Unlock instant, AI-driven research and patent intelligence for your innovation.

Stereoscopic warehouse monitoring system and user identity authentication and operation tracing method thereof

A user identity authentication and monitoring system technology, which is applied to the three-dimensional library monitoring system and its user identity authentication and operation traceability fields, can solve the problems of system danger, poor traceability, and inability to trace back to operators, and achieve strong traceability, The effect of high safety

Pending Publication Date: 2022-03-01
安歌软件(嘉兴)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The security of the traditional user login verification function is relatively weak, and the traceability is also relatively poor. When the user has not logged out of the account after login and the account login time is still valid, the user leaves the work station, and other personnel other than the account operate, follow-up traceability can only find out what operations occurred on the user account, but cannot be traced back to the actual operator
Moreover, if the password is still a weak password, once the password is cracked, the system will be very dangerous. Now a three-dimensional library monitoring system and its user identity authentication and operation traceability method are proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stereoscopic warehouse monitoring system and user identity authentication and operation tracing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] refer to figure 1 , the implementation of this method includes the following steps:

[0054] Step 1: Define user portrait database and operation log database;

[0055] Step 2: Register the user, the system collects the user's facial image through the camera and stores it in the portrait database;

[0056] The third step: the user starts to use the keyboard and mouse to operate the three-dimensional library monitoring system;

[0057] Step 4: When the three-dimensional library monitoring system intercepts the operation event, it triggers the judgment of the user authentication module, and the monitoring system adjusts the camera to start face recognition;

[0058] The fifth step: judge whether the authentication of the user authentication module is passed, if it is passed, go to the sixth step, otherwise go to the tenth step;

[0059] Step 6: Read the user profile related to the latest recognized face;

[0060] Step 7: Continue to execute the operation event of the thr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a stereoscopic warehouse monitoring system and a user identity authentication and operation tracing method thereof. The system comprises a database establishing module, a user identity authentication module and an operation log recording module. The database establishment module is used for collecting face photos of a user and establishing a portrait database of the user; the user identity authentication module is used for performing face recognition according to an established portrait database when operating the stereoscopic library monitoring system, judging whether an operator is an authorized user or not, allowing the system to operate only when the operator is the authorized user, and taking an image of the operator as evidence at the same time; and the log recording module is used for recording all operation events and operation time of the user to a database for subsequent tracing. The method provided by the invention solves the problem that the actual operator is difficult to trace after the traditional stereoscopic warehouse monitoring system is operated by other personnel when the account does not exit after the user operates and the login time is still in the valid period.

Description

【Technical field】 [0001] The invention relates to the technical field of automatic three-dimensional warehouse management, in particular to a three-dimensional warehouse monitoring system and its user identity authentication and operation tracing method. 【Background technique】 [0002] The security of the traditional user login verification function is relatively weak, and the traceability is also relatively poor. When the user has not logged out of the account after login and the account login time is still valid, the user leaves the work station, and other personnel other than the account operate, follow-up traceability At this time, you can only find out what operations have occurred on the user account, but cannot be traced back to the actual operator. Moreover, if the password is still weak, once the password is cracked, the system will be very dangerous. A three-dimensional warehouse monitoring system and its user identity authentication and operation traceability meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0861H04L9/3231
Inventor 姜跃君田晓聪
Owner 安歌软件(嘉兴)有限公司