CN107508803A - A kind of face identification method for online game security checking - Google Patents
A kind of face identification method for online game security checking Download PDFInfo
- Publication number
- CN107508803A CN107508803A CN201710675355.4A CN201710675355A CN107508803A CN 107508803 A CN107508803 A CN 107508803A CN 201710675355 A CN201710675355 A CN 201710675355A CN 107508803 A CN107508803 A CN 107508803A
- Authority
- CN
- China
- Prior art keywords
- face
- camera
- game
- database
- face picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/79—Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Library & Information Science (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Pinball Game Machines (AREA)
- Closed-Circuit Television Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of face identification method for online game security checking, comprise the following steps, camera is installed, point opens game register interface, typing account number cipher rear camera automatically opens up, an optimal face figure is captured, then in the regional face database according to corresponding to player IP by player's face figure information deposit IP.Point opens game login interface, and typing account number cipher rear camera automatically opens up, and captures an optimal face figure, clicks on after logging in game, is transmitted data to by way of socket links in game server, server does 1 according to GID:1 image recognition, certification grant login by rear.The safety of GID is strengthened, no longer the various cumbersome complicated auxiliary protections such as miscellaneous lock, close guarantor in account are worked, enormously simplify the use operation of player.
Description
Technical field
The present invention relates to field of face identification, and in particular to a kind of recognition of face side for online game security checking
Method.
Background technology
Current network game developments are swift and violent, and player is countless, trigger the growth of this industry explosion type, GID also into
For an extra virtual wealth.Therefore the industry of steal-number also arises, and in order to ensure the rights and interests of GID player, draws
Enter recognition of face and log in game, greatly strengthen the security of account so that player does not have to concern various virus, wooden horse, plays trip
Play is played and must trembled with fear.With the development of the industry, the transaction of article equipment is also more and more frequent, more and more valuable in game,
Face authentication is introduced to strengthen trading channel safety.Still further aspect, teenager indulge the more and more of game, are played to control
The time of game, the time for introducing face monitoring to control player to play.Traditional restraining is discriminated whether by identity card
For same player, but very big leak so is had, change an identity card can and hide the limitation.Plus recognition of face
Afterwards, identity card is changed, GID is changed and all no longer cuts any ice, because being locked to people now, what is do not relocked is identity card
And account.
The content of the invention
The present invention in view of the shortcomings of the prior art, proposes a kind of face identification method for online game security checking,
Concrete technical scheme is as follows:
A kind of face identification method for online game security checking, it is characterised in that:
Using following steps,
Step 1:Game register interface is opened, after inserting data message, the data message includes ID card information, account name
Claim and encrypted message, camera gather facial image;
Step 2:Whether game server end judges to exist in identity database according to the ID card information inserted makes
The data message of user, if it is present into next step, otherwise, into step 4;
Step 3:According to the ID card information of user, judge whether existed and user's identity in face database
Face picture corresponding to information is demonstrate,proved, if it is not, into step once, otherwise, into step 5;
Step 4:The data message of user is established in identity database, the face picture storage that camera is captured is arrived
In face database, and establish the mapping relations of the face picture and user's data message;
Step 5:Judge whether the face picture similarity in facial image and face database that camera collects arrives
Up to threshold value, if it is, into next step, otherwise, into step 7;
Step 6:Data message is established in identity database, by data message face corresponding with face database
Picture establishes mapping relations, and every face picture, which can correspond to, binds n account information, enters step 8;
Step 7:Prompt the people in the ID card information face database corresponding with the ID card information of user's input
Face picture is inconsistent, exits register interface.
Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end and passes through figure
As identification is contrasted;
Step 9:Judge the account face picture that corresponding face picture is captured with camera in face database
Whether similarity reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;
Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2
Individual hour, then, into step 13, otherwise, into next step;
Step 11:User's running game, at regular intervals, camera are opened camera candid photograph face picture and uploaded to
Game services end, contrasted by image recognition face picture corresponding with face database;
Step 12:Judge whether the face picture similarity in face picture and face database that camera is captured reaches
The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 13:Exit game.
Further:Face database is provided with least N platforms according to Area distribution formula, and the pictorial information of user is stored
In the nearest face database of the IP address from login.
Further:Step 11 includes:
Step 111:Judge whether the face picture similarity in face picture and face database that camera is captured reaches
It is to enter next step otherwise if it is, returning to step 8 to the threshold value of setting;
Step 112:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera opens shooting
Head captures face picture and uploads to game services end;
Step 113:Judge whether the face picture face picture corresponding with face database that camera is captured reaches
The threshold value of setting, if it is, step 8 is returned to, otherwise, into next step.
Beneficial effects of the present invention are:First, the safety of GID is strengthened, no longer to miscellaneous in account
The various cumbersome complicated auxiliary protections work such as lock, close guarantor, enormously simplify the use operation of player.Second, strike is simultaneously
Suppress the existence of steal-number industry, make its profitless.Transaction confidence level is enhanced, away from swindle.3rd, control teen-age net
Addiction so that game turns into real amusement game, rather than the input forgotten to eat and sleep.
Brief description of the drawings
Fig. 1 is the flow chart of the present invention.
Embodiment
Presently preferred embodiments of the present invention is described in detail below in conjunction with the accompanying drawings, so that advantages and features of the invention energy
It is easier to be readily appreciated by one skilled in the art, apparent is clearly defined so as to be made to protection scope of the present invention.
A kind of face identification method for online game security checking, it is characterised in that:
Using following steps,
Step 1:Game register interface is opened, after inserting data message, the data message includes ID card information, account name
Claim and encrypted message, camera gather facial image;
Step 2:Whether game server end judges to exist in identity database according to the ID card information inserted makes
The data message of user, if it is present into next step, otherwise, into step 4;
Step 3:According to the ID card information of user, judge whether existed and user's identity in face database
Face picture corresponding to information is demonstrate,proved, face database is provided with least N platforms according to Area distribution formula, and the picture of user is believed
Breath is stored in the face database nearest from the IP address of login.
If it is not, into step once, otherwise, into step 5;
Step 4:The data message of user is established in identity database, the face picture storage that camera is captured is arrived
In face database, and establish the mapping relations of the face picture and user's data message;
Step 5:Judge whether the face picture similarity in facial image and face database that camera collects arrives
Up to threshold value, if it is, into next step, otherwise, into step 7;
Step 6:Data message is established in identity database, by data message face corresponding with face database
Picture establishes mapping relations, and every face picture, which can correspond to, binds n account information, enters step 8;
Step 7:Prompt the people in the ID card information face database corresponding with the ID card information of user's input
Face picture is inconsistent, exits register interface.
Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end and passes through figure
As identification is contrasted;
Step 9:Judge the account face picture that corresponding face picture is captured with camera in face database
Whether similarity reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;
Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2
Individual hour, then, into step 15, otherwise, into next step;
Step 11:Judge whether the face picture similarity in face picture and face database that camera is captured reaches
The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 12:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera opens shooting
Head captures face picture and uploads to game services end;
Step 13:Judge whether the face picture face picture corresponding with face database of camera candid photograph reaches to set
Fixed threshold value, if it is, step 8 is returned to, otherwise, into next step.
Step 14:Judge whether the face picture similarity in face picture and face database that camera is captured reaches
The threshold value of setting, it is to enter next step otherwise if it is, returning to step 8;
Step 15:Exit game.
Claims (3)
- A kind of 1. face identification method for online game security checking, it is characterised in that:Using following steps,Step 1:Open game register interface, after inserting data message, the data message include ID card information, account title and Encrypted message, camera collection facial image;Step 2:Game server end judges whether user be present in identity database according to the ID card information inserted Data message, if it is present into next step, otherwise, into step 4;Step 3:According to the ID card information of user, judge whether to exist in face database and believe with user's identity card Face picture corresponding to breath, if it is not, into step once, otherwise, into step 5;Step 4:The data message of user is established in identity database, face is arrived in the face picture storage that camera is captured In database, and establish the mapping relations of the face picture and user's data message;Step 5:Judge whether the face picture similarity in facial image and face database that camera collects reaches threshold Value, if it is, into next step, otherwise, into step 7;Step 6:Data message is established in identity database, by data message face picture corresponding with face database Mapping relations are established, every face picture, which can correspond to, binds n account information, enters step 8;Step 7:Prompt the face figure in the ID card information face database corresponding with the ID card information of user's input Piece is inconsistent, exits register interface.Step 8:User is logged in by account and played, and camera crawl facial image is sent to game services end to be known by image Do not contrasted;Step 9:Judge that the account corresponding face picture in face database is similar to the face picture that camera is captured Whether degree reaches the threshold value of setting, if it is, into next step, otherwise, then into step 13;Step 10:Judge all accounts that the user possesses cumulative time whether more than 2 hours, if it exceeds 2 are small When, then, into step 13, otherwise, into next step;Step 11:User's running game, at regular intervals, camera open camera candid photograph face picture and upload to game Service end, contrasted by image recognition face picture corresponding with face database;Step 12:Judge whether the face picture similarity in face picture and face database that camera is captured reaches setting Threshold value, be to enter next step otherwise if it is, returning to step 8;Step 13:Exit game.
- A kind of 2. face identification method for online game security checking according to claim 1, it is characterised in that:Face Database is provided with N platforms according to Area distribution formula, and the pictorial information of user is stored in the people nearest from the IP address of login In face database.
- A kind of 3. face identification method for online game security checking according to claim 1, it is characterised in that:Step 11 include:Step 111:Judge whether the face picture similarity in face picture and face database that camera is captured reaches to set The threshold value put, it is to enter next step otherwise if it is, returning to step 8;Step 112:Head portrait is directed at camera by game client ejection prompting frame prompting user, and camera is opened camera and grabbed Clap face picture and upload to game services end;Step 113:Judge whether the face picture face picture corresponding with face database that camera is captured reaches setting Threshold value, if it is, step 8 is returned to, otherwise, into next step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710675355.4A CN107508803A (en) | 2017-08-09 | 2017-08-09 | A kind of face identification method for online game security checking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710675355.4A CN107508803A (en) | 2017-08-09 | 2017-08-09 | A kind of face identification method for online game security checking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107508803A true CN107508803A (en) | 2017-12-22 |
Family
ID=60690601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710675355.4A Pending CN107508803A (en) | 2017-08-09 | 2017-08-09 | A kind of face identification method for online game security checking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107508803A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108992926A (en) * | 2018-06-15 | 2018-12-14 | 广州市点格网络科技有限公司 | Based on recognition of face game login method, device and computer readable storage medium |
CN110175490A (en) * | 2018-09-21 | 2019-08-27 | 永康市巴九灵科技有限公司 | Game machine history account analysis system |
CN112735004A (en) * | 2020-12-28 | 2021-04-30 | 广州畅联信息科技有限公司 | Virtual key distribution method, server and distribution system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094070A (en) * | 2007-07-18 | 2007-12-26 | 汪铁良 | System with function of recognizing human face for preventing enthrallment on network |
CN101303712A (en) * | 2007-05-10 | 2008-11-12 | 上海银晨智能识别科技有限公司 | Method for preventing enthrallment network game through human face recognition |
CN102164113A (en) * | 2010-02-22 | 2011-08-24 | 深圳市联通万达科技有限公司 | Face recognition login method and system |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN105227316A (en) * | 2015-09-01 | 2016-01-06 | 深圳市创想一登科技有限公司 | Based on mobile Internet account login system and the method for facial image authentication |
CN105407098A (en) * | 2015-11-26 | 2016-03-16 | 小米科技有限责任公司 | Identity verification method and device |
CN105512531A (en) * | 2015-11-26 | 2016-04-20 | 北京像素软件科技股份有限公司 | Method and device for controlling game validation |
CN106778607A (en) * | 2016-12-15 | 2017-05-31 | 国政通科技股份有限公司 | A kind of people based on recognition of face and identity card homogeneity authentication device and method |
CN106982224A (en) * | 2017-04-28 | 2017-07-25 | 南京网博计算机软件系统有限公司 | The method and system of real time identity checking identification |
-
2017
- 2017-08-09 CN CN201710675355.4A patent/CN107508803A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101303712A (en) * | 2007-05-10 | 2008-11-12 | 上海银晨智能识别科技有限公司 | Method for preventing enthrallment network game through human face recognition |
CN100552688C (en) * | 2007-05-10 | 2009-10-21 | 上海银晨智能识别科技有限公司 | Prevent the method for enthrallment network game by recognition of face |
CN101094070A (en) * | 2007-07-18 | 2007-12-26 | 汪铁良 | System with function of recognizing human face for preventing enthrallment on network |
CN102164113A (en) * | 2010-02-22 | 2011-08-24 | 深圳市联通万达科技有限公司 | Face recognition login method and system |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN105227316A (en) * | 2015-09-01 | 2016-01-06 | 深圳市创想一登科技有限公司 | Based on mobile Internet account login system and the method for facial image authentication |
CN105407098A (en) * | 2015-11-26 | 2016-03-16 | 小米科技有限责任公司 | Identity verification method and device |
CN105512531A (en) * | 2015-11-26 | 2016-04-20 | 北京像素软件科技股份有限公司 | Method and device for controlling game validation |
CN106778607A (en) * | 2016-12-15 | 2017-05-31 | 国政通科技股份有限公司 | A kind of people based on recognition of face and identity card homogeneity authentication device and method |
CN106982224A (en) * | 2017-04-28 | 2017-07-25 | 南京网博计算机软件系统有限公司 | The method and system of real time identity checking identification |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108992926A (en) * | 2018-06-15 | 2018-12-14 | 广州市点格网络科技有限公司 | Based on recognition of face game login method, device and computer readable storage medium |
CN110175490A (en) * | 2018-09-21 | 2019-08-27 | 永康市巴九灵科技有限公司 | Game machine history account analysis system |
CN110175490B (en) * | 2018-09-21 | 2021-04-16 | 泰州市津达电子科技有限公司 | Game machine historical account number analysis system |
CN112735004A (en) * | 2020-12-28 | 2021-04-30 | 广州畅联信息科技有限公司 | Virtual key distribution method, server and distribution system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210295327A1 (en) | Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website | |
US9917826B2 (en) | Automated identity assessment method and system | |
US9288196B2 (en) | Identity verification via selection of sensible output from recorded digital data | |
CN104469767B (en) | The implementation method of integrated form security protection subsystem in a set of mobile office system | |
CN105260628B (en) | Classifier training method and apparatus, auth method and system | |
CN106101136A (en) | The authentication method of a kind of biological characteristic contrast and system | |
CN106803289A (en) | A kind of false proof method and system of registering of intelligent mobile | |
CN103795724B (en) | Method for protecting account security based on asynchronous dynamic password technology | |
CN107508803A (en) | A kind of face identification method for online game security checking | |
Polakis et al. | All your face are belong to us: Breaking facebook's social authentication | |
CN201508555U (en) | Internet bar management system based on face recognition | |
CN101174948A (en) | Network login system and method with face authentication | |
CN106339613A (en) | Application data processing method, terminal and server | |
CN108600154A (en) | A kind of government affairs remote authentication system and method | |
CN106790260A (en) | A kind of multiple-factor identity identifying method | |
CN107786487B (en) | Information authentication processing method, system and related equipment | |
CN105897428A (en) | Real-time video safety communication system and method based on iris recognition | |
CN109118606A (en) | A kind of attendance checking through facial recognition process authentication method | |
CN104967610A (en) | Watermark hopping communication method based on time slot | |
CN102333066A (en) | Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game | |
CN102377729A (en) | User registration and logon method by combining speaker speech identity authentication and account code protection in network games | |
CN107454064A (en) | A kind of visitor's authentication method and system based on public number | |
Chandrashekhar et al. | Cyberstalking and Cyberbullying: Effects and prevention measures | |
CN107707754A (en) | A kind of intelligent terminal recovers method and apparatus | |
CN110162942A (en) | Auth method, device, equipment and storage medium based on timestamp |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 511457 Guangdong city of Guangzhou province Nansha District Golden Road No. 26 room 1306 (only for office use) Applicant after: Yuncong Technology Group Co., Ltd Address before: 518000 Guangdong city of Guangzhou province Nansha District Golden Road No. 26 room 1306 Applicant before: GUANGZHOU YUNCONG INFORMATION TECHNOLOGY CO., LTD. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171222 |