction verification method.The present invention considers in all its bearings, and corresponding Anti-addiction verification method is made for different situations,
In addition the present invention is applicable not only to computer network game, is more suitable for all operation platforms such as mobile phone network game and carries camera
Electronic equipment, substantially avoid online game and negatively affected to caused by minor, fundamentally prevented minor
To the addiction phenomenon of online game.
Brief description of the drawings
Fig. 1 is user identity binding schematic flow sheet of the present invention;
Fig. 2 is that routine of the invention logs in schematic flow sheet;
Fig. 3 is that present invention account for public use logs in schematic flow sheet.
Embodiment
With reference to the accompanying drawings and detailed description, the invention will be further described.
Embodiment 1:As shown in figure 1, a kind of network game indulging verification method, is concretely comprised the following steps:
Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and
Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account,
And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;
Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used
The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to.
Step1.3:Camera acquisition user human face photo progress recognition of face is opened according to the rule in Step1.3.1 to test
Demonstrate,prove, the identity card human face photo stored in human face photo and database that server obtains to it carries out recognition of face, and checking is
No is same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If checking
Failure, then log in failure, also prevented steal-number person steals means;
Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases
It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If
Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;
Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need
Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours
System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
The account it is non-I use when verification method step be:
Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time
Identity information in Lu Wuxu matching databases;
Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes
The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present
Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;
Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to
Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3.
Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line,
Verification method is identical with method described in Step2.2, if this time checking still succeeds, without carrying out again three times in this time logging in
Checking;If this time authentication failed, logs in failure, compulsory withdrawal account;
Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line
It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time
Checking still fails, then logs in failure, compulsory withdrawal account.
The account is X days from registration, and can be verified without Anti-addiction can log in success, but user is after line 3 hours
System compulsory withdrawal logs in, and the same day can not log in the account again, once do not carry out account identity yet after x days from registration
Binding, then this account can not be logged in normally before account identity binding is not carried out.
Matching process described in the step Step1.1, first by the technical limit spacing such as image recognition identification card number and name,
Whether access public security system checking identification card number matches with name, then verifies the identity card face uploaded by face recognition technology
Whether the human face photo that photo obtains with camera is same people, if same people, then the match is successful, and otherwise, it fails to match.
The people that camera in step Step1.1, Step1.3, Step2.2, Step2.2.2, Step2.2.3 can not be obtained
Face photo is stored.
The privacy informations such as user's date of birth and the identity card human face photo of database are stored in the step Step1.1 only
Sign-On authentication can be used for, be not useable for other behaviors.
The acquisition of user's date of birth in the step Step1.1, it is right first by the technical limit spacing identification card number such as image recognition
Identification card number 7 ~ 14 is intercepted, you can obtains the date of birth.
The acquisition of user's current age in the step Step1.2, gone out by what current date and user identity card number provided
Phase birthday calculating difference is drawn.
Embodiment 2:As shown in Fig. 2 on the basis of embodiment 1, it is assumed that in 23 years old this year of accounting number users, upload identity card and lead to
Camera need to be only opened after crossing account identity binding, when logging in every time and obtains human face photo, it is ensured that is kissed with the identity information of binding
Conjunction can log in success, and need not carry out secondary checking again in this time logging in.In addition, to prevent steal-number person's to steal means, if
Detect and misfitted with the identity information bound, then log in failure.
Certainly, it is contemplated that Consumer's Experience and account number safety, whether need recognition of face to verify when logging in, that is, verify that frequency is
Establish on markov N meta-models basis, it is associated with preceding N-1 the result.If preceding N-1 checking is verified into
Work(, then it is appropriate to reduce checking frequency;If authentication failed be present in preceding N-1 checking, appropriate increase checking frequency.
Embodiment 3:Assuming that 16 years old this year of accounting number users, after uploading identity card by account identity binding, when logging in every time
The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need to be to the accounting number users
Anti-addiction is carried out, without carrying out recognition of face checking again, you can log in success.But user's system compulsory withdrawal after line 3 hours
Log in, and the same day can not log in other accounts under the account and identity card binding again.
Embodiment 4:Assuming that in 23 years old this year of accounting number users, after uploading identity card by account identity binding, but want account
It is outer to lend friend's use, need first login account in person and log in success, apply for account for public use, be i.e. log in without matched data next time
Identity information in storehouse.
When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, server
The human face photo obtained to it carries out recognition of face, and the age of the face is obtained with prior art.
Assuming that the age for obtaining the face is 22 years old, then it is proved to be successful, it is contemplated that obtain showing for photo user's face age
There is technology and immature, erroneous judgement be present, therefore the user is determined as that user is after line 3 hours without Anti-addiction for the time being
Secondary checking need to be carried out, if this time checking still succeeds, without being verified three times again in this time logging in;If this time checking is lost
Lose, then log in failure, compulsory withdrawal account.
Assuming that the age for obtaining the face is 15 years old, then authentication failed, it is contemplated that obtain showing for photo user's face age
Have technology and immature, erroneous judgement be present, therefore the user is determined as Anti-addiction for the time being, user line need after 3 hours into
The secondary checking of row, if being this time proved to be successful, without being verified three times again in this time logging in;If this time checking still fails,
Then log in failure, compulsory withdrawal account.
Above in association with accompanying drawing to the present invention embodiment be explained in detail, but the present invention be not limited to it is above-mentioned
Embodiment, can also be before present inventive concept not be departed from those of ordinary skill in the art's possessed knowledge
Put that various changes can be made.
Claims (8)
- A kind of 1. network game indulging verification method, it is characterised in that:Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account, And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to;Step1.3:Camera, which is opened, according to the rule in Step1.3.1 obtains the progress recognition of face checking of user's human face photo, The identity card human face photo that is stored in human face photo and database that server obtains to it carries out recognition of face, verify whether for Same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If authentication failed, Then log in failure;Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
- 2. network game indulging verification method according to claim 1, it is characterised in that the account is non-, and I uses When verification method step be:Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time Identity information in Lu Wuxu matching databases;Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3;Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line, verifies Method is identical with method described in Step2.2, if this time checking still succeeds, without being tested three times again in this time logging in Card;If this time authentication failed, logs in failure, compulsory withdrawal account;Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time Checking still fails, then logs in failure, compulsory withdrawal account.
- 3. network game indulging verification method according to claim 1, it is characterised in that:Account X from registration My god, can be verified without Anti-addiction can log in success, but user's system compulsory withdrawal after line 3 hours logs in, and the same day The account can not be logged in again, once not carrying out account identity binding yet after x days from registration, then this account is not carrying out account Can not normally it be logged in before identity binding.
- 4. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 Described matching process, first by the technical limit spacing such as image recognition identification card number and name, access public security system checking identification card number Whether matched with name, then verify that the identity card human face photo uploaded shines with the face that camera obtains by face recognition technology Whether piece is same people, if same people, then the match is successful, and otherwise, it fails to match.
- 5. network game indulging verification method according to claim 1, it is characterised in that:Can not to step Step1.1, The human face photo that camera obtains in Step1.3, Step2.2, Step2.2.2, Step2.2.3 is stored.
- 6. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 It is stored in the privacy informations such as user's date of birth and the identity card human face photo of database and is only used for Sign-On authentication, is not useable for it His behavior.
- 7. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 The acquisition of user's date of birth, first by the technical limit spacing identification card number such as image recognition, to identification card number, 7 ~ 14 intercept, i.e., The date of birth can be obtained.
- 8. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.2 The acquisition of user's current age, the date of birth calculating difference provided by current date and user identity card number are drawn.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710750437.0A CN107485858A (en) | 2017-08-28 | 2017-08-28 | A kind of network game indulging verification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710750437.0A CN107485858A (en) | 2017-08-28 | 2017-08-28 | A kind of network game indulging verification method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107485858A true CN107485858A (en) | 2017-12-19 |
Family
ID=60650763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710750437.0A Pending CN107485858A (en) | 2017-08-28 | 2017-08-28 | A kind of network game indulging verification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107485858A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537022A (en) * | 2018-03-27 | 2018-09-14 | 努比亚技术有限公司 | terminal control method, terminal and computer readable storage medium |
CN108711321A (en) * | 2018-06-04 | 2018-10-26 | 太仓迪米克斯节能服务有限公司 | It is a kind of based on multi-platform learning System |
CN109522069A (en) * | 2018-10-26 | 2019-03-26 | 深圳壹账通智能科技有限公司 | The method, apparatus and electronic equipment of Anti-addiction game |
CN109558716A (en) * | 2018-11-07 | 2019-04-02 | 浙江海洋大学 | It is a kind of that network method is indulged using face recognition technology prevention minor |
CN110311903A (en) * | 2019-06-26 | 2019-10-08 | 维沃移动通信有限公司 | A kind of terminal equipment control method, terminal device and server |
CN110609970A (en) * | 2019-08-29 | 2019-12-24 | 北京大米科技有限公司 | User identity identification method and device, storage medium and electronic equipment |
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111611959A (en) * | 2020-05-28 | 2020-09-01 | 青岛海尔科技有限公司 | Personal information acquisition and processing method and device |
CN111782971A (en) * | 2020-08-07 | 2020-10-16 | 腾讯科技(深圳)有限公司 | Information processing method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101303712A (en) * | 2007-05-10 | 2008-11-12 | 上海银晨智能识别科技有限公司 | Method for preventing enthrallment network game through human face recognition |
CN103532919A (en) * | 2012-07-06 | 2014-01-22 | 腾讯科技(深圳)有限公司 | Method and system for maintaining login state of user account |
CN206149310U (en) * | 2016-07-25 | 2017-05-03 | 重庆中科云丛科技有限公司 | Based on people's face login verification system |
CN106778607A (en) * | 2016-12-15 | 2017-05-31 | 国政通科技股份有限公司 | A kind of people based on recognition of face and identity card homogeneity authentication device and method |
-
2017
- 2017-08-28 CN CN201710750437.0A patent/CN107485858A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101303712A (en) * | 2007-05-10 | 2008-11-12 | 上海银晨智能识别科技有限公司 | Method for preventing enthrallment network game through human face recognition |
CN103532919A (en) * | 2012-07-06 | 2014-01-22 | 腾讯科技(深圳)有限公司 | Method and system for maintaining login state of user account |
CN206149310U (en) * | 2016-07-25 | 2017-05-03 | 重庆中科云丛科技有限公司 | Based on people's face login verification system |
CN106778607A (en) * | 2016-12-15 | 2017-05-31 | 国政通科技股份有限公司 | A kind of people based on recognition of face and identity card homogeneity authentication device and method |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537022A (en) * | 2018-03-27 | 2018-09-14 | 努比亚技术有限公司 | terminal control method, terminal and computer readable storage medium |
CN108711321A (en) * | 2018-06-04 | 2018-10-26 | 太仓迪米克斯节能服务有限公司 | It is a kind of based on multi-platform learning System |
CN109522069A (en) * | 2018-10-26 | 2019-03-26 | 深圳壹账通智能科技有限公司 | The method, apparatus and electronic equipment of Anti-addiction game |
CN109558716A (en) * | 2018-11-07 | 2019-04-02 | 浙江海洋大学 | It is a kind of that network method is indulged using face recognition technology prevention minor |
CN110311903A (en) * | 2019-06-26 | 2019-10-08 | 维沃移动通信有限公司 | A kind of terminal equipment control method, terminal device and server |
CN110311903B (en) * | 2019-06-26 | 2022-09-02 | 维沃移动通信有限公司 | Terminal device control method, terminal device and server |
CN110609970A (en) * | 2019-08-29 | 2019-12-24 | 北京大米科技有限公司 | User identity identification method and device, storage medium and electronic equipment |
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111611959A (en) * | 2020-05-28 | 2020-09-01 | 青岛海尔科技有限公司 | Personal information acquisition and processing method and device |
CN111611959B (en) * | 2020-05-28 | 2024-03-26 | 青岛海尔科技有限公司 | Personal information acquisition processing method and device |
CN111782971A (en) * | 2020-08-07 | 2020-10-16 | 腾讯科技(深圳)有限公司 | Information processing method, device, equipment and storage medium |
CN111782971B (en) * | 2020-08-07 | 2023-08-22 | 腾讯科技(深圳)有限公司 | Information processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107485858A (en) | A kind of network game indulging verification method | |
US10841319B2 (en) | System and method for validating users using social network information | |
KR102137953B1 (en) | Method and system for voting and counting based on virtual vote code | |
CN104205721B (en) | The adaptive authentication method of context aware and device | |
RU2625050C1 (en) | System and method of transactions trusted declaration | |
CN105678125B (en) | A kind of user authen method, device | |
CN105389488B (en) | Identity identifying method and device | |
EP3518487B1 (en) | Identity recognition method and device | |
WO2017196609A1 (en) | User authentication and access control using identity services | |
WO2016033698A1 (en) | Method and system for real-time authentication of user access to a resource | |
US20130227700A1 (en) | Dynamic Trust Score for Evaulating Ongoing Online Relationships | |
EP3596681A2 (en) | Secure age verification system | |
JP2013540313A5 (en) | ||
US20210105277A1 (en) | Systems and methods for preventing a fraudulent registration | |
CN106453205A (en) | Identity verification method and identity verification device | |
CN107918911A (en) | System and method for performing safe web bank transaction | |
CN116578955A (en) | Risk control method, device and equipment based on identity verification | |
CN109639724A (en) | Password method for retrieving, password device for retrieving, computer equipment and storage medium | |
WO2023010715A1 (en) | Game account control method, apparatus and device | |
CN109876451A (en) | The login method and equipment of game APP | |
US9639677B1 (en) | Skill-based authentication | |
KR102317656B1 (en) | Electronic vote record management system based on blockchain | |
JP6368261B2 (en) | Authentication system and authentication method | |
JP2021170224A (en) | Authentication system, terminal device, program, and authentication management communication system | |
CN105897555A (en) | Method for interconnection between personal computer side and mobile-side game account number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171219 |