Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe system interaction operation method based on artificial intelligence

An artificial intelligence and interactive operation technology, applied in the field of system interaction, can solve problems such as high cost of use, data loss, some functions can only be used by senior managers, and some functions can only be used by middle-level managers, so as to ensure security, The effect of reducing usage costs

Pending Publication Date: 2022-03-29
GUIYANG SHIJIHENGTONG TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Basically, no matter it is an enterprise, a government agency, a social organization, etc., there will be application systems related to their own industries, but the current system operation mode basically stays in the traditional system interaction mode. The user opens the system website, selects the user name + password Or mobile phone SMS verification to log in to the system. After logging in, if the user temporarily leaves for something and forgets to close the system, it will leave an opportunity for others to take advantage of; another system often has many functions, and there are many users using this system. Some functions can only be used by senior management personnel, and some functions can only be used by mid-level management personnel. If the permissions are not set, data loss and theft will occur; and when the system is developed to a certain extent, there will be more and more functions. The traditional way of flipping pages to view and search is very unfriendly to users, and the cost of use is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe system interaction operation method based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0018] Such as figure 1 As shown, a safe system interactive operation method based on artificial intelligence includes the following steps:

[0019] (1) The system collects and stores the user's basic information, face information and voiceprint information, and opens an account for the user. The system sets function permissions for the user. The system uses H5 technology to open the local camera to collect the face, and passes through the iFLYTEK silent life detection API. The way to collect voiceprint information and set function permissions is as follows: set the function permissions that can be used by different users;

[0020] (2) The user logs into the system t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe system interaction operation method based on artificial intelligence, which comprises the following steps that: (1) a system acquires and stores basic information, face information and voiceprint information of a user and opens an account for the user, and the system sets a function permission for the user; (2) the user logs in the system through face recognition or voice recognition; (3) after the user logs in the system through face recognition, the function is clicked, the system recognizes the face and judges whether the face is the face information of the current login user or not, if yes, whether the user has the function operation authority or not is judged, if yes, a response is made, and if not, no use authority is prompted; (4) after the user logs in the system through voice recognition, the system judges whether the voice is matched with the voiceprint information of the current login user through a voice search function, if so, judges whether the user has a function operation authority, if so, responds, and if not, prompts that the user has no use authority; the method can ensure the safety of the system to the greatest extent.

Description

technical field [0001] The invention relates to system interaction, in particular to an artificial intelligence-based safe system interaction operation method. Background technique [0002] With the development of Internet + technology, more and more industries have become Internet-based, and more and more business processes have been transferred from offline to online, which naturally produced many online business systems. Basically, no matter it is an enterprise, a government agency, a social organization, etc., there will be application systems related to their own industries, but the current system operation mode basically stays in the traditional system interaction mode. The user opens the system website, selects the user name + password Or mobile phone SMS verification to log in to the system. After logging in, if the user temporarily leaves for something and forgets to close the system, it will leave an opportunity for others to take advantage of; another system often...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06Q10/10
CPCG06F21/32G06Q10/103
Inventor 杨兴海李超杨兴荣李建州李建新
Owner GUIYANG SHIJIHENGTONG TECH