KR20170039518A - Apparatus and method for controlling use of electronic device using fake face detection - Google Patents
Apparatus and method for controlling use of electronic device using fake face detection Download PDFInfo
- Publication number
- KR20170039518A KR20170039518A KR1020150138758A KR20150138758A KR20170039518A KR 20170039518 A KR20170039518 A KR 20170039518A KR 1020150138758 A KR1020150138758 A KR 1020150138758A KR 20150138758 A KR20150138758 A KR 20150138758A KR 20170039518 A KR20170039518 A KR 20170039518A
- Authority
- KR
- South Korea
- Prior art keywords
- face
- user
- electronic device
- camera
- face authentication
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000001514 detection method Methods 0.000 title description 4
- 230000006870 function Effects 0.000 claims description 21
- 230000000007 visual effect Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 6
- 230000000903 blocking effect Effects 0.000 description 4
- 230000033001 locomotion Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 2
- 238000000513 principal component analysis Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 239000013598 vector Substances 0.000 description 2
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G06K9/00255—
-
- H04M1/72522—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
Abstract
Description
The present invention relates to an apparatus and method for controlling use of an electronic device for verifying an authenticated user through a fake face to warn or limit the actual use of the electronic apparatus.
2. Description of the Related Art Recently, various types of user authentication methods have been proposed to improve the security of each electronic device with the increasing use of electronic devices capable of displaying and reproducing various types of contents and mobile devices such as smart phones.
The user authentication method includes a method of recognizing a slide pattern displayed on a screen when a user has a touch screen, a PIN method of inputting numbers, and a password input method of combining characters. In recent years, ) Authentication method is used.
Among them, face recognition technology is a technique of log-in to an electronic device (eg, a computer, a notebook, a mobile terminal and others) through facial recognition instead of inputting a password. Stored faces are compared with each other to permit user authentication for accessing the electronic device, that is, login.
However, the conventional face recognition technology mainly focuses on the login of the electronic device, and it is possible to restrict the use of the electronic device by verifying the fake user authenticated through the user's fake face (fake face) But does not care about the technology that controls it.
It is an object of the present invention to provide an apparatus and method for controlling usage of an electronic device that can continuously warn a fake user who has passed authentication through a facet and warn or block the use of the electronic device.
It is another object of the present invention to provide an apparatus for controlling use of an electronic device and a method thereof, which can continuously verify a fake user whose authentication has been passed through a facet, thereby restricting the use of some functions of the electronic apparatus.
According to another aspect of the present invention, there is provided an apparatus for controlling usage of an electronic device, including: a camera for capturing a user; a memory in which faces of at least one user are registered; A face recognition unit for recognizing a face by processing an image photographed by a camera; And a control unit comparing the face recognized by the face recognition unit and the face registered in the memory to perform a first face authentication and logging in as an initial screen, wherein the control unit operates the camera irregularly after logging in, The second face authentication is performed by comparing the face authenticated at the time of log-in with the face currently photographed.
According to an embodiment of the present invention, the electronic device may include a mobile or stationary electronic device having a display unit and entering the initial screen by login.
According to an embodiment of the present invention, the controller performs an additional function of warning the user when the second face authentication fails, and the attachable function can be performed through visual and auditory output and a combination thereof.
According to an embodiment of the present invention, the controller may perform the second face authentication by operating the camera when the user executes a specific application, or when a keyboard or a mouse key is input or when a touch is input.
According to an embodiment of the present invention, when the second face authentication fails, the controller may block the use of the electronic device or restrict the use of some functions of the electronic device.
According to an embodiment of the present invention, when the second face authentication fails, the controller can check the user and its security level, and restrict the execution of a predetermined application or an Internet game according to the current position and the security level of the user.
According to another aspect of the present invention, there is provided a method of controlling use of an electronic device, the method comprising: photographing a user by operating a camera when using the first electronic device; Recognizing a face in an image photographed by the camera; Comparing the recognized face with a face registered in the memory to perform first face authentication and logging in if authentication is successful; And performing a second face authentication by photographing a user's face by irregularly operating the camera after the login and comparing the face authenticated at the time of log-in with the face currently photographed.
According to an embodiment of the present invention, the method further comprises performing an additional function to warn the user when the second face authentication fails, wherein the additional function can be performed through visual and auditory output and a combination thereof .
According to an embodiment of the present invention, the second face authentication is performed when the user executes a specific application, or when a keyboard or a mouse key is input or a touch is inputted.
According to an embodiment of the present invention, there is provided a method of authenticating a user, comprising: immediately logging out if the second face authentication fails; 9. The method of claim 8, further comprising: restricting use of some functions of the electronic device when the second face authentication fails. .
According to an embodiment of the present invention, when the second face authentication fails, the user and the security level of the user can be checked to limit the execution of a predetermined application or an Internet game according to the current position and the security level of the user.
The present invention continuously verifies a user who has been authenticated through a facet, thereby blocking the use of the electronic device, thereby preventing a fake user who has passed the authentication from using the actual user's electronic device or blocking the access of the user's important information There is an effect that it is possible to effectively prevent a disadvantage of information security caused by the information security.
In addition, the present invention provides a method and system for continuously verifying a user who has passed an authentication through a facet and determining the level of use of the electronic device according to a user, thereby allowing use of general information or a program, The information access can be blocked.
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a diagram showing an example of face authentication applied to a notebook in the present invention. Fig.
2 is a block diagram of a use control apparatus for an electronic apparatus according to an embodiment of the present invention;
3 is a flowchart illustrating a method of controlling use of an electronic device through the detection of a facet phase according to an embodiment of the present invention.
4 is an embodiment of an additional function that can be performed when the second face authentication fails in the present invention.
BACKGROUND OF THE INVENTION Field of the Invention [0001] The present invention relates to a method and apparatus for controlling use of an electronic device.
FIG. 6 illustrates an embodiment in which the use of the electronic device is restricted when the second face authentication fails in the present invention. FIG.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, wherein like or similar elements are denoted by the same reference numerals, and redundant description thereof will be omitted. The suffix "module" and " part "for the components used in the following description are given or mixed in consideration of ease of specification, and do not have their own meaning or role. In the following description of the embodiments of the present invention, a detailed description of related arts will be omitted when it is determined that the gist of the embodiments disclosed herein may be blurred. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. , ≪ / RTI > equivalents, and alternatives.
Terms including ordinals, such as first, second, etc., may be used to describe various elements, but the elements are not limited to these terms. The terms are used only for the purpose of distinguishing one component from another.
It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.
Also, the singular forms "a", "an", and "the" include plural referents unless the context clearly dictates otherwise.
In the present invention, the terms "comprising" or "having ", and the like, specify that the presence of a feature, a number, a step, an operation, an element, a component, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.
The conventional face recognition technique is mainly used for comparing and judging a forged face, more specifically, a blinking, a facial expression, and a 3D camera image to prevent a login. Nonetheless, it often happens that the user passes through a face-to-face (Fake face), for example, using high-resolution photos and videos.
Therefore, when the inventor of the present invention passes the authentication of the first user through the facet, the second user (eg, another user) unauthorizedly uses the first user's electronic device, 1 We have recognized problems such as missing important information or viewing confidential information. In addition, it is also possible that a parent user (eg, a PC, a notebook, etc.) using a facet face (a picture of a parent) without a first user , Smart Tab, and Macbook), and recognized the problem of surfing the Internet, playing games, and accessing adult sites at times that parents did not allow.
In view of the above problems, the inventor of the present invention has conducted a continuous verification for a user who has passed authentication (eg, login) through a fake face to block use of an actual user's electronic device And suggests ways to increase the reliability of information security by limiting access to information.
The user who has passed the face authentication in the present invention means a user who has passed the authentication using the photo or video of the first user when the first user is absent, And may include all the second users to use in the electronic apparatus of the first user while the user is idle for a while.
An electronic apparatus to which the present invention is applied includes both a fixed type and a movable type and includes at least one display such as a computer, a notebook, a mobile terminal, a smart phone, and the like, Appliances are targeted.
According to an embodiment of the present invention, the camera may be operated irregularly or intermittently to perform re-authentication by comparing a face that has been successfully authenticated at the first log-in with the current face.
According to an embodiment of the present invention, re-authentication can be performed when a specific application (banking or the like) is performed, or when a keyboard or a key of a mouse or a touch input is operated.
The present invention, in one embodiment, may use the re-authentication result to limit the use and available applications or content of the electronic device.
1 shows an example of face authentication applied to a notebook in the present invention.
Referring to FIG. 1, when a user registers his face through the face authentication program, a login window is displayed on the
Accordingly, the user can set the user authentication method to face authentication by selecting the face-in
2 is a block diagram showing a configuration of an apparatus for controlling usage of an electronic device according to an embodiment of the present invention. For convenience of description,
2, the use control device for an electronic device according to the present invention includes a
The
The
The
The
The
The
The
Although not shown in the drawings, the use control apparatus of an electronic device according to the present invention may further include a wireless communication section for communicating with a network or an external electronic device, and an audio output section for outputting sound. The
Hereinafter, an apparatus for controlling usage of an electronic device according to an embodiment of the present invention will be described with reference to the accompanying drawings.
3 is a flowchart illustrating a method of controlling usage of an electronic device through the detection of a facet phase according to the first embodiment of the present invention. In the first embodiment of the present invention, a notebook computer will be described as an example for convenience of explanation. The actual user of the electronic device is assumed to be the first user and the fake user is assumed to be the second user.
3, when the second user opens the cover of the notebook of the first user, the
The
The
If it is determined that the first face authentication is successful, the
When the second user uses the notebook of the first user, the
The present invention operates the camera irregularly because the second user can know when the camera is operated regularly and the face is photographed. For example, when the camera is operated intermittently or when a specific application (Internet banking) is executed, the camera can be operated at the time of accessing the secret information (photograph, memo, SNS) or the keyboard or mouse key input.
As a result of the second face authentication, the authenticated face (facet face) stored in the
On the other hand, if the face authenticated at the login and the face of the second user currently photographed are the same and the second face authentication is successful, the
4 is an embodiment of an additional function that can be performed when the second face authentication fails in the present invention.
4 shows an example of darkening the screen and outputting a warning in the first method of the additional function when the second face authentication fails. The warning is performed through visual and auditory output and a combination thereof. A visual warning can display a warning message, and an audible warning can include a warning sound and a warning message stored in advance.
When the audible warning is output, the use control device of the electronic device according to the present invention may include an audio output unit (not shown).
The additional function may be transmitted to a smart device (smart phone, wearable device) possessed by the first user. In this case, the use control device of the electronic device according to the present invention may include a wireless communication unit. The wireless communication unit may include a mobile communication module for transmitting and receiving a wireless signal in a mobile communication network, a wireless communication module for wireless Internet access, and a short-range communication module for performing short-range communication.
The warning may be generated for a predetermined time, and if the second face authentication again performed after a lapse of a predetermined time fails again, the
In another embodiment, the present invention may perform logout immediately without warning if the second face authentication fails.
5 is a flowchart illustrating a method for controlling use of an electronic device through the detection of a facet phase according to a second embodiment of the present invention. In the second embodiment of the present invention, a notebook is taken as an example for convenience of explanation, and the actual user of the electronic device is assumed to be the first user and the fake user is assumed to be the second user.
5, when the second user presses the face-in button 53 (or automatically) while the window login window is displayed on the
The
The
In the present invention, it is assumed that a second user causes the
If the first face authentication is successful, the
When the second user uses the first user's notebook, the
As a result of the second face authentication, when the authenticated face (face face) at the time of login is different from the face of the second user currently photographed, that is, when the user currently using the notebook is determined not to be the first user and the second face authentication fails , The
For this purpose, the apparatus for controlling usage of electronic devices according to the present invention may include a location information module capable of measuring the current position of a user, and may set a security level for each family, relatives, and colleagues in the
Accordingly, the
FIG. 6 is an embodiment for notifying that the use of the electronic device is restricted when the second face authentication fails in the present invention.
As described above, as a result of the second face authentication, the face authenticated at the time of login (facet face) is different from the face of the second user currently photographed, that is, the user currently using the notebook is determined not to be the first user, If the face authentication fails, the
Although the present invention has been described taking an example of a notebook as an electronic device for convenience of explanation, the present invention is not limited thereto. The present invention is equally applied to all electronic devices including a display unit and performing face authentication through the display unit It is obvious.
As described above, according to the present invention, the user who has passed the authentication through the facet is continuously verified to block or limit the use of the electronic device, so that the fake user, which has passed the conventional authentication, It is possible to effectively prevent the disadvantages of information security caused by not blocking the important information access of the user.
The present invention also provides a method and system for continuously verifying the use of an electronic device by a user authenticated via a facet or an authenticated user during a short absence, It is possible to use the general information or the program by determining and executing the information that should not be allowed, but it is advantageous in that the security of the electronic device can be further strengthened by blocking access to information to important information or harmful information or program.
The present invention described above can be embodied as computer-readable codes on a medium on which a program is recorded. The computer readable medium includes all kinds of recording devices in which data that can be read by a computer system is stored. Examples of the computer readable medium include a hard disk drive (HDD), a solid state disk (SSD), a silicon disk drive (SDD), a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, , And may also be implemented in the form of a carrier wave (e.g., transmission over the Internet). Also, the computer may include a control unit 180 of the terminal. Accordingly, the above description should not be construed in a limiting sense in all respects and should be considered illustrative. The scope of the present invention should be determined by rational interpretation of the appended claims, and all changes within the scope of equivalents of the present invention are included in the scope of the present invention.
50: desktop 51: key input unit
52: Text input window 53: Face in button
100: camera 102: face recognition unit
104: control unit 106: use restriction unit
108: memory 110: display unit
Claims (13)
A memory in which at least one user's face is registered;
A face recognition unit for recognizing a face by processing an image photographed by a camera; And
And a controller for comparing the face recognized by the face recognition unit and the face registered in the memory to perform the first face authentication and log in as an initial screen,
The control unit
Wherein the second face authentication is performed by photographing a user's face by operating the camera irregularly after logging in and comparing the face authenticated at the time of log-in with the face currently photographed.
And a portable or stationary electronic device having a display unit and entering an initial screen by log-in.
Performs an additional function of warning the user if the second face authentication fails,
Wherein said attachability is achieved through visual and auditory output and combinations thereof.
Wherein the second face authentication is performed by the user by operating the camera when the user executes a specific application, inputs a keyboard, mouse key, or touch input.
And prohibits the use of the electronic device when the second face authentication fails.
And restricts the use of some functions of the electronic device when the second face authentication fails.
When the second face authentication fails, confirms the user and its security level, and limits the execution of the predetermined application or the Internet game according to the current position and the security level of the user.
Recognizing a face in an image photographed by the camera;
Comparing the recognized face with a face registered in the memory to perform first face authentication and logging in if authentication is successful; And
And performing second face authentication by photographing a face of the user by irregularly operating the camera after the login and comparing the face authenticated at the time of log-in with the face currently photographed Control method of use.
Wherein said attachability is achieved through visual and auditory output and combinations thereof.
Characterized in that the method is performed when the user executes a specific application or when a keyboard or a mouse key is input or when a touch input is made.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150138758A KR20170039518A (en) | 2015-10-01 | 2015-10-01 | Apparatus and method for controlling use of electronic device using fake face detection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150138758A KR20170039518A (en) | 2015-10-01 | 2015-10-01 | Apparatus and method for controlling use of electronic device using fake face detection |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170039518A true KR20170039518A (en) | 2017-04-11 |
Family
ID=58580765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150138758A KR20170039518A (en) | 2015-10-01 | 2015-10-01 | Apparatus and method for controlling use of electronic device using fake face detection |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170039518A (en) |
-
2015
- 2015-10-01 KR KR1020150138758A patent/KR20170039518A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11272362B2 (en) | System and method for implicit authentication | |
US20220004611A1 (en) | Identifying and authenticating users based on passive factors determined from sensor data | |
KR101688168B1 (en) | Mobile terminal and method for controlling the same | |
US9531710B2 (en) | Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication | |
US9788203B2 (en) | System and method for implicit authentication | |
TWI613564B (en) | Eye gaze authentication | |
CN104200145B (en) | Embedded verification system in electronic device | |
US20140197922A1 (en) | System and method for positive identification on a mobile device | |
US20150128291A1 (en) | Information processing apparatus and information processing method | |
CN104376248B (en) | A kind of method and device that user's checking is carried out in interface for password input | |
US20140283014A1 (en) | User identity detection and authentication using usage patterns and facial recognition factors | |
KR101941966B1 (en) | Apparatus, method and program for access control based on pattern recognition | |
JP2021068472A (en) | Face authentication system, face authentication method, biometrics authentication system, biometrics authentication method, and storage medium | |
CN108475306B (en) | User interface for mobile device | |
CN108431821B (en) | User interface for mobile device | |
US11194894B2 (en) | Electronic device and control method thereof | |
CN111695509A (en) | Identity authentication method, identity authentication device, machine readable medium and equipment | |
US11042615B2 (en) | Information processing apparatus and method | |
KR101778008B1 (en) | Method for unlocking security status of security processed object and apparatus thereof | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
JP2009156948A (en) | Display control device, display control method, and display control program | |
US10509899B2 (en) | Information device operating system, information device operating method and program for operating information device based on authentication | |
KR20170039518A (en) | Apparatus and method for controlling use of electronic device using fake face detection | |
JP6873143B2 (en) | Devices and methods for camera-based user authentication for content access | |
CN112311949A (en) | Image forming apparatus, control method thereof, and storage medium storing computer program |