CN116843302A - Advertisement design project management system - Google Patents
Advertisement design project management system Download PDFInfo
- Publication number
- CN116843302A CN116843302A CN202310914643.6A CN202310914643A CN116843302A CN 116843302 A CN116843302 A CN 116843302A CN 202310914643 A CN202310914643 A CN 202310914643A CN 116843302 A CN116843302 A CN 116843302A
- Authority
- CN
- China
- Prior art keywords
- login
- verification
- unit
- coefficient
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 claims abstract description 117
- 238000000034 method Methods 0.000 claims abstract description 15
- 238000007726 management method Methods 0.000 claims description 43
- 230000002159 abnormal effect Effects 0.000 claims description 34
- 238000012384 transportation and delivery Methods 0.000 claims description 10
- 238000012550 audit Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 7
- 230000001815 facial effect Effects 0.000 description 25
- 230000000875 corresponding effect Effects 0.000 description 13
- 238000005286 illumination Methods 0.000 description 13
- 238000001514 detection method Methods 0.000 description 12
- 238000004364 calculation method Methods 0.000 description 7
- 238000003709 image segmentation Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000000638 solvent extraction Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000012938 design process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Abstract
The application belongs to the field of project management, and discloses an advertisement design project management system, which comprises a login module, wherein the login module is used for identifying the identity of a worker and judging whether the worker has login permission; the login module comprises a selection unit and a verification unit; the selection unit is used for selecting a login verification mode based on a preset rule; the verification unit is used for identifying the identity of the staff by adopting the login verification mode selected by the selection unit and judging whether the staff has login permission. In the advertisement design project management system, in the process of carrying out identity recognition on staff, the corresponding login verification mode is selected to carry out identity recognition through the preset rule, and compared with the existing system which only adopts one fixed login verification mode, the advertisement design project management system can reduce the probability of the management system being illegally logged in when account information is illegally acquired or a mobile phone is lost, and improves the safety of the advertisement design project management system.
Description
Technical Field
The application relates to the field of project management, in particular to an advertisement design project management system.
Background
The management process of the advertisement design project involves multiple steps of case setting, distribution, progress tracking, auditing, case setting and the like. In order to manage advertisement design projects, a set of corresponding management systems needs to be established. However, the existing management system generally only relies on account information or mobile phone number for verification when logging in, which results in insufficient security, because when account information is illegally acquired or mobile phone is lost, the management system is easily illegally logged in to affect the security of advertisement design items.
Disclosure of Invention
The application aims to disclose an advertisement design project management system, which solves the problem of how to improve the safety of the advertisement design project management system.
In order to achieve the above purpose, the present application provides the following technical solutions:
the application provides an advertisement design project management system, which comprises a login module, a management module and a management module, wherein the login module is used for carrying out identity recognition on a worker and judging whether the worker has login permission;
the login module comprises a selection unit and a verification unit;
the selection unit is used for selecting a login verification mode based on a preset rule;
the verification unit is used for identifying the identity of the staff by adopting the login verification mode selected by the selection unit and judging whether the staff has login permission.
Preferably, the login verification mode comprises verification code verification, password verification, face verification and fingerprint verification.
Preferably, selecting a login verification manner based on a preset rule includes:
acquiring login information;
and selecting a login verification mode based on the login information.
Preferably, the login information includes login time and login interval;
the login time is the starting time of the selection unit;
the login interval is the time interval between the login time of the login at the time corresponding to the login account used by the staff and the login time of the previous login.
Preferably, selecting a login verification manner based on login information includes:
calculating an abnormal login coefficient based on the login time and the login interval of the login at the time;
and selecting a login verification mode based on the abnormal login coefficient.
Preferably, the calculation function of the abnormal login coefficient is:
abncef represents an abnormal login coefficient, w 1 、w 2 The weights in terms of login time and time interval are respectively represented, and the sum of the two weights is more than 0 and less than or equal to 1; the times represent the login time of the current login, the time represents the average value of the login time of the last Q logins, the time represents the login interval corresponding to the current login, and the time represents the average value of the login interval corresponding to the last Q logins.
Preferably, selecting the login verification method based on the abnormal login coefficient includes:
if the abnormal login coefficient is smaller than or equal to a set first coefficient threshold value, selecting password verification as a verification mode;
if the abnormal login coefficient is larger than the set first coefficient threshold value and smaller than or equal to the set second coefficient threshold value, selecting verification code verification as a verification mode;
if the abnormal login coefficient is larger than the set second coefficient threshold value and smaller than or equal to the set third coefficient threshold value, selecting fingerprint verification as a verification mode;
if the abnormal login coefficient is larger than the set third coefficient threshold value, selecting face verification as a verification mode;
the first coefficient threshold is less than the second coefficient threshold and the second coefficient threshold is less than the third coefficient threshold.
Preferably, the device further comprises a working module; the work module is used for managing the advertisement design project by a worker with login authority.
Preferably, the staff is a business person or designer or department leader.
Preferably, the working module comprises a business unit, a distribution unit, a delivery unit, an auditing unit and a management unit;
the business unit is used for communicating business personnel with clients of the advertisement design project;
the distribution unit is used for inputting design tasks by business personnel according to the requirements of clients;
the delivery unit is used for uploading advertising works designed according to the design task by a designer;
the auditing unit is used for auditing the advertising works by the department leader;
the management unit is used for managing the business unit, the distribution unit, the delivery unit and the auditing unit by the department leader.
The application has the beneficial effects that:
in the advertisement design project management system, in the process of carrying out identity recognition on staff, the corresponding login verification mode is selected to carry out identity recognition through the preset rule, and compared with the existing system which only adopts one fixed login verification mode, the advertisement design project management system can reduce the probability of the management system being illegally logged in when account information is illegally acquired or a mobile phone is lost, and improves the safety of the advertisement design project management system.
Drawings
The present disclosure will become more fully understood from the detailed description given herein below and the accompanying drawings, which are given by way of illustration only, and thus are not limiting of the present disclosure, and wherein:
FIG. 1 is a schematic diagram of an advertisement design project management system according to the present application.
FIG. 2 is a second schematic diagram of an advertisement design project management system according to the present application. A step of
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, however, the present application may be practiced in other ways than those described herein, and therefore the scope of the present application is not limited to the specific embodiments disclosed below.
The application provides an advertisement design project management system as shown in an embodiment of fig. 1, which comprises a login module, a management module and a management module, wherein the login module is used for identifying the identity of a worker and judging whether the worker has login permission;
the login module comprises a selection unit and a verification unit;
the selection unit is used for selecting a login verification mode based on a preset rule;
the verification unit is used for identifying the identity of the staff by adopting the login verification mode selected by the selection unit and judging whether the staff has login permission.
In the process of carrying out identity recognition on the staff, a corresponding login verification mode is selected through a preset rule to carry out identity recognition, compared with the existing system which only adopts a fixed login verification mode, the probability that when account information is illegally acquired or a mobile phone is lost, the management system is illegally logged in can be reduced, and the safety of the management system of advertisement design projects is improved.
Preferably, the login verification mode comprises verification code verification, password verification, face verification and fingerprint verification.
Preferably, the authentication unit includes an authentication code authentication subunit, a password authentication subunit, a face authentication subunit, a fingerprint authentication subunit, and an authentication server.
Specifically, when a worker starts the management system, the login module is started first. For example, a login window may be displayed on the display screen, where the login window includes a login account input box, after the login account is input in the login account input box by the worker, the login account is sent to the selection unit, and then the selection unit selects a corresponding login verification mode according to login information of the login account.
Preferably, the verification code verification subunit comprises a first input box, a second input box, a sending key and a determining key, when a worker inputs the mobile phone number bound by the login account in the first input box, the sending button is clicked, the mobile phone number is transmitted to a verification server, the verification server generates a verification code for verification, and the verification code is sent to a terminal corresponding to the mobile phone number;
the staff inputs the verification code in the second input box, then clicks the determination key through the mouse, the verification code is transmitted to the verification server, and the verification server judges whether the login authority exists or not by judging whether the generated verification code is consistent with the received verification code or not.
Preferably, the password verification subunit is configured to determine whether the login permission exists by adopting a password verification mode, and the specific principle is that a password input by a worker is acquired, the password is sent to a verification server, the verification server acquires a preset password according to a login account, and determines whether the received password is consistent with the preset password, if so, the password is provided with the login permission, otherwise, the password is not provided with the login permission.
Specifically, the password is set when the staff registers the login account, and is stored in the verification server after the password is set.
Preferably, the face verification subunit is configured to identify the staff member by:
acquiring a facial image of a worker;
acquiring facial features in a facial image;
transmitting the facial features to a verification server;
receiving a verification result sent back by a verification server, and judging whether a worker has login permission according to the verification result;
the verification server is used for comparing the facial features with the facial features of the personnel with login rights corresponding to the login account, calculating the similarity of the facial features and the personnel with login rights, and when the similarity is larger than a set threshold value, the verification result is that the personnel has the login rights; when the similarity is smaller than or equal to a set threshold value, the verification result is that the staff has no login permission.
Specifically, facial features of a person with login permission are prestored in the verification server, and in the login account registration process, after the registered terminal acquires facial images of the person, the facial images are uploaded to the verification server, and the verification server extracts the facial features and stores the facial images.
Specifically, the face feature extraction algorithm adopted by the face verification subunit is the same as the face feature extraction algorithm adopted by the verification server.
Preferably, the fingerprint verification subunit mainly obtains the fingerprint of the finger of the staff, then sends the fingerprint to the verification server, and the verification server compares the received fingerprint with the fingerprint corresponding to the login account to judge whether the similarity between the fingerprint and the login account meets the requirement, so as to judge whether the staff has login permission.
Preferably, acquiring facial features in the facial image includes:
partitioning the face image into a plurality of sub-images;
calculating the brightness condition coefficient of each sub-image;
selecting pixels for performing pixel identification of the sub-image belonging to facial skin based on the brightness condition coefficient;
forming a skin image based on pixel points belonging to facial skin in all the sub-images;
facial features in the skin image are acquired.
Specifically, facial features may be extracted by an algorithm such as a hog algorithm, a sift algorithm, or the like.
In the application, the pixels belonging to the facial skin are not acquired by adopting a single detection model in the acquisition process, because the facial image comprises a plurality of pixels belonging to the facial skin, and the brightness of the pixels in different areas is different, the single detection model cannot be used for identifying the pixels belonging to the skin in the pixels in different areas, therefore, the application acquires a more accurate identification result by dividing the facial image into a plurality of sub-images and then acquiring the detection model in each sub-image based on the brightness condition coefficient, thereby being beneficial to improving the success rate of the application in the process of carrying out facial verification and improving the use experience of staff.
Preferably, partitioning the face image into a plurality of sub-images includes:
calculating illumination distribution parameters of the face image;
calculating the number subnum of the sub-images based on the illumination distribution parameters;
the face image is divided into subnum sub-images of the same area.
Because the illumination distribution in the face image is inconsistent under different illumination conditions, in order to make the brightness of the pixel points in the sub-image as uniform as possible, the application calculates the number of the sub-images through the illumination distribution parameters, and when the illumination distribution is more nonuniform, the number of the sub-images is more, thereby improving the similarity degree of the brightness of the pixel points in the sub-images, and being beneficial to more accurately judging which detection module is adopted to identify the pixel points belonging to the face skin.
Preferably, the calculation function of the illumination distribution parameter is:
ligdistar denotes the illumination distribution parameter, d 1 And d 2 Representing a first weight and a second weight, fceimg representing a set of pixels of the facial image, gry s The value representing the luminance component of the pixel s in the Lab color middle, fceimgnum representing the number of pixels of the face image, csrig representing the preset luminance component, and mdgry, avegry, mxgry representing the median, average, and maximum values, respectively, of the luminance components of the pixels in fceimg in the Lab color middle.
The illumination distribution parameters are calculated on one hand by calculating the variance of the brightness components of the pixel points, and on the other hand, the application also calculates the difference value between the median value and the average value of the brightness components, and the larger the difference value is, the more uneven the brightness distribution is represented, and the larger the illumination distribution parameters are, so that the illumination distribution parameters can be changed along with the change of the brightness distribution.
Specifically, d 1 、d 2 The values of (2) may be 0.4 and 0.6, respectively. The value of csrig is 100.
Preferably, calculating the number subnum of sub-images based on the illumination distribution parameters includes:
mxligdistpa represents the maximum value of the illumination distribution parameter, Ω represents a preset number.
In the application, the subnum is positively correlated with the ligdistar, so that the number of the sub-images changes along with the change of the brightness distribution condition, and the similarity of the brightness of the pixel points in the single sub-image is improved.
Preferably, the calculation function of the luminance condition coefficient is:
lumconcef represents a brightness condition coefficient, bgth represents a set of pixel points in the sub-image, the gray value of which is greater than an image segmentation threshold value, the image segmentation threshold value is obtained by calculating the sub-image by using an Ojin method, and gry h For the gray value of the pixel h, hghnum represents the number of pixels included in bgth, slth represents the set of pixels whose gray value is equal to or less than the image segmentation threshold in the sub-image, slthnum represents the number of pixels included in slth, gry k The gray value of pixel k is represented.
Specifically, the brightness condition coefficient is obtained by calculating the difference between the pixel point with the gray value larger than the image segmentation threshold and the average value of the gray value of the pixel point smaller than or equal to the image segmentation threshold, and the larger the difference is, the larger the brightness difference of the pixel point in the sub-image is indicated.
Preferably, selecting a detection model for skin color identification of the sub-image based on the luminance condition coefficients comprises:
if the brightness condition coefficient is greater than 50, using the elliptical skin color model as a detection model for skin color recognition of the sub-image;
and if the brightness condition coefficient is less than or equal to 50, using a detection model based on the RGB color space as a detection model for skin color recognition of the sub-image.
Specifically, the calculation time of the elliptical skin color model is longer, but the elliptical skin color model can be suitable for more complicated brightness distribution conditions, and the detection model based on the RGB color space is short in calculation time without conversion of the color space, but is not suitable for complicated brightness distribution conditions, so that the method combines the points of the two detection models, and achieves good balance between calculation time and detection precision when the method detects the pixel points belonging to the facial skin.
Preferably, selecting a login verification manner based on a preset rule includes:
acquiring login information;
and selecting a login verification mode based on the login information.
Specifically, the login information is obtained by the selection unit.
Preferably, the login information includes login time and login interval;
the login time is the starting time of the selection unit;
the login interval is the time interval between the login time of the login at the time corresponding to the login account used by the staff and the login time of the previous login.
Specifically, when the worker opens the login module, the selection unit is started. The selection unit also stores information such as login time, login ip and the like when the same login account logs in each time.
Specifically, the change range of the login time is 0 point 0 minutes to 23 point 59 minutes.
Preferably, selecting a login verification manner based on login information includes:
calculating an abnormal login coefficient based on the login time and the login interval of the login at the time;
and selecting a login verification mode based on the abnormal login coefficient.
Specifically, the abnormal login coefficient is mainly used for judging whether the login action is similar to the previous login action, because the abnormal login coefficient corresponds to the same staff, after the login is carried out for a plurality of times for a long time, the login time and the login interval are basically kept the same, and whether abnormal login occurs can be known by judging the information.
Preferably, the calculation function of the abnormal login coefficient is:
abncef represents an abnormal login coefficient, w 1 、w 2 The weights in terms of login time and time interval are respectively represented, and the sum of the two weights is more than 0 and less than or equal to 1; lotimes representationThe login time of the current login represents the average value of the login time of the last Q logins, the itutime represents the login interval corresponding to the current login, and the ofttr represents the average value of the login interval corresponding to the last Q logins.
Specifically, when the absolute value of the difference between the times is larger, the absolute value of the difference between the itutime and the ofttr is larger, the probability of abnormal login is larger, and the numerical value of the abnormal login coefficient is larger at the moment, so that the accurate detection of abnormal login is realized.
Specifically, when the login number of the login account is less than Q times, face verification is uniformly adopted as a login verification mode.
Preferably, selecting the login verification method based on the abnormal login coefficient includes:
if the abnormal login coefficient is smaller than or equal to a set first coefficient threshold value, selecting password verification as a verification mode;
if the abnormal login coefficient is larger than the set first coefficient threshold value and smaller than or equal to the set second coefficient threshold value, selecting verification code verification as a verification mode;
if the abnormal login coefficient is larger than the set second coefficient threshold value and smaller than or equal to the set third coefficient threshold value, selecting fingerprint verification as a verification mode;
if the abnormal login coefficient is larger than the set third coefficient threshold value, selecting face verification as a verification mode;
the first coefficient threshold is less than the second coefficient threshold and the second coefficient threshold is less than the third coefficient threshold.
Specifically, the verification mode is selected by setting three coefficient thresholds with different values, and the greater the abnormal login coefficient is, the higher the security of the selected verification mode is, so that the security of the management system is improved.
Preferably, the device further comprises a working module; the work module is used for managing the advertisement design project by a worker with login authority.
Specifically, after successful login, the worker can use the work module to manage the advertisement design project.
Preferably, the staff is a business person or designer or department leader.
Specifically, the functions of the working modules which can be used by different staff are different, so that the safety of the management system is further improved, and the probability of data disclosure in the advertisement design process is reduced.
Preferably, the working module comprises a business unit, a distribution unit, a delivery unit, an auditing unit and a management unit;
the business unit is used for communicating business personnel with clients of the advertisement design project;
the distribution unit is used for inputting design tasks by business personnel according to the requirements of clients;
the delivery unit is used for uploading advertising works designed according to the design task by a designer;
the auditing unit is used for auditing the advertising works by the department leader;
the management unit is used for managing the business unit, the distribution unit, the delivery unit and the auditing unit by the department leader.
Specifically, the business unit may integrate common office communication software, so that business personnel can conveniently communicate with clients using different communication software.
The design tasks include the names of advertisement design projects, design requirements, responsible personnel, deadlines and other information.
The department leader can set up lists of usable staff for the business unit, the distribution unit, the delivery unit and the auditing unit through the management unit, so that the staff can only use the unit related to the work content of the staff, and the data security is improved.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. The advertisement design project management system is characterized by comprising a login module, wherein the login module is used for identifying the identity of a worker and judging whether the worker has login authority;
the login module comprises a selection unit and a verification unit;
the selection unit is used for selecting a login verification mode based on a preset rule;
the verification unit is used for identifying the identity of the staff by adopting the login verification mode selected by the selection unit and judging whether the staff has login permission.
2. The advertising design project management system of claim 1, wherein the login authentication means comprises authentication code authentication, password authentication, face authentication, and fingerprint authentication.
3. The advertising design project management system of claim 2, wherein selecting a login verification method based on a preset rule comprises:
acquiring login information;
and selecting a login verification mode based on the login information.
4. An advertisement design project management system according to claim 3, wherein the login information includes a login time and a login interval;
the login time is the starting time of the selection unit;
the login interval is the time interval between the login time of the login at the time corresponding to the login account used by the staff and the login time of the previous login.
5. The advertisement design project management system according to claim 4, wherein selecting a login verification method based on the login information comprises:
calculating an abnormal login coefficient based on the login time and the login interval of the login at the time;
and selecting a login verification mode based on the abnormal login coefficient.
6. The advertising design project management system of claim 5, wherein the abnormal login coefficients are calculated as a function of:
abncef represents an abnormal login coefficient, w 1 、w 2 The weights in terms of login time and time interval are respectively represented, and the sum of the two weights is more than 0 and less than or equal to 1; the times represent the login time of the current login, the time represents the average value of the login time of the last Q logins, the time represents the login interval corresponding to the current login, and the time represents the average value of the login interval corresponding to the last Q logins.
7. The advertisement design project management system according to claim 6, wherein selecting a login verification method based on the abnormal login coefficient comprises:
if the abnormal login coefficient is smaller than or equal to a set first coefficient threshold value, selecting password verification as a login verification mode;
if the abnormal login coefficient is larger than the set first coefficient threshold value and smaller than or equal to the set second coefficient threshold value, selecting verification code verification as a login verification mode;
if the abnormal login coefficient is larger than the set second coefficient threshold value and smaller than or equal to the set third coefficient threshold value, selecting fingerprint verification as a login verification mode;
if the abnormal login coefficient is larger than a set third coefficient threshold value, selecting face verification as a login verification mode;
the first coefficient threshold is less than the second coefficient threshold and the second coefficient threshold is less than the third coefficient threshold.
8. The advertising design project management system of claim 1, further comprising a work module; the work module is used for managing the advertisement design project by a worker with login authority.
9. The advertising design project management system of claim 8, wherein the staff member is a business person or designer or department leader.
10. The advertising design project management system of claim 9, wherein the work module comprises a business unit, an allocation unit, a delivery unit, an audit unit, and a management unit;
the business unit is used for communicating business personnel with clients of the advertisement design project;
the distribution unit is used for inputting design tasks by business personnel according to the requirements of clients;
the delivery unit is used for uploading advertising works designed according to the design task by a designer;
the auditing unit is used for auditing the advertising works by the department leader;
the management unit is used for managing the business unit, the distribution unit, the delivery unit and the auditing unit by the department leader.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310914643.6A CN116843302A (en) | 2023-07-25 | 2023-07-25 | Advertisement design project management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310914643.6A CN116843302A (en) | 2023-07-25 | 2023-07-25 | Advertisement design project management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116843302A true CN116843302A (en) | 2023-10-03 |
Family
ID=88174333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310914643.6A Pending CN116843302A (en) | 2023-07-25 | 2023-07-25 | Advertisement design project management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116843302A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN110943990A (en) * | 2019-11-29 | 2020-03-31 | 合肥开元埃尔软件有限公司 | Big data-based data analysis system for communication security management and control |
CN111460403A (en) * | 2020-02-28 | 2020-07-28 | 拉扎斯网络科技(上海)有限公司 | Information processing method and system |
CN114791981A (en) * | 2022-06-24 | 2022-07-26 | 山东欧通信息科技有限公司 | Internet-based data query management system for file consultation |
CN115564441A (en) * | 2022-07-15 | 2023-01-03 | 北京莞安科技有限公司 | Financial account security management method and system |
CN116257840A (en) * | 2022-12-28 | 2023-06-13 | 南京邮电大学盐城大数据研究院有限公司 | Login information query management system and method based on big data |
-
2023
- 2023-07-25 CN CN202310914643.6A patent/CN116843302A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN110943990A (en) * | 2019-11-29 | 2020-03-31 | 合肥开元埃尔软件有限公司 | Big data-based data analysis system for communication security management and control |
CN111460403A (en) * | 2020-02-28 | 2020-07-28 | 拉扎斯网络科技(上海)有限公司 | Information processing method and system |
CN114791981A (en) * | 2022-06-24 | 2022-07-26 | 山东欧通信息科技有限公司 | Internet-based data query management system for file consultation |
CN115564441A (en) * | 2022-07-15 | 2023-01-03 | 北京莞安科技有限公司 | Financial account security management method and system |
CN116257840A (en) * | 2022-12-28 | 2023-06-13 | 南京邮电大学盐城大数据研究院有限公司 | Login information query management system and method based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110458154B (en) | Face recognition method, face recognition device and computer-readable storage medium | |
CN111125512B (en) | Service recommendation processing method, device and system | |
CN110502592B (en) | Project domain topic analysis system based on big data analysis technology | |
CN109784274B (en) | Method for identifying trailing and related product | |
CN112330833A (en) | Face recognition attendance data verification method and device and computer equipment | |
CN103095672A (en) | Multi-dimensional reputation scoring | |
CN111861240A (en) | Suspicious user identification method, device, equipment and readable storage medium | |
CN112115450B (en) | Campus security information management system based on artificial intelligence technology | |
US11620728B2 (en) | Information processing device, information processing system, information processing method, and program | |
WO2021082548A1 (en) | Living body testing method and apparatus, server and facial recognition device | |
CN116843302A (en) | Advertisement design project management system | |
CN112235602A (en) | Personalized screen protection system and method of smart television and smart television | |
CN107294981A (en) | A kind of method and apparatus of certification | |
CN108683901B (en) | Data processing method, MEC server and computer readable storage medium | |
CN112258009B (en) | Intelligent government affair request processing method | |
CN114004639A (en) | Preferential information recommendation method and device, computer equipment and storage medium | |
CN111163049A (en) | Platform docking and authentication method and system | |
CN110598531A (en) | Method and system for recognizing electronic seal based on face of mobile terminal | |
CN111614697A (en) | Method and system for identity recognition | |
CN116108475B (en) | Collaborative management system for digital delivery | |
CN117320008B (en) | 5G message tax system and processing method thereof | |
CN111932759B (en) | Smart park Internet of things data processing platform and method | |
CN113592732B (en) | Image processing method based on big data and intelligent security | |
CN112115446B (en) | Skyline query biological feature-based identity authentication method and system | |
CN114722366A (en) | Method and system for realizing cloud desktop client multi-factor authentication based on Electron framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |