CN111414569A - Efficient access control method for network recruitment search technology - Google Patents

Efficient access control method for network recruitment search technology Download PDF

Info

Publication number
CN111414569A
CN111414569A CN202010100083.7A CN202010100083A CN111414569A CN 111414569 A CN111414569 A CN 111414569A CN 202010100083 A CN202010100083 A CN 202010100083A CN 111414569 A CN111414569 A CN 111414569A
Authority
CN
China
Prior art keywords
identity card
face image
card number
registration request
job seeker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010100083.7A
Other languages
Chinese (zh)
Other versions
CN111414569B (en
Inventor
郭盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wangpin Consulting Co ltd
Original Assignee
Beijing Wangpin Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wangpin Consulting Co ltd filed Critical Beijing Wangpin Consulting Co ltd
Priority to CN202010100083.7A priority Critical patent/CN111414569B/en
Publication of CN111414569A publication Critical patent/CN111414569A/en
Application granted granted Critical
Publication of CN111414569B publication Critical patent/CN111414569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a high-efficiency access control method for a network recruitment search technology, which comprises the following steps: receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number; acquiring the identity card number of the job seeker, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if so, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image; receiving a login request sent by a job seeker, wherein the login request comprises an identity card number; acquiring the identity card number of the job seeker through the login request, and extracting a reference face image corresponding to the identity card number by using the identity card number; acquiring a real-time face image of a job seeker; and judging whether to allow login according to the similarity between the real-time face image and the reference face image. The invention can effectively avoid the delivery of resumes by minors using the recruitment platform through an implementation mode of combining the identity card number and the face verification.

Description

Efficient access control method for network recruitment search technology
Technical Field
The invention relates to the technical field of Internet. More particularly, the invention relates to an efficient access control method for network recruitment search technology.
Background
With the rapid development and popularization of internet technology, recruitment enterprises and job seekers generally complete work by employing websites. And at the recruitment website, the recruitment enterprise issues through the recruitment website according to the recruitment requirement recruitment information, a job seeker registers at the recruitment website first, fills and makes a resume according to a resume template provided by the website, and searches positions through the recruitment website for delivery. At present, the national legal working age is 18 years old, in order to avoid related work of minor search which does not reach 18 years old, the recruitment platform limits the age of resume edition to be more than 18 years old, but only limits the age at the resume edition and cannot avoid that minor search uses false age information to deliver resumes.
Disclosure of Invention
An object of the present invention is to solve at least the above problems and to provide at least the advantages described later.
The invention also aims to provide an efficient access control method for the network recruitment search technology, which can effectively avoid the delivery of resumes by minors using a recruitment platform through an implementation mode of combining identity card numbers and face verification.
To achieve these objects and other advantages and in accordance with the purpose of the invention, there is provided an efficient access control method for a network recruitment search technique, comprising:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
Preferably, after receiving the first registration request, the method further includes:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request.
Preferably, the identity card head portrait in the identity card picture can be acquired through the third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number.
Preferably, the judging whether the face image is a valid face image according to the similarity between the face image carried by the second registration request and the identification card head image includes:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image.
Preferably, the first similarity threshold is 50.
Preferably, the judging whether to allow login according to the similarity between the real-time face image and the reference face image comprises:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
Preferably, the second similarity threshold is 70.
The invention at least comprises the following beneficial effects:
Firstly, the efficient access control method can effectively avoid the minors from delivering resumes by using a recruitment platform through an implementation mode of combining identity card numbers and face verification.
Secondly, the identity card number is used for logging in a recruitment platform and limiting the age range of the registrants, the face reference image is used for verifying whether the logged-in user is the same as the logged-in user during registration, and the fact that minors use accounts of other people to deliver resumes is avoided.
Thirdly, the identity card picture is uploaded, whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person can be further verified, and the fact that the minors register on the recruitment platform by using the identity card numbers of other persons is avoided.
And fourthly, the identity card head portrait in the identity card picture is obtained, and the similarity between the identity card head portrait and the face image is judged, so that the identity card number, the identity card picture and the face image in the first registration request are further limited to be registered on the recruitment platform by the same person, registration of the minors by the identity card number and the identity card picture of other people is avoided, and meanwhile, the delivery resume of the minors by the account numbers of other people can be avoided.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Detailed Description
The present invention is further described in detail below with reference to examples so that those skilled in the art can practice the invention with reference to the description.
The efficient access control method for the network recruitment search technology comprises the following steps:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
In the technical scheme, the device for implementing the efficient access control method for the network recruitment search technology can be a smart phone, a tablet computer, a notebook computer, a desktop computer and the like with a photographing function, and in order to avoid embezzlement of photos, pictures and the like of legal job seekers to complete face verification, living body detection is further performed on the face image in the face image acquisition process, and whether the face image is a face head portrait of the job seeker is judged, wherein the living body detection comprises common voice prompts such as blinking, head nodding and the like to acquire the image, which is the prior art; the login information with the user name as the identity card number is acquired after registration; the age information is obtained through the identification card number, for example, the seventh to fourteenth identification card numbers represent the birth date of the identification card owner, and the age of the job seeker can be obtained based on the birth date.
In the using process, a job seeker logs in a recruitment platform for the first time, registration information needs to be completed first, first registration information which is an identity card number of the job seeker is received, the age of the job seeker is calculated based on the identity card number after the registration information is obtained, whether the age is more than eighteen years old or not is judged, if the age is less than eighteen years old, the job seeker is not allowed to carry out the next operation, and if the age is more than eighteen years old, a second registration request is received, a face image of the job seeker is obtained, and a face database is established; and when the job seeker logs in the recruitment platform again, the identity card number is used for logging in, whether the identity card number is registered in the recruitment platform or not is judged, if not, the job seeker is forbidden to carry out the next operation, if so, the identity card number is used for extracting a reference face image which is recorded in a face database and corresponds to the identity card number, then a real-time face image sent by the job seeker is received, and whether the login is allowed or not is judged according to the similarity between the real-time face image and the reference face image.
By adopting the technical scheme, the efficient access control method can effectively avoid the delivery of resumes by minors using a recruitment platform through an implementation mode of combining identity card numbers and face verification; the identity card number is used for logging in a recruitment platform and limiting the age range of a registrant, the face reference image is used for verifying whether the logged-in user is the same as the logged-in user during registration, and the fact that a minor uses an account number of another person to deliver a resume is avoided (after the recruitment platform in the prior art logs in, names, ages, education experiences and the like can be modified according to requirements, so that hidden dangers of reduced account number delivery of the minor use of the other person exist).
In another technical solution, after receiving the first registration request, the method further includes:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, if so, acquiring the age of a job seeker according to the identity card number, and if not, rejecting to register on the recruitment platform;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request. By adopting the technical scheme, whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not can be further verified by uploading the identity card pictures, so that the registration of minors on a recruitment platform by using the identity card numbers of other persons is avoided.
In another technical scheme, an identity card head portrait in an identity card picture can be acquired through a third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number. By adopting the technical scheme, the identity card head portrait in the identity card picture is obtained, the similarity between the identity card head portrait and the face image is judged, the identity card number, the identity card picture and the face image in the first registration request are further limited to be registered on the recruitment platform by the same person, registration of juveniles by using the identity card numbers and the identity card pictures of other people is avoided, and meanwhile, delivery resumes by using accounts of other people by the juveniles can also be avoided.
In another technical solution, the determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identification card avatar comprises:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image. By adopting the technical scheme, whether the face image carried by the second registration request and the head image of the identity card are the same person or not is judged.
In another embodiment, the first similarity threshold is 50. By adopting the technical scheme, whether the face image and the head image of the identity card are the same person or not can be conveniently determined.
In another technical solution, the determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in. By adopting the technical scheme, the similarity between the real-time face image and the reference face image is judged.
In another embodiment, the second similarity threshold is 70. By adopting the technical scheme, whether the real-time face image and the reference face image are the same person or not is convenient to determine.
While embodiments of the invention have been described above, it is not limited to the applications set forth in the description and the embodiments, which are fully applicable to various fields of endeavor for which the invention may be embodied with additional modifications as would be readily apparent to those skilled in the art, and the invention is therefore not limited to the details given herein and to the embodiments shown and described without departing from the generic concept as defined by the claims and their equivalents.

Claims (7)

1. The efficient access control method for the network recruitment search technology is characterized by comprising the following steps:
Receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
Acquiring the identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and receiving a second registration request of the job seeker if the age is more than eighteen years old, wherein the second registration request comprises a face image;
Taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
Receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
Acquiring the identity card number of the job seeker through the login request, judging whether the identity card number is registered or not, and if so, extracting a reference face image which is recorded in a face database and corresponds to the identity card number by using the identity card number;
Receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
And judging whether to allow login according to the similarity between the real-time face image and the reference face image.
2. The method for efficient access control for network recruitment search techniques of claim 1, further comprising, after receiving the first registration request:
Receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
Acquiring the identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
And judging whether the age is more than eighteen years old, and if so, receiving a second registration request.
3. The network recruitment search technology-oriented efficient access control method according to claim 2, wherein an identity card avatar in the identity card picture can be further acquired through the third registration request;
And receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the identity card head image, if so, taking the face image as a reference face image, and establishing a face database comprising the reference face image, the identity card number, the mapping relation between the reference face image and the identity card number.
4. The network recruitment search technology-oriented efficient access control method according to claim 3, wherein the judging whether the face image is a valid face image according to the similarity between the face image carried by the second registration request and the head image of the identity card comprises:
If the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to the first similarity threshold value, the face image is an effective face image;
And if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold, the face image does not belong to the effective face image.
5. The network recruitment search technology-oriented efficient access control method of claim 4, wherein the first similarity threshold is 50.
6. The network recruitment search technology-oriented efficient access control method according to claim 1, wherein the judging whether to allow login according to the similarity between the real-time face image and the reference face image comprises:
If the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
And if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
7. The network recruitment search technology-oriented efficient access control method of claim 6, wherein the second similarity threshold is 70.
CN202010100083.7A 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology Active CN111414569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010100083.7A CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010100083.7A CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Publications (2)

Publication Number Publication Date
CN111414569A true CN111414569A (en) 2020-07-14
CN111414569B CN111414569B (en) 2023-05-12

Family

ID=71490848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010100083.7A Active CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Country Status (1)

Country Link
CN (1) CN111414569B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277623A (en) * 2022-08-01 2022-11-01 上海安鑫网络科技有限公司 Hot chat friend-making method based on data communication application

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002149880A (en) * 2000-11-10 2002-05-24 Yanoman:Kk System for providing employment information and commodity information
US20070098225A1 (en) * 2005-10-28 2007-05-03 Piccionelli Gregory A Age verification method for website access
US20090177511A1 (en) * 2008-01-08 2009-07-09 Matthew Mark Shaw Recruiting and applicant qualification system
JP2011100332A (en) * 2009-11-06 2011-05-19 Mixi Inc Attribute analysis method by full name, program, and system
CN107360119A (en) * 2016-05-09 2017-11-17 中兴通讯股份有限公司 A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client
CN107485858A (en) * 2017-08-28 2017-12-19 昆明理工大学 A kind of network game indulging verification method
CN107786487A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 A kind of authentification of message processing method, system and relevant device
CN109660509A (en) * 2018-10-29 2019-04-19 北京旷视科技有限公司 Login method, device, system and storage medium based on recognition of face
CN109829782A (en) * 2019-01-03 2019-05-31 深圳壹账通智能科技有限公司 Cigarette sells control method and device, storage medium and electronic equipment
CN110096859A (en) * 2019-03-14 2019-08-06 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium
CN110782119A (en) * 2019-09-10 2020-02-11 中国平安人寿保险股份有限公司 Insurance agent selection method, device and equipment based on artificial intelligence

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002149880A (en) * 2000-11-10 2002-05-24 Yanoman:Kk System for providing employment information and commodity information
US20070098225A1 (en) * 2005-10-28 2007-05-03 Piccionelli Gregory A Age verification method for website access
US20090177511A1 (en) * 2008-01-08 2009-07-09 Matthew Mark Shaw Recruiting and applicant qualification system
JP2011100332A (en) * 2009-11-06 2011-05-19 Mixi Inc Attribute analysis method by full name, program, and system
CN107360119A (en) * 2016-05-09 2017-11-17 中兴通讯股份有限公司 A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client
CN107786487A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 A kind of authentification of message processing method, system and relevant device
CN107485858A (en) * 2017-08-28 2017-12-19 昆明理工大学 A kind of network game indulging verification method
CN109660509A (en) * 2018-10-29 2019-04-19 北京旷视科技有限公司 Login method, device, system and storage medium based on recognition of face
CN109829782A (en) * 2019-01-03 2019-05-31 深圳壹账通智能科技有限公司 Cigarette sells control method and device, storage medium and electronic equipment
CN110096859A (en) * 2019-03-14 2019-08-06 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium
CN110782119A (en) * 2019-09-10 2020-02-11 中国平安人寿保险股份有限公司 Insurance agent selection method, device and equipment based on artificial intelligence

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277623A (en) * 2022-08-01 2022-11-01 上海安鑫网络科技有限公司 Hot chat friend-making method based on data communication application

Also Published As

Publication number Publication date
CN111414569B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
US11240234B2 (en) Methods and systems for providing online verification and security
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
US6810480B1 (en) Verification of identity and continued presence of computer users
US8909938B2 (en) System and method for providing secure access to an electronic device using facial biometrics
US20210287472A1 (en) Attendance management system and method, and electronic device
CN108429745B (en) Login authentication method and system, and webpage login method and system
US11934500B2 (en) Identification system enrollment and validation and/or authentication
CN105468950A (en) Identity authentication method and apparatus, terminal and server
TW202008197A (en) Identity verification method and device and account information modification method and device
US11698956B2 (en) Open data biometric identity validation
US20200019968A1 (en) System and method for authenticating transactions from a mobile device
CN108108605A (en) Approaches to IM and device
US20200293760A1 (en) Multi-modal identity recognition
CN107656959B (en) Message leaving method and device and message leaving equipment
CN111414569B (en) Efficient access control method for network recruitment search technology
CN105407069B (en) Living body authentication method, apparatus, client device and server
WO2021082045A1 (en) Smile expression detection method and apparatus, and computer device and storage medium
WO2012177421A1 (en) Enrollment in a telepresence system using a face-recognition-based identification system
US11720655B2 (en) System, device and method for logging-in by staring at a display device
CN106161030B (en) Account registration verification request based on image identification and registration verification method and device
CN109034944B (en) Method and device for maintaining data information of multiple users in same person
CN112637148B (en) Method, device, electronic equipment and medium for verifying user
CN110223421B (en) Access control method and system adaptive to dynamic change of human face
WO2016200416A1 (en) Methods and systems for providing online verification and security
JP2002014695A (en) Method and device for interactive personal identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant