当前位置: 高中英语 / 阅读理解
  • 1. (2021·淮安模拟) 阅读理解

    Using your face to unlock your phone is a pretty genius security. plan. But like any advanced technology, thieves and hackers are always up to the challenge, whether that's unlocking your phone with your face while you sleep or using a photo from social media to do the am.

    Like every other human biometric identification system(生物标识系统)before it, such as fingerprints and retina scans, there are still significant. security bugs in some of the most advanced identity verification (证实) technology. Brigham Young University electrical and computer engineering Professor D. J. Lee has decided there is a better and more secure way to use your face for restricted access.

    It's called Concurrent Two-Factor Identity Verification (C2FIV) and it requires both one's facial identity and a specific facial motion to gain access. To set it up, a user faces a camera and records a short 1-2 second video of either a unique facial motion or a lip movement from reading a secret phrase. The video is then input into the device, which obtains facial features and the features of the facial motion, storing them for later ID verification.

    To get technical, C2FIV relies on an integrated neural network framework to learn facial features and actions at the same time. Using this integrated neural network framework, the user's facial features and movements are embedded (嵌入) and stored on a server or in an embedded device and when they later attempt to gain access, the computer compares the newly generated embedding to the stored one. That user's ID is verified if the new and stored embeddings match at a certain level.

    Lee said C2FIV has broader application, including accessing restricted areas at a workplace, online banking, ATM use, safe deposit box access or even hotel room entry or keyless access to your vehicle. "How great would it be to know that even if you lost your car key, no one can steal your vehicle because they don't know your secret facial action?"

    1. (1) How do today's hackers unlock your phone?
      A . By challenging you to make faces. B . By making genius security plans. C . By taking your fingerprints. D . By stealing your photos from social media.
    2. (2) What is Paragraph 3 mainly about?
      A . How C2FIV differs. B . How C2FIV works. C . Why C2FTV is convenient. D . Where C2FIV is applied.
    3. (3) What is the foundation to guarantee that C2FIVgets technical?
      A . Learning facial features and actions at once. B . Being equipped with an embedded device. C . Matching the new and stored embeddings. D . Using an integrated neural network framework.
    4. (4) What does Professor D. J. Lee think of C2FTV?
      A . It has limited application areas. B . It can improve work efficiency. C . It has a bright application future. D . It can ensure the motion of vehicles.

微信扫码预览、分享更方便