Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A face recognition verification system and its association method with a target system

A target system and face recognition technology, which is applied in the field of image recognition and multi-system correlation fusion, can solve the problems of high rate of false results of face recognition, unreasonable point setting, hidden dangers of system security, etc., to improve the security of login verification performance, improve risk management and control capabilities, and save development costs

Active Publication Date: 2021-07-13
黄玉新
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For existing management systems such as OA systems, ERP systems, and project management systems, there are B / S and C / S architectures. With the development of Internet technology, B / S architecture has become the mainstream form of various management systems. Although the system with this structure has many advantages, it also has certain security risks to a certain extent. This type of system uses a user name account and password or a verification login method combined with a page verification code. This login method It brings major hidden dangers to the security of the system. There are many illegal login incidents such as account numbers and passwords being stolen by others, causing huge hidden dangers of data information, especially for project management systems or bank online banking systems that involve major confidential project data. or important customer data management, the previous account password system login verification method may cause huge economic losses
Although many software vendors currently use the verification method of binding mobile phone numbers, there is still the risk of unauthorized logins. Therefore, a new login verification method is needed to completely solve the risk of unauthorized logins
[0003] Facial recognition technology has been used in functional fields such as access control systems, attendance systems, and mobile phone startups, and the capabilities of facial recognition technologies are also quite different. Most common facial recognition technologies are non-living body recognition technologies. When facial recognition is performed, only facial contours Points in the area are detected, and a photo of a face can often be fooled, or some live recognition technologies require the user to make several movement changes, and the user experience is not good. This type of recognition technology focuses on the points within the facial contour. Recognition analysis, or the common problem is that the point setting is less, and the point setting is unreasonable and other common problems, resulting in a high false result rate of facial recognition when using it
[0004] In addition, if you want to add the facial recognition verification function to a certain target system, you need to develop corresponding programs for each system before it can be realized, which wastes a lot of manpower and material resources. At present, it has not been seen that multiple B / S can be associated at the same time. Publicly reported or publicly used live facial recognition systems of other target systems of the structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A face recognition verification system and its association method with a target system
  • A face recognition verification system and its association method with a target system
  • A face recognition verification system and its association method with a target system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0041] Such as figure 1 Shown is the structural diagram of the face recognition verification system of the present invention.

[0042] The face recognition verification system includes a client program and a server system.

[0043] The server-side system includes a facial recognition management module and an association setting module, wherein the facial recognition management module includes a facial recognition analysis module, a facial recognition log, and a user information management module.

[0044] The server-side system and other target systems are installed on the same server. It is a system program based on the database structure. Through the user information management module of the server-side system, the open database technology (ODBC) is used to synchronize with the user information data of other target systems. , set the login...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for associating a face recognition verification system with a target system, comprising the following steps: calling user information data in the target system database, and synchronizing the user information data to the face recognition verification system; The domain name or IP address of the login website is associated with the target system; by entering the domain name or IP address of the login website, the login interface of the target system is started, and the user ID authentication is performed. After the user ID authentication is successful, the face recognition analysis of the face recognition verification system is started In the process, the login face is recognized and analyzed. If the face recognition is passed, the interface will jump to the operation interface after the target system is logged in. Otherwise, it will prompt that it cannot log in and exit. The present invention can be associated with B / S structure type management systems such as OA system and ERP system, significantly improves the security of login verification of existing management systems, and effectively solves risk problems such as cheating identification by methods such as static detection.

Description

technical field [0001] The invention relates to the field of image recognition and multi-system association fusion, in particular to a face recognition verification system and an association method with a target system. Background technique [0002] For existing management systems such as OA systems, ERP systems, and project management systems, there are B / S and C / S architectures. With the development of Internet technology, B / S architecture has become the mainstream form of various management systems. Although the system with this structure has many advantages, it also has certain security risks to a certain extent. This type of system uses a user name account and password or a verification login method combined with a page verification code. This login method It brings major hidden dangers to the security of the system. There are many illegal login incidents such as account numbers and passwords being stolen by others, causing huge hidden dangers of data information, espec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/32G06K9/00
CPCH04L63/0861G06F21/32G06V40/16
Inventor 黄玉新
Owner 黄玉新
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products