CN101140607A - Personal electronic equipments safety and information protection method and system - Google Patents

Personal electronic equipments safety and information protection method and system Download PDF

Info

Publication number
CN101140607A
CN101140607A CNA2006101275153A CN200610127515A CN101140607A CN 101140607 A CN101140607 A CN 101140607A CN A2006101275153 A CNA2006101275153 A CN A2006101275153A CN 200610127515 A CN200610127515 A CN 200610127515A CN 101140607 A CN101140607 A CN 101140607A
Authority
CN
China
Prior art keywords
authentication
probe
information
detector
people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101275153A
Other languages
Chinese (zh)
Inventor
肖善鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecom R&D Center
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CNA2006101275153A priority Critical patent/CN101140607A/en
Publication of CN101140607A publication Critical patent/CN101140607A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

A security and information protection method for personal electronic devices: When a display monitor is in an enable status, a detector can fulfill cycle measurement around a host computer, in order to determine whether personnel exists and distance between the personnel and the detector; identify whether an acquired measurement signal is higher than the threshold; If yes, make the display monitor into a screen saver awaiting status or shutdown power to the display monitor, and meanwhile, send display awaiting indications to a host computer processor; when the display monitor is in an awaiting status, the detector will perform cycle measurement around the host computer to see whether personnel exist, as well as the distance between the personnel and the detector; identify whether an acquired measurement signal is higher than a threshold; If yes, send display enable request signal to the host computer processor; the host computer processor will identify whether right discrimination is necessary; If necessary, select a right discrimination mode to perform right discrimination; If passing the right discrimination, enable the screen display; otherwise, record illegal incursion information and send the information to security departments through a network. The invention can record and report illegal incursion information, so as to provide convenience for security departments in management to increase security of electronic devices.

Description

Personal electronic equipments safety and information protection method and system
Technical field
The present invention relates to the electronic equipment protection, particularly information security and the means of defence and the system of personal electronic equipments (comprising PC, notebook computer and PDA and mobile phone etc.).
Background technology
Current personal electronic equipments generally with the method for setting timer make electronic equipment enter screen protection, close demonstration, close hard disk, states such as system standby and system hibernates.Can carry out authentication by password authentification when opening electronic equipment.Up-to-date technology shows that the computer cell phone of some brands carries out authentication by recognition of face and fingerprint recognition.
In existing system, the computer expert crosses timer protection, and real-time is not strong.Carry out authentication by password, security is not high, and illegal invasion information is difficult to record.The up-to-date method for authenticating that passes through recognition of face and fingerprint recognition is because sensor is always operating at monitored state, and efficient is low, and power consumption is big.Prior art does not write down illegal invasion information and to network-reporting, makes administrative authority in time to find and to eliminate safe hidden trouble simultaneously.
Summary of the invention
The purpose of this invention is to provide a kind of personal electronic equipments safety and information protection method and system.
According to an aspect of of the present present invention, a kind of personal electronic equipments safety and information protection method comprise step:
When demonstration is in state of activation, whether the distance between people's existence and people and the detector is arranged around the detector period measurement main frame;
Whether the measuring-signal that judgement is obtained is greater than thresholding, if then allow demonstration enter the screen protection holding state or close show power supply, and indicate to host-processor transmission demonstration standby;
When demonstration is in holding state, whether the distance between people's existence and people and the detector is arranged around the detector period measurement main frame;
Whether judge the measuring-signal that obtains greater than thresholding, if then send the demonstration activation request signal to host-processor;
Host-processor need to judge whether authentication, and authentication then selects authentication mode to carry out authentication if desired;
If passed through authentication, then activate screen display, otherwise write down illegal invasion information and send to security department by network.
According to another aspect of the present invention, a kind of personal electronic equipments safety and message protection system comprise display control unit and host-processor, and described display control unit comprises:
Infrared probe is used to survey the distance that whether has around the main frame between people's existence and people and the probe;
Probe-head control module is used to gather identifying information and receiving transducer configuration information, and control probe supply module and monitor power supply module are respectively to probe and monitor power supply;
Probe is provided with software module, be used to be provided with infrared probe monitoring periods, enter and withdraw from holding state delay parameter, whether start authentication and select authentication mode;
The authentication information managing software module is used to obtain and write down identifying information, and display is activated in authentication success back, otherwise, give security department the illegal invasion report information by network.
The present invention has improved recognition efficiency, and has reached the purpose of effective economize on electricity by two step identifying schemes.The present invention's record and report illegal invasion information are convenient to security department's management, the security that improves electronic equipment.
Description of drawings
Fig. 1 is personal electronic equipments safety and message protection system configuration;
Fig. 2 is that the display control unit management enters the process flow diagram that shows holding state;
Fig. 3 is that the display control unit management enters the process flow diagram that shows state of activation;
Fig. 4 is the process flow diagram that host-processor carries out authentication.
Embodiment
Fig. 1 is the arrangement plan of system of the present invention, and it comprises two big ingredients, 100 display control units and 110 host-processors, and the interface 107 between the two can be by wired or wireless mode, and as USB, bluetooth etc. connect.
100 display control units comprise following chief component:
101 infrared control heads: be used to monitor infrared signal, whether the distance between people's existence and people and the probe is arranged around its energy perception, it is an important component of the present invention.
102 cameras: be used for obtaining of recognition of face signal, it is optional assembly, and after having disposed face identification functions, this setting is only necessary.
103 irises probe: be used for obtaining of human eye iris signal, it is optionally, and after having disposed iris identifying function, this setting is only necessary.
104 probe-head control modules: be used for control probe supply module, gather identifying information, control monitor power supply module, receiving transducer configuration information.
105 probe supply modules: open the probe power supply and start probe work according to the instruction of probe-head control module.
106 monitor power supply modules: according to the power supply of instruction opening display and the work of startup display of probe-head control module.
110 host-processors have increased by two software modules except existing processing capacity, probe is provided with software module and authentication information managing software module.
111 probes are provided with software module and the monitoring periods T0 and the T1 of infrared probe can be set and enter and withdraw from the delay parameter T2 and the T3 of holding state, and whether start authentication and select authentication mode.The parameter that the user is provided with will pass to 104 probe-head control modules by interface 107.
112 authentication information managing software modules are used to obtain and write down identifying information, carry out authentication then, if the authentication success then activates display, otherwise give security department the illegal invasion report information by network.
Fig. 2 and Fig. 3 and Fig. 4 are typical implementation methods of the present invention.
Fig. 2 is that the management of 100 display control units enters the process flow diagram that shows holding state.
Show that in step 201, according to configuration parameter, infrared probe is period measurement infrared sensor signal s with T0 when being in state of activation.
Whether step 202 judges s less than thresholding STH, if, write down the duration t2 of this state and carry out 203, be 0 and restart to measure if not the t2 that then resets.
Whether step 203 judges t2 greater than thresholding T2, if, then allow demonstration enter the screen protection holding state or close show power supply in step 204, send demonstration standby indication in step 205 to host-processor simultaneously.Otherwise, continue to measure.
Fig. 3 is that the management of 100 display control units enters the process flow diagram that shows state of activation.
Show that in step 301, according to configuration parameter, infrared probe is period measurement infrared sensor signal s with T1 when being in holding state.
Whether step 302 judges s greater than thresholding STH, if, write down the duration t3 and the execution in step 303 of this state, be 0 and restart to measure if not the t3 that then resets.
Whether step 303 judges t3 greater than thresholding T3, if then send the demonstration activation request signal in step 304 to host-processor.
Step 305 judges whether configuration and has started authentication, if then change step 307 execution, otherwise execution in step 306 starts the demonstration power supply and activates demonstration.
Step 307 is judged the selection of user to authentication mode:
If authentication mode is a password, then as prior art, point out the user to input password in step 308.
If authentication mode is recognition of face, then starts the camera power supply and activate its collection people face signal in step 309.
If authentication mode is an iris recognition, then starts the power supply of iris probe and activate collection human eye iris signal in step 310.
Fig. 4 is the process flow diagram that host-processor carries out authentication.
In step 401, processor receives and shows the request of activation.
Step 402 judges whether configuration and has started authentication, if then change step 404 execution, otherwise execution in step 403 starts the demonstration power supply and activates demonstration.
Step 404 is judged the selection of user to authentication mode:
If authentication mode is a password, then as prior art, reads the password of user input and verify in step 405.
If authentication mode is recognition of face, then read camera signals and checking in step 406.
If authentication mode is an iris recognition, then read iris probe signal and checking in step 407.
Step 408 judges whether to have passed through authentication, if then activate demonstration, otherwise write down illegal invasion information and send to security department by network.

Claims (10)

1. personal electronic equipments safety and information protection method comprise step:
When demonstration is in state of activation, whether the distance between people's existence and people and the detector is arranged around the detector period measurement main frame;
Whether the measuring-signal that judgement is obtained is greater than thresholding, if then allow demonstration enter the screen protection holding state or close show power supply, and indicate to host-processor transmission demonstration standby;
When demonstration is in holding state, whether the distance between people's existence and people and the detector is arranged around the detector period measurement main frame;
Whether judge the measuring-signal that obtains greater than thresholding, if then send the demonstration activation request signal to host-processor;
Host-processor need to judge whether authentication, and authentication then selects authentication mode to carry out authentication if desired;
If passed through authentication, then activate screen display, otherwise write down illegal invasion information and send to security department by network.
2. method according to claim 1 is characterized in that described authentication mode comprises one of the following:
Password authentication, recognition of face authentication and iris recognition authentication.
3. method according to claim 1 is characterized in that described detector is an infrared probe.
4. method according to claim 3 is characterized in that using camera to carry out people's face authentication.
5. want 3 described methods according to right, it is characterized in that using the iris probe to carry out the iris authentication.
6. according to claim 4 or 5 described methods, it is characterized in that only showing that the infrared sensing signal just starts camera greater than certain threshold value and after continuing for some time or iris is popped one's head under the holding state and when monitoring.
7. personal electronic equipments safety and message protection system comprise display control unit and host-processor, and described display control unit comprises:
Infrared probe is used to survey the distance that whether has around the main frame between people's existence and people and the probe;
Probe-head control module is used to gather identifying information and receiving transducer configuration information, and control probe supply module and monitor power supply module are respectively to probe and monitor power supply;
Probe is provided with software module, be used to be provided with infrared probe monitoring periods, enter and withdraw from holding state delay parameter, whether start authentication and select authentication mode;
The authentication information managing software module is used to obtain and write down identifying information, and display is activated in authentication success back, otherwise, give security department the illegal invasion report information by network.
8. system according to claim 7 is characterized in that also comprising camera, is used for obtaining of recognition of face signal.
9. system according to claim 7 is characterized in that also comprising the iris probe, is used for obtaining of human eye iris signal.
10. according to Claim 8 or 9 described systems, it is characterized in that, only showing that the infrared sensing signal is just starting camera greater than certain threshold value and after continuing for some time or iris is popped one's head under the holding state and when monitoring.
CNA2006101275153A 2006-09-07 2006-09-07 Personal electronic equipments safety and information protection method and system Pending CN101140607A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101275153A CN101140607A (en) 2006-09-07 2006-09-07 Personal electronic equipments safety and information protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101275153A CN101140607A (en) 2006-09-07 2006-09-07 Personal electronic equipments safety and information protection method and system

Publications (1)

Publication Number Publication Date
CN101140607A true CN101140607A (en) 2008-03-12

Family

ID=39192556

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101275153A Pending CN101140607A (en) 2006-09-07 2006-09-07 Personal electronic equipments safety and information protection method and system

Country Status (1)

Country Link
CN (1) CN101140607A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
CN102656601A (en) * 2009-10-14 2012-09-05 希亚姆·米谢特 Biometric identification and authentication system for financial accounts
CN103377353A (en) * 2012-04-23 2013-10-30 富泰华工业(深圳)有限公司 Electronic device and touch screen protection method and protection system thereof
CN103885547A (en) * 2014-04-15 2014-06-25 吴江市赛纳电子科技有限公司 Automatic-control adjustable display screen
CN104751218A (en) * 2015-04-13 2015-07-01 京东方科技集团股份有限公司 Electronic certificate and display method thereof
CN105203154A (en) * 2014-06-30 2015-12-30 微动公司 Transmitter equipment and method of monitoring changes in surrounding environment
CN105427500A (en) * 2015-12-30 2016-03-23 联想(北京)有限公司 Control method and controller
WO2017036150A1 (en) * 2015-08-31 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Vehicle door opening control method, apparatus and system
CN108206809A (en) * 2016-12-16 2018-06-26 北京振兴计量测试研究所 A kind of concerning security matters Personnel Authentication Identification System and method
US10043374B2 (en) 2015-12-30 2018-08-07 Lenovo (Beijing) Limited Method, system, and electronic device for monitoring
CN109194769A (en) * 2018-09-30 2019-01-11 上海创功通讯技术有限公司 Indicating means, shared device and the server of shared device use state

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102656601A (en) * 2009-10-14 2012-09-05 希亚姆·米谢特 Biometric identification and authentication system for financial accounts
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
WO2012109840A1 (en) * 2011-02-16 2012-08-23 中兴通讯股份有限公司 Method and device for implementing guard against theft for mobile termianal by face recognition
CN103377353A (en) * 2012-04-23 2013-10-30 富泰华工业(深圳)有限公司 Electronic device and touch screen protection method and protection system thereof
CN103377353B (en) * 2012-04-23 2018-04-17 富泰华工业(深圳)有限公司 Electronic device and its touch screen guard method and protection system
CN103885547A (en) * 2014-04-15 2014-06-25 吴江市赛纳电子科技有限公司 Automatic-control adjustable display screen
CN105203154A (en) * 2014-06-30 2015-12-30 微动公司 Transmitter equipment and method of monitoring changes in surrounding environment
CN104751218B (en) * 2015-04-13 2018-01-23 京东方科技集团股份有限公司 A kind of electronic certificate and its display methods
CN104751218A (en) * 2015-04-13 2015-07-01 京东方科技集团股份有限公司 Electronic certificate and display method thereof
WO2017036150A1 (en) * 2015-08-31 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Vehicle door opening control method, apparatus and system
CN105427500A (en) * 2015-12-30 2016-03-23 联想(北京)有限公司 Control method and controller
US10043374B2 (en) 2015-12-30 2018-08-07 Lenovo (Beijing) Limited Method, system, and electronic device for monitoring
CN108206809A (en) * 2016-12-16 2018-06-26 北京振兴计量测试研究所 A kind of concerning security matters Personnel Authentication Identification System and method
CN109194769A (en) * 2018-09-30 2019-01-11 上海创功通讯技术有限公司 Indicating means, shared device and the server of shared device use state

Similar Documents

Publication Publication Date Title
CN101140607A (en) Personal electronic equipments safety and information protection method and system
CN204463028U (en) A kind of identification apparatus with infrared arousal function
KR100966073B1 (en) Apparatus and method for managing terminal users
CN104808772A (en) Device and method for detecting continuous attaching of head-wearing intelligent device on human body
CN111679861A (en) Wake-up apparatus and method for electronic device, computer device and storage medium
CN106970552B (en) Switch control method, intelligent switch and mobile terminal
CN109767508A (en) School attendance recorder based on recognition of face tool temperature detecting function
CN110516423A (en) Management method, device, electronic equipment and the readable storage medium storing program for executing of electronic equipment
CN107680224A (en) Control method for door lock and device
CN117453441A (en) Abnormality recovery method and device for electronic equipment
EP1542180A1 (en) Electronic data processing device
CN107274590A (en) A kind of monitoring system, method, device, financial machine and tool and storage medium
CN109946495A (en) Ammeter box managing and control system based on smart lock
CN107861623A (en) A kind of terminal control method, device, terminal and readable storage medium storing program for executing
CN210052214U (en) Device for identifying personnel identity information in oil field operation area
WO2018227475A1 (en) Fingerprint chip detection method, device and system
CN109754345A (en) System and method for carrying out examinee's assessment based on fail-safe computer
CN112150691A (en) Face recognition machine with automatic body temperature measuring function and face recognition system thereof
CN104484968B (en) Method, device and system for human detection
CN203759811U (en) Intelligent household monitor alarm system
CN108108196B (en) Wake-up device, wake-up system, wake-up method and device
CN206849138U (en) Recognition of face building residence intercom and intercom system
CN106291016A (en) A kind of intelligent electric meter preventing power stealing
CN206656761U (en) Historical relic's protection device based on wireless sensor network
CN206991471U (en) A kind of monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080312