澳门百丽宫官方投注网

> 面试 > 面试热点 > 社会 > Your present position: Home > Interview > Interview Hotspot > Social >

Interview Hotspots: How to Ensure Personal Information Security

2019-12-24 09:12:08 | Source: CCP Education Yu Changchun

[Hot background]

With the commercial application of face recognition technology, more and more fields have begun to use face verification, face brush payment and other methods for security protection. As a mature technology for biometrics, face brushing technology can improve recognition efficiency and reduce operating costs. It has a wide range of application scenarios, and the market space in the future is very large. However, compared to single biometrics such as fingerprints, irises, and voiceprints, face recognition is aimed at overall biometrics. The user's facial features need to be collected, which involves information from multiple sensitive parts. Once the risk of leakage occurs, it will cause unpredictable losses to users, and it is a cause for concern. Not long ago, a “explosive” AI face-changing app had low operating technology thresholds, collecting personal biometric information such as faces without the user ’s explicit consent, unclear personal information processing rules, excessive claims for portrait rights, copyright infringement, and data leakage Or risk of abuse, causing user panic and public criticism, and eventually being removed from the shelves under regulatory pressure.

In addition, face recognition technology has the risk of being cracked. For example, Fengchao smart express cabinet's face brush pickup system was cracked by primary school students with printed photos; a university face recognition access control was tricked by students with teacher photos; the sixth session At the World Internet Conference, security manufacturers demonstrated the use of artificial intelligence for face replacement technology, which can generate 3D face models in 10 seconds, easily deceived face recognition, etc., all highlighting the controllability of face recognition technology.

It should be noted that the current face brushing technology is not only used for identity verification, but also bundled with electronic payment functions provided by some applications. This means that once the user's face information is leaked, it may cause economic loss. Obviously, if the security problem cannot be effectively solved, face recognition technology will inevitably be resisted by the majority of users and cannot be widely used.

[Simulation test questions]

With the advancement of science and technology, the era of face-brushing is screaming. High-tech such as face-logging, face-drawing, and face-paying are gradually coming into people's lives. However, some people worry about its safety. Tell us what you think of the era of brushing your face.

[Chinese public analysis]

The coming of the face-brushing era is the product of technological progress and social development. However, the current face-brushing technology is not yet mature enough, and indeed there are certain security risks. We must face this new era objectively and rationally.

The advent of the brush face era marks the advancement of science and technology and the development of society on the one hand, and on the other hand, it has provided great convenience for public travel and online work. In addition, it also provides an important technical support for the government's social management, which is conducive to optimal management, such as an online ID card authentication system

However, we must also see that there are still some security risks in face brushing technology, which may lead to information leakage and affect account security; it may affect the efficiency of special groups in conducting business. For example, elderly people may not use brushing technology.

The reasons for these problems are inseparable from their immaturity as a new thing: (1) the technology is immature, and there are still many leaks, which are far from the accuracy of biometrics such as fingerprints and are easy to produce. Potential safety hazards; (2) technical instability, people's faces will change due to factors such as heavy makeup, allergies, injuries, cosmetic procedures, and even different shooting angles will affect recognition, which will cause the accuracy of face recognition to drop significantly; (3) Facial information is easy to leak, which brings opportunities for criminals.

In the future, if we want to make face brushing technology truly serve the times, I think we need the joint efforts of all parties.

First of all, users must increase their awareness of security, and be careful when brushing their faces in social and Internet scenes, especially not using their faces as "keys" for key information.

Second, manufacturers should improve security measures. When applying face recognition technology, they cannot use the face as the only credential, but must use it in combination with traditional verification methods such as short messages, verification codes, and mobile phone numbers.

Thirdly, at the technical level, relevant technical departments should improve the level of research and development, improve the accuracy of recognition, identify key information on faces, and improve the safety factor.

Finally, there must be corresponding guarantees, perfect related laws and regulations, severely crack down on illegal acts, and protect the privacy and safety of users from the institutional level.

Source: Guangming.com: "The First Case of Chinese Face Recognition" Helps Standardize Brushing Techniques

Note: The manuscripts of this site may not be reprinted without permission. Please retain the source and source file address for reprinting.
(Responsible editor: Li Qian)

Recommended course

Disclaimer: The test questions provided by this site are all provided by netizens or collected by the Internet. They are edited by this site and are for personal research, communication and study use only, and do not involve commercial profit. If it involves copyright issues, please contact the administrator of this site to change or delete it.

Exam Preparation Tools
books