Network login system and method with face authentication

A network login and network system technology, applied in user identity/authority verification, instrument, character and pattern recognition, etc., can solve the problems of password theft, poor security performance, inability to accurately confirm the real identity of network users, etc. The effect of embezzlement and security improvement

Inactive Publication Date: 2008-05-07
SHANGHAI ISVISION INTELLIGENT RECOGNITION TECH
View PDF0 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, network users usually log in through a password, which has poor security performance. If a network user conducts illegal transmission, it is often difficult to determine the real identity of the network user
[0003] Furthermore, when the network user forgets the password, there are two ways to retrieve the pass

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network login system and method with face authentication
  • Network login system and method with face authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] see figure 1 , the network login system with face authentication of the present invention at least includes: a feature information database, a login mode selection module, a collection module, a verification module and a password retrieval module.

[0015] The characteristic information database is used to store the characteristic information including face information submitted by the user when registering in the network system. For example, when the user registers in the QQ chat system or the MSN system, his own photo is extracted through the facial feature extraction algorithm. extract its face information, and store the face information and the set login password in the feature information database, wherein the feature information database can be set on the user's local machine for the user to manage, In order to avoid the management of many user identity information by network system administrators, it can also improve the security of network user identities. In ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network landing system with face identification and a landing method; the feature information which is submitted when a user registers on the network system and comprises the face information is memorized, when the user lands again, the corresponding validation is implemented according to the selected landing pattern, e.g. when user selects the pattern of face identification for landing, the face information of user is collected in real time to be compared with the one which is submitted when the user registers; in this way the real ID of the network user can be confirmed and the user code can be prevented from being stolen, the loss of the user ID can be prevented; at the same time, because the submitted face information in registration can be memorized locally, the network user can manage the landing ID, so the security of the user ID is promoted.

Description

technical field [0001] The invention relates to a network login system and a login method with face authentication. Background technique [0002] At present, network users usually log in through a password method, which has poor security performance. If a network user conducts illegal transmission, it is often difficult to determine the real identity of the network user. [0003] Furthermore, when the network user forgets the password, there are two ways to retrieve the password: one is to retrieve the password through the pre-set password retrieval question, and the network user often forgets the password and is difficult to remember clearly. The answer to the password recovery question; the other is to find the corresponding system administrator by phone and unlock the password. Steal passwords. [0004] Therefore, how to solve the security problem of existing users logging into the network system has become an urgent technical issue for those skilled in the art. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00
Inventor 毛丽
Owner SHANGHAI ISVISION INTELLIGENT RECOGNITION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products