Method, apparatus, and computer-readable recording medium for authenticating a user

A technology for authenticating users and storage devices, applied in computer components, calculations, digital data authentication, etc., can solve problems such as authentication failure of the same registered user, and achieve the effect of overcoming security loopholes

Inactive Publication Date: 2014-11-26
INTEL CORP
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, even if a face image of a registered user (for example, having an image registered in a storage device) is scanned, it is possible that authentication for the same registered user may fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus, and computer-readable recording medium for authenticating a user
  • Method, apparatus, and computer-readable recording medium for authenticating a user
  • Method, apparatus, and computer-readable recording medium for authenticating a user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present disclosure has been described in detail with reference to the accompanying drawings relating to specific embodiments in which the present disclosure can be implemented. The embodiments are described in detail to enable those of ordinary skill in the art to practice the present disclosure. It should be understood that the various embodiments of the present disclosure differ from each other, but are not necessarily mutually exclusive. For example, specific shapes, structures and characteristics described herein with respect to an embodiment may be implemented in another embodiment without departing from the spirit and scope of the present disclosure. It should be noted that the location and arrangement of each element within each disclosed embodiment may be modified without departing from the spirit and scope of the disclosure. Therefore, the following detailed description should not be construed as limiting the present disclosure. The scope of the present d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are a method, apparatus, and computer-readable recording medium for authenticating a user. The user authentication method includes obtaining an image including a face and a face movement by driving a camera to extract feature information on a facial image and a movement pattern from the obtained image, and comparing the extracted feature information on the facial image with feature information on a facial image registered in a storage and, when the extracted feature information matches the registered feature information, comparing the extracted movement pattern with a movement pattern registered in the storage and, when the extracted movement pattern matches the registered movement pattern, unlocking a device.

Description

technical field [0001] The present disclosure relates to a method, apparatus, and computer-readable recording medium for authenticating a user. In this disclosure, because the device is unlocked by recognizing facial movements (eg, the number of blinks, the direction of head rotation, etc.), it is possible to prevent The device is unlocked using a facial image not captured. Background technique [0002] Biometrics is a technique for identifying different physical characteristics of a person (eg, fingerprints, face shape, iris of eyes, etc.), which can be used to authorize certain access, eg, to a device. Unlike keys or passwords, physical characteristics cannot be stolen or copied and are not at risk of being altered or lost. Therefore, physical characteristics can be exploited in the security field. [0003] In the field of biometrics, face recognition technology includes a technology of detecting a face area from a video or photo image and recognizing a face included in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/00
CPCG06F21/32G06K9/00335G06V40/20H04L63/0853H04L63/0861G06F2221/2103G06F2221/2105G06F2221/2117G06F2221/2147G06V40/171G06V40/172G06V40/45G06V10/40
Inventor 金大成千智姬
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products