CN108875346A - A kind of method and apparatus antitheft suitable for computerized information - Google Patents
A kind of method and apparatus antitheft suitable for computerized information Download PDFInfo
- Publication number
- CN108875346A CN108875346A CN201810689169.0A CN201810689169A CN108875346A CN 108875346 A CN108875346 A CN 108875346A CN 201810689169 A CN201810689169 A CN 201810689169A CN 108875346 A CN108875346 A CN 108875346A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- electronic tag
- people
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
The object of the present invention is to provide a kind of method and apparatus antitheft suitable for computerized information, steal computerized information to solve current scene, anti-theft technique has the problems such as being stolen, password is forgotten using the method for being manually entered password, this method;A kind of antitheft method and apparatus of computerized information provided by the invention are based on technology of Internet of things, using RFID technique, speech recognition technology and image recognition technology, by acquiring user's information, including audio-frequency information and image information, while authorizing user's electronic tag;Based on RFID technique, people information is identified;Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It identifies people information, determines whether people information is user, then authorizes the right to use if it is user, if not warning message will be sent;Multi-ply air defense system may be implemented, it is ensured that information is not revealed, while also having warning function, sound assurance computer information safe.
Description
Technical field
The present invention relates to information theft-preventing technical field, more particularly to a kind of method antitheft suitable for computerized information and
Device.
Background technique
It improves to the understanding of information theft-preventing importance, enhances prevention awareness, strengthen management, using legal means and relevant
The network theftproof precautionary measures and key technology are the important guarantee and precondition for guaranteeing computer information safe.
Computerized information is stolen can be divided into two classes, and it is stolen that one is networks, mainly take network theftproof mode at present, subtract
Few computer system loophole, relating computer the methods of are not surfed the Internet, and another kind is scene copy computerized information, anti-theft technique master
There is the problems such as being stolen, password is forgotten using the method for being manually entered password, this method.
Summary of the invention
The object of the present invention is to provide a kind of method and apparatus antitheft suitable for computerized information, to solve scene at present
Computerized information is stolen, anti-theft technique is using the method for being manually entered password, and this method, which exists, to be stolen, and password forgetting etc. is asked
Topic.
In a first aspect, a kind of method antitheft suitable for computerized information, the method includes:
Step S101:User's information, including audio-frequency information and image information are acquired, while authorizing user's electronic tag;
Step S102:Based on RFID technique, people information is identified;
Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Step S104:It identifies people information, determines whether people information is user, then authorizes the right to use if it is user,
If not warning message will be sent.
In conjunction with the application's in a first aspect, in second of embodiment of the application first aspect, step S101:It adopts
Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;It further include acquisition personage's fingerprint
Information.
In conjunction with the application's in a first aspect, in the third embodiment of the application first aspect, step S101:It adopts
Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag includes only
One identification code.
In conjunction with the application's in a first aspect, in the 4th kind of embodiment of the application first aspect, step S103:Just
Step determines permission, if it is decided that passes through, then authorizes booting permission;It is described to determine to include whether personage has the electronic tag,
Whether the electronic tag has permission.
In conjunction with the application's in a first aspect, in the 5th kind of embodiment of the application first aspect, step S104:Know
Other people information determines whether people information is user, then authorizes the right to use if it is user, if not will send report
Alert information, the identification people information are audio-frequency information or image information.
Second aspect, one kind being suitable for computerized information anti-theft device, the method includes:
Acquisition unit:For acquiring user's information, including audio-frequency information and image information, while authorizing user's electronics mark
Label;
First recognition unit:For being based on RFID technique, people information is identified;
Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user
The right to use, if not warning message will be sent.
In conjunction with the second aspect of the application, in second of embodiment of the application second aspect, acquisition unit:With
In acquisition user's information, including audio-frequency information and image information, while authorizing user's electronic tag;It further include acquisition personage
Finger print information.
In conjunction with the second aspect of the application, in the third embodiment of the application second aspect, acquisition unit:With
In acquisition user's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag packet
Include unique identifier.
In conjunction with the second aspect of the application, in the 4th kind of embodiment of the application second aspect, judging unit:With
In preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It is described to determine to include whether personage has the electronics mark
Whether label, the electronic tag have permission.
In conjunction with the second aspect of the application, in the 5th kind of embodiment of the application second aspect, the second identification is single
Member:People information for identification determines whether people information is user, the right to use is then authorized if it is user, if not
It is that will send warning message, the identification people information is audio-frequency information or image information.
From the above technical scheme:The object of the present invention is to provide a kind of method and apparatus that computerized information is antitheft,
Computerized information is stolen to solve current scene, using the method for being manually entered password, this method exists to be stolen anti-theft technique,
The problems such as password is forgotten;A kind of antitheft method and apparatus of computerized information provided by the invention are based on technology of Internet of things, use
RFID technology, speech recognition technology and image recognition technology, may be implemented multi-ply air defense system, it is ensured that information is not revealed, together
When also there is warning function, sound assurance computer information safe.
Detailed description of the invention
Some specific embodiments of the present invention is described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter.
Identical appended drawing reference denotes same or similar part or part in attached drawing.It should be appreciated by those skilled in the art that these
What attached drawing was not necessarily drawn to scale.
In attached drawing:Fig. 1 is a kind of method flow diagram that computerized information is antitheft provided by the embodiments of the present application.
Specific embodiment
This following will be combined with the drawings in the embodiments of the present invention, technical solution in the embodiment of the present invention carry out it is clear,
Complete description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
His embodiment, shall fall within the protection scope of the present invention.
As shown in Figure 1, being a kind of method flow diagram that computerized information is antitheft.
In a first aspect, a kind of method that computerized information is antitheft, the method includes:
Step S101:User's information, including audio-frequency information and image information are acquired, while authorizing user's electronic tag;
Step S102:Based on RFID technique, people information is identified;
Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Step S104:It identifies people information, determines whether people information is user, then authorizes the right to use if it is user,
If not warning message will be sent.
The object of the present invention is to provide a kind of methods that computerized information is antitheft, steal trusted computer to solve current scene
There is the problems such as being stolen, password is forgotten using the method for being manually entered password, this method in breath, anti-theft technique;The present invention provides
A kind of antitheft method of computerized information, be based on technology of Internet of things, using RFID technique, speech recognition technology and image are known
Other technology, may be implemented multi-ply air defense system, it is ensured that information is not revealed, while also having warning function, sound assurance meter
Calculate machine information safety.
Further, step S101:User's information, including audio-frequency information and image information are acquired, while authorizing use
Person's electronic tag;It further include acquisition personage's finger print information.
Further, step S101:User's information, including audio-frequency information and image information are acquired, while authorizing use
Person's electronic tag;The electronic tag includes unique identifier.
Further, step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;The judgement packet
Include whether personage has the electronic tag, whether the electronic tag has permission.
Further, in the 5th kind of embodiment of the application first aspect, step S104:Identify people information,
Determine whether people information is user, then authorizes the right to use if it is user, it is described if not warning message will be sent
Identify that people information is audio-frequency information or image information.
Second aspect, a kind of device that computerized information is antitheft, the method includes:
Acquisition unit:For acquiring user's information, including audio-frequency information and image information, while authorizing user's electronics mark
Label;
First recognition unit:For being based on RFID technique, people information is identified;
Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;
Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user
The right to use, if not warning message will be sent.
Further, acquisition unit:For acquiring user's information, including audio-frequency information and image information, authorize simultaneously
User's electronic tag;It further include acquisition personage's finger print information.
Further, acquisition unit:For acquiring user's information, including audio-frequency information and image information, authorize simultaneously
User's electronic tag;The electronic tag includes unique identifier.
Further, judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;It is described to sentence
Surely include whether personage has the electronic tag, whether the electronic tag has permission.
Further the second recognition unit:People information for identification determines whether people information is user, if it is
User then authorizes the right to use, and if not that will send warning message, the identification people information is audio-frequency information or image
Information.
From the above technical scheme:The object of the present invention is to provide a kind of method antitheft suitable for computerized information and
Device steals computerized information to solve current scene, and anti-theft technique is using the method for being manually entered password, and there are quilts for this method
Steal, password forget the problems such as;A kind of antitheft method and apparatus of computerized information provided by the invention are based on Internet of Things skill
Art, using RFID technology, speech recognition technology and image recognition technology, by acquiring user's information, including audio-frequency information
And image information, while authorizing user's electronic tag;Based on RFID technique, people information is identified;Preliminary judgement permission, such as
Fruit determines to pass through, then authorizes booting permission;It identifies people information, determines whether people information is user, if it is user
The right to use is then authorized, if not warning message will be sent;Multi-ply air defense system may be implemented, it is ensured that information is not revealed, simultaneously
Also there is warning function, sound assurance computer information safe.
So far, although those skilled in the art will appreciate that present invention has been shown and described in detail herein multiple shows
Example property embodiment still without departing from the spirit and scope of the present invention, still can according to the present disclosure directly
Determine or deduce out many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is understood that and recognizes
It is set to and covers all such other variations or modifications.
Claims (6)
1. a kind of method antitheft suitable for computerized information, which is characterized in that the method includes:Step S101:Acquisition makes
User's information, including audio-frequency information and image information, while authorizing user's electronic tag;Step S102:Based on RFID technique,
Identify people information;Step S103:Preliminary judgement permission, if it is decided that pass through, then authorize booting permission;Step S104:Identification
People information determines whether people information is user, then authorizes the right to use if it is user, if not will send alarm
Information.
2. the method according to claim 1, wherein step S101:Acquire user's information, including audio-frequency information
And image information, while authorizing user's electronic tag;It further include acquisition personage's finger print information.
3. the method according to claim 1, wherein step S101:Acquire user's information, including audio-frequency information
And image information, while authorizing user's electronic tag;The electronic tag includes unique identifier.
4. the method according to claim 1, wherein step S103:Preliminary judgement permission, if it is decided that pass through,
Then authorize booting permission;Described to determine to include whether personage has the electronic tag, whether the electronic tag has permission.
5. the method according to claim 1, wherein step S104:It identifies people information, determines that people information is
No is user, then authorizes the right to use if it is user, and if not will send warning message, the identification people information is
Audio-frequency information or image information.
6. a kind of device antitheft suitable for computerized information, which is characterized in that described device includes:Acquisition unit:For adopting
Collect user's information, including audio-frequency information and image information, while authorizing user's electronic tag;First recognition unit:For
Based on RFID technique, people information is identified;Judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting power
Limit;Second recognition unit:People information for identification determines whether people information is user, is then authorized if it is user
The right to use, if not warning message will be sent;The acquisition unit:For acquiring user's information, including audio-frequency information and
Image information, while authorizing user's electronic tag;It further include acquisition personage's finger print information;The acquisition unit:For acquiring
User's information, including audio-frequency information and image information, while authorizing user's electronic tag;The electronic tag includes unique
Identification code;The judging unit:For preliminary judgement permission, if it is decided that pass through, then authorize booting permission;The judgement includes
Whether personage has the electronic tag, and whether the electronic tag has permission;Second recognition unit:People for identification
Object information determines whether people information is user, then authorizes the right to use if it is user, if not will send alarm
Information, the identification people information are audio-frequency information or image information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810689169.0A CN108875346A (en) | 2018-06-28 | 2018-06-28 | A kind of method and apparatus antitheft suitable for computerized information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810689169.0A CN108875346A (en) | 2018-06-28 | 2018-06-28 | A kind of method and apparatus antitheft suitable for computerized information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108875346A true CN108875346A (en) | 2018-11-23 |
Family
ID=64296524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810689169.0A Withdrawn CN108875346A (en) | 2018-06-28 | 2018-06-28 | A kind of method and apparatus antitheft suitable for computerized information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875346A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109299603A (en) * | 2018-09-27 | 2019-02-01 | 郑州云海信息技术有限公司 | A kind of guard method of server, system and relevant apparatus |
-
2018
- 2018-06-28 CN CN201810689169.0A patent/CN108875346A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109299603A (en) * | 2018-09-27 | 2019-02-01 | 郑州云海信息技术有限公司 | A kind of guard method of server, system and relevant apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9983551B2 (en) | Intelligent switching | |
CN108023943A (en) | APP controls Vehicular system | |
JP2007024543A (en) | Safety inspection system | |
JP2008186321A (en) | Qualification management system, managing device and qualification management program | |
CN212009680U (en) | Intelligent entrance guard monitoring system for computer room | |
US20190068924A1 (en) | Monitoring system having personal information protection function and method thereof | |
CN108875346A (en) | A kind of method and apparatus antitheft suitable for computerized information | |
CN105118117B (en) | Entrance guard recognition device and recognition methods | |
CN112332990B (en) | Safety control method, device and storage medium for commanding and dispatching agents | |
CN112416954A (en) | Multi-user mode management method for electric power tool and computer storage medium | |
CN110084008A (en) | A method of it is antitheft for computerized information | |
CN108154016A (en) | A kind of antitheft method and apparatus of computerized information | |
EP2690574A1 (en) | Method and system for digital content online reading authentication | |
CN109229060A (en) | A kind of method for retrieving and retrieving system of stolen vehicle | |
CN109840456B (en) | Biological recognition device applied to receiving and delivering, receiving and delivering management system and method | |
CN110956732A (en) | Safety entrance guard based on thing networking | |
CN110717770A (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
WO2012083456A1 (en) | Biometric authentication system and method | |
WO2016075139A1 (en) | Sobriety test authentication process and device | |
CN111541780B (en) | Intelligent gateway based on cloud platform | |
CN109194672A (en) | A kind of network intrusions warning system and method based on man machine language's interaction | |
JP2002197065A (en) | Notification system for abnormal state such as theft and confinement in personal identification | |
KR20220034967A (en) | Method for Measuring Drinking Based on Non-Face-to-Face | |
TWM591182U (en) | Intelligent watch | |
CN109510837A (en) | A kind of user authority management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181123 |