Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face

A technology of encrypted storage and face recognition, which is applied in biometric recognition, character and pattern recognition, instruments, etc., can solve the problems of cracking, endangering system security, non-randomness and small length of passwords, etc., and achieves difficult memory, easy cracking and prevention The effect of falsification

Inactive Publication Date: 2016-07-13
深圳泰首智能技术有限公司
View PDF10 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to its non-randomness and small length, passwords are often easily cracked by attackers, thus endangering the security of the system.
Therefore, some disadvantages exposed by the traditional encryption storage technology: First, the keyboard or mouse is required to enter the unlocking character password, the character password is a precise password, must be entered accurately, and can be used repeatedly
This input method is not only inconvenient, but also brings hidden dangers of leakage
Second, due to the need to manually input the password, the user must remember the password, which brings inconvenience to the user.
[0004] But, the recognition method of the current face image of this type of input, its production is the key that the face image is calculated, in actual use, it can be used by people to use face models or face photos and the like. feature to encrypt or decrypt, bringing counterfeit security risks to face recognition authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face
  • Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] See figure 1 and figure 2 , figure 1 and figure 2 Revealed is a method of unlocking encrypted storage space with facial recognition authentication, including:

[0051] Face registration steps

[0052] 11. Use a camera to collect video data; of course, the camera in this step can also be replaced by a high-speed camera (the same below);

[0053] 12. Detect the face image in the video from the collected video data; the technology to detect the face is the existing technology, mainly the pre-stored face image, and detect whether there are several main parts of the face for comparison Yes, if the comparison is successful, the face is detected, otherwise the face is not detected;

[0054] 13. Whether the face image is detected, if not, return to step 12, if yes, enter step 14;

[0055] 14. Human face detection;

[0056]15. Whether the human face is alive or not, within the predetermined time, if the physiological parts of the human face that can move are detected, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for recognizing, authenticating, unlocking and encrypting storage space by using a human face. The method comprises steps: 11, video data are acquired; 12, a human face image in the video is detected; 13, the human face image is detected; 14, human face vivo detection is carried out; 15, human face vivo judgment is carried out; 16, a human face feature value is extracted; 17, local replication storage is carried out on the human face feature value; the above steps from 11 to 17 are repeated, and the current human face feature value is generated; fuzzy matching processing is carried out on the current human face feature value and the local replication of the human face feature value; the matching result is judged, if the matching succeeds, the next step is carried out, or otherwise, the last step is carried out; a manager is announced to call a driving program for unlocking; and the process is over. Three difficult problems of difficult input, easy breaking and difficult remembering brought by a character key can be solved; and as the human face vivo image is used, the problem of fake and hidden safety dangers caused when a lawbreaker uses human face materials such as a model, a picture and a video for human face recognition and authentication can also be solved.

Description

technical field [0001] The invention relates to a method and device for unlocking an encrypted storage space by face recognition authentication. Background technique [0002] Traditional encrypted storage technology hides and locks part of the storage space of physical storage devices such as computer disks or USB flash drives. Unlocking requires a driver that matches the storage hardware. Since the matching relationship between the driver and the storage hardware is confidential, Therefore, it is impossible to unlock the hidden storage space without a matching driver. In order to realize the usability of the hidden storage space, it is necessary to activate and deactivate the driver through a password binding relationship. This kind of password binding is realized as follows: provide management software, use the keyboard and mouse to input character passwords in the management software, and the management software reads the copy of the password stored somewhere, and compar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06V40/172G06V40/45
Inventor 秦玉杰操轶杨文胡船歌程建波夏建军胡盼
Owner 深圳泰首智能技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products