Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection method for mobile application face recognition service

A face recognition and face application technology, applied in the field of information security, can solve problems such as the abuse of face recognition technology, lack of security measures, and insufficient security technical standards and usage specifications for face recognition technology, so as to reduce risks and ensure The effect of user rights

Pending Publication Date: 2022-01-07
上海蛮犀科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, while face recognition technology is developing rapidly and deepening into society, it has also brought us many security challenges. Information security risks caused by personal privacy data leakage and technology abuse need to be resolved urgently
The lack of network and data security guarantee mechanisms can easily lead to face data leakage. The current security technical standards and usage specifications for face recognition technology are not perfect. The responsibilities and obligations of face data controllers, the rights of face data subjects and the There is a lack of relevant regulations on the security measures that should be adopted in all aspects of data collection, storage, and processing
Most apps did not clearly inform and obtain user consent when collecting face data, and did not even explain the purpose, scope and method of using face recognition technology in the privacy policy, making the passive collection and use of face data the norm. Social entertainment apps and online education apps do not collect and use face data in accordance with relevant laws and regulations, resulting in frequent abuse of face recognition technology. However, face recognition services in many apps require users to register and After use, it will be triggered when related businesses are involved, such as remote financial account opening, card binding verification, account login, facial recognition attendance, facial recognition payment, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for mobile application face recognition service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] The present invention will be further described now in conjunction with accompanying drawing.

[0023] see figure 1 , the present invention provides a detection method for mobile application face recognition services, comprising the following steps:

[0024] S1: unpack the app file, and record the unpacked file as set A;

[0025] S2: Classify the data in set A, record the dex file as set B, and record the dynamic library file as set C;

[0026] S3: t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a detection method for a mobile application face recognition service. The method comprises the following steps: unpacking an app file to obtain files, classifying the files, and traversing a set dex file to obtain a class name and a function name; traversing all class names and comparing the class names with face recognition SDK data in preset data; judging file names of all the dynamic library files and comparing the file names with face recognition SDK data in preset data; installing and operating the app file, and traversing all pages in the application; judging whether face recognition related keywords exist in the page or not; judging whether a camera calling behavior exists in the page or not; and deduplicating the data obtained to confirm whether the application has a face recognition related service or not. Compared with the prior art, the invention comprises unpacking and extracting a file from a target App, and comparing a face recognition database, and traversing all pages to be associated with face recognition scene keywords, so that related information related to face recognition in the App is effectively obtained.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a detection method for a mobile application face recognition service. Background technique [0002] In recent years, with the rapid development of face recognition technology, "swiping face" has gradually become the main field of biometric technology application in the new era. Especially after entering 2017, face recognition has ushered in a blowout explosion. Faced with laws and regulations and certain business needs, Internet companies have launched account real-name authentication, and the face authentication link is included in related apps. realized in. [0003] However, while face recognition technology is developing rapidly and deepening into society, it has also brought us many security challenges. Information security risks caused by personal privacy data leakage and technology abuse need to be resolved urgently. The lack of network and data security guar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06F16/14G06F16/58
CPCG06F21/52G06F16/148G06F16/58
Inventor 张永锋龙柏林
Owner 上海蛮犀科技有限公司