Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Technology and method for guaranteeing authenticity of network learning by applying face recognition

A technology for network learning and face application, applied in data processing applications, biometric recognition, character and pattern recognition, etc. The effect of manual comparison and inspection, good user experience, and enhanced confidentiality

Pending Publication Date: 2022-07-19
深圳市筑恒教育科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above-mentioned prior art has the following defects: 1. There is a lack of monitoring means for students to personally participate in learning under the network environment. Students only need to inform others of their account numbers and passwords, or give their mobile phones to others, and then others can complete online learning instead of students. , the authenticity of learning behavior cannot be guaranteed, and the phenomenon of acting as a substitute cannot be fundamentally eliminated, and it is difficult to achieve the expected purpose and effect of using the network to carry out learning; Confidentiality of important and secret documents; 3. Record files cannot be automatically generated, which is not conducive to manual comparison and inspection in the later stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Technology and method for guaranteeing authenticity of network learning by applying face recognition
  • Technology and method for guaranteeing authenticity of network learning by applying face recognition
  • Technology and method for guaranteeing authenticity of network learning by applying face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the technical means, creative features, achievement goals and effects realized by the present invention easy to understand, the present invention will be further described below with reference to the specific embodiments.

[0026] In the description of the present invention, it should be noted that the terms "upper", "lower", "inner", "outer", "front end", "rear end", "two ends", "one end" and "the other end" The orientation or positional relationship indicated by etc. is based on the orientation or positional relationship shown in the accompanying drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the indicated device or element must have a specific orientation, with a specific orientation. The orientation configuration and operation are therefore not to be construed as limitations of the present invention. Furthermore, the terms "first" and "second" are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a technology and a method for guaranteeing the authenticity of network learning by applying face recognition, relates to the field of artificial intelligence and Internet, and provides a technology and a method for guaranteeing the authenticity of network learning by applying face recognition. Learning monitoring in learning: monitoring by selecting one or more of a real-time verification monitoring strategy, a timing verification monitoring strategy, a random verification monitoring strategy and a secret document learning monitoring strategy, and automatically producing a learning record file: combining data collected in a learning process according to rules to generate the learning record file. According to the invention, the face recognition verification technology is applied before learning, during learning and after learning, so that the phenomena of learning by others, idle learning hour and the like are effectively prevented; the confidential document learning monitoring strategy can solve the confidentiality problem of learning important and secret files in a network mode; in addition, by automatically generating an electronic edition learning record file, later manual comparison and inspection are also facilitated.

Description

technical field [0001] The invention relates to the fields of artificial intelligence and the Internet, in particular to a technology and method for applying face recognition to ensure the authenticity of network learning. Background technique [0002] Face recognition technology is a relatively mature human biometric identification technology, which has been widely used in human body identity verification in the fields of payment, access control, monitoring, etc. In the present invention, this technology is effectively combined with network learning, which is a Techniques for monitoring student learning in a remote network environment. The existing prior art closest to the present invention at present: Method 1: Send a dynamic verification code to the student's mobile phone, and the student can start or continue learning only after the student has correctly entered the received verification code. Method 2: The dynamic code verification window for letters, numbers, and pict...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06V40/16G06V40/40G06V10/25G06F21/32G06Q50/20
CPCG06F21/32G06Q50/205
Inventor 杨智勇
Owner 深圳市筑恒教育科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products