Rohos Face Logon v.2.9

Advertisement
Advertisement

The program is designed to add authentication convenience and additional security method to the standard Windows logon procedure. It allows to access Windows computer in an easy, fast and secure way by using any Windows compatible camera. The login of the user is performed automatically once the face has been recognized by the program. Rohos Face Logon provides identification of a user by biometric verification in an automatic continuous process, based on neural network technology.Program features: * Rohos Face Logon adds convenience to your usual Windows login/password by using a web camera as a face recognition device * Easy to set up and use * Automatic login when your face is recognized * Rohos Face logon options: Hide Rohos Face Logon window; Temporary stop login by face * Last successful attempts to access the system by means of webcam are saved and stored * All registered face patterns are saved and poor ones may be deleted * Multi-user support - You may register faces of several people for one user account! * Supports both Windows XP and Vista * Self-training - helps avoiding face recognition failure[Unique] The option d-deDUHide Rohos Face Logon window during logind-deDt will help you to hide the fact of programd-deOaos presence. Thus an intruder will not be aware of face recognition process.The Self-training feature remembers failed recognitions and allows automatically convert them into face models without registering new face models. This makes the additional face registration process unnecessary. 1. Open d-deDUNot logged ind-deDt dialog 2. Choose the patterns and 3. Click Register faces to save them as face modelsAuthentication integrated within the Windows LogonRohos Face Logon integrates into any Windows logon model: Local PC logon or AD network joined workstation, Windows XP/Vista home computer. Thus, no compatibility problems will be encountered after installing Rohos Face Logon.Video - d-deDUd-deTZI never use password for Windows d-deTZd-deDt :In this video you will see: * Register some face models for poper face recognition with Rohos. * Unlocking Windows using face recognition. * Rohos Face Logon auto- training using face models that were not recognized before. * See the list of faces that were used for login / unlock for a week. * Hiding the face recognition dialogue from the logon window for: 1. Preventing people know that you use face for logging; 2. Makes it impossible for another person to use your face or your photo to access your computer

The program is designed to add authentication ...

pictures, sync, time, function, solve, browser, system, camera, picture

 
  • Rohos Face Logon
  • 2.9
  • Teslain
  • WinXP, Win Vista, Windows 7
  • Shareware
  • 4.1 Mb
  • 197
 
 

Review Rohos Face Logon

  • captcha
 

Other software of Teslain
  • Rohos Logon Key  v.2.6It allows to access Windows in a secure way by USB drive, biometric USB drive, Bluetooth mobile or eTokens, replacing the Windows login. For Windows Vista program install two-factor authentication Credential Provider. Support remote desktop login.No ...
  • Rohos Welcome  v.1.1Rohos installs a new featured Login Screen (welcome-screen). It's user-friendly and smarter than the typical Windows login. Advantages: Easy and automated access to Windows via your USB flash drive; Automatically lock your desktop upon removal of an ...

New Miscellaneous software
  • Active@ LiveCD  v.5.0.0Active@ LiveCD is tool set which helps you to recover lost data, reset passwords, back up computers, securely erase data.
  • Action1 Block USB Devices  v.1.1Working in the Cloud, Action1 Block USB Devices discovers all of your endpoints in seconds and you can query your entire network of workstations to immediately see what USB devices, SD cards and other removable media is being used and where.
  • Serial Port Tester  v.7.0Monitor, display, log and analyze all of your system's serial port activity using Serial Port Monitor. This professional serial port tester allows you to test any RS232/422/485 COM port on your system and log transmission data for further analysis.