CN110955479A - UI design method and storage medium for safe box app - Google Patents

UI design method and storage medium for safe box app Download PDF

Info

Publication number
CN110955479A
CN110955479A CN201911064134.9A CN201911064134A CN110955479A CN 110955479 A CN110955479 A CN 110955479A CN 201911064134 A CN201911064134 A CN 201911064134A CN 110955479 A CN110955479 A CN 110955479A
Authority
CN
China
Prior art keywords
interface
verification
password
recognition
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911064134.9A
Other languages
Chinese (zh)
Other versions
CN110955479B (en
Inventor
卢仕辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhang Jiehui
Original Assignee
Zhongshan Aopo Metal Manufactory Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Aopo Metal Manufactory Co ltd filed Critical Zhongshan Aopo Metal Manufactory Co ltd
Priority to CN201911064134.9A priority Critical patent/CN110955479B/en
Publication of CN110955479A publication Critical patent/CN110955479A/en
Application granted granted Critical
Publication of CN110955479B publication Critical patent/CN110955479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a UI design method and a storage medium of safe box app.101, a safe box login request instruction of a user is obtained, and a current interface is jumped to an ID identification interface; step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned; 103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, and performing face recognition and iris recognition; and 104, jumping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the digits according to the password digits, and acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence. The invention can control the opening of the safe box by using the app and can obtain the approval of the user on the UI.

Description

UI design method and storage medium for safe box app
Technical Field
The invention relates to the field of safe box apps, in particular to a UI design method and a storage medium of a safe box app.
Background
With the increasing growth of people's life, the demand of safes in the current society is increasing, and safes in the current market cannot be opened by people, and because many safes have huge values of stored articles, certain risks still exist when people open the safes by people. The market today needs a UI design method for safe apps that can control safe opening by using apps and that can be approved by the user on the UI.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a UI design method and a storage medium for safe box app, which can control a safe box to be opened on the app through a combination mode of password login, face recognition, iris recognition and safe box password simulation check, so that the safety of the safe box is ensured.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for designing UI of safe box app is provided, which comprises the following steps:
101, acquiring a safe box login request instruction of a user, jumping a current interface to an ID (identity) identification interface, wherein the current interface is an initial interface of app, the initial interface is specifically distributed in such a way that a virtual button is arranged at a central position, and the login request instruction is triggered when a region of the virtual button is pressed;
step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned;
103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, performing face recognition and iris recognition, acquiring results of the face recognition and the iris recognition, turning to the step 104 if the verification is passed, and returning to the face selection interface if the verification is not passed;
and 104, skipping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the numerical values according to the password numerical values, acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence, judging whether the password numbers are correct passwords or not, opening the safe and returning to the initial interface if the password numbers are correct passwords, and returning to the password verification interface if the password numbers are not correct passwords.
Further, the virtual button in step 101 may also perform fingerprint identification, and the login request command may be triggered only when the fingerprint of the user can be identified and the duration of pressing the virtual button by the user reaches 5 s.
Further, in step 102, when the verification fails, jumping the displayed interface from the ID identification interface to a first intermediate interface, where an interface center position of the first intermediate interface displays a reason for the failure of the verification and a remaining verification number of times of the day, where the verification number is automatically updated to 3 times per day, the verification number is decreased by 1 each time the verification fails, when the display time of the first intermediate interface reaches a first threshold, jumping the displayed interface from the first intermediate interface to an initial interface, and determining whether the remaining face identification number of the day is greater than 0, if so, continuing the verification, and if not, failing to continue the verification.
Further, the interface layout of the face selection interface specifically includes not less than 1 page of face selection sub-interfaces, and the face image of each face selection sub-interface is arranged in the center of the interface in a five-grid form.
Further, the specific placement of the face images further includes that the face image of each face selection sub-interface is a face image subjected to normalization processing, and it is ensured that the eye parts of the face images in the same horizontal line are located in the same horizontal line, and the eye parts of the face images in the same vertical line are located in the same vertical line.
Further, in the step 103, the specific judgment criteria for verifying whether the verification passes include: judging the recognition results of the face recognition and the iris recognition, only when the face recognition and the iris recognition are both passed, transferring to a step 104, when the face recognition and the iris recognition are not completely passed, transferring to a second intermediate interface, displaying the reason of the failed combined recognition and the number of combined recognition times remained on the day at the interface center position of the second intermediate interface, automatically updating the number of combined recognition times to 3 times every day, reducing the verification times to 1 when the verification is failed every time, when the display time of the second intermediate interface reaches a second threshold value, jumping the displayed interface from the second intermediate interface to a face selection interface, judging whether the number of combined recognition times remained on the day is larger than 0, if so, continuing the combined recognition, and if not, failing to continue the combined recognition.
Further, the specific layout of the password verification interface includes: the password verification interface comprises a virtual pointer arranged at the center of the password verification interface, a virtual dial is arranged on the outer side of the virtual pointer, 10 Arabic numerals of 0-9 are arranged on the virtual dial at equal intervals, and a user presses the virtual pointer and drags the virtual pointer to rotate so that the virtual pointer points to 1 Arabic numeral to complete 1-time password number selection.
Further, after the user completes account password verification, 1 log file is formed, and the log file is used for recording the subsequent operation conditions of the user, wherein the subsequent operation conditions specifically include the number of times of errors of face recognition performed by the user, face image information selected by each error, the number of times of errors of password verification performed by the user, and the number of passwords corresponding to each error.
A computer-readable storage medium is also proposed, the computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the UI design method of the safe app.
The invention has the beneficial effects that: the invention provides a UI design method and a storage medium for safe box app, which can control a safe box to be opened on the app by a combination mode of password login, face recognition, iris recognition and safe box password simulation check, so that the safety of the safe box is ensured.
Drawings
FIG. 1 is a flow chart illustrating a method for designing a UI for a safe app according to the present invention.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
With reference to fig. 1, the present invention provides a method for designing UI of a safe app, including the following steps:
101, acquiring a safe box login request instruction of a user, jumping a current interface to an ID (identity) identification interface, wherein the current interface is an initial interface of app, the initial interface is specifically distributed in such a way that a virtual button is arranged at a central position, and the login request instruction is triggered when a region of the virtual button is pressed;
step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned;
103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, performing face recognition and iris recognition, acquiring results of the face recognition and the iris recognition, turning to the step 104 if the verification is passed, and returning to the face selection interface if the verification is not passed;
and 104, skipping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the numerical values according to the password numerical values, acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence, judging whether the password numbers are correct passwords or not, opening the safe and returning to the initial interface if the password numbers are correct passwords, and returning to the password verification interface if the password numbers are not correct passwords.
When the safe deposit box is used, firstly, a user presses a virtual button to trigger a login request instruction, then the user inputs an account password registered before the user to confirm the identity information of the user, the user can perform the next operation after the user passes the operation, if the user fails, the login request instruction needs to be sent again, after the identity information is confirmed, the user needs to select a face image of the user to perform face recognition, the user can enter the next interface after the face recognition is successful, namely, a safe deposit box password verification interface, and the safe deposit box can be opened by inputting a correct safe deposit box password.
As a preferred embodiment of the present invention, the virtual button described in step 101 above can also perform fingerprint identification, and the login request command is triggered only when the fingerprint of the user can be identified and the user presses the virtual button for a period of time of 5 s.
In the embodiment, the virtual button is added with a fingerprint identification function, so that two purposes are achieved, the identity of the user can be preliminarily confirmed, the login request of the user can be acquired, and the method is very convenient.
As a preferred embodiment of the present invention, in step 102, when the verification fails, the displayed interface is skipped from the ID identification interface to the first intermediate interface, the interface center position of the first intermediate interface displays the reason of the failure of the verification and the number of verification times remaining on the day, the number of verification times is automatically updated to 3 times per day, the number of verification times is reduced by 1 when the verification fails each time, when the time displayed by the first intermediate interface reaches a first threshold (which can be set manually and reasonably), the displayed interface is skipped from the first intermediate interface to the initial interface, and whether the number of verification times remaining on the day is greater than 0 is determined, if so, the verification can be continued, and if not, the verification cannot be continued.
In the embodiment, the authentication frequency of the user per day is limited to only 3 times, so that the user is prevented from cracking the account password logged in by the user through a malicious means.
As a preferred embodiment of the present invention, the interface layout of the face selection interface specifically includes not less than 1 page of face selection sub-interfaces, and the face image of each face selection sub-interface is arranged in the center of the interface in the form of a five-grid.
In the embodiment, the arrangement problem of the face selection interface is considered, and the face image can be more orderly without losing features by adopting a five-grid arrangement mode.
As a preferred embodiment of the present invention, the specific placement of the face images further includes that the face image of each face selection sub-interface is a face image subjected to normalization processing, and it should be ensured that the eye parts of the face images in the same horizontal line are located in the same horizontal line, and the eye parts of the face images in the same vertical line are located in the same vertical line.
In the embodiment, because the face images have large or small sizes due to shooting, personal problems and the like, the normalization processing is performed on the face images to ensure that the stored face images have the same size, so that a user does not feel that each face image is too obtrusive when selecting the face images, and the use experience of the user is greatly improved.
As a preferred embodiment of the present invention, in the step 103, the specific judgment criteria for verifying whether the verification is passed include: judging the recognition results of the face recognition and the iris recognition, only when the face recognition and the iris recognition are both passed, transferring to a step 104, when the face recognition and the iris recognition are not completely passed, transferring to a second intermediate interface, displaying the reason of the failed combined recognition and the residual combined recognition times on the day at the interface center position of the second intermediate interface, automatically updating the combined recognition times to 3 times every day, reducing the verification times to 1 when the verification is failed every time, when the display time of the second intermediate interface reaches a second threshold value (which can be manually set and reasonably), skipping the displayed interface from the second intermediate interface to a face selection interface, judging whether the residual combined recognition times on the day are larger than 0, if so, continuing the combined recognition, and if not, continuing the combined recognition.
The iris identification technology is based on the iris in eyes for identification, and is applied to security equipment (such as access control and the like) and places with high confidentiality requirements.
The human eye structure is composed of parts such as the sclera, iris, pupil lens, retina, etc. The iris is an annular segment between the black pupil and the white sclera containing many details characteristic of interlaced spots, filaments, coronaries, stripes, crypts, etc. And the iris will remain unchanged throughout life span after it is formed during the fetal development stage. These features determine the uniqueness of the iris features and also the uniqueness of the identification. Therefore, the iris feature of the eye can be used as an identification target for each person.
The process of iris recognition technology generally comprises the following four steps:
1. iris image acquisition
The whole eye of the person is shot by using a specific camera equipment, and the shot image is transmitted to image preprocessing software of an iris recognition system.
2. Image pre-processing
The obtained iris image is processed as follows, so that the requirement of extracting the iris characteristics is met.
Iris positioning: and determining the positions of the inner circle, the outer circle and the quadratic curve in the image. Wherein, the inner circle is the boundary between the iris and the pupil, the outer circle is the boundary between the iris and the sclera, and the secondary curve is the boundary between the iris and the upper and lower eyelids.
Normalization of the iris image: and adjusting the size of the iris in the image to a fixed size set by the recognition system.
Image enhancement: and processing the normalized image by brightness, contrast, smoothness and the like, so as to improve the recognition rate of the iris information in the image.
3. Feature extraction
And extracting characteristic points required by iris recognition from the iris image by adopting a specific algorithm, and coding the characteristic points.
4. Feature matching
And matching the feature codes obtained by feature extraction with the iris image feature codes in the database one by one, and judging whether the iris images are the same iris images or not, thereby achieving the aim of identity recognition.
In the embodiment, the number of times of daily combined recognition (namely face recognition and iris recognition) of the user is limited to only 3, so that the user is prevented from cracking the account password logged in by a malicious means. In the embodiment, the verification accuracy is further ensured and the safety of the safe box is greatly improved by adopting a mode of combined recognition of face recognition and iris recognition.
As a preferred embodiment of the present invention, a specific layout of the password verification interface includes: the password verification interface comprises a virtual pointer arranged at the center of the password verification interface, a virtual dial is arranged on the outer side of the virtual pointer, 10 Arabic numerals of 0-9 are arranged on the virtual dial at equal intervals, and a user presses the virtual pointer and drags the virtual pointer to rotate so that the virtual pointer points to 1 Arabic numeral to complete 1-time password number selection.
In the embodiment, the virtual pointer is arranged to simulate the real rotation unlocking mode of the safe box, so that the preference of a user can be met.
As a preferred embodiment of the present invention, after the user completes the account password verification, 1 log file is formed, where the log file is used to record the subsequent operation conditions of the user, and the subsequent operation conditions specifically include the number of face recognition errors performed by the user, the face image information selected by each error, the number of password verification errors performed by the user, and the number of passwords corresponding to each error.
In the present embodiment, by generating a log file, the owner or manager of the safe can refer to the information of the opener and the error information of the opener in operation, thereby helping the owner or manager of the safe to analyze the risk situation.
A computer-readable storage medium is also proposed, the computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the UI design method of the safe app.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the above-described method embodiments when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (9)

1. A UI design method of a safe app is characterized by comprising the following steps:
101, acquiring a safe box login request instruction of a user, jumping a current interface to an ID (identity) identification interface, wherein the current interface is an initial interface of app, the initial interface is specifically distributed in such a way that a virtual button is arranged at a central position, and the login request instruction is triggered when a region of the virtual button is pressed;
step 102, the user verifies the account number and the password on the ID identification interface to obtain a verification result, if the verification is passed, the step 103 is carried out, and if the verification is not passed, the initial interface is returned;
103, skipping the ID recognition interface to a face selection interface, acquiring a face image and an iris image selected by a user, starting a camera to acquire the face image and the iris image of the user, performing face recognition and iris recognition, acquiring results of the face recognition and the iris recognition, turning to the step 104 if the verification is passed, and returning to the face selection interface if the verification is not passed;
and 104, skipping the face selection interface to a password verification interface, acquiring password values with the same times as the numerical values of the numerical values according to the password numerical values, acquiring the password numbers formed by arranging the final password numerical values according to the acquired sequence, judging whether the password numbers are correct passwords or not, opening the safe and returning to the initial interface if the password numbers are correct passwords, and returning to the password verification interface if the password numbers are not correct passwords.
2. The method of claim 1, wherein the virtual button in step 101 is further capable of performing fingerprint recognition, and the login request command is triggered only when the user's fingerprint is recognized and the user presses the virtual button for 5 s.
3. The method of claim 1, wherein in step 102, when the verification fails, the displayed interface is skipped from the ID identification interface to a first intermediate interface, the interface center position of the first intermediate interface displays the reason of the failure of the verification and the number of verification times remaining on the day, the number of verification times is automatically updated to 3 times per day, the number of verification times is reduced by 1 each time the verification fails, when the time displayed by the first intermediate interface reaches a first threshold, the displayed interface is skipped from the first intermediate interface to the initial interface, and whether the number of verification times remaining on the day is greater than 0 is determined, if so, the verification can be continued, and if not, the verification cannot be continued.
4. The UI design method for safe app according to claim 1, wherein the interface layout of the face selection interface specifically includes not less than 1 page of face selection sub-interfaces, and the face image of each face selection sub-interface is arranged in the center of the interface in the form of a five-grid.
5. The UI design method for safe app according to claim 4, wherein the specific arrangement of the face images further includes that the face images of each face selection sub-interface are normalized face images, and it is ensured that the eye parts of the face images in the same horizontal line are located in the same horizontal line and the eye parts of the face images in the same vertical line are located in the same vertical line.
6. The method for designing UI of safe app as claimed in claim 5, wherein the step 103 of verifying whether the specific criteria are passed includes: judging the recognition results of the face recognition and the iris recognition, only when the face recognition and the iris recognition are both passed, transferring to a step 104, when the face recognition and the iris recognition are not completely passed, transferring to a second intermediate interface, displaying the reason of the failed combined recognition and the number of combined recognition times remained on the day at the interface center position of the second intermediate interface, automatically updating the number of combined recognition times to 3 times every day, reducing the verification times to 1 when the verification is failed every time, when the display time of the second intermediate interface reaches a second threshold value, jumping the displayed interface from the second intermediate interface to a face selection interface, judging whether the number of combined recognition times remained on the day is larger than 0, if so, continuing the combined recognition, and if not, failing to continue the combined recognition.
7. The method for designing the UI of a safe app according to claim 1, wherein the specific layout of the password verification interface comprises: the password verification interface comprises a virtual pointer arranged at the center of the password verification interface, a virtual dial is arranged on the outer side of the virtual pointer, 10 Arabic numerals of 0-9 are arranged on the virtual dial at equal intervals, and a user presses the virtual pointer and drags the virtual pointer to rotate so that the virtual pointer points to 1 Arabic numeral to complete 1-time password number selection.
8. The UI design method for safe app according to claim 1, wherein 1 log file is formed after a user completes account password verification, and the log file is used to record subsequent operating conditions of the user, and the subsequent operating conditions specifically include the number of face recognition errors made by the user, face image information selected by each error, the number of password verification errors made by the user, and the number of passwords corresponding to each error.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN201911064134.9A 2019-11-04 2019-11-04 UI design method of safe app and storage medium Active CN110955479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911064134.9A CN110955479B (en) 2019-11-04 2019-11-04 UI design method of safe app and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911064134.9A CN110955479B (en) 2019-11-04 2019-11-04 UI design method of safe app and storage medium

Publications (2)

Publication Number Publication Date
CN110955479A true CN110955479A (en) 2020-04-03
CN110955479B CN110955479B (en) 2023-12-29

Family

ID=69976025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911064134.9A Active CN110955479B (en) 2019-11-04 2019-11-04 UI design method of safe app and storage medium

Country Status (1)

Country Link
CN (1) CN110955479B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114626036A (en) * 2020-12-08 2022-06-14 腾讯科技(深圳)有限公司 Information processing method and device based on face recognition, storage medium and terminal
CN116052313A (en) * 2023-02-10 2023-05-02 北京中超伟业信息安全技术股份有限公司 Intelligent secret cabinet control method, device, equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114626036A (en) * 2020-12-08 2022-06-14 腾讯科技(深圳)有限公司 Information processing method and device based on face recognition, storage medium and terminal
CN114626036B (en) * 2020-12-08 2024-05-24 腾讯科技(深圳)有限公司 Information processing method and device based on face recognition, storage medium and terminal
CN116052313A (en) * 2023-02-10 2023-05-02 北京中超伟业信息安全技术股份有限公司 Intelligent secret cabinet control method, device, equipment and storage medium
CN116052313B (en) * 2023-02-10 2024-02-23 北京中超伟业信息安全技术股份有限公司 Intelligent secret cabinet control method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110955479B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN108846676B (en) Biological feature auxiliary payment method, device, computer equipment and storage medium
US8953851B2 (en) Ocular biometric authentication with system verification
JP2019522278A (en) Identification method and apparatus
AU2019219813A1 (en) Transaction verification system
CN106603563A (en) Information safety realization method and system based on biometric features identification
US11716330B2 (en) Mobile enrollment using a known biometric
US9552471B1 (en) Personal familiarity authentication
Galbally et al. From the iriscode to the iris: A new vulnerability of iris recognition systems
CN110955479B (en) UI design method of safe app and storage medium
CN109756458A (en) Identity identifying method and system
CN111062018A (en) Method for unlocking AR glasses based on sclera, unlocking device and AR glasses
CN107390864B (en) Network investigation method based on eyeball trajectory tracking, electronic equipment and storage medium
CN110889356A (en) Method and device for unlocking AR glasses based on infrared camera and AR glasses
CN111582145A (en) Biometric identification method, electronic device, and computer-readable storage medium
KR102059511B1 (en) User authentication system using eye response and user information
KR102059520B1 (en) User authentication system using low-resolution pupil reaction
Beukes Hand vein-based biometric authentication with limited training samples
KR102059517B1 (en) User authentication system and method based on eye responses evoked from visual stimuli
KR102059544B1 (en) Continuous authentication system using eye response
US20240070254A1 (en) Image-based login and authentication
Swamy Real-Time Eye Blinking for Password Authentication
CN109271853A (en) It is a kind of improve safety of payment recognition methods and device
CN114067408A (en) Face recognition identity authentication method and system for bank self-service equipment
CN117592941A (en) Power grid equipment operation system and method
CN118035968A (en) Authorization authentication method, system, equipment and medium for combined biological recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No.45 Zhaoyi Road, Dongsheng Town, Zhongshan City, Guangdong Province 528415

Applicant after: Guangdong AOPO smart home Co.,Ltd.

Address before: No.45 Zhaoyi Road, Dongsheng Town, Zhongshan City, Guangdong Province 528415

Applicant before: ZHONGSHAN AOPO METAL MANUFACTORY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231205

Address after: No. 18, Tai'an West Lane, Yuelong Middle Road, Xiaolan Town, Zhongshan, Guangdong 528415

Applicant after: Zhang Jiehui

Address before: No.45 Zhaoyi Road, Dongsheng Town, Zhongshan City, Guangdong Province 528415

Applicant before: Guangdong AOPO smart home Co.,Ltd.

GR01 Patent grant
GR01 Patent grant