CN107508803A - A kind of face identification method for online game security checking - Google Patents

A kind of face identification method for online game security checking Download PDF

Info

Publication number
CN107508803A
CN107508803A CN201710675355.4A CN201710675355A CN107508803A CN 107508803 A CN107508803 A CN 107508803A CN 201710675355 A CN201710675355 A CN 201710675355A CN 107508803 A CN107508803 A CN 107508803A
Authority
CN
China
Prior art keywords
face
camera
game
database
face picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710675355.4A
Other languages
Chinese (zh)
Inventor
周曦
陈昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yuncong Information Technology Co Ltd
Original Assignee
Guangzhou Yuncong Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yuncong Information Technology Co Ltd filed Critical Guangzhou Yuncong Information Technology Co Ltd
Priority to CN201710675355.4A priority Critical patent/CN107508803A/en
Publication of CN107508803A publication Critical patent/CN107508803A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Library & Information Science (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Pinball Game Machines (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of face identification method for online game security checking, comprise the following steps, camera is installed, point opens game register interface, typing account number cipher rear camera automatically opens up, an optimal face figure is captured, then in the regional face database according to corresponding to player IP by player's face figure information deposit IP.Point opens game login interface, and typing account number cipher rear camera automatically opens up, and captures an optimal face figure, clicks on after logging in game, is transmitted data to by way of socket links in game server, server does 1 according to GID:1 image recognition, certification grant login by rear.The safety of GID is strengthened, no longer the various cumbersome complicated auxiliary protections such as miscellaneous lock, close guarantor in account are worked, enormously simplify the use operation of player.

Description

A kind of face identification method for online game security checking
Technical field
The present invention relates to field of face identification, and in particular to a kind of recognition of face side for online game security checking Method.
Background technology
Current network game developments are swift and violent, and player is countless, trigger the growth of this industry explosion type, GID also into For an extra virtual wealth.Therefore the industry of steal-number also arises, and in order to ensure the rights and interests of GID player, draws Enter recognition of face and log in game, greatly strengthen the security of account so that player does not have to concern various virus, wooden horse, plays trip Play is played and must trembled with fear.With the development of the industry, the transaction of article equipment is also more and more frequent, more and more valuable in game, Face authentication is introduced to strengthen trading channel safety.Still further aspect, teenager indulge the more and more of game, are played to control The time of game, the time for introducing face monitoring to control player to play.Traditional restraining is discriminated whether by identity card For same player, but very big leak so is had, change an identity card can and hide the limitation.Plus recognition of face Afterwards, identity card is changed, GID is changed and all no longer cuts any ice, because being locked to people now, what is do not relocked is identity card And account.
The content of the invention
The present invention in view of the shortcomings of the prior art, proposes a kind of face identification method for online game security checking, Concrete technical scheme is as follows:
A kind of face identification method for online game security checking, it is characterised in that:
Using following steps,
Step 1:Game register interface is opened, after inserting data message, the data message includes ID card information, account name Claim and encrypted message, camera gather facial image;
Step 2:Whether game server end judges to exist in identity database according to the ID card information inserted makes The data message of user, if it is present into next step, otherwise, into step 4;
Step 3:According to the ID card information of user, judge whether existed and user's identity in face database Face picture corresponding to information is demonstrate,proved, if it is not, into step once, otherwise, into step 5;
Step 4:The data message of user is established in identity database, the face picture storage that camera is captured is arrived In face database, and establish the mapping relations of the face picture and user's data message;
Step 5:Judge whether the face picture similarity in facial image and face database that camera collects arrives Up to threshold value, if it is, into next step, otherwise, into step 7;
Step 6:Data message is established in identity database, by data message face corresponding with face database Picture establishes mapping relations, and every face picture, which can correspond to, binds n account information, enters step 8;
Step 7:Prompt the people in the ID card information face database corresponding with the ID card information of user's input Face picture is inconsistent, exits register interface.
Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end and passes through figure As identification is contrasted;
Step 9:Judge the account face picture that corresponding face picture is captured with camera in face database Whether similarity reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;
Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2 Individual hour, then, into step 13, otherwise, into next step;
Step 11:User's running game, at regular intervals, camera are opened camera candid photograph face picture and uploaded to Game services end, contrasted by image recognition face picture corresponding with face database;
Step 12:Judge whether the face picture similarity in face picture and face database that camera is captured reaches The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 13:Exit game.
Further:Face database is provided with least N platforms according to Area distribution formula, and the pictorial information of user is stored In the nearest face database of the IP address from login.
Further:Step 11 includes:
Step 111:Judge whether the face picture similarity in face picture and face database that camera is captured reaches It is to enter next step otherwise if it is, returning to step 8 to the threshold value of setting;
Step 112:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera opens shooting Head captures face picture and uploads to game services end;
Step 113:Judge whether the face picture face picture corresponding with face database that camera is captured reaches The threshold value of setting, if it is, step 8 is returned to, otherwise, into next step.
Beneficial effects of the present invention are:First, the safety of GID is strengthened, no longer to miscellaneous in account The various cumbersome complicated auxiliary protections work such as lock, close guarantor, enormously simplify the use operation of player.Second, strike is simultaneously Suppress the existence of steal-number industry, make its profitless.Transaction confidence level is enhanced, away from swindle.3rd, control teen-age net Addiction so that game turns into real amusement game, rather than the input forgotten to eat and sleep.
Brief description of the drawings
Fig. 1 is the flow chart of the present invention.
Embodiment
Presently preferred embodiments of the present invention is described in detail below in conjunction with the accompanying drawings, so that advantages and features of the invention energy It is easier to be readily appreciated by one skilled in the art, apparent is clearly defined so as to be made to protection scope of the present invention.
A kind of face identification method for online game security checking, it is characterised in that:
Using following steps,
Step 1:Game register interface is opened, after inserting data message, the data message includes ID card information, account name Claim and encrypted message, camera gather facial image;
Step 2:Whether game server end judges to exist in identity database according to the ID card information inserted makes The data message of user, if it is present into next step, otherwise, into step 4;
Step 3:According to the ID card information of user, judge whether existed and user's identity in face database Face picture corresponding to information is demonstrate,proved, face database is provided with least N platforms according to Area distribution formula, and the picture of user is believed Breath is stored in the face database nearest from the IP address of login.
If it is not, into step once, otherwise, into step 5;
Step 4:The data message of user is established in identity database, the face picture storage that camera is captured is arrived In face database, and establish the mapping relations of the face picture and user's data message;
Step 5:Judge whether the face picture similarity in facial image and face database that camera collects arrives Up to threshold value, if it is, into next step, otherwise, into step 7;
Step 6:Data message is established in identity database, by data message face corresponding with face database Picture establishes mapping relations, and every face picture, which can correspond to, binds n account information, enters step 8;
Step 7:Prompt the people in the ID card information face database corresponding with the ID card information of user's input Face picture is inconsistent, exits register interface.
Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end and passes through figure As identification is contrasted;
Step 9:Judge the account face picture that corresponding face picture is captured with camera in face database Whether similarity reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;
Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2 Individual hour, then, into step 15, otherwise, into next step;
Step 11:Judge whether the face picture similarity in face picture and face database that camera is captured reaches The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 12:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera opens shooting Head captures face picture and uploads to game services end;
Step 13:Judge whether the face picture face picture corresponding with face database of camera candid photograph reaches to set Fixed threshold value, if it is, step 8 is returned to, otherwise, into next step.
Step 14:Judge whether the face picture similarity in face picture and face database that camera is captured reaches The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 15:Exit game.

Claims (3)

  1. A kind of 1. face identification method for online game security checking, it is characterised in that:
    Using following steps,
    Step 1:Open game register interface, after inserting data message, the data message include ID card information, account title and Encrypted message, camera collection facial image;
    Step 2:Game server end judges whether user be present in identity database according to the ID card information inserted Data message, if it is present into next step, otherwise, into step 4;
    Step 3:According to the ID card information of user, judge whether to exist in face database and believe with user's identity card Face picture corresponding to breath, if it is not, into step once, otherwise, into step 5;
    Step 4:The data message of user is established in identity database, face is arrived in the face picture storage that camera is captured In database, and establish the mapping relations of the face picture and user's data message;
    Step 5:Judge whether the face picture similarity in facial image and face database that camera collects reaches threshold Value, if it is, into next step, otherwise, into step 7;
    Step 6:Data message is established in identity database, by data message face picture corresponding with face database Mapping relations are established, every face picture, which can correspond to, binds n account information, enters step 8;
    Step 7:Prompt the face figure in the ID card information face database corresponding with the ID card information of user's input Piece is inconsistent, exits register interface.
    Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end to be known by image Do not contrasted;
    Step 9:Judge that the account corresponding face picture in face database is similar to the face picture that camera is captured Whether degree reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;
    Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2 are small When, then, into step 13, otherwise, into next step;
    Step 11:User's running game, at regular intervals, camera open camera candid photograph face picture and upload to game Service end, contrasted by image recognition face picture corresponding with face database;
    Step 12:Judge whether the face picture similarity in face picture and face database that camera is captured reaches setting Threshold value, be to enter next step otherwise if it is, returning to step 8;
    Step 13:Exit game.
  2. A kind of 2. face identification method for online game security checking according to claim 1, it is characterised in that:Face Database is provided with N platforms according to Area distribution formula, and the pictorial information of user is stored in the people nearest from the IP address of login In face database.
  3. A kind of 3. face identification method for online game security checking according to claim 1, it is characterised in that:Step 11 include:
    Step 111:Judge whether the face picture similarity in face picture and face database that camera is captured reaches to set The threshold value put, it is to enter next step otherwise if it is, returning to step 8;
    Step 112:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera is opened camera and grabbed Clap face picture and upload to game services end;
    Step 113:Judge whether the face picture face picture corresponding with face database that camera is captured reaches setting Threshold value, if it is, step 8 is returned to, otherwise, into next step.
CN201710675355.4A 2017-08-09 2017-08-09 A kind of face identification method for online game security checking Pending CN107508803A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710675355.4A CN107508803A (en) 2017-08-09 2017-08-09 A kind of face identification method for online game security checking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710675355.4A CN107508803A (en) 2017-08-09 2017-08-09 A kind of face identification method for online game security checking

Publications (1)

Publication Number Publication Date
CN107508803A true CN107508803A (en) 2017-12-22

Family

ID=60690601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710675355.4A Pending CN107508803A (en) 2017-08-09 2017-08-09 A kind of face identification method for online game security checking

Country Status (1)

Country Link
CN (1) CN107508803A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108992926A (en) * 2018-06-15 2018-12-14 广州市点格网络科技有限公司 Based on recognition of face game login method, device and computer readable storage medium
CN110175490A (en) * 2018-09-21 2019-08-27 永康市巴九灵科技有限公司 Game machine history account analysis system
CN112735004A (en) * 2020-12-28 2021-04-30 广州畅联信息科技有限公司 Virtual key distribution method, server and distribution system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094070A (en) * 2007-07-18 2007-12-26 汪铁良 System with function of recognizing human face for preventing enthrallment on network
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN102164113A (en) * 2010-02-22 2011-08-24 深圳市联通万达科技有限公司 Face recognition login method and system
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof
CN105227316A (en) * 2015-09-01 2016-01-06 深圳市创想一登科技有限公司 Based on mobile Internet account login system and the method for facial image authentication
CN105407098A (en) * 2015-11-26 2016-03-16 小米科技有限责任公司 Identity verification method and device
CN105512531A (en) * 2015-11-26 2016-04-20 北京像素软件科技股份有限公司 Method and device for controlling game validation
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method
CN106982224A (en) * 2017-04-28 2017-07-25 南京网博计算机软件系统有限公司 The method and system of real time identity checking identification

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN100552688C (en) * 2007-05-10 2009-10-21 上海银晨智能识别科技有限公司 Prevent the method for enthrallment network game by recognition of face
CN101094070A (en) * 2007-07-18 2007-12-26 汪铁良 System with function of recognizing human face for preventing enthrallment on network
CN102164113A (en) * 2010-02-22 2011-08-24 深圳市联通万达科技有限公司 Face recognition login method and system
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof
CN105227316A (en) * 2015-09-01 2016-01-06 深圳市创想一登科技有限公司 Based on mobile Internet account login system and the method for facial image authentication
CN105407098A (en) * 2015-11-26 2016-03-16 小米科技有限责任公司 Identity verification method and device
CN105512531A (en) * 2015-11-26 2016-04-20 北京像素软件科技股份有限公司 Method and device for controlling game validation
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method
CN106982224A (en) * 2017-04-28 2017-07-25 南京网博计算机软件系统有限公司 The method and system of real time identity checking identification

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108992926A (en) * 2018-06-15 2018-12-14 广州市点格网络科技有限公司 Based on recognition of face game login method, device and computer readable storage medium
CN110175490A (en) * 2018-09-21 2019-08-27 永康市巴九灵科技有限公司 Game machine history account analysis system
CN110175490B (en) * 2018-09-21 2021-04-16 泰州市津达电子科技有限公司 Game machine historical account number analysis system
CN112735004A (en) * 2020-12-28 2021-04-30 广州畅联信息科技有限公司 Virtual key distribution method, server and distribution system

Similar Documents

Publication Publication Date Title
US20210295327A1 (en) Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
US9917826B2 (en) Automated identity assessment method and system
US9288196B2 (en) Identity verification via selection of sensible output from recorded digital data
CN104469767B (en) The implementation method of integrated form security protection subsystem in a set of mobile office system
CN105260628B (en) Classifier training method and apparatus, auth method and system
CN106101136A (en) The authentication method of a kind of biological characteristic contrast and system
CN106803289A (en) A kind of false proof method and system of registering of intelligent mobile
CN103795724B (en) Method for protecting account security based on asynchronous dynamic password technology
CN107508803A (en) A kind of face identification method for online game security checking
Polakis et al. All your face are belong to us: Breaking facebook's social authentication
CN201508555U (en) Internet bar management system based on face recognition
CN101174948A (en) Network login system and method with face authentication
CN106339613A (en) Application data processing method, terminal and server
CN108600154A (en) A kind of government affairs remote authentication system and method
CN106790260A (en) A kind of multiple-factor identity identifying method
CN107786487B (en) Information authentication processing method, system and related equipment
CN105897428A (en) Real-time video safety communication system and method based on iris recognition
CN109118606A (en) A kind of attendance checking through facial recognition process authentication method
CN104967610A (en) Watermark hopping communication method based on time slot
CN102333066A (en) Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game
CN102377729A (en) User registration and logon method by combining speaker speech identity authentication and account code protection in network games
CN107454064A (en) A kind of visitor's authentication method and system based on public number
Chandrashekhar et al. Cyberstalking and Cyberbullying: Effects and prevention measures
CN107707754A (en) A kind of intelligent terminal recovers method and apparatus
CN110162942A (en) Auth method, device, equipment and storage medium based on timestamp

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 511457 Guangdong city of Guangzhou province Nansha District Golden Road No. 26 room 1306 (only for office use)

Applicant after: Yuncong Technology Group Co., Ltd

Address before: 518000 Guangdong city of Guangzhou province Nansha District Golden Road No. 26 room 1306

Applicant before: GUANGZHOU YUNCONG INFORMATION TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171222