Stereoscopic warehouse monitoring system and user identity authentication and operation tracing method thereof
A user identity authentication and monitoring system technology, which is applied to the three-dimensional library monitoring system and its user identity authentication and operation traceability fields, can solve the problems of system danger, poor traceability, and inability to trace back to operators, and achieve strong traceability, The effect of high safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] refer to figure 1 , the implementation of this method includes the following steps:
[0054] Step 1: Define user portrait database and operation log database;
[0055] Step 2: Register the user, the system collects the user's facial image through the camera and stores it in the portrait database;
[0056] The third step: the user starts to use the keyboard and mouse to operate the three-dimensional library monitoring system;
[0057] Step 4: When the three-dimensional library monitoring system intercepts the operation event, it triggers the judgment of the user authentication module, and the monitoring system adjusts the camera to start face recognition;
[0058] The fifth step: judge whether the authentication of the user authentication module is passed, if it is passed, go to the sixth step, otherwise go to the tenth step;
[0059] Step 6: Read the user profile related to the latest recognized face;
[0060] Step 7: Continue to execute the operation event of the thr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
