KR20170039518A - Apparatus and method for controlling use of electronic device using fake face detection - Google Patents

Apparatus and method for controlling use of electronic device using fake face detection Download PDF

Info

Publication number
KR20170039518A
KR20170039518A KR1020150138758A KR20150138758A KR20170039518A KR 20170039518 A KR20170039518 A KR 20170039518A KR 1020150138758 A KR1020150138758 A KR 1020150138758A KR 20150138758 A KR20150138758 A KR 20150138758A KR 20170039518 A KR20170039518 A KR 20170039518A
Authority
KR
South Korea
Prior art keywords
face
user
electronic device
camera
face authentication
Prior art date
Application number
KR1020150138758A
Other languages
Korean (ko)
Inventor
이일용
한종우
Original Assignee
엘지전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 엘지전자 주식회사 filed Critical 엘지전자 주식회사
Priority to KR1020150138758A priority Critical patent/KR20170039518A/en
Publication of KR20170039518A publication Critical patent/KR20170039518A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06K9/00255
    • H04M1/72522
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation

Abstract

The present invention relates to an apparatus and method for controlling use of an electronic device for warning or limiting actual use of the electronic device by verifying a user authenticated through a fake face. The apparatus of the present invention comprises: a camera which photographs a user; a memory in which a face of at least one user is registered; a face recognition unit which processes an image photographed by the camera to recognize a face; and a control unit which compares the face recognized in the face recognition unit with the face registered in the memory to perform first face authentication to log-in to an initial screen. The control unit photographs a face of a user by occasionally operating the camera after logging in, and comparing the face authenticated during the log-in with a currently photographed face to perform second face authentication.

Description

TECHNICAL FIELD [0001] The present invention relates to an apparatus and a method for controlling use of an electronic device by detecting a facet phase,

The present invention relates to an apparatus and method for controlling use of an electronic device for verifying an authenticated user through a fake face to warn or limit the actual use of the electronic apparatus.

2. Description of the Related Art Recently, various types of user authentication methods have been proposed to improve the security of each electronic device with the increasing use of electronic devices capable of displaying and reproducing various types of contents and mobile devices such as smart phones.

The user authentication method includes a method of recognizing a slide pattern displayed on a screen when a user has a touch screen, a PIN method of inputting numbers, and a password input method of combining characters. In recent years, ) Authentication method is used.

Among them, face recognition technology is a technique of log-in to an electronic device (eg, a computer, a notebook, a mobile terminal and others) through facial recognition instead of inputting a password. Stored faces are compared with each other to permit user authentication for accessing the electronic device, that is, login.

However, the conventional face recognition technology mainly focuses on the login of the electronic device, and it is possible to restrict the use of the electronic device by verifying the fake user authenticated through the user's fake face (fake face) But does not care about the technology that controls it.

It is an object of the present invention to provide an apparatus and method for controlling usage of an electronic device that can continuously warn a fake user who has passed authentication through a facet and warn or block the use of the electronic device.

It is another object of the present invention to provide an apparatus for controlling use of an electronic device and a method thereof, which can continuously verify a fake user whose authentication has been passed through a facet, thereby restricting the use of some functions of the electronic apparatus.

According to another aspect of the present invention, there is provided an apparatus for controlling usage of an electronic device, including: a camera for capturing a user; a memory in which faces of at least one user are registered; A face recognition unit for recognizing a face by processing an image photographed by a camera; And a control unit comparing the face recognized by the face recognition unit and the face registered in the memory to perform a first face authentication and logging in as an initial screen, wherein the control unit operates the camera irregularly after logging in, The second face authentication is performed by comparing the face authenticated at the time of log-in with the face currently photographed.

According to an embodiment of the present invention, the electronic device may include a mobile or stationary electronic device having a display unit and entering the initial screen by login.

According to an embodiment of the present invention, the controller performs an additional function of warning the user when the second face authentication fails, and the attachable function can be performed through visual and auditory output and a combination thereof.

According to an embodiment of the present invention, the controller may perform the second face authentication by operating the camera when the user executes a specific application, or when a keyboard or a mouse key is input or when a touch is input.

According to an embodiment of the present invention, when the second face authentication fails, the controller may block the use of the electronic device or restrict the use of some functions of the electronic device.

According to an embodiment of the present invention, when the second face authentication fails, the controller can check the user and its security level, and restrict the execution of a predetermined application or an Internet game according to the current position and the security level of the user.

According to another aspect of the present invention, there is provided a method of controlling use of an electronic device, the method comprising: photographing a user by operating a camera when using the first electronic device; Recognizing a face in an image photographed by the camera; Comparing the recognized face with a face registered in the memory to perform first face authentication and logging in if authentication is successful; And performing a second face authentication by photographing a user's face by irregularly operating the camera after the login and comparing the face authenticated at the time of log-in with the face currently photographed.

According to an embodiment of the present invention, the method further comprises performing an additional function to warn the user when the second face authentication fails, wherein the additional function can be performed through visual and auditory output and a combination thereof .

According to an embodiment of the present invention, the second face authentication is performed when the user executes a specific application, or when a keyboard or a mouse key is input or a touch is inputted.

According to an embodiment of the present invention, there is provided a method of authenticating a user, comprising: immediately logging out if the second face authentication fails; 9. The method of claim 8, further comprising: restricting use of some functions of the electronic device when the second face authentication fails. .

According to an embodiment of the present invention, when the second face authentication fails, the user and the security level of the user can be checked to limit the execution of a predetermined application or an Internet game according to the current position and the security level of the user.

The present invention continuously verifies a user who has been authenticated through a facet, thereby blocking the use of the electronic device, thereby preventing a fake user who has passed the authentication from using the actual user's electronic device or blocking the access of the user's important information There is an effect that it is possible to effectively prevent a disadvantage of information security caused by the information security.

In addition, the present invention provides a method and system for continuously verifying a user who has passed an authentication through a facet and determining the level of use of the electronic device according to a user, thereby allowing use of general information or a program, The information access can be blocked.

BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a diagram showing an example of face authentication applied to a notebook in the present invention. Fig.
2 is a block diagram of a use control apparatus for an electronic apparatus according to an embodiment of the present invention;
3 is a flowchart illustrating a method of controlling use of an electronic device through the detection of a facet phase according to an embodiment of the present invention.
4 is an embodiment of an additional function that can be performed when the second face authentication fails in the present invention.
BACKGROUND OF THE INVENTION Field of the Invention [0001] The present invention relates to a method and apparatus for controlling use of an electronic device.
FIG. 6 illustrates an embodiment in which the use of the electronic device is restricted when the second face authentication fails in the present invention. FIG.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, wherein like or similar elements are denoted by the same reference numerals, and redundant description thereof will be omitted. The suffix "module" and " part "for the components used in the following description are given or mixed in consideration of ease of specification, and do not have their own meaning or role. In the following description of the embodiments of the present invention, a detailed description of related arts will be omitted when it is determined that the gist of the embodiments disclosed herein may be blurred. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. , ≪ / RTI > equivalents, and alternatives.

Terms including ordinals, such as first, second, etc., may be used to describe various elements, but the elements are not limited to these terms. The terms are used only for the purpose of distinguishing one component from another.

It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.

Also, the singular forms "a", "an", and "the" include plural referents unless the context clearly dictates otherwise.

In the present invention, the terms "comprising" or "having ", and the like, specify that the presence of a feature, a number, a step, an operation, an element, a component, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.

The conventional face recognition technique is mainly used for comparing and judging a forged face, more specifically, a blinking, a facial expression, and a 3D camera image to prevent a login. Nonetheless, it often happens that the user passes through a face-to-face (Fake face), for example, using high-resolution photos and videos.

Therefore, when the inventor of the present invention passes the authentication of the first user through the facet, the second user (eg, another user) unauthorizedly uses the first user's electronic device, 1 We have recognized problems such as missing important information or viewing confidential information. In addition, it is also possible that a parent user (eg, a PC, a notebook, etc.) using a facet face (a picture of a parent) without a first user , Smart Tab, and Macbook), and recognized the problem of surfing the Internet, playing games, and accessing adult sites at times that parents did not allow.

In view of the above problems, the inventor of the present invention has conducted a continuous verification for a user who has passed authentication (eg, login) through a fake face to block use of an actual user's electronic device And suggests ways to increase the reliability of information security by limiting access to information.

The user who has passed the face authentication in the present invention means a user who has passed the authentication using the photo or video of the first user when the first user is absent, And may include all the second users to use in the electronic apparatus of the first user while the user is idle for a while.

An electronic apparatus to which the present invention is applied includes both a fixed type and a movable type and includes at least one display such as a computer, a notebook, a mobile terminal, a smart phone, and the like, Appliances are targeted.

According to an embodiment of the present invention, the camera may be operated irregularly or intermittently to perform re-authentication by comparing a face that has been successfully authenticated at the first log-in with the current face.

According to an embodiment of the present invention, re-authentication can be performed when a specific application (banking or the like) is performed, or when a keyboard or a key of a mouse or a touch input is operated.

The present invention, in one embodiment, may use the re-authentication result to limit the use and available applications or content of the electronic device.

1 shows an example of face authentication applied to a notebook in the present invention.

Referring to FIG. 1, when a user registers his face through the face authentication program, a login window is displayed on the desktop 50 when the cover of the notebook is opened. The login window is provided with a character input window 52 through which a password can be inputted through the key input unit 51 and a button 53 which is a face that can use face authentication.

Accordingly, the user can set the user authentication method to face authentication by selecting the face-in button 53 by cursor movement or touch input in the login window. When the user authentication method is set to face authentication, the camera 100 installed in the upper center of the display unit 110 is automatically operated whenever the user closes the lid of the notebook and the face of the user is photographed to perform face authentication After successful authentication, login is performed.

2 is a block diagram showing a configuration of an apparatus for controlling usage of an electronic device according to an embodiment of the present invention. For convenience of description,

2, the use control device for an electronic device according to the present invention includes a camera 100, a face recognition unit 102, a control unit 104, a use restriction unit 106, a memory 108, (110).

The camera 100 is installed on the front surface of the electronic device, more specifically, on the top surface of the display unit 110, and captures an image of a user in front of the electronic device. The camera 100 may be a single camera, but is not limited thereto. The camera 100 may be a camera module when the camera 100 includes a plurality of cameras of different types. Such a camera 100 may be located at the left, right, center, or two or more positions of the top of the electronic device. When the camera is attached to two or more positions, the camera can constitute a camera module including different kinds of cameras.

The camera 100 may operate the camera irregularly or intermittently under the control of the control unit 104. When the specific application (banking or the like) is performed or the key input or touch input of the keyboard or mouse is detected And when a user's specific motion is detected.

The face recognition unit 104 extracts the face region of the user from the user image captured by the camera 100, and extracts the feature of the extracted face region. Here, the extraction of the face region of the user included in the user's image may be performed through any one of a method using brightness information, a method using motion information, a method using brightness and motion information at the same time, and a method using color information.

The controller 104 compares at least one user image previously stored in the face image of the user recognized by the face recognition 104 and performs user authentication. The control unit 104 performs login according to the result of user authentication, operates the camera 100 aperiodically after login, captures a face image of a user currently using the electronic device, and performs re-authentication.

 The usage restricting unit 106 limits the use of the electronic device or the execution of a specific application or the viewing of content according to a re-authentication result. The restriction is performed on the basis of a security level predetermined for each user stored in the memory 108 in advance.

The memory 108 stores an operating program for driving an electronic device, and stores applications and contents executable according to at least one user image for user authentication and a security level for each user.

The display unit 110 executes various applications, contents, and games executed by the user or displays results corresponding to commands inputted by the user through the key input unit 510. The display unit 110 displays a result The display unit 110 displays execution screen information of an application program running on the electronic device or UI (User Interface), GUI (Graphic User Interface), and the like, according to the execution screen information, The display unit 110 may be configured as a touch screen.

Although not shown in the drawings, the use control apparatus of an electronic device according to the present invention may further include a wireless communication section for communicating with a network or an external electronic device, and an audio output section for outputting sound. The use restricting unit 106 may be integrated into the control unit 104 and operated.

Hereinafter, an apparatus for controlling usage of an electronic device according to an embodiment of the present invention will be described with reference to the accompanying drawings.

3 is a flowchart illustrating a method of controlling usage of an electronic device through the detection of a facet phase according to the first embodiment of the present invention. In the first embodiment of the present invention, a notebook computer will be described as an example for convenience of explanation. The actual user of the electronic device is assumed to be the first user and the fake user is assumed to be the second user.

3, when the second user opens the cover of the notebook of the first user, the control unit 104 executes the window program to display the window login window on the desktop 50. FIG. In this state, when the second user presses the face-in button 53 (or automatically), the control unit 180 operates the camera 100 to photograph the second user who is currently watching the display unit 100. [

The face recognizing unit 104 extracts a feature of the face image from the image of the second user photographed by the camera 100 to perform face recognition and transmits the recognized face to the control unit 104. [ In this case, feature extraction from the face image of the second user is performed by extracting eigenvectors using a KL (Karhunen-Loeve) transform and characterizing the feature vectors, a method of extracting size information of direction information and gradient from an image, A method using an image, a method using a transformation, a method of extracting features of an image using a distance between an eye, a nose and a mouth, a method using a principal component analysis, and a method using a linear discriminant analysis .

The control unit 104 performs the first face authentication by comparing the face of the second user transmitted from the face recognition unit 104 with the face of the first user registered (S100, S110). If the second user causes the camera 100 to photograph a facet, that is, a photograph or a moving image of the first user, the first face authentication by the control unit 104 will succeed. The present invention assumes that the second user causes the camera 100 to take a photograph of the first user or a moving picture of the first user.

If it is determined that the first face authentication is successful, the control unit 104 displays the initial screen (main screen or home screen) on the display unit 110 by performing the window login (S120) Accesses the Internet using a notebook or accesses information stored by a first user.

When the second user uses the notebook of the first user, the control unit 104 periodically shoots the face of the second user by operating the camera (S130), recognizes the face from the photographed second user image, Two-face authentication is performed (S140, S150)). At this time, the control unit 104 performs the second face authentication by comparing the authenticated face (facet face) at the time of login with the face of the second user currently photographed. The photographed second user's face is stored in the memory 108.

The present invention operates the camera irregularly because the second user can know when the camera is operated regularly and the face is photographed. For example, when the camera is operated intermittently or when a specific application (Internet banking) is executed, the camera can be operated at the time of accessing the secret information (photograph, memo, SNS) or the keyboard or mouse key input.

As a result of the second face authentication, the authenticated face (facet face) stored in the memory 108 at the time of login is different from the face of the second user currently photographed, that is, it is confirmed that the user currently using the notebook is not the first user If the two-face authentication fails, the control unit 104 outputs a control signal to the use restriction unit 106 to perform an additional function for restricting use of the electronic device. The additional function may include the use of an electronic device, the execution of a specific application, or the restriction of viewing the content. In particular, when the use restriction unit 106 is not separately provided, the direct control unit 104 can perform the additional function. The additionally includes visual and / or audible warning, logout.

On the other hand, if the face authenticated at the login and the face of the second user currently photographed are the same and the second face authentication is successful, the control unit 104 allows the second user to continue using the notebook at step S170.

4 is an embodiment of an additional function that can be performed when the second face authentication fails in the present invention.

4 shows an example of darkening the screen and outputting a warning in the first method of the additional function when the second face authentication fails. The warning is performed through visual and auditory output and a combination thereof. A visual warning can display a warning message, and an audible warning can include a warning sound and a warning message stored in advance.

When the audible warning is output, the use control device of the electronic device according to the present invention may include an audio output unit (not shown).

The additional function may be transmitted to a smart device (smart phone, wearable device) possessed by the first user. In this case, the use control device of the electronic device according to the present invention may include a wireless communication unit. The wireless communication unit may include a mobile communication module for transmitting and receiving a wireless signal in a mobile communication network, a wireless communication module for wireless Internet access, and a short-range communication module for performing short-range communication.

The warning may be generated for a predetermined time, and if the second face authentication again performed after a lapse of a predetermined time fails again, the control unit 104 or the usage restricting unit 106 immediately logs out the window without warning.

In another embodiment, the present invention may perform logout immediately without warning if the second face authentication fails.

5 is a flowchart illustrating a method for controlling use of an electronic device through the detection of a facet phase according to a second embodiment of the present invention. In the second embodiment of the present invention, a notebook is taken as an example for convenience of explanation, and the actual user of the electronic device is assumed to be the first user and the fake user is assumed to be the second user.

5, when the second user presses the face-in button 53 (or automatically) while the window login window is displayed on the desktop 50, the controller 180 operates the camera 100 The second user who is currently viewing the display unit 100 is photographed. The photographed second user's face is stored in the memory 108.

The face recognizing unit 104 recognizes a face from the image of the second user photographed by the camera 100, and transmits the recognized face to the control unit 104. In this case, feature extraction from the face image of the second user is performed by extracting eigenvectors using a KL (Karhunen-Loeve) transform and characterizing the feature vectors, a method of extracting size information of direction information and gradient from an image, A method using an image, a method using a transformation, a method of extracting features of an image using a distance between an eye, a nose and a mouth, a method using a principal component analysis, and a method using a linear discriminant analysis .

The control unit 104 compares the face of the second user transmitted from the face recognition unit 104 with the face of the first user registered in step S200 to perform the first face authentication (S200, S210). If the second user causes the camera 100 to photograph a facet, that is, a photograph or a moving image of the first user, the first face authentication by the control unit 104 will succeed. In this case, it can be considered that the child (the second user) logs in to the parent's notebook or the home computer while the parent (first user) is not at home.

In the present invention, it is assumed that a second user causes the camera 100 to capture a fake face, that is, a photograph or a moving picture of a first user (parent). In this case, the first face authentication can succeed. On the other hand, when the parent (first user) is at home, the child may use the above-mentioned logged-in parent's notebook while the parent is not registered for a while after signing in through face authentication. Both of the above-mentioned two users (child) become ready to use the notebook of the first user (parent).

If the first face authentication is successful, the control unit 104 performs a window login to display an initial screen (main screen or home screen) on the display unit 110 (S220), and the second user uses the first user's notebook To access the Internet or to access information stored by the first user.

When the second user uses the first user's notebook, the control unit 104 periodically photographs the face of the second user by operating the camera (S230), recognizes the face from the photographed second user image, Two-face authentication is performed (S240, S250)). At this time, the control unit 104 performs the second face authentication by comparing the authenticated face (facet face) at the time of login with the face of the second user currently photographed.

As a result of the second face authentication, when the authenticated face (face face) at the time of login is different from the face of the second user currently photographed, that is, when the user currently using the notebook is determined not to be the first user and the second face authentication fails , The control unit 104 confirms the current user and confirms the current position.

For this purpose, the apparatus for controlling usage of electronic devices according to the present invention may include a location information module capable of measuring the current position of a user, and may set a security level for each family, relatives, and colleagues in the memory 108, You can specify acceptable applications or content by level. For example, if the current position is a home, the second user is a child, the security level is 1, the allowable program is a document creation program for homework, and the unacceptable program may include a game, have. In particular, when the program is set as a program allowing a game or an Internet connection, the usage time can be set to a limited time, for example, one hour. In another example, if the current location is the workplace and the second user is a colleague, the security level is 2, the acceptable program is the Internet, the document creation program, and the unacceptable program may include photos and important documents.

Accordingly, the control unit 104 outputs a control signal to the use restriction unit 106 directly or according to the location and security level of the second user to limit the use of some functions of the electronic device (S270). On the other hand, if the face authenticated at the login is the same as the face of the second user currently photographed and the second face authentication is successful, the control unit 104 continues to use the notebook by the second user (S280).

FIG. 6 is an embodiment for notifying that the use of the electronic device is restricted when the second face authentication fails in the present invention.

As described above, as a result of the second face authentication, the face authenticated at the time of login (facet face) is different from the face of the second user currently photographed, that is, the user currently using the notebook is determined not to be the first user, If the face authentication fails, the control unit 104 or the usage restricting unit 106 checks whether the current user is the current user and confirms the current position, restricts the use of some functions of the electronic device, And informs the unit 110 of the currently limited function.

Although the present invention has been described taking an example of a notebook as an electronic device for convenience of explanation, the present invention is not limited thereto. The present invention is equally applied to all electronic devices including a display unit and performing face authentication through the display unit It is obvious.

As described above, according to the present invention, the user who has passed the authentication through the facet is continuously verified to block or limit the use of the electronic device, so that the fake user, which has passed the conventional authentication, It is possible to effectively prevent the disadvantages of information security caused by not blocking the important information access of the user.

The present invention also provides a method and system for continuously verifying the use of an electronic device by a user authenticated via a facet or an authenticated user during a short absence, It is possible to use the general information or the program by determining and executing the information that should not be allowed, but it is advantageous in that the security of the electronic device can be further strengthened by blocking access to information to important information or harmful information or program.

The present invention described above can be embodied as computer-readable codes on a medium on which a program is recorded. The computer readable medium includes all kinds of recording devices in which data that can be read by a computer system is stored. Examples of the computer readable medium include a hard disk drive (HDD), a solid state disk (SSD), a silicon disk drive (SDD), a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, , And may also be implemented in the form of a carrier wave (e.g., transmission over the Internet). Also, the computer may include a control unit 180 of the terminal. Accordingly, the above description should not be construed in a limiting sense in all respects and should be considered illustrative. The scope of the present invention should be determined by rational interpretation of the appended claims, and all changes within the scope of equivalents of the present invention are included in the scope of the present invention.

50: desktop 51: key input unit
52: Text input window 53: Face in button
100: camera 102: face recognition unit
104: control unit 106: use restriction unit
108: memory 110: display unit

Claims (13)

A camera for photographing a user,
A memory in which at least one user's face is registered;
A face recognition unit for recognizing a face by processing an image photographed by a camera; And
And a controller for comparing the face recognized by the face recognition unit and the face registered in the memory to perform the first face authentication and log in as an initial screen,
The control unit
Wherein the second face authentication is performed by photographing a user's face by operating the camera irregularly after logging in and comparing the face authenticated at the time of log-in with the face currently photographed.
The electronic device according to claim 1, wherein the electronic device
And a portable or stationary electronic device having a display unit and entering an initial screen by log-in.
The apparatus of claim 1, wherein the control unit
Performs an additional function of warning the user if the second face authentication fails,
Wherein said attachability is achieved through visual and auditory output and combinations thereof.
The apparatus of claim 1, wherein the control unit
Wherein the second face authentication is performed by the user by operating the camera when the user executes a specific application, inputs a keyboard, mouse key, or touch input.
The apparatus of claim 1, wherein the control unit
And prohibits the use of the electronic device when the second face authentication fails.
The apparatus of claim 1, wherein the control unit
And restricts the use of some functions of the electronic device when the second face authentication fails.
7. The apparatus of claim 6, wherein the control unit
When the second face authentication fails, confirms the user and its security level, and limits the execution of the predetermined application or the Internet game according to the current position and the security level of the user.
Operating a camera when using the first electronic device to photograph a user;
Recognizing a face in an image photographed by the camera;
Comparing the recognized face with a face registered in the memory to perform first face authentication and logging in if authentication is successful; And
And performing second face authentication by photographing a face of the user by irregularly operating the camera after the login and comparing the face authenticated at the time of log-in with the face currently photographed Control method of use.
9. The method of claim 8, further comprising performing an additional function to warn a user when the second face authentication fails,
Wherein said attachability is achieved through visual and auditory output and combinations thereof.
9. The method of claim 8, wherein the second face authentication
Characterized in that the method is performed when the user executes a specific application or when a keyboard or a mouse key is input or when a touch input is made.
9. The method as claimed in claim 8, further comprising logging out immediately when the second face authentication fails. 9. The method of claim 8, further comprising: restricting use of some functions of the electronic device when the second face authentication fails. 13. The electronic device according to claim 12, wherein when the second face authentication is failed, the user and the security level of the user are checked to limit the execution of the predetermined application or the Internet game according to the current position and the security level of the user. Control method.
KR1020150138758A 2015-10-01 2015-10-01 Apparatus and method for controlling use of electronic device using fake face detection KR20170039518A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150138758A KR20170039518A (en) 2015-10-01 2015-10-01 Apparatus and method for controlling use of electronic device using fake face detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150138758A KR20170039518A (en) 2015-10-01 2015-10-01 Apparatus and method for controlling use of electronic device using fake face detection

Publications (1)

Publication Number Publication Date
KR20170039518A true KR20170039518A (en) 2017-04-11

Family

ID=58580765

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150138758A KR20170039518A (en) 2015-10-01 2015-10-01 Apparatus and method for controlling use of electronic device using fake face detection

Country Status (1)

Country Link
KR (1) KR20170039518A (en)

Similar Documents

Publication Publication Date Title
US11272362B2 (en) System and method for implicit authentication
US20220004611A1 (en) Identifying and authenticating users based on passive factors determined from sensor data
KR101688168B1 (en) Mobile terminal and method for controlling the same
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
US9788203B2 (en) System and method for implicit authentication
TWI613564B (en) Eye gaze authentication
CN104200145B (en) Embedded verification system in electronic device
US20140197922A1 (en) System and method for positive identification on a mobile device
US20150128291A1 (en) Information processing apparatus and information processing method
CN104376248B (en) A kind of method and device that user's checking is carried out in interface for password input
US20140283014A1 (en) User identity detection and authentication using usage patterns and facial recognition factors
KR101941966B1 (en) Apparatus, method and program for access control based on pattern recognition
JP2021068472A (en) Face authentication system, face authentication method, biometrics authentication system, biometrics authentication method, and storage medium
CN108475306B (en) User interface for mobile device
CN108431821B (en) User interface for mobile device
US11194894B2 (en) Electronic device and control method thereof
CN111695509A (en) Identity authentication method, identity authentication device, machine readable medium and equipment
US11042615B2 (en) Information processing apparatus and method
KR101778008B1 (en) Method for unlocking security status of security processed object and apparatus thereof
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
JP2009156948A (en) Display control device, display control method, and display control program
US10509899B2 (en) Information device operating system, information device operating method and program for operating information device based on authentication
KR20170039518A (en) Apparatus and method for controlling use of electronic device using fake face detection
JP6873143B2 (en) Devices and methods for camera-based user authentication for content access
CN112311949A (en) Image forming apparatus, control method thereof, and storage medium storing computer program