CN111414569B - Efficient access control method for network recruitment search technology - Google Patents
Efficient access control method for network recruitment search technology Download PDFInfo
- Publication number
- CN111414569B CN111414569B CN202010100083.7A CN202010100083A CN111414569B CN 111414569 B CN111414569 B CN 111414569B CN 202010100083 A CN202010100083 A CN 202010100083A CN 111414569 B CN111414569 B CN 111414569B
- Authority
- CN
- China
- Prior art keywords
- face image
- identity card
- card number
- registration request
- job seeker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/75—Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
- G06V10/751—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a high-efficiency access control method facing to a network recruitment search technology, which comprises the following steps: receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number; acquiring an identity card number of the job seeker, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image; receiving a login request sent by a job seeker, wherein the login request comprises an identity card number; acquiring an identity card number of a job seeker through a login request, and extracting a reference face image corresponding to the identity card number by using the identity card number; acquiring a real-time face image of a job seeker; and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image. The invention can effectively avoid the minors from delivering the resume by using the recruitment platform through the realization mode of combining the identification card number and the face verification.
Description
Technical Field
The invention relates to the technical field of Internet. More particularly, the invention relates to a high-efficiency access control method facing to a network recruitment search technology.
Background
With the rapid development and popularization of internet technology, recruiters generally complete work through recruitment websites. In a recruitment website, recruitment enterprises issue through the recruitment website according to recruitment information required by recruitment, a job seeker registers in the recruitment website first, makes out a production resume according to a resume template provided by the website, and searches for positions through the recruitment website for delivery. Currently, the national legal working age is 18 years old, and in order to avoid underage search related work which does not reach 18 years old, the recruitment platform limits the age of resume editing to be above 18 years old, but only by limiting the age at resume editing, underage cannot be avoided for delivering resume using false age information.
Disclosure of Invention
It is an object of the present invention to solve at least the above problems and to provide at least the advantages to be described later.
The invention also aims to provide a high-efficiency access control method facing the network recruitment search technology, which can effectively avoid the minors from delivering the resume by using the recruitment platform through the implementation mode of combining the identification card number and the face verification.
To achieve these objects and other advantages and in accordance with the purpose of the invention, a method for efficient access control for network recruitment search technology is provided, comprising:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image.
Preferably, after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
and judging whether the age is more than eighteen years old, and if yes, receiving a second registration request.
Preferably, the third registration request can also obtain an identity card head portrait in the identity card picture;
and receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number.
Preferably, determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card includes:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image.
Preferably, the first similarity threshold is 50.
Preferably, determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
Preferably, the second similarity threshold is 70.
The invention at least comprises the following beneficial effects:
according to the first, the high-efficiency access control method disclosed by the invention, through an implementation mode of combining the identification card number and the face verification, the phenomenon that the minors use a recruitment platform to deliver the resume can be effectively avoided.
Secondly, the identification card number is used for logging in the recruitment platform and limiting the age range of a registrant, and the face reference image is used for verifying whether a logged-in user is the same person or not during registration, so that the minors are prevented from using the account numbers of other people to deliver the resume.
Third, the invention can further verify whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not by uploading the identity card picture, thereby avoiding the minor from registering on the recruitment platform by using the identity card number of the other person.
Fourth, the invention further limits that the identity card number, the identity card picture and the face image in the first registration request can be registered on the recruitment platform only by the same person by acquiring the identity card head image in the identity card picture and judging the similarity of the identity card head image and the face image, thereby avoiding the registration of minors by using the identity card number and the identity card picture of other people and avoiding the delivery resume of minors by using the account number of other people.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Detailed Description
The present invention is described in further detail below with reference to examples to enable those skilled in the art to practice the same by referring to the description.
The efficient access control method for the network recruitment search technology comprises the following steps:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image.
In the technical scheme, the equipment for realizing the efficient access control method facing the network recruitment search technology can be a smart phone, a tablet computer, a notebook computer or a desktop computer with a photographing function, and in order to avoid underage embezzling photos, pictures and the like of legal job seekers to finish face verification, the method further comprises the step of carrying out living detection on a face image in the face image acquisition process, and judging whether the face image is a face head image of the job seeker, wherein the living detection comprises common voice prompts such as blinking, nodding and the like, and the image is acquired; the login information with the user name of the identity card number is acquired after registration; age information is obtained through the identification card number, for example, the seventh to fourteenth positions of the identification card number represent the birth date of the identification card owner, and the age of the job seeker can be obtained based on the birth date.
In the use process, the job seeker logs in the recruitment platform for the first time, registration information is required to be completed firstly, first registration information of the job seeker, which is an identity card number, is received firstly, after the first registration information is obtained, the age of the job seeker is calculated based on the identity card number, whether the age is more than eighteen years old is judged, if the age is less than eighteen years old, the job seeker is not allowed to perform the next operation, and if the age is more than eighteen years old, a second registration request is received to obtain a face image of the job seeker, and a face database is established; when the job seeker logs in the recruitment platform again, the identity card number is used for logging in, whether the identity card number is registered in the recruitment platform is judged, if not, the job seeker is forbidden to conduct the next operation, if so, the identity card number is used for extracting a reference face image corresponding to the identity card number, which is input in a face database, and then the real-time face image sent by the job seeker is received, and whether the logging in is allowed is judged according to the similarity between the real-time face image and the reference face image.
By adopting the technical scheme, the high-efficiency access control method can effectively avoid the use of a recruitment platform for delivering resume by minors through the implementation mode of combining the identification card number and the face verification; the identification card number is used for logging in the recruitment platform and limiting the age range of a registrant, the face reference image is used for verifying whether a logged-in user is the same person as the registered user or not, and the phenomenon that minors use account numbers of other people to deliver resume is avoided (names, ages, educational experiences and the like can be modified according to requirements after the recruitment platform in the prior art logs in, so hidden danger of reduced account delivery of the other people used by the minors exists).
In another aspect, after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, acquiring the age of the job seeker according to the identity card number if the identity card number is consistent with the identity card number, and refusing to register on a recruitment platform if the identity card number is inconsistent with the identity card number;
and judging whether the age is more than eighteen years old, and if yes, receiving a second registration request. By adopting the technical scheme, the identity card picture of the first registration request and the identity card picture of the third registration request can be further verified whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not through uploading the identity card picture, and the fact that minors register on a recruitment platform by using the identity card numbers of the other persons is avoided.
In another technical scheme, the identity card head portrait in the identity card picture can also be obtained through a third registration request;
and receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number. By adopting the technical scheme, the identity card head portrait in the identity card picture is acquired, the similarity of the identity card head portrait and the face image is judged, the fact that the identity card number, the identity card picture and the face image in the first registration request can be registered on the recruitment platform only by the same person is further limited, the fact that minors use the identity card number and the identity card picture of other people for registration is avoided, and meanwhile the fact that minors use the account number of other people for delivering resume is avoided.
In another technical scheme, determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card includes:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image. By adopting the technical scheme, whether the face image carried by the second registration request and the head portrait of the identity card are the same person or not is judged.
In another aspect, the first similarity threshold is 50. By adopting the technical scheme, whether the face image and the head portrait of the identity card are the same person or not is conveniently determined.
In another technical solution, determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in. By adopting the technical scheme, the similarity between the real-time face image and the reference face image is judged.
In another aspect, the second similarity threshold is 70. By adopting the technical scheme, whether the real-time face image and the reference face image are the same person or not is conveniently determined.
Although embodiments of the present invention have been disclosed above, it is not limited to the details and embodiments shown, it is well suited to various fields of use for which the invention is suited, and further modifications may be readily made by one skilled in the art, and the invention is therefore not to be limited to the particular details and examples shown and described herein, without departing from the general concepts defined by the claims and the equivalents thereof.
Claims (4)
1. The efficient access control method for the network recruitment search technology is characterized by comprising the following steps of:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image;
after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
judging whether the age is more than eighteen years old, if yes, receiving a second registration request;
the identity card head portrait in the identity card picture can also be obtained through the third registration request;
receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number;
the step of judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card comprises the following steps:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image.
2. The efficient access control method for a network recruitment search technique of claim 1 wherein the first similarity threshold is 50.
3. The efficient access control method for a network recruitment search technique of claim 1, wherein determining whether to allow logging based on a similarity between the real-time face image and the reference face image comprises:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
4. The network recruitment search-oriented efficient access control method of claim 3 wherein the second similarity threshold is 70.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010100083.7A CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010100083.7A CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111414569A CN111414569A (en) | 2020-07-14 |
CN111414569B true CN111414569B (en) | 2023-05-12 |
Family
ID=71490848
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010100083.7A Active CN111414569B (en) | 2020-02-18 | 2020-02-18 | Efficient access control method for network recruitment search technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111414569B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277623B (en) * | 2022-08-01 | 2024-06-07 | 上海安鑫网络科技有限公司 | Hot chat friend making method based on data communication application |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002149880A (en) * | 2000-11-10 | 2002-05-24 | Yanoman:Kk | System for providing employment information and commodity information |
JP2011100332A (en) * | 2009-11-06 | 2011-05-19 | Mixi Inc | Attribute analysis method by full name, program, and system |
CN110782119A (en) * | 2019-09-10 | 2020-02-11 | 中国平安人寿保险股份有限公司 | Insurance agent selection method, device and equipment based on artificial intelligence |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070098225A1 (en) * | 2005-10-28 | 2007-05-03 | Piccionelli Gregory A | Age verification method for website access |
US20090177511A1 (en) * | 2008-01-08 | 2009-07-09 | Matthew Mark Shaw | Recruiting and applicant qualification system |
CN107360119A (en) * | 2016-05-09 | 2017-11-17 | 中兴通讯股份有限公司 | A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client |
CN107786487B (en) * | 2016-08-24 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Information authentication processing method, system and related equipment |
CN107485858A (en) * | 2017-08-28 | 2017-12-19 | 昆明理工大学 | A kind of network game indulging verification method |
CN109660509A (en) * | 2018-10-29 | 2019-04-19 | 北京旷视科技有限公司 | Login method, device, system and storage medium based on recognition of face |
CN109829782A (en) * | 2019-01-03 | 2019-05-31 | 深圳壹账通智能科技有限公司 | Cigarette sells control method and device, storage medium and electronic equipment |
CN110096859A (en) * | 2019-03-14 | 2019-08-06 | 深圳壹账通智能科技有限公司 | User authentication method, device, computer equipment and computer readable storage medium |
-
2020
- 2020-02-18 CN CN202010100083.7A patent/CN111414569B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002149880A (en) * | 2000-11-10 | 2002-05-24 | Yanoman:Kk | System for providing employment information and commodity information |
JP2011100332A (en) * | 2009-11-06 | 2011-05-19 | Mixi Inc | Attribute analysis method by full name, program, and system |
CN110782119A (en) * | 2019-09-10 | 2020-02-11 | 中国平安人寿保险股份有限公司 | Insurance agent selection method, device and equipment based on artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
CN111414569A (en) | 2020-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
US6810480B1 (en) | Verification of identity and continued presence of computer users | |
US8909938B2 (en) | System and method for providing secure access to an electronic device using facial biometrics | |
US20210287472A1 (en) | Attendance management system and method, and electronic device | |
WO2019033574A1 (en) | Electronic device, dynamic video face recognition method and system, and storage medium | |
CN108429745B (en) | Login authentication method and system, and webpage login method and system | |
CN110148232B (en) | Visitor management system, method, device and storage medium | |
US12019721B2 (en) | Identification system enrollment and validation and/or authentication | |
CN108809992B (en) | Face recognition verification system and correlation method of face recognition verification system and target system | |
CN113055377A (en) | Network security protection system based on authority authentication | |
CN108806041A (en) | Building access control method, Cloud Server and computer readable storage medium | |
CN106909811A (en) | The method and apparatus of ID treatment | |
CN113111330B (en) | Enterprise legal identity authentication management method and system based on enterprise chain code | |
TW202024975A (en) | Information processing method and device, electronic equipment and computer readable storage medium | |
CN111414569B (en) | Efficient access control method for network recruitment search technology | |
WO2019134548A1 (en) | Identity recognition method, apparatus and system | |
WO2012177421A1 (en) | Enrollment in a telepresence system using a face-recognition-based identification system | |
CN109034944B (en) | Method and device for maintaining data information of multiple users in same person | |
US10210684B2 (en) | System and method for identity verification in a detention environment | |
CN109995761B (en) | Service processing method and device, electronic equipment and storage medium | |
CN116489176A (en) | Private cloud storage server system of intelligent lock | |
CN106339584A (en) | patient information checking method and device | |
CN112637148B (en) | Method, device, electronic equipment and medium for verifying user | |
CN109636578A (en) | Risk checking method, device, equipment and the readable storage medium storing program for executing of credit information | |
KR102443906B1 (en) | Method for reading qualification in real time of manpower on construction site using facial recognition technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |