With the growing need to exchange information and share resources, information security has become more important than ever in both the public and private sectors. Although many technologies have been developed to control access to files or resources, to enforce security policies, and to audit network usages, there does not exist a technology that can verify that the user who is using the system is the same person who logged in.
FaceAccess provides a prototype implementation as a "login module" of an information system. The goal is to enhance the level of system security by periodically checking the user’s identity without disrupting the user’s activities.
...