CN111414569B - Efficient access control method for network recruitment search technology - Google Patents

Efficient access control method for network recruitment search technology Download PDF

Info

Publication number
CN111414569B
CN111414569B CN202010100083.7A CN202010100083A CN111414569B CN 111414569 B CN111414569 B CN 111414569B CN 202010100083 A CN202010100083 A CN 202010100083A CN 111414569 B CN111414569 B CN 111414569B
Authority
CN
China
Prior art keywords
face image
identity card
card number
registration request
job seeker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010100083.7A
Other languages
Chinese (zh)
Other versions
CN111414569A (en
Inventor
郭盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wangpin Consulting Co ltd
Original Assignee
Beijing Wangpin Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wangpin Consulting Co ltd filed Critical Beijing Wangpin Consulting Co ltd
Priority to CN202010100083.7A priority Critical patent/CN111414569B/en
Publication of CN111414569A publication Critical patent/CN111414569A/en
Application granted granted Critical
Publication of CN111414569B publication Critical patent/CN111414569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a high-efficiency access control method facing to a network recruitment search technology, which comprises the following steps: receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number; acquiring an identity card number of the job seeker, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image; receiving a login request sent by a job seeker, wherein the login request comprises an identity card number; acquiring an identity card number of a job seeker through a login request, and extracting a reference face image corresponding to the identity card number by using the identity card number; acquiring a real-time face image of a job seeker; and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image. The invention can effectively avoid the minors from delivering the resume by using the recruitment platform through the realization mode of combining the identification card number and the face verification.

Description

Efficient access control method for network recruitment search technology
Technical Field
The invention relates to the technical field of Internet. More particularly, the invention relates to a high-efficiency access control method facing to a network recruitment search technology.
Background
With the rapid development and popularization of internet technology, recruiters generally complete work through recruitment websites. In a recruitment website, recruitment enterprises issue through the recruitment website according to recruitment information required by recruitment, a job seeker registers in the recruitment website first, makes out a production resume according to a resume template provided by the website, and searches for positions through the recruitment website for delivery. Currently, the national legal working age is 18 years old, and in order to avoid underage search related work which does not reach 18 years old, the recruitment platform limits the age of resume editing to be above 18 years old, but only by limiting the age at resume editing, underage cannot be avoided for delivering resume using false age information.
Disclosure of Invention
It is an object of the present invention to solve at least the above problems and to provide at least the advantages to be described later.
The invention also aims to provide a high-efficiency access control method facing the network recruitment search technology, which can effectively avoid the minors from delivering the resume by using the recruitment platform through the implementation mode of combining the identification card number and the face verification.
To achieve these objects and other advantages and in accordance with the purpose of the invention, a method for efficient access control for network recruitment search technology is provided, comprising:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image.
Preferably, after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
and judging whether the age is more than eighteen years old, and if yes, receiving a second registration request.
Preferably, the third registration request can also obtain an identity card head portrait in the identity card picture;
and receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number.
Preferably, determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card includes:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image.
Preferably, the first similarity threshold is 50.
Preferably, determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
Preferably, the second similarity threshold is 70.
The invention at least comprises the following beneficial effects:
according to the first, the high-efficiency access control method disclosed by the invention, through an implementation mode of combining the identification card number and the face verification, the phenomenon that the minors use a recruitment platform to deliver the resume can be effectively avoided.
Secondly, the identification card number is used for logging in the recruitment platform and limiting the age range of a registrant, and the face reference image is used for verifying whether a logged-in user is the same person or not during registration, so that the minors are prevented from using the account numbers of other people to deliver the resume.
Third, the invention can further verify whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not by uploading the identity card picture, thereby avoiding the minor from registering on the recruitment platform by using the identity card number of the other person.
Fourth, the invention further limits that the identity card number, the identity card picture and the face image in the first registration request can be registered on the recruitment platform only by the same person by acquiring the identity card head image in the identity card picture and judging the similarity of the identity card head image and the face image, thereby avoiding the registration of minors by using the identity card number and the identity card picture of other people and avoiding the delivery resume of minors by using the account number of other people.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Detailed Description
The present invention is described in further detail below with reference to examples to enable those skilled in the art to practice the same by referring to the description.
The efficient access control method for the network recruitment search technology comprises the following steps:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
and judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image.
In the technical scheme, the equipment for realizing the efficient access control method facing the network recruitment search technology can be a smart phone, a tablet computer, a notebook computer or a desktop computer with a photographing function, and in order to avoid underage embezzling photos, pictures and the like of legal job seekers to finish face verification, the method further comprises the step of carrying out living detection on a face image in the face image acquisition process, and judging whether the face image is a face head image of the job seeker, wherein the living detection comprises common voice prompts such as blinking, nodding and the like, and the image is acquired; the login information with the user name of the identity card number is acquired after registration; age information is obtained through the identification card number, for example, the seventh to fourteenth positions of the identification card number represent the birth date of the identification card owner, and the age of the job seeker can be obtained based on the birth date.
In the use process, the job seeker logs in the recruitment platform for the first time, registration information is required to be completed firstly, first registration information of the job seeker, which is an identity card number, is received firstly, after the first registration information is obtained, the age of the job seeker is calculated based on the identity card number, whether the age is more than eighteen years old is judged, if the age is less than eighteen years old, the job seeker is not allowed to perform the next operation, and if the age is more than eighteen years old, a second registration request is received to obtain a face image of the job seeker, and a face database is established; when the job seeker logs in the recruitment platform again, the identity card number is used for logging in, whether the identity card number is registered in the recruitment platform is judged, if not, the job seeker is forbidden to conduct the next operation, if so, the identity card number is used for extracting a reference face image corresponding to the identity card number, which is input in a face database, and then the real-time face image sent by the job seeker is received, and whether the logging in is allowed is judged according to the similarity between the real-time face image and the reference face image.
By adopting the technical scheme, the high-efficiency access control method can effectively avoid the use of a recruitment platform for delivering resume by minors through the implementation mode of combining the identification card number and the face verification; the identification card number is used for logging in the recruitment platform and limiting the age range of a registrant, the face reference image is used for verifying whether a logged-in user is the same person as the registered user or not, and the phenomenon that minors use account numbers of other people to deliver resume is avoided (names, ages, educational experiences and the like can be modified according to requirements after the recruitment platform in the prior art logs in, so hidden danger of reduced account delivery of the other people used by the minors exists).
In another aspect, after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, acquiring the age of the job seeker according to the identity card number if the identity card number is consistent with the identity card number, and refusing to register on a recruitment platform if the identity card number is inconsistent with the identity card number;
and judging whether the age is more than eighteen years old, and if yes, receiving a second registration request. By adopting the technical scheme, the identity card picture of the first registration request and the identity card picture of the third registration request can be further verified whether the identity card number of the first registration request and the identity card picture of the third registration request are the same person or not through uploading the identity card picture, and the fact that minors register on a recruitment platform by using the identity card numbers of the other persons is avoided.
In another technical scheme, the identity card head portrait in the identity card picture can also be obtained through a third registration request;
and receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number. By adopting the technical scheme, the identity card head portrait in the identity card picture is acquired, the similarity of the identity card head portrait and the face image is judged, the fact that the identity card number, the identity card picture and the face image in the first registration request can be registered on the recruitment platform only by the same person is further limited, the fact that minors use the identity card number and the identity card picture of other people for registration is avoided, and meanwhile the fact that minors use the account number of other people for delivering resume is avoided.
In another technical scheme, determining whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card includes:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image. By adopting the technical scheme, whether the face image carried by the second registration request and the head portrait of the identity card are the same person or not is judged.
In another aspect, the first similarity threshold is 50. By adopting the technical scheme, whether the face image and the head portrait of the identity card are the same person or not is conveniently determined.
In another technical solution, determining whether to allow login according to the similarity between the real-time face image and the reference face image includes:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in. By adopting the technical scheme, the similarity between the real-time face image and the reference face image is judged.
In another aspect, the second similarity threshold is 70. By adopting the technical scheme, whether the real-time face image and the reference face image are the same person or not is conveniently determined.
Although embodiments of the present invention have been disclosed above, it is not limited to the details and embodiments shown, it is well suited to various fields of use for which the invention is suited, and further modifications may be readily made by one skilled in the art, and the invention is therefore not to be limited to the particular details and examples shown and described herein, without departing from the general concepts defined by the claims and the equivalents thereof.

Claims (4)

1. The efficient access control method for the network recruitment search technology is characterized by comprising the following steps of:
receiving a first registration request of a job seeker, wherein the first registration request comprises an identity card number;
acquiring an identity card number of the job seeker through the first registration request, acquiring the age of the job seeker according to the identity card number, judging whether the age is more than eighteen years old, and if yes, receiving a second registration request of the job seeker, wherein the second registration request comprises a face image;
taking the face image as a reference face image, establishing a face database containing the reference face image, the identity card number and the mapping relation between the reference face image and the identity card number, and finishing registration;
receiving a login request sent by a job seeker, wherein the login request comprises an identity card number;
acquiring an identity card number of a job seeker through a login request, judging whether the identity card number is registered, and if so, extracting a reference face image corresponding to the identity card number, which is recorded in a face database, by using the identity card number;
receiving a face verification request sent by a job seeker, and acquiring a real-time face image of the job seeker;
judging whether login is allowed or not according to the similarity between the real-time face image and the reference face image;
after receiving the first registration request, the method further includes:
receiving a third registration request of the job seeker, wherein the third registration request comprises an identity card picture;
acquiring an identity card number in the identity card picture through a third registration request, judging whether the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture, and acquiring the age of the job seeker according to the identity card number if the identity card number acquired through the first registration request is consistent with the identity card number acquired through the identity card picture;
judging whether the age is more than eighteen years old, if yes, receiving a second registration request;
the identity card head portrait in the identity card picture can also be obtained through the third registration request;
receiving a second registration request, judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card, if so, taking the face image as a reference face image, and establishing a face database containing the reference face image, the identity card number, and the mapping relation between the reference face image and the identity card number;
the step of judging whether the face image is an effective face image according to the similarity between the face image carried by the second registration request and the head portrait of the identity card comprises the following steps:
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is greater than or equal to a first similarity threshold value, the face image is an effective face image;
if the similarity between the face image carried by the second registration request and the head portrait of the identity card is smaller than the first similarity threshold value, the face image does not belong to the effective face image.
2. The efficient access control method for a network recruitment search technique of claim 1 wherein the first similarity threshold is 50.
3. The efficient access control method for a network recruitment search technique of claim 1, wherein determining whether to allow logging based on a similarity between the real-time face image and the reference face image comprises:
if the similarity between the real-time face image and the reference face image is greater than or equal to a second similarity threshold value, allowing the job seeker to log in;
and if the similarity between the real-time face image and the reference face image is smaller than a second similarity threshold value, refusing the job seeker to log in.
4. The network recruitment search-oriented efficient access control method of claim 3 wherein the second similarity threshold is 70.
CN202010100083.7A 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology Active CN111414569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010100083.7A CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010100083.7A CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Publications (2)

Publication Number Publication Date
CN111414569A CN111414569A (en) 2020-07-14
CN111414569B true CN111414569B (en) 2023-05-12

Family

ID=71490848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010100083.7A Active CN111414569B (en) 2020-02-18 2020-02-18 Efficient access control method for network recruitment search technology

Country Status (1)

Country Link
CN (1) CN111414569B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277623B (en) * 2022-08-01 2024-06-07 上海安鑫网络科技有限公司 Hot chat friend making method based on data communication application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002149880A (en) * 2000-11-10 2002-05-24 Yanoman:Kk System for providing employment information and commodity information
JP2011100332A (en) * 2009-11-06 2011-05-19 Mixi Inc Attribute analysis method by full name, program, and system
CN110782119A (en) * 2019-09-10 2020-02-11 中国平安人寿保险股份有限公司 Insurance agent selection method, device and equipment based on artificial intelligence

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070098225A1 (en) * 2005-10-28 2007-05-03 Piccionelli Gregory A Age verification method for website access
US20090177511A1 (en) * 2008-01-08 2009-07-09 Matthew Mark Shaw Recruiting and applicant qualification system
CN107360119A (en) * 2016-05-09 2017-11-17 中兴通讯股份有限公司 A kind of cloud desktop Sign-On authentication method, cloud desktop control system and client
CN107786487B (en) * 2016-08-24 2021-02-02 腾讯科技(深圳)有限公司 Information authentication processing method, system and related equipment
CN107485858A (en) * 2017-08-28 2017-12-19 昆明理工大学 A kind of network game indulging verification method
CN109660509A (en) * 2018-10-29 2019-04-19 北京旷视科技有限公司 Login method, device, system and storage medium based on recognition of face
CN109829782A (en) * 2019-01-03 2019-05-31 深圳壹账通智能科技有限公司 Cigarette sells control method and device, storage medium and electronic equipment
CN110096859A (en) * 2019-03-14 2019-08-06 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002149880A (en) * 2000-11-10 2002-05-24 Yanoman:Kk System for providing employment information and commodity information
JP2011100332A (en) * 2009-11-06 2011-05-19 Mixi Inc Attribute analysis method by full name, program, and system
CN110782119A (en) * 2019-09-10 2020-02-11 中国平安人寿保险股份有限公司 Insurance agent selection method, device and equipment based on artificial intelligence

Also Published As

Publication number Publication date
CN111414569A (en) 2020-07-14

Similar Documents

Publication Publication Date Title
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
US6810480B1 (en) Verification of identity and continued presence of computer users
US8909938B2 (en) System and method for providing secure access to an electronic device using facial biometrics
US20210287472A1 (en) Attendance management system and method, and electronic device
WO2019033574A1 (en) Electronic device, dynamic video face recognition method and system, and storage medium
CN108429745B (en) Login authentication method and system, and webpage login method and system
CN110148232B (en) Visitor management system, method, device and storage medium
US12019721B2 (en) Identification system enrollment and validation and/or authentication
CN108809992B (en) Face recognition verification system and correlation method of face recognition verification system and target system
CN113055377A (en) Network security protection system based on authority authentication
CN108806041A (en) Building access control method, Cloud Server and computer readable storage medium
CN106909811A (en) The method and apparatus of ID treatment
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
TW202024975A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN111414569B (en) Efficient access control method for network recruitment search technology
WO2019134548A1 (en) Identity recognition method, apparatus and system
WO2012177421A1 (en) Enrollment in a telepresence system using a face-recognition-based identification system
CN109034944B (en) Method and device for maintaining data information of multiple users in same person
US10210684B2 (en) System and method for identity verification in a detention environment
CN109995761B (en) Service processing method and device, electronic equipment and storage medium
CN116489176A (en) Private cloud storage server system of intelligent lock
CN106339584A (en) patient information checking method and device
CN112637148B (en) Method, device, electronic equipment and medium for verifying user
CN109636578A (en) Risk checking method, device, equipment and the readable storage medium storing program for executing of credit information
KR102443906B1 (en) Method for reading qualification in real time of manpower on construction site using facial recognition technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant