CN111414569A - Efficient access control method for network recruitment search technology - Google Patents
Efficient access control method for network recruitment search technology Download PDFInfo
- Publication number
- CN111414569A CN111414569A CN202010100083.7A CN202010100083A CN111414569A CN 111414569 A CN111414569 A CN 111414569A CN 202010100083 A CN202010100083 A CN 202010100083A CN 111414569 A CN111414569 A CN 111414569A
- Authority
- CN
- China
- Prior art keywords
- identity card
- face image
- card number
- registration request
- job seeker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/75—Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
- G06V10/751—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention discloses a high-efficiency access control method for a network recruitment search technology, which comprises the following steps: receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number; acquiring the identity card number of the job seeker, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if so, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image; receiving a login request sent by a job seeker, wherein the login request comprises an identity card number; acquiring the identity card number of the job seeker through the login request, and extracting a reference face image corresponding to the identity card number by using the identity card number; acquiring a real-time face image of a job seeker; and judging whether to allow login according to the similarity between the real-time face image and the reference face image. The invention can effectively avoid the delivery of resumes by minors using the recruitment platform through an implementation mode of combining the identity card number and the face verification.
Description
Technical Field
The invention relates to the technical field of Internet. More particularly, the invention relates to an efficient access control method for network recruitment search technology.
Background
With the rapid development and popularization of internet technology, recruitment enterprises and job seekers generally complete work by employing websites. And at the recruitment website, the recruitment enterprise issues through the recruitment website according to the recruitment requirement recruitment information, a job seeker registers at the recruitment website first, fills and makes a resume according to a resume template provided by the website, and searches positions through the recruitment website for delivery. At present, the national legal working age is 18 years old, in order to avoid related work of minor search which does not reach 18 years old, the recruitment platform limits the age of resume edition to be more than 18 years old, but only limits the age at the resume edition and cannot avoid that minor search uses false age information to deliver resumes.
Disclosure of Invention
An object of the present invention is to solve at least the above problems and to provide at least the advantages described later.
The invention also aims to provide an efficient access control method for the network recruitment search technology, which can effectively avoid the delivery of resumes by minors using a recruitment platform through an implementation mode of combining identity card numbers and face verification.
To achieve these objects and other advantages and in accordance with the purpose of the invention, there is provided an efficient access control method for a network recruitment search technique, comprising:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
Preferably, after receiving the first registration request, the method further includes:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request.
Preferably, the identity card head portrait in the identity card picture can be acquired through the third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number.
Preferably, the judging whether the face image is a valid face image according to the similarity between the face image carried by the second registration request and the identification card head image includes:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image.
Preferably, the first similarity threshold is 50.
Preferably, the judging whether to allow login according to the similarity between the real-time face image and the reference face image comprises:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
Preferably, the second similarity threshold is 70.
The invention at least comprises the following beneficial effects:
Firstly, the efficient access control method can effectively avoid the minors from delivering resumes by using a recruitment platform through an implementation mode of combining identity card numbers and face verification.
Secondly, the identity card number is used for logging in a recruitment platform and limiting the age range of the registrants, the face reference image is used for verifying whether the logged-in user is the same as the logged-in user during registration, and the fact that minors use accounts of other people to deliver resumes is avoided.
Thirdly, the identity card picture is uploaded, whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person can be further verified, and the fact that the minors register on the recruitment platform by using the identity card numbers of other persons is avoided.
And fourthly, the identity card head portrait in the identity card picture is obtained, and the similarity between the identity card head portrait and the face image is judged, so that the identity card number, the identity card picture and the face image in the first registration request are further limited to be registered on the recruitment platform by the same person, registration of the minors by the identity card number and the identity card picture of other people is avoided, and meanwhile, the delivery resume of the minors by the account numbers of other people can be avoided.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Detailed Description
The present invention is further described in detail below with reference to examples so that those skilled in the art can practice the invention with reference to the description.
The efficient access control method for the network recruitment search technology comprises the following steps:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
In the technical scheme, the device for implementing the efficient access control method for the network recruitment search technology can be a smart phone, a tablet computer, a notebook computer, a desktop computer and the like with a photographing function, and in order to avoid embezzlement of photos, pictures and the like of legal job seekers to complete face verification, living body detection is further performed on the face image in the face image acquisition process, and whether the face image is a face head portrait of the job seeker is judged, wherein the living body detection comprises common voice prompts such as blinking, head nodding and the like to acquire the image, which is the prior art; the login information with the user name as the identity card number is acquired after registration; the age information is obtained through the identification card number, for example, the seventh to fourteenth identification card numbers represent the birth date of the identification card owner, and the age of the job seeker can be obtained based on the birth date.
In the using process, a job seeker logs in a recruitment platform for the first time, registration information needs to be completed first, first registration information which is an identity card number of the job seeker is received, the age of the job seeker is calculated based on the identity card number after the registration information is obtained, whether the age is more than eighteen years old or not is judged, if the age is less than eighteen years old, the job seeker is not allowed to carry out the next operation, and if the age is more than eighteen years old, a second registration request is received, a face image of the job seeker is obtained, and a face database is established; and when the job seeker logs in the recruitment platform again, the identity card number is used for logging in, whether the identity card number is registered in the recruitment platform or not is judged, if not, the job seeker is forbidden to carry out the next operation, if so, the identity card number is used for extracting a reference face image which is recorded in a face database and corresponds to the identity card number, then a real-time face image sent by the job seeker is received, and whether the login is allowed or not is judged according to the similarity between the real-time face image and the reference face image.
By adopting the technical scheme, the efficient access control method can effectively avoid the delivery of resumes by minors using a recruitment platform through an implementation mode of combining identity card numbers and face verification; the identity card number is used for logging in a recruitment platform and limiting the age range of a registrant, the face reference image is used for verifying whether the logged-in user is the same as the logged-in user during registration, and the fact that a minor uses an account number of another person to deliver a resume is avoided (after the recruitment platform in the prior art logs in, names, ages, education experiences and the like can be modified according to requirements, so that hidden dangers of reduced account number delivery of the minor use of the other person exist).
In another technical solution, after receiving the first registration request, the method further includes:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, if so, acquiring the age of a job seeker according to the identity card number, and if not, rejecting to register on the recruitment platform;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request. By adopting the technical scheme, whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not can be further verified by uploading the identity card pictures, so that the registration of minors on a recruitment platform by using the identity card numbers of other persons is avoided.
In another technical scheme, an identity card head portrait in an identity card picture can be acquired through a third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number. By adopting the technical scheme, the identity card head portrait in the identity card picture is obtained, the similarity between the identity card head portrait and the face image is judged, the identity card number, the identity card picture and the face image in the first registration request are further limited to be registered on the recruitment platform by the same person, registration of juveniles by using the identity card numbers and the identity card pictures of other people is avoided, and meanwhile, delivery resumes by using accounts of other people by the juveniles can also be avoided.
In another technical solution, the determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identification card avatar comprises:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image. By adopting the technical scheme, whether the face image carried by the second registration request and the head image of the identity card are the same person or not is judged.
In another embodiment, the first similarity threshold is 50. By adopting the technical scheme, whether the face image and the head image of the identity card are the same person or not can be conveniently determined.
In another technical solution, the determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in. By adopting the technical scheme, the similarity between the real-time face image and the reference face image is judged.
In another embodiment, the second similarity threshold is 70. By adopting the technical scheme, whether the real-time face image and the reference face image are the same person or not is convenient to determine.
While embodiments of the invention have been described above, it is not limited to the applications set forth in the description and the embodiments, which are fully applicable to various fields of endeavor for which the invention may be embodied with additional modifications as would be readily apparent to those skilled in the art, and the invention is therefore not limited to the details given herein and to the embodiments shown and described without departing from the generic concept as defined by the claims and their equivalents.
Claims (7)
1. The efficient access control method for the network recruitment search technology is characterized by comprising the following steps:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
2. The method for efficient access control for network recruitment search techniques of claim 1, further comprising, after receiving the first registration request:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request.
3. The network recruitment search technology-oriented efficient access control method according to claim 2, wherein an identity card avatar in the identity card picture can be further acquired through the third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number.
4. The network recruitment search technology-oriented efficient access control method according to claim 3, wherein the judging whether the face image is a valid face image according to the similarity between the face image carried by the second registration request and the head image of the identity card comprises:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image.
5. The network recruitment search technology-oriented efficient access control method of claim 4, wherein the first similarity threshold is 50.
6. The network recruitment search technology-oriented efficient access control method according to claim 1, wherein the judging whether to allow login according to the similarity between the real-time face image and the reference face image comprises:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
7. The network recruitment search technology-oriented efficient access control method of claim 6, wherein the second similarity threshold is 70.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010100083.7A CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010100083.7A CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111414569A true CN111414569A (en) | 2020-07-14 |
CN111414569B CN111414569B (en) | 2023-05-12 |
Family
ID=71490848
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010100083.7A Active CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111414569B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277623A (en) * | 2022-08-01 | 2022-11-01 | 上海安鑫网络科技有限公司 | Hot chat friend-making method based on data communication application |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002149880A (en) * | 2000-11-10 | 2002-05-24 | Yanoman:Kk | System for providing employment information and commodity information |
US20070098225A1 (en) * | 2005-10-28 | 2007-05-03 | Piccionelli Gregory A | Age verification method for website access |
US20090177511A1 (en) * | 2008-01-08 | 2009-07-09 | Matthew Mark Shaw | Recruiting and applicant qualification system |
JP2011100332A (en) * | 2009-11-06 | 2011-05-19 | Mixi Inc | Attribute analysis method by full name, program, and system |
CN107360119A (en) * | 2016-05-09 | 2017-11-17 | 中兴通讯股份有限公司 | A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client |
CN107485858A (en) * | 2017-08-28 | 2017-12-19 | 昆明理工大学 | A kind of network game indulging verification method |
CN107786487A (en) * | 2016-08-24 | 2018-03-09 | 腾讯科技(深圳)有限公司 | A kind of authentification of message processing method, system and relevant device |
CN109660509A (en) * | 2018-10-29 | 2019-04-19 | 北京旷视科技有限公司 | Login method, device, system and storage medium based on recognition of face |
CN109829782A (en) * | 2019-01-03 | 2019-05-31 | 深圳壹账通智能科技有限公司 | Cigarette sells control method and device, storage medium and electronic equipment |
CN110096859A (en) * | 2019-03-14 | 2019-08-06 | 深圳壹账通智能科技有限公司 | User authentication method, device, computer equipment and computer readable storage medium |
CN110782119A (en) * | 2019-09-10 | 2020-02-11 | 中国平安人寿保险股份有限公司 | Insurance agent selection method, device and equipment based on artificial intelligence |
-
2020
- 2020-02-18 CN CN202010100083.7A patent/CN111414569B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002149880A (en) * | 2000-11-10 | 2002-05-24 | Yanoman:Kk | System for providing employment information and commodity information |
US20070098225A1 (en) * | 2005-10-28 | 2007-05-03 | Piccionelli Gregory A | Age verification method for website access |
US20090177511A1 (en) * | 2008-01-08 | 2009-07-09 | Matthew Mark Shaw | Recruiting and applicant qualification system |
JP2011100332A (en) * | 2009-11-06 | 2011-05-19 | Mixi Inc | Attribute analysis method by full name, program, and system |
CN107360119A (en) * | 2016-05-09 | 2017-11-17 | 中兴通讯股份有限公司 | A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client |
CN107786487A (en) * | 2016-08-24 | 2018-03-09 | 腾讯科技(深圳)有限公司 | A kind of authentification of message processing method, system and relevant device |
CN107485858A (en) * | 2017-08-28 | 2017-12-19 | 昆明理工大学 | A kind of network game indulging verification method |
CN109660509A (en) * | 2018-10-29 | 2019-04-19 | 北京旷视科技有限公司 | Login method, device, system and storage medium based on recognition of face |
CN109829782A (en) * | 2019-01-03 | 2019-05-31 | 深圳壹账通智能科技有限公司 | Cigarette sells control method and device, storage medium and electronic equipment |
CN110096859A (en) * | 2019-03-14 | 2019-08-06 | 深圳壹账通智能科技有限公司 | User authentication method, device, computer equipment and computer readable storage medium |
CN110782119A (en) * | 2019-09-10 | 2020-02-11 | 中国平安人寿保险股份有限公司 | Insurance agent selection method, device and equipment based on artificial intelligence |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277623A (en) * | 2022-08-01 | 2022-11-01 | 上海安鑫网络科技有限公司 | Hot chat friend-making method based on data communication application |
Also Published As
Publication number | Publication date |
---|---|
CN111414569B (en) | 2023-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11240234B2 (en) | Methods and systems for providing online verification and security | |
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
US6810480B1 (en) | Verification of identity and continued presence of computer users | |
US8909938B2 (en) | System and method for providing secure access to an electronic device using facial biometrics | |
US20210287472A1 (en) | Attendance management system and method, and electronic device | |
CN108429745B (en) | Login authentication method and system, and webpage login method and system | |
US11934500B2 (en) | Identification system enrollment and validation and/or authentication | |
CN105468950A (en) | Identity authentication method and apparatus, terminal and server | |
TW202008197A (en) | Identity verification method and device and account information modification method and device | |
US11698956B2 (en) | Open data biometric identity validation | |
US20200019968A1 (en) | System and method for authenticating transactions from a mobile device | |
CN108108605A (en) | Approaches to IM and device | |
US20200293760A1 (en) | Multi-modal identity recognition | |
CN107656959B (en) | Message leaving method and device and message leaving equipment | |
CN111414569B (en) | Efficient access control method for network recruitment search technology | |
CN105407069B (en) | Living body authentication method, apparatus, client device and server | |
WO2021082045A1 (en) | Smile expression detection method and apparatus, and computer device and storage medium | |
WO2012177421A1 (en) | Enrollment in a telepresence system using a face-recognition-based identification system | |
US11720655B2 (en) | System, device and method for logging-in by staring at a display device | |
CN106161030B (en) | Account registration verification request based on image identification and registration verification method and device | |
CN109034944B (en) | Method and device for maintaining data information of multiple users in same person | |
CN112637148B (en) | Method, device, electronic equipment and medium for verifying user | |
CN110223421B (en) | Access control method and system adaptive to dynamic change of human face | |
WO2016200416A1 (en) | Methods and systems for providing online verification and security | |
JP2002014695A (en) | Method and device for interactive personal identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |