CN107485858A - A kind of network game indulging verification method - Google Patents

A kind of network game indulging verification method Download PDF

Info

Publication number
CN107485858A
CN107485858A CN201710750437.0A CN201710750437A CN107485858A CN 107485858 A CN107485858 A CN 107485858A CN 201710750437 A CN201710750437 A CN 201710750437A CN 107485858 A CN107485858 A CN 107485858A
Authority
CN
China
Prior art keywords
account
user
checking
verification method
addiction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710750437.0A
Other languages
Chinese (zh)
Inventor
龙华
祁俊辉
彭艺
唐菁敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunming University of Science and Technology
Original Assignee
Kunming University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunming University of Science and Technology filed Critical Kunming University of Science and Technology
Priority to CN201710750437.0A priority Critical patent/CN107485858A/en
Publication of CN107485858A publication Critical patent/CN107485858A/en
Pending legal-status Critical Current

Links

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/30Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
    • A63F13/35Details of game servers
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5546Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a kind of network game indulging verification method, belong to technical field of network security.The present invention abandons existing network game Anti-addiction rule, mainly for the online game account verified by Anti-addiction of fraud, innovatively introduces the technologies such as image recognition, recognition of face, shows a kind of brand-new network game indulging verification method.The present invention considers in all its bearings, corresponding Anti-addiction verification method is made for different situations, in addition the present invention is applicable not only to computer network game, it is more suitable for electronic equipment of all operation platforms such as mobile phone network game with camera, it substantially avoid online game to negatively affect to caused by minor, fundamentally prevented addiction phenomenon of the minor to online game.

Description

A kind of network game indulging verification method
Technical field
The present invention relates to a kind of network game indulging verification method, belong to technical field of network security.
Background technology
Along with the fast development of computer age, the equipment such as computer, smart mobile phone is also widely used.But While these electronic products bring us and facilitated, many negative effects are also generated, because increasing minor sinks It is confused in online game, is unfavorable for the development of current age section.
Though game can improve itself intelligence to a certain extent, teenager's self-control is not general high, holds very much Easily indulge wherein.Present major online game business men has all formulated corresponding indulging system rule, but these rules are all substantially It is similar, it is to fill in the information such as identification card number nothing but, and these information are faked and are easy to, it is impossible to fundamentally solve minor and sink It is confused the phenomenon of online game.
Existing patent discloses Application No.:201510453489.2 a kind of network Anti-addiction side based on fingerprint recognition Method, this method can effectively control the surf time, prevented some online personnel by changing account, the activity such as change planes it is anti-to escape The problem of indulging control.But this method has the shortcomings that obvious, i.e., only support computation, the ring especially as Internet bar Border, and the bigger epoch are influenceed on minor for present mobile phone games, and do not apply to.
The content of the invention
The technical problem to be solved in the present invention is the limitation and deficiency for prior art, there is provided a kind of online game is anti-settling Verification method is confused, innovatively introduces the technologies such as image recognition, recognition of face, is swum with settlement computer online game or cell phone network The influence to minor's development such as play, has fundamentally prevented addiction phenomenon of the minor to online game.
The technical scheme is that:A kind of network game indulging verification method, is concretely comprised the following steps:
Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account, And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;
Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to.
Step1.3:Camera acquisition user human face photo progress recognition of face is opened according to the rule in Step1.3.1 to test Demonstrate,prove, the identity card human face photo stored in human face photo and database that server obtains to it carries out recognition of face, and checking is No is same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If checking Failure, then log in failure, also prevented steal-number person steals means;
Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;
Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
The account it is non-I use when verification method step be:
Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time Identity information in Lu Wuxu matching databases;
Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;
Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3.
Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line, Verification method is identical with method described in Step2.2, if this time checking still succeeds, without carrying out again three times in this time logging in Checking;If this time authentication failed, logs in failure, compulsory withdrawal account;
Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time Checking still fails, then logs in failure, compulsory withdrawal account.
The account is X days from registration, and can be verified without Anti-addiction can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in the account again, once do not carry out account identity yet after x days from registration Binding, then this account can not be logged in normally before account identity binding is not carried out.
Matching process described in the step Step1.1, first by the technical limit spacing such as image recognition identification card number and name, Whether access public security system checking identification card number matches with name, then verifies the identity card face uploaded by face recognition technology Whether the human face photo that photo obtains with camera is same people, if same people, then the match is successful, and otherwise, it fails to match.
The people that camera in step Step1.1, Step1.3, Step2.2, Step2.2.2, Step2.2.3 can not be obtained Face photo is stored.
The privacy informations such as user's date of birth and the identity card human face photo of database are stored in the step Step1.1 only Sign-On authentication can be used for, be not useable for other behaviors.
The acquisition of user's date of birth in the step Step1.1, it is right first by the technical limit spacing identification card number such as image recognition Identification card number 7 ~ 14 is intercepted, you can obtains the date of birth.
The acquisition of user's current age in the step Step1.2, gone out by what current date and user identity card number provided Phase birthday calculating difference is drawn.
Lawful age described in described step Step1.2, Step1.4, Step2.2.1, refers to the age for reaching adult, Referred generally to for 18 one full year of life.
The Anti-addiction verification method is applicable not only to computer network game, and suitable for all fortune such as mobile phone network game Row platform carries the electronic equipment of camera.
The beneficial effects of the invention are as follows:Existing network game Anti-addiction rule is abandoned, is passed through mainly for fraud anti-settling The online game account of checking is confused, innovatively introduces the technologies such as image recognition, recognition of face, shows a kind of brand-new network trip Play Anti-addiction verification method.The present invention considers in all its bearings, and corresponding Anti-addiction verification method is made for different situations, In addition the present invention is applicable not only to computer network game, is more suitable for all operation platforms such as mobile phone network game and carries camera Electronic equipment, substantially avoid online game and negatively affected to caused by minor, fundamentally prevented minor To the addiction phenomenon of online game.
Brief description of the drawings
Fig. 1 is user identity binding schematic flow sheet of the present invention;
Fig. 2 is that routine of the invention logs in schematic flow sheet;
Fig. 3 is that present invention account for public use logs in schematic flow sheet.
Embodiment
With reference to the accompanying drawings and detailed description, the invention will be further described.
Embodiment 1:As shown in figure 1, a kind of network game indulging verification method, is concretely comprised the following steps:
Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account, And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;
Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to.
Step1.3:Camera acquisition user human face photo progress recognition of face is opened according to the rule in Step1.3.1 to test Demonstrate,prove, the identity card human face photo stored in human face photo and database that server obtains to it carries out recognition of face, and checking is No is same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If checking Failure, then log in failure, also prevented steal-number person steals means;
Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;
Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
The account it is non-I use when verification method step be:
Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time Identity information in Lu Wuxu matching databases;
Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;
Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3.
Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line, Verification method is identical with method described in Step2.2, if this time checking still succeeds, without carrying out again three times in this time logging in Checking;If this time authentication failed, logs in failure, compulsory withdrawal account;
Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time Checking still fails, then logs in failure, compulsory withdrawal account.
The account is X days from registration, and can be verified without Anti-addiction can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in the account again, once do not carry out account identity yet after x days from registration Binding, then this account can not be logged in normally before account identity binding is not carried out.
Matching process described in the step Step1.1, first by the technical limit spacing such as image recognition identification card number and name, Whether access public security system checking identification card number matches with name, then verifies the identity card face uploaded by face recognition technology Whether the human face photo that photo obtains with camera is same people, if same people, then the match is successful, and otherwise, it fails to match.
The people that camera in step Step1.1, Step1.3, Step2.2, Step2.2.2, Step2.2.3 can not be obtained Face photo is stored.
The privacy informations such as user's date of birth and the identity card human face photo of database are stored in the step Step1.1 only Sign-On authentication can be used for, be not useable for other behaviors.
The acquisition of user's date of birth in the step Step1.1, it is right first by the technical limit spacing identification card number such as image recognition Identification card number 7 ~ 14 is intercepted, you can obtains the date of birth.
The acquisition of user's current age in the step Step1.2, gone out by what current date and user identity card number provided Phase birthday calculating difference is drawn.
Embodiment 2:As shown in Fig. 2 on the basis of embodiment 1, it is assumed that in 23 years old this year of accounting number users, upload identity card and lead to Camera need to be only opened after crossing account identity binding, when logging in every time and obtains human face photo, it is ensured that is kissed with the identity information of binding Conjunction can log in success, and need not carry out secondary checking again in this time logging in.In addition, to prevent steal-number person's to steal means, if Detect and misfitted with the identity information bound, then log in failure.
Certainly, it is contemplated that Consumer's Experience and account number safety, whether need recognition of face to verify when logging in, that is, verify that frequency is Establish on markov N meta-models basis, it is associated with preceding N-1 the result.If preceding N-1 checking is verified into Work(, then it is appropriate to reduce checking frequency;If authentication failed be present in preceding N-1 checking, appropriate increase checking frequency.
Embodiment 3:Assuming that 16 years old this year of accounting number users, after uploading identity card by account identity binding, when logging in every time The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need to be to the accounting number users Anti-addiction is carried out, without carrying out recognition of face checking again, you can log in success.But user's system compulsory withdrawal after line 3 hours Log in, and the same day can not log in other accounts under the account and identity card binding again.
Embodiment 4:Assuming that in 23 years old this year of accounting number users, after uploading identity card by account identity binding, but want account It is outer to lend friend's use, need first login account in person and log in success, apply for account for public use, be i.e. log in without matched data next time Identity information in storehouse.
When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, server The human face photo obtained to it carries out recognition of face, and the age of the face is obtained with prior art.
Assuming that the age for obtaining the face is 22 years old, then it is proved to be successful, it is contemplated that obtain showing for photo user's face age There is technology and immature, erroneous judgement be present, therefore the user is determined as that user is after line 3 hours without Anti-addiction for the time being Secondary checking need to be carried out, if this time checking still succeeds, without being verified three times again in this time logging in;If this time checking is lost Lose, then log in failure, compulsory withdrawal account.
Assuming that the age for obtaining the face is 15 years old, then authentication failed, it is contemplated that obtain showing for photo user's face age Have technology and immature, erroneous judgement be present, therefore the user is determined as Anti-addiction for the time being, user line need after 3 hours into The secondary checking of row, if being this time proved to be successful, without being verified three times again in this time logging in;If this time checking still fails, Then log in failure, compulsory withdrawal account.
Above in association with accompanying drawing to the present invention embodiment be explained in detail, but the present invention be not limited to it is above-mentioned Embodiment, can also be before present inventive concept not be departed from those of ordinary skill in the art's possessed knowledge Put that various changes can be made.

Claims (8)

  1. A kind of 1. network game indulging verification method, it is characterised in that:
    Step1.1:User first logs into account, and identity binding is carried out to account, and binding needs upload user ID card information, and Open camera and obtain user's human face photo, matched with the ID card information of upload;The match is successful, then is bound with account, And obtain date of birth and the identity card human face photo deposit database of the user;Otherwise, need to bind again;
    Step1.2:During each login account of user, Anti-addiction checking is carried out first, and system first obtains the account in database and used The current age at family, if current age is more than or equal to lawful age, jump to Step1.3;Otherwise, Step1.4 is jumped to;
    Step1.3:Camera, which is opened, according to the rule in Step1.3.1 obtains the progress recognition of face checking of user's human face photo, The identity card human face photo that is stored in human face photo and database that server obtains to it carries out recognition of face, verify whether for Same people, if being proved to be successful, account logs in success, and need not carry out secondary checking again in this time logging in;If authentication failed, Then log in failure;
    Step1.3.1:Whether this is logged in needs Anti-addiction to verify, that is, verifies that frequency is built upon markov N meta-model bases It is associated with preceding N-1 the result on plinth, it is appropriate to reduce checking frequency if preceding N-1 checking is proved to be successful;If Authentication failed be present in preceding N-1 checking, then appropriate increase checking frequency;
    Step1.4:The information such as the date of birth provided by database, learn that the current age of the user is less than lawful age, need Anti-addiction is carried out to the accounting number users, without carrying out recognition of face checking again, you can log in success, but user is after line 3 hours System compulsory withdrawal logs in, and the same day can not log in other accounts under the account and identity card binding again.
  2. 2. network game indulging verification method according to claim 1, it is characterised in that the account is non-, and I uses When verification method step be:
    Step2.1:Account it is non-I in use, need first my login account and log in success, apply for account for public use, be i.e. step on next time Identity information in Lu Wuxu matching databases;
    Step2.2:When account for public use logs on, camera need to be opened and obtain the progress Anti-addiction checking of user's human face photo, clothes The human face photo that business device obtains to it carries out recognition of face, and the age of the face is obtained with prior art, it is contemplated that mistake be present Situation about sentencing, therefore need to be carried out according to the rule in Step2.2.1;
    Step2.2.1:If the age obtained is more than or equal to lawful age, it is proved to be successful, you can log in and jump to Step2.2.2;Otherwise, need to be carried out according to the rule in Step2.2.3;
    Step2.2.2:The user is determined as without Anti-addiction for the time being, user needs to carry out secondary checking after 3 hours in line, verifies Method is identical with method described in Step2.2, if this time checking still succeeds, without being tested three times again in this time logging in Card;If this time authentication failed, logs in failure, compulsory withdrawal account;
    Step2.2.3:The user is determined as Anti-addiction for the time being, user needs to carry out secondary checking, verification method after 3 hours in line It is identical with method described in Step2.2, if being this time proved to be successful, without being verified three times again in this time logging in;If this time Checking still fails, then logs in failure, compulsory withdrawal account.
  3. 3. network game indulging verification method according to claim 1, it is characterised in that:Account X from registration My god, can be verified without Anti-addiction can log in success, but user's system compulsory withdrawal after line 3 hours logs in, and the same day The account can not be logged in again, once not carrying out account identity binding yet after x days from registration, then this account is not carrying out account Can not normally it be logged in before identity binding.
  4. 4. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 Described matching process, first by the technical limit spacing such as image recognition identification card number and name, access public security system checking identification card number Whether matched with name, then verify that the identity card human face photo uploaded shines with the face that camera obtains by face recognition technology Whether piece is same people, if same people, then the match is successful, and otherwise, it fails to match.
  5. 5. network game indulging verification method according to claim 1, it is characterised in that:Can not to step Step1.1, The human face photo that camera obtains in Step1.3, Step2.2, Step2.2.2, Step2.2.3 is stored.
  6. 6. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 It is stored in the privacy informations such as user's date of birth and the identity card human face photo of database and is only used for Sign-On authentication, is not useable for it His behavior.
  7. 7. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.1 The acquisition of user's date of birth, first by the technical limit spacing identification card number such as image recognition, to identification card number, 7 ~ 14 intercept, i.e., The date of birth can be obtained.
  8. 8. network game indulging verification method according to claim 1, it is characterised in that:In the step Step1.2 The acquisition of user's current age, the date of birth calculating difference provided by current date and user identity card number are drawn.
CN201710750437.0A 2017-08-28 2017-08-28 A kind of network game indulging verification method Pending CN107485858A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710750437.0A CN107485858A (en) 2017-08-28 2017-08-28 A kind of network game indulging verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710750437.0A CN107485858A (en) 2017-08-28 2017-08-28 A kind of network game indulging verification method

Publications (1)

Publication Number Publication Date
CN107485858A true CN107485858A (en) 2017-12-19

Family

ID=60650763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710750437.0A Pending CN107485858A (en) 2017-08-28 2017-08-28 A kind of network game indulging verification method

Country Status (1)

Country Link
CN (1) CN107485858A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537022A (en) * 2018-03-27 2018-09-14 努比亚技术有限公司 terminal control method, terminal and computer readable storage medium
CN108711321A (en) * 2018-06-04 2018-10-26 太仓迪米克斯节能服务有限公司 It is a kind of based on multi-platform learning System
CN109522069A (en) * 2018-10-26 2019-03-26 深圳壹账通智能科技有限公司 The method, apparatus and electronic equipment of Anti-addiction game
CN109558716A (en) * 2018-11-07 2019-04-02 浙江海洋大学 It is a kind of that network method is indulged using face recognition technology prevention minor
CN110311903A (en) * 2019-06-26 2019-10-08 维沃移动通信有限公司 A kind of terminal equipment control method, terminal device and server
CN110609970A (en) * 2019-08-29 2019-12-24 北京大米科技有限公司 User identity identification method and device, storage medium and electronic equipment
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111611959A (en) * 2020-05-28 2020-09-01 青岛海尔科技有限公司 Personal information acquisition and processing method and device
CN111782971A (en) * 2020-08-07 2020-10-16 腾讯科技(深圳)有限公司 Information processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN103532919A (en) * 2012-07-06 2014-01-22 腾讯科技(深圳)有限公司 Method and system for maintaining login state of user account
CN206149310U (en) * 2016-07-25 2017-05-03 重庆中科云丛科技有限公司 Based on people's face login verification system
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN103532919A (en) * 2012-07-06 2014-01-22 腾讯科技(深圳)有限公司 Method and system for maintaining login state of user account
CN206149310U (en) * 2016-07-25 2017-05-03 重庆中科云丛科技有限公司 Based on people's face login verification system
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537022A (en) * 2018-03-27 2018-09-14 努比亚技术有限公司 terminal control method, terminal and computer readable storage medium
CN108711321A (en) * 2018-06-04 2018-10-26 太仓迪米克斯节能服务有限公司 It is a kind of based on multi-platform learning System
CN109522069A (en) * 2018-10-26 2019-03-26 深圳壹账通智能科技有限公司 The method, apparatus and electronic equipment of Anti-addiction game
CN109558716A (en) * 2018-11-07 2019-04-02 浙江海洋大学 It is a kind of that network method is indulged using face recognition technology prevention minor
CN110311903A (en) * 2019-06-26 2019-10-08 维沃移动通信有限公司 A kind of terminal equipment control method, terminal device and server
CN110311903B (en) * 2019-06-26 2022-09-02 维沃移动通信有限公司 Terminal device control method, terminal device and server
CN110609970A (en) * 2019-08-29 2019-12-24 北京大米科技有限公司 User identity identification method and device, storage medium and electronic equipment
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111611959A (en) * 2020-05-28 2020-09-01 青岛海尔科技有限公司 Personal information acquisition and processing method and device
CN111611959B (en) * 2020-05-28 2024-03-26 青岛海尔科技有限公司 Personal information acquisition processing method and device
CN111782971A (en) * 2020-08-07 2020-10-16 腾讯科技(深圳)有限公司 Information processing method, device, equipment and storage medium
CN111782971B (en) * 2020-08-07 2023-08-22 腾讯科技(深圳)有限公司 Information processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107485858A (en) A kind of network game indulging verification method
US10841319B2 (en) System and method for validating users using social network information
KR102137953B1 (en) Method and system for voting and counting based on virtual vote code
CN104205721B (en) The adaptive authentication method of context aware and device
RU2625050C1 (en) System and method of transactions trusted declaration
CN105678125B (en) A kind of user authen method, device
CN105389488B (en) Identity identifying method and device
EP3518487B1 (en) Identity recognition method and device
WO2017196609A1 (en) User authentication and access control using identity services
WO2016033698A1 (en) Method and system for real-time authentication of user access to a resource
US20130227700A1 (en) Dynamic Trust Score for Evaulating Ongoing Online Relationships
EP3596681A2 (en) Secure age verification system
JP2013540313A5 (en)
US20210105277A1 (en) Systems and methods for preventing a fraudulent registration
CN106453205A (en) Identity verification method and identity verification device
CN107918911A (en) System and method for performing safe web bank transaction
CN116578955A (en) Risk control method, device and equipment based on identity verification
CN109639724A (en) Password method for retrieving, password device for retrieving, computer equipment and storage medium
WO2023010715A1 (en) Game account control method, apparatus and device
CN109876451A (en) The login method and equipment of game APP
US9639677B1 (en) Skill-based authentication
KR102317656B1 (en) Electronic vote record management system based on blockchain
JP6368261B2 (en) Authentication system and authentication method
JP2021170224A (en) Authentication system, terminal device, program, and authentication management communication system
CN105897555A (en) Method for interconnection between personal computer side and mobile-side game account number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171219