Computer login verification system and method based on iris recognition technology

A login verification and iris recognition technology, which is applied in the field of login verification of the operating system, can solve problems such as easy cracking, impact, and hidden dangers of data security, and achieve the effect of ensuring legal validity, ensuring security, and improving security

Inactive Publication Date: 2014-10-08
中山市品匠电子科技有限公司
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, password verification has the following defects: (1) easy to be cracked; (2) easy to forget if not used for a long time
[0004] However, in the prior art, only the data of the iris itself is used as the identification standard, which causes some illegal users to have

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer login verification system and method based on iris recognition technology
  • Computer login verification system and method based on iris recognition technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] Before any embodiment of the present invention is described in detail, it should be understood that the application of the present invention is not limited to the details of construction, the mounting connections of components, etc. shown in the following description or drawings. The invention is capable of other embodiments and of being carried out or being carried out in various ways. Also, it is to be understood that the specific phraseology and terminology used herein to describe the principles and features of the present invention are not to be regarded as limiting. As used herein, "including", "comprising" and variations thereof are meant to include the items listed below and their equivalents and additions; the term "connected" and variations thereof are used broadly including, but not limited to, direct One or more of connection methods such as connection, induction or coupling in a way or indirectly , all other embodiments obtained by those of ordinary skill i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer login verification system based on an iris recognition technology. The system is composed of an iris information database, an iris acquisition unit, a body temperature sensor, a pulse sensor, a heart rate sensor, a high-sensitivity capacitance type human body contact sensor, an iris extracting unit, a login verification unit, a communication unit, a power source and a computer terminal device. It is guaranteed that the acquired iris information is legal and effective, the defect that an illegal user logs in a computer system through a simulated iris is avoided, safety of a computer operating system is enhanced, and meanwhile the embarrassment that the legal user cannot login the computer operating system because the user forgets the login password is avoided.

Description

technical field [0001] The present invention relates to a method for entering an operating system login verification, more specifically, to a computer login verification system and method based on iris recognition technology. Background technique [0002] With the development of the Internet age, it is becoming more and more important to conduct company business processing through computers. As a collection of system software that manages computer hardware resources, controls the operation of other programs, and provides users with an interactive operation interface, the operating system is the basis for computer operation. With the internationalization of the world economy and fierce competition, technical confidentiality is becoming more and more important. At present, in order to keep work information confidential, the operating system login verification of existing office computers is set to password verification. However, password verification has the following defect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 史玉桂庄子利
Owner 中山市品匠电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products