External terminal protection device and protection system including face information verification
A technology of face information and protective equipment, applied in internal/peripheral computer component protection, digital data authentication, etc., can solve problems such as lack of recognition ability, external protective equipment does not have privacy protection, and lack of security awareness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0029] According to a preferred embodiment of the present invention, the file monitoring module includes:
[0030] The identity information storage unit is used to temporarily store the face information of the user;
[0031] The identity recognition unit is used to verify whether the face information of the user satisfies the preset access authority.
[0032] According to a preferred embodiment of the present invention, the identity information storage unit is further used for pre-storing identity information of users satisfying access rights, and the identity information includes face information.
[0033] According to a preferred embodiment of the present invention, when the external interface is connected to an external device, the identity recognition unit combines the face information collected from the user with the person in the pre-stored user identity information that meets the access authority. Face information is matched, and if the match is successful, the user me...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


