Safe login verification method through facial recognition in Linux operation system

A technology for operating system and login verification, applied in the direction of digital data authentication, etc., can solve problems such as impact, easy to be cracked, hidden dangers of user data security, etc., to achieve the effect of ensuring security, ensuring legal validity, and improving security

Inactive Publication Date: 2014-10-08
ZHONGSHAN YIZHAN DECORATION ENGINEERING CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, password verification has the following defects: (1) easy to be cracked; (2) easy to forget if not used for a long time
[0004] However, in the prior art, only the data of the facial image itself is used as the identification standard, which makes some illegal users have an impact on the facial image recognition in the prior art by forging false facial image models, simulated facial images and other fraudulent means. User data security brings hidden dangers, therefore, it is imminent to improve the timeliness and anti-counterfeiting of facial image recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe login verification method through facial recognition in Linux operation system
  • Safe login verification method through facial recognition in Linux operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Before any embodiment of the present invention is described in detail, it should be understood that the application of the present invention is not limited to the details of the structure and the installation and connection of components, etc. shown in the following description or drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. At the same time, it should be understood that the specific terms and terms used herein to describe the principles and features of the present invention should not be regarded as limiting. As used herein, "comprising", "comprising" and its variants mean including the items listed below and their equivalents and additional items; the term "connected" and its variants are used broadly, including but not limited to directly One or more of the connection methods such as connection, induction or coupling, etc. in an indirect or indirect manner, in addition, "connection" or "coupli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe login verification method through facial recognition in a Linux operation system. The method is achieved through a facial image information database, a facial image collection unit, a body temperature sensor, a pulse sensor, a heart rate sensor, a high-sensitivity capacitance type human-body touch sensor, a facial image extraction unit, a login verification unit, a communication unit, a power supply and a computer terminal device. By means of the method, legal validity of the collected facial image information is guaranteed, the defect that an illegal user logins a computer system by using an emulated facial image is overcome, security of a computer operation system is enhanced, and the embarrassment that a legal user cannot login the computer operation system because the login password is forgotten is avoided as well.

Description

technical field [0001] The invention relates to a method for logging in to an operating system, more specifically, to a method for using face recognition in a Linux operating system to log in securely. Background technique [0002] With the development of the Internet age, it is becoming more and more important to conduct company business processing through computers. As a collection of system software that manages computer hardware resources, controls the operation of other programs, and provides users with an interactive operation interface, the operating system is the basis for computer operation. With the internationalization of the world economy and fierce competition, technical confidentiality is becoming more and more important. At present, in order to keep work information confidential, the operating system login verification of existing office computers is set to password verification. However, password verification has the following defects: (1) it is easy to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 庄可军
Owner ZHONGSHAN YIZHAN DECORATION ENGINEERING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products