CN108875346A - A kind of method and apparatus antitheft suitable for computerized information - Google Patents

A kind of method and apparatus antitheft suitable for computerized information Download PDF

Info

Publication number
CN108875346A
CN108875346A CN201810689169.0A CN201810689169A CN108875346A CN 108875346 A CN108875346 A CN 108875346A CN 201810689169 A CN201810689169 A CN 201810689169A CN 108875346 A CN108875346 A CN 108875346A
Authority
CN
China
Prior art keywords
information
user
electronic tag
people
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810689169.0A
Other languages
Chinese (zh)
Inventor
邵洪贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Original Assignee
Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lang Jin Anti-Counterfeit Technology Co Ltd filed Critical Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Priority to CN201810689169.0A priority Critical patent/CN108875346A/en
Publication of CN108875346A publication Critical patent/CN108875346A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The object of the present invention is to provide a kind of method and apparatus antitheft suitable for computerized information, steal computerized information to solve current scene, anti-theft technique has the problems such as being stolen, password is forgotten using the method for being manually entered password, this method;A kind of antitheft method and apparatus of computerized information provided by the invention are based on technology of Internet of things, using RFID technique, speech recognition technology and image recognition technology, by acquiring user's information, including audio-frequency information and image information, while authorizing user's electronic tag;Based on RFID technique, people information is identified;Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It identifies people information, determines whether people information is user, then authorizes the right to use if it is user, if not warning message will be sent;Multi-ply air defense system may be implemented, it is ensured that information is not revealed, while also having warning function, sound assurance computer information safe.

Description

A kind of method and apparatus antitheft suitable for computerized information
Technical field
The present invention relates to information theft-preventing technical field, more particularly to a kind of method antitheft suitable for computerized information and Device.
Background technique
It improves to the understanding of information theft-preventing importance, enhances prevention awareness, strengthen management, using legal means and relevant The network theftproof precautionary measures and key technology are the important guarantee and precondition for guaranteeing computer information safe.
Computerized information is stolen can be divided into two classes, and it is stolen that one is networks, mainly take network theftproof mode at present, subtract Few computer system loophole, relating computer the methods of are not surfed the Internet, and another kind is scene copy computerized information, anti-theft technique master There is the problems such as being stolen, password is forgotten using the method for being manually entered password, this method.
Summary of the invention
The object of the present invention is to provide a kind of method and apparatus antitheft suitable for computerized information, to solve scene at present Computerized information is stolen, anti-theft technique is using the method for being manually entered password, and this method, which exists, to be stolen, and password forgetting etc. is asked Topic.
In a first aspect, a kind of method antitheft suitable for computerized information, the method includes:
Step S101:User's information, including audio-frequency information and image information are acquired, while authorizing user's electronic tag;
Step S102:Based on RFID technique, people information is identified;
Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Step S104:It identifies people information, determines whether people information is user, then authorizes the right to use if it is user, If not warning message will be sent.
In conjunction with the application's in a first aspect, in second of embodiment of the application first aspect, step S101:It adopts Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;It further include acquisition personage's fingerprint Information.
In conjunction with the application's in a first aspect, in the third embodiment of the application first aspect, step S101:It adopts Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag includes only One identification code.
In conjunction with the application's in a first aspect, in the 4th kind of embodiment of the application first aspect, step S103:Just Step determines permission, if it is decided that passes through, then authorizes booting permission;It is described to determine to include whether personage has the electronic tag, Whether the electronic tag has permission.
In conjunction with the application's in a first aspect, in the 5th kind of embodiment of the application first aspect, step S104:Know Other people information determines whether people information is user, then authorizes the right to use if it is user, if not will send report Alert information, the identification people information are audio-frequency information or image information.
Second aspect, one kind being suitable for computerized information anti-theft device, the method includes:
Acquisition unit:For acquiring user's information, including audio-frequency information and image information, while authorizing user's electronics mark Label;
First recognition unit:For being based on RFID technique, people information is identified;
Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user The right to use, if not warning message will be sent.
In conjunction with the second aspect of the application, in second of embodiment of the application second aspect, acquisition unit:With In acquisition user's information, including audio-frequency information and image information, while authorizing user's electronic tag;It further include acquisition personage Finger print information.
In conjunction with the second aspect of the application, in the third embodiment of the application second aspect, acquisition unit:With In acquisition user's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag packet Include unique identifier.
In conjunction with the second aspect of the application, in the 4th kind of embodiment of the application second aspect, judging unit:With In preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It is described to determine to include whether personage has the electronics mark Whether label, the electronic tag have permission.
In conjunction with the second aspect of the application, in the 5th kind of embodiment of the application second aspect, the second identification is single Member:People information for identification determines whether people information is user, the right to use is then authorized if it is user, if not It is that will send warning message, the identification people information is audio-frequency information or image information.
From the above technical scheme:The object of the present invention is to provide a kind of method and apparatus that computerized information is antitheft, Computerized information is stolen to solve current scene, using the method for being manually entered password, this method exists to be stolen anti-theft technique, The problems such as password is forgotten;A kind of antitheft method and apparatus of computerized information provided by the invention are based on technology of Internet of things, use RFID technology, speech recognition technology and image recognition technology, may be implemented multi-ply air defense system, it is ensured that information is not revealed, together When also there is warning function, sound assurance computer information safe.
Detailed description of the invention
Some specific embodiments of the present invention is described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter. Identical appended drawing reference denotes same or similar part or part in attached drawing.It should be appreciated by those skilled in the art that these What attached drawing was not necessarily drawn to scale.
In attached drawing:Fig. 1 is a kind of method flow diagram that computerized information is antitheft provided by the embodiments of the present application.
Specific embodiment
This following will be combined with the drawings in the embodiments of the present invention, technical solution in the embodiment of the present invention carry out it is clear, Complete description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
As shown in Figure 1, being a kind of method flow diagram that computerized information is antitheft.
In a first aspect, a kind of method that computerized information is antitheft, the method includes:
Step S101:User's information, including audio-frequency information and image information are acquired, while authorizing user's electronic tag;
Step S102:Based on RFID technique, people information is identified;
Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Step S104:It identifies people information, determines whether people information is user, then authorizes the right to use if it is user, If not warning message will be sent.
The object of the present invention is to provide a kind of methods that computerized information is antitheft, steal trusted computer to solve current scene There is the problems such as being stolen, password is forgotten using the method for being manually entered password, this method in breath, anti-theft technique;The present invention provides A kind of antitheft method of computerized information, be based on technology of Internet of things, using RFID technique, speech recognition technology and image are known Other technology, may be implemented multi-ply air defense system, it is ensured that information is not revealed, while also having warning function, sound assurance meter Calculate machine information safety.
Further, step S101:User's information, including audio-frequency information and image information are acquired, while authorizing use Person's electronic tag;It further include acquisition personage's finger print information.
Further, step S101:User's information, including audio-frequency information and image information are acquired, while authorizing use Person's electronic tag;The electronic tag includes unique identifier.
Further, step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;The judgement packet Include whether personage has the electronic tag, whether the electronic tag has permission.
Further, in the 5th kind of embodiment of the application first aspect, step S104:Identify people information, Determine whether people information is user, then authorizes the right to use if it is user, it is described if not warning message will be sent Identify that people information is audio-frequency information or image information.
Second aspect, a kind of device that computerized information is antitheft, the method includes:
Acquisition unit:For acquiring user's information, including audio-frequency information and image information, while authorizing user's electronics mark Label;
First recognition unit:For being based on RFID technique, people information is identified;
Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user The right to use, if not warning message will be sent.
Further, acquisition unit:For acquiring user's information, including audio-frequency information and image information, authorize simultaneously User's electronic tag;It further include acquisition personage's finger print information.
Further, acquisition unit:For acquiring user's information, including audio-frequency information and image information, authorize simultaneously User's electronic tag;The electronic tag includes unique identifier.
Further, judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It is described to sentence Surely include whether personage has the electronic tag, whether the electronic tag has permission.
Further the second recognition unit:People information for identification determines whether people information is user, if it is User then authorizes the right to use, and if not that will send warning message, the identification people information is audio-frequency information or image Information.
From the above technical scheme:The object of the present invention is to provide a kind of method antitheft suitable for computerized information and Device steals computerized information to solve current scene, and anti-theft technique is using the method for being manually entered password, and there are quilts for this method Steal, password forget the problems such as;A kind of antitheft method and apparatus of computerized information provided by the invention are based on Internet of Things skill Art, using RFID technology, speech recognition technology and image recognition technology, by acquiring user's information, including audio-frequency information And image information, while authorizing user's electronic tag;Based on RFID technique, people information is identified;Preliminary judgement permission, such as Fruit determines to pass through, then authorizes booting permission;It identifies people information, determines whether people information is user, if it is user The right to use is then authorized, if not warning message will be sent;Multi-ply air defense system may be implemented, it is ensured that information is not revealed, simultaneously Also there is warning function, sound assurance computer information safe.
So far, although those skilled in the art will appreciate that present invention has been shown and described in detail herein multiple shows Example property embodiment still without departing from the spirit and scope of the present invention, still can according to the present disclosure directly Determine or deduce out many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers all such other variations or modifications.

Claims (6)

1. a kind of method antitheft suitable for computerized information, which is characterized in that the method includes:Step S101:Acquisition makes User's information, including audio-frequency information and image information, while authorizing user's electronic tag;Step S102:Based on RFID technique, Identify people information;Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;Step S104:Identification People information determines whether people information is user, then authorizes the right to use if it is user, if not will send alarm Information.
2. the method according to claim 1, wherein step S101:Acquire user's information, including audio-frequency information And image information, while authorizing user's electronic tag;It further include acquisition personage's finger print information.
3. the method according to claim 1, wherein step S101:Acquire user's information, including audio-frequency information And image information, while authorizing user's electronic tag;The electronic tag includes unique identifier.
4. the method according to claim 1, wherein step S103:Preliminary judgement permission, if it is decided that pass through, Then authorize booting permission;Described to determine to include whether personage has the electronic tag, whether the electronic tag has permission.
5. the method according to claim 1, wherein step S104:It identifies people information, determines that people information is No is user, then authorizes the right to use if it is user, and if not will send warning message, the identification people information is Audio-frequency information or image information.
6. a kind of device antitheft suitable for computerized information, which is characterized in that described device includes:Acquisition unit:For adopting Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;First recognition unit:For Based on RFID technique, people information is identified;Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting power Limit;Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user The right to use, if not warning message will be sent;The acquisition unit:For acquiring user's information, including audio-frequency information and Image information, while authorizing user's electronic tag;It further include acquisition personage's finger print information;The acquisition unit:For acquiring User's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag includes unique Identification code;The judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;The judgement includes Whether personage has the electronic tag, and whether the electronic tag has permission;Second recognition unit:People for identification Object information determines whether people information is user, then authorizes the right to use if it is user, if not will send alarm Information, the identification people information are audio-frequency information or image information.
CN201810689169.0A 2018-06-28 2018-06-28 A kind of method and apparatus antitheft suitable for computerized information Withdrawn CN108875346A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810689169.0A CN108875346A (en) 2018-06-28 2018-06-28 A kind of method and apparatus antitheft suitable for computerized information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810689169.0A CN108875346A (en) 2018-06-28 2018-06-28 A kind of method and apparatus antitheft suitable for computerized information

Publications (1)

Publication Number Publication Date
CN108875346A true CN108875346A (en) 2018-11-23

Family

ID=64296524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810689169.0A Withdrawn CN108875346A (en) 2018-06-28 2018-06-28 A kind of method and apparatus antitheft suitable for computerized information

Country Status (1)

Country Link
CN (1) CN108875346A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299603A (en) * 2018-09-27 2019-02-01 郑州云海信息技术有限公司 A kind of guard method of server, system and relevant apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299603A (en) * 2018-09-27 2019-02-01 郑州云海信息技术有限公司 A kind of guard method of server, system and relevant apparatus

Similar Documents

Publication Publication Date Title
US9983551B2 (en) Intelligent switching
CN108023943A (en) APP controls Vehicular system
JP2007024543A (en) Safety inspection system
JP2008186321A (en) Qualification management system, managing device and qualification management program
CN212009680U (en) Intelligent entrance guard monitoring system for computer room
US20190068924A1 (en) Monitoring system having personal information protection function and method thereof
CN108875346A (en) A kind of method and apparatus antitheft suitable for computerized information
CN105118117B (en) Entrance guard recognition device and recognition methods
CN112332990B (en) Safety control method, device and storage medium for commanding and dispatching agents
CN112416954A (en) Multi-user mode management method for electric power tool and computer storage medium
CN110084008A (en) A method of it is antitheft for computerized information
CN108154016A (en) A kind of antitheft method and apparatus of computerized information
EP2690574A1 (en) Method and system for digital content online reading authentication
CN109229060A (en) A kind of method for retrieving and retrieving system of stolen vehicle
CN109840456B (en) Biological recognition device applied to receiving and delivering, receiving and delivering management system and method
CN110956732A (en) Safety entrance guard based on thing networking
CN110717770A (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
WO2012083456A1 (en) Biometric authentication system and method
WO2016075139A1 (en) Sobriety test authentication process and device
CN111541780B (en) Intelligent gateway based on cloud platform
CN109194672A (en) A kind of network intrusions warning system and method based on man machine language's interaction
JP2002197065A (en) Notification system for abnormal state such as theft and confinement in personal identification
KR20220034967A (en) Method for Measuring Drinking Based on Non-Face-to-Face
TWM591182U (en) Intelligent watch
CN109510837A (en) A kind of user authority management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181123