Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security login guarantee system

A computer security, computer technology, applied in computing, image data processing, instruments, etc., can solve problems such as information leakage, inability to log in securely, passwords easily stolen, etc., to improve identification accuracy, improve information security, and reduce errors. the effect of the situation

Inactive Publication Date: 2018-11-20
CHANGZHOU UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increasing functions of mobile phones, the computer may no longer be a carry-on item. Sometimes it is necessary to lend the computer to other people, or the computer is placed in the office or at home, and the computer owner is out and needs some information in the computer urgently. Help open the computer to obtain the required information, or the computer is placed out of sight of the computer owner, and the computer owner cannot know whether someone has used his computer, thus bringing computer security risks
[0003] At present, most of the guarantee systems for computer security login log in to the computer through simple password login, fingerprint login, etc., but both password login and fingerprint identification login have their drawbacks. For password login, the password is easy to be stolen. Password leakage will directly lead to information leakage. For fingerprint identification login, on the one hand, fingerprints are easy to be destroyed unintentionally, resulting in insecure login. On the other hand, fingerprints are easy to be printed on the surface of glass, plasticine, etc. At present, when logging into the computer, the computer will send a verification code to the associated user's mobile phone, and the user needs to provide the verification code before logging in. However, the user cannot know who is logging into his computer at this time, so he cannot Determine whether to provide verification codes, and to whom

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security login guarantee system
  • Computer security login guarantee system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The computer security login protection system provided by the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0035] Such as figure 1 As shown, the computer security login guarantee system provided by the present invention includes a central processing device (1), a password input unit (2), a password checker (3), an image acquisition module (4), an image processing module (5), an operating system (6), alarm device (7), wireless transmission device (8), user mobile phone (9), computer monitor (10) and computer memory (11);

[0036] Wherein, the output end of the password checker (3) and the output end of the image processing module (5) are connected to the input end of the central processing unit (1), the input end of the operating system (6) and the input end of the alarm device (7) terminal, the input terminal of the computer monitor (10) and the input terminal of the computer memory (11) are all co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer security login guarantee system. The computer security login guarantee system adopts a central processing device, a password input unit, a password checker, an imagecollection module, an image processing module, an operating system, an alarm device, a wireless transmission device, a user mobile phone, a computer display and a computer memory, a computer owner canauthorize a computer user to use a computer through the mobile phone and can also obtain face image information of the personnel logging in the computer so as to know who is using the computer, and can also know who logs in / attempts to log in the computer at what time through the computer memory, so that the information security of the computer is greatly improved, wherein the image processing module performs image denoising, image enhancement, image sharpening and image smoothing on collected images in turn to collect the image information of the image collection module efficiently and quickly, and the recognition accuracy of the face of the personnel logging in the computer can be improved to effectively reduce the occurrence of misjudgments.

Description

technical field [0001] The invention relates to the technical field of intelligent monitoring, in particular to a computer security login guarantee system. Background technique [0002] With the increasing functions of mobile phones, the computer may no longer be a carry-on item. Sometimes it is necessary to lend the computer to other people, or the computer is placed in the office or at home, and the computer owner is out and needs some information in the computer urgently. Help to open the computer to obtain the required information, or the computer is placed out of sight of the computer owner, and the computer owner cannot know whether someone has used his computer, thus bringing computer security risks. [0003] At present, most of the guarantee systems for computer security login log in to the computer through simple password login, fingerprint login, etc., but both password login and fingerprint identification login have their disadvantages. For password login, the pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06T5/00
CPCG06F21/32G06T5/73G06T5/70
Inventor 朱轮翟羽佳马庆功王峰汤建华
Owner CHANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products