Unconscious login
The organic combination of security and convenience
  • Security


    Support multi-factor authentication mechanism to prevent the risk of password cracking, guessing and sharing.
  • Simple deployment

    Simple deployment

    The deployment is simple and flexible, and there are stand-alone version and online version to choose from.
  • Convenience


    Support face recognition and insensitivity login.



Security E Login Unconscious login product consists of the face verification service platform, device information management system, and ELOGIN client program, where the face verification service platform is responsible for realizing end-users face registration binding, face feature database establishment, live detection, face feature comparison, etc.; the device information management system is responsible for the information of all devices, personnel, organizations, accounts, device usage rights, etc., and provide service interface for Security E login client program; Security E login client program is an executable program installed on the client computer, responsible for realizing the extension of Windows authentication process, adding different authentication methods such as face authentication and CA to the authentication process of Windows, and providing users with multiple login methods.


  • Improving the security of login computer

    ELOGIN enhances the security of the original authentication methods of Windows by integrating authentication methods with higher security level, so that it can expand any authentication methods and customize authentication strategies like self-developed applications, and realize multi-factor authentication of Windows.
  • Convenient user experience

    ELOGIN can integrate fingerprint, code scanning, biometric identification and other more convenient authentication methods with better experience, so as to realize secret-free login.
  • Incorporating computer login into the unified identity authentication system

    ELOGIN can be integrated with the existing unified identity system of the enterprise. Other resources such as user login computer and user login application use the same set of accounts and vouchers, matching the correspondence among computers, people and vouchers, and avoiding illegal sharing of computers, accounts and vouchers.
  • Single sign-on starts with logging in to the computer

    ELOGIN on the basis of realizing the unified identity authentication of the computer, users don't need to log in again when accessing various application systems on this computer, and log in directly through the single sign-on strategy, which greatly improves the user experience and work efficiency.


  • Multi-factor integration authentication


    Support the use of traditional authentication methods such as password, U key, OTP and other authentication methods for computers. Support the use of cell phones to assist in completing authentication, such as text messages, sweeping QR codes, cell phone fingerprints, faces, voiceprints and other authentication methods. Support the integration and expansion of the specified authentication methods, while supporting the adjustment of the authentication order and authentication policy for these authentication methods.

  • Automatic login to B/S application after successful computer login


    After completing the computer login authentication, users do not need to authenticate again when opening the browser to access specific B/S applications, realizing single sign-on, and providing secondary authentication for systems with high-security requirements.

  • Automatic login to C/S application after successful computer login


    When users open desktop C/S applications after completing computer login authentication, they do not need to authenticate again, realizing the single sign-on, which can be realized through Windows-related protocols or combined with special tools.

  • Support multiple installation policies


    Support offline stand-alone installation, domain push installation, silent installation, automatic software update, and autorun on starting up and other installation methods and policies, which can be selected and adjusted according to the actual environment.

  • Unconscious login


    Through biometric authentication technology such as face recognition, users automatically log in to the system when coming to PCs and other devices without performing manual login operations, and automatically lock the screen after the user leaves to prevent others from illegally operating the computer, which is an excellent embodiment of authentication technology that balances security and convenience.

  • Device binding and authorization


    Support administrators or users to bind to computer devices, and also support Ukey, USB and other credentials to bind to the device, and set each user can access the specified computer and the number of computers to prevent unauthorized users from illegally logging into the computer.





  • Integration with Bamboocloud IAM system to form a complete solution

    E login can be integrated with other products of the Bamboocloud IAM system to provide various access control policies during users login to computers, such as discovery and warning of computer login risks, dynamic adjustment of authentication methods and unified access auditing.

    Integration with Bamboocloud IAM system to form a complete solution
  • Secure and Unconscious authentication process

    The authentication process adopts face recognition and comparison technology. As long as you are facing the computer camera, the system login can be completed, and the whole process is Unconscious. No account password is required to complete the login, which can effectively avoid the security risk caused by account breach.

    Secure and Unconscious authentication process
  • Unified standard of security policy

    The system provides a unified standard security policy to manage local computer accounts, password strength, password expiration, etc., ensuring the security of local computer accounts and passwords. At the same time, ensuring the consistency of computer account information with the server through the synchronization mechanism, effectively preventing other people from creating private accounts.

    Unified standard of security policy
  • Unified management of device information

    IT managers unify the information of all computer devices on the service platform, get real-time insight into the usage of the devices, and realize the dynamic adjustment of usage rights through the service platform.

    Unified management of device information