CN110909334A - Information system security peep-proof method, device, electronic equipment and storage medium - Google Patents

Information system security peep-proof method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110909334A
CN110909334A CN201911201807.0A CN201911201807A CN110909334A CN 110909334 A CN110909334 A CN 110909334A CN 201911201807 A CN201911201807 A CN 201911201807A CN 110909334 A CN110909334 A CN 110909334A
Authority
CN
China
Prior art keywords
information system
operator
portrait picture
portrait
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911201807.0A
Other languages
Chinese (zh)
Inventor
郝海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Original Assignee
HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN filed Critical HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Priority to CN201911201807.0A priority Critical patent/CN110909334A/en
Publication of CN110909334A publication Critical patent/CN110909334A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Controls And Circuits For Display Device (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention provides a method and a device for safe peep prevention of an information system, electronic equipment and a storage medium, wherein the method comprises the following steps: when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system; generating a portrait picture of an operator through a video stream of the operator acquired in real time; calculating a difference value between a portrait picture of an operator and a portrait picture of an information system account owner; and judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peeped, and otherwise, determining that the information system is not peeped. By the method provided by the embodiment of the invention, the identity of the operator can be monitored in real time in any scene, so that the safety of the information system is greatly improved, the risk of the system is reduced, and the safety of the information system is ensured.

Description

Information system security peep-proof method, device, electronic equipment and storage medium
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a method and a device for security peep prevention of an information system, electronic equipment and a storage medium.
Background
With the wide application of information systems in national enterprises, various data are managed by all enterprises through computer systems, and many data are invisible to others except the system account, so that other data are not allowed to be involved. However, in practice, there are some people who steal and see system data on the spot to achieve their own purpose, and the interests of others and enterprises are damaged, and the problem of security technology inspection is becoming more and more prominent, and becoming an important ring that is not negligible for each system.
The traditional information system management methods are divided into two methods, the first method is physical isolation, namely, an office for operating the information system is isolated from the outside, other personnel are not allowed to enter the system, and the authority can be obtained only by applying for use; the second is system software isolation, which uses account password for isolation. However, these are far from sufficient, and in practice, the undesirable molecules are always in contact with the system in various ways, and as long as they are in contact with the system, they can steal the system information, and the user neglects a little bit, which will cause a serious security accident. In the information-oriented era, the information security problem can be achieved without loss by simple physical isolation and technical isolation, and the traditional management and inspection means cannot completely meet the requirements of the security work of an information system under a new situation.
Disclosure of Invention
To overcome the existing problems or at least partially solve the problems, embodiments of the present invention provide a method, an apparatus, an electronic device, and a storage medium for security and anti-peeping of an information system.
According to a first aspect of the embodiments of the present invention, there is provided a method for security and peep-proof of an information system, including:
when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system;
generating a portrait picture of an operator through a video stream of the operator acquired in real time;
calculating a difference value between a portrait picture of an operator and a portrait picture of an information system account owner;
and judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
Further, when the operator logs in the information system, the acquiring of the portrait image of the account owner of the information system includes:
when an operator logs in an information system, a plurality of portrait pictures uploaded by an account owner of the information system during system registration are obtained, and an account owner portrait picture sequence is formed.
Further, the generating the operator portrait picture through the video stream of the operator acquired in real time includes:
and calling a BOM interface to obtain a video stream when an operator logs in the information system, periodically generating a portrait picture of the operator, and forming an operator portrait picture sequence.
Further, the forming of the portrait picture sequence of the operator further includes:
and screening according to the time sequence, and acquiring the newly generated preset number of operator portrait pictures from the portrait picture sequence of the operator.
Further, the calculating the difference between the portrait of the operator and the portrait of the information system account owner includes:
calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
Further, the determining whether the difference value is greater than the difference threshold value, if so, the information system is peened, otherwise, the method further includes:
when the information system is peeked, automatically transferring to a login page of the information system and quitting the information system;
when the information system is not peered, the operator continues to use the information system.
According to a second aspect of the embodiments of the present invention, there is provided an information system security peep-proof device, including:
the acquisition module is used for acquiring a portrait picture of an account owner of the information system when an operator logs in the information system;
the generation module is used for generating a portrait picture of an operator through a video stream of the operator acquired in real time;
the calculation module is used for calculating a difference value between the portrait picture of the operator and the portrait picture of the information system account owner;
and the determining module is used for judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
Further, calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
correspondingly, the determining module is specifically configured to:
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
According to a third aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor calls the program instruction to perform the method for security and anti-peeping of an information system provided in any one of the various possible implementations of the first aspect.
According to a fourth aspect of the embodiments of the present invention, there is also provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for security and privacy protection of an information system provided in any one of the various possible implementations of the first aspect.
The embodiment of the invention provides a method and a device for preventing an information system from being peeped, which can prevent the information system from being peeped or not by comparing a portrait picture of an operator with a portrait picture of an account owner of the information system, so that the identity of the operator can be monitored in real time in any scene, the safety of the information system is greatly improved, the risk of the system is reduced, and the safety of the information system is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic overall flow chart of a method for security and anti-peeping of an information system according to an embodiment of the present invention;
FIG. 2 is a flowchart of the method for security and anti-peeping of an information system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a comparison of a portrait image of an operator with a portrait image of an information system account owner;
fig. 4 is a schematic view of an overall structure of a device for security and peep prevention of an information system according to an embodiment of the present invention;
fig. 5 is a schematic view of an overall structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
In an embodiment of the present invention, a method for security peeping prevention of an information system is provided, and fig. 1 is a schematic overall flow chart of the method for security peeping prevention of an information system provided in the embodiment of the present invention, where the method includes:
when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system;
generating a portrait picture of an operator through a video stream of the operator acquired in real time;
calculating a difference value between a portrait picture of an operator and a portrait picture of an information system account owner;
and judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
It can be understood that, in practice, for the information systems of each enterprise, there is a situation that someone steals and watches the system data on the spot to achieve the purpose of oneself, harm the interests of others and enterprises, and the security technology inspection problem is increasingly prominent, which becomes an important part that each system is not negligible. According to the embodiment of the invention, when the information system is ensured to be peeped, the portrait picture of the operator is compared with the portrait picture of the account owner of the information system to prevent the information system from being peeped, so that the identity of the operator can be monitored in real time in any scene, the safety of the information system is greatly improved, the risk of the information system is reduced, and the safety of the information system is ensured.
On the basis of the above embodiment, in the embodiment of the present invention, when the operator logs in the information system, acquiring the portrait image of the account owner of the information system includes:
when an operator logs in an information system, a plurality of portrait pictures uploaded by an account owner of the information system during system registration are obtained, and an account owner portrait picture sequence is formed.
It can be understood that when the owner performs system registration, a plurality of portrait pictures including portrait pictures with different expressions and different orientations are uploaded to form a portrait picture sequence of the owner of the account of the information system.
On the basis of the above embodiment, in the embodiment of the present invention, generating a portrait picture of an operator through a video stream of the operator acquired in real time includes:
and calling a BOM interface to obtain a video stream when an operator logs in the information system, periodically generating a portrait picture of the operator, and forming a portrait picture sequence of the operator.
It can be understood that when an operator logs in the information system, the camera is started to acquire a video stream of the operator logging in the information system, and a portrait picture of the operator is periodically generated according to the acquired video stream of the operator to form a portrait picture sequence of the operator. For example, a series of portrait pictures of the operator are generated at a cycle of 60ms from a video stream taken when the operator logs in the information system.
On the basis of the above embodiment, in the embodiment of the present invention, after forming the portrait picture sequence of the operator, the method further includes:
and screening according to the time sequence, and acquiring the newly generated preset number of portrait pictures from the portrait picture sequence of the operator.
It is understood that the foregoing embodiment periodically generates a series of operator portrait image sequences according to time, and in the generated series of operator portrait image sequences, the operator portrait image sequences are screened according to time sequence, and a preset number of latest generated portrait images are acquired from the operator portrait image sequences. For example, 10 newly generated portrait images of the operator are obtained by time screening.
On the basis of the above embodiment, in the embodiment of the present invention, calculating the difference between the portrait image of the operator and the portrait image of the information system account owner includes:
calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
It can be understood that in the foregoing embodiment, a plurality of operator portrait pictures and portrait pictures of the information system account owner are acquired. In this embodiment, a difference value between each operator portrait picture and each account owner portrait picture is calculated to obtain a difference value matrix. For example, if there are 15 portrait pictures of the account owner and 10 portrait pictures of the operator, the difference quality between each portrait picture of the operator and each portrait picture of the account owner is calculated, so that total 11 × 15 to 150 difference values are obtained, a difference value matrix of 10 × 15 may be formed, and then the average value of the 150 difference values is calculated to obtain the average difference value.
And judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
On the basis of the foregoing embodiments, in an embodiment of the present invention, it is determined whether the difference is greater than the difference threshold, if so, the information system is peened, otherwise, the method further includes:
when the information system is peeked, automatically transferring to a login page of the information system and quitting the information system;
when the information system is not peered, the operator continues to use the information system.
It can be understood that when the information system is peeked, the operator needs to be prevented from continuing to use the information system, automatically turning to the login page of the information system and quitting the information system; if the information system is not peened, the operator continues to use the information system, and the purpose of safety and peering prevention of the information system is achieved.
The following describes a method for security and anti-peeping of an information system according to an embodiment of the present invention with reference to fig. 2 and 3.
When an operator logs in an information system, a video stream of the operator is obtained, a series of portrait pictures of the operator are generated according to the video stream, 10 newly generated portrait pictures are selected from the portrait pictures and stored in a list2, the portrait pictures in the list2 are represented as p21, p22 …, and p2m, and m is 10 in the embodiment. According to time, 10 portrait pictures of an information system account owner are obtained and stored in a list1, the portrait pictures in the list1 are represented as p11, p12 …, and p1n, wherein in the embodiment, n is 15.
And storing the obtained portrait picture sequence of the owner of the information system account and the portrait picture sequence of the operator into a calculation queue by 150-150 pixels. Calculating difference values of each portrait picture (namely the portrait picture of the information system account owner) in the list1 and each portrait picture (namely the portrait picture of the operator) in the list2, calculating an average value of the difference values, judging whether the average value exceeds a difference threshold value, and if so, indicating that the information system is peeped; if not, the information system is not peeked.
If the information system is peeked, an operator needs to be prevented from continuously using the information system, and the operator automatically transfers to a login page of the information system and quits the information system; if the information system is not peened, the operator continues to use the information system, and the purpose of safety and peering prevention of the information system is achieved.
In another embodiment of the present invention, an information system security peep-proof device is provided, which is used for implementing the method in the foregoing embodiments. Therefore, the descriptions and definitions in the embodiments of the method for security and anti-peeping of the information system may be used for understanding the execution modules in the embodiments of the present invention. Fig. 4 is a schematic view of an overall structure of an information system security peep-proof device according to an embodiment of the present invention, where the device includes an obtaining module 41, a generating module 42, a calculating module 43, and a determining module 44.
The acquisition module 41 is used for acquiring a portrait picture of an account owner of an information system when an operator logs in the information system;
the generating module 42 is used for generating a portrait picture of the operator through the video stream of the operator acquired in real time;
a calculating module 43, configured to calculate a difference between the portrait image of the operator and the portrait image of the information system account owner;
a determining module 44, configured to determine whether the difference is greater than a difference threshold, if so, determine that the information system is peened, otherwise, determine that the information system is not peened.
The calculating module 43 is specifically configured to:
calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
correspondingly, the determining module 44 is specifically configured to:
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
The information system security peep-proof device provided by the embodiment of the invention corresponds to the information system security peep-proof method provided by the embodiment, and the related technical features of the information system security peep-proof device can refer to the related technical features of the information system security peep-proof method, and are not described herein again.
Fig. 5 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 5: a processor (processor)501, a communication interface (communication interface)502, a memory (memory)503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 are communicated with each other through the communication bus 504. The processor 501 may call logic instructions in the memory 503 to perform the following method: when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system; generating a portrait picture of an operator through a video stream of the operator acquired in real time; calculating the difference between the portrait picture of the operator and the portrait picture of the information system account owner; and judging whether the difference is larger than a difference threshold value, if so, determining that the information system is peeked, and otherwise, determining that the information system is not peeked.
In addition, the logic instructions in the memory 503 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the methods provided by the above method embodiments, for example, including: when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system; generating a portrait picture of an operator through a video stream of the operator acquired in real time; calculating the difference between the portrait picture of the operator and the portrait picture of the information system account owner; and judging whether the difference is larger than a difference threshold value, if so, determining that the information system is peeked, and otherwise, determining that the information system is not peeked.
The embodiment of the invention provides a method and a device for preventing information system from being peeped, electronic equipment and a storage medium, wherein the portrait picture of an operator is compared with the portrait picture of an account owner of the information system to prevent the information system from being peeped, so that the identity of the operator can be monitored in real time in any scene, the safety of the information system is greatly improved, the risk of the system is reduced, and the safety of the information system is ensured.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for security and peep-proof of an information system is characterized by comprising the following steps:
when an operator logs in an information system, acquiring a portrait picture of an account owner of the information system;
generating a portrait picture of an operator through a video stream of the operator acquired in real time;
calculating a difference value between a portrait picture of an operator and a portrait picture of an information system account owner;
and judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
2. The method for security peep prevention of an information system according to claim 1, wherein the step of obtaining a portrait picture of an account owner of the information system when an operator logs in the information system comprises:
when an operator logs in an information system, a plurality of portrait pictures uploaded by an account owner of the information system during system registration are obtained, and an account owner portrait picture sequence is formed.
3. The method for security peep prevention of an information system according to claim 2, wherein the generating of the operator portrait images from the video stream of the operator acquired in real time comprises:
and calling a BOM interface to obtain a video stream when an operator logs in the information system, periodically generating a portrait picture of the operator, and forming an operator portrait picture sequence.
4. The method for security peeking of an information system according to claim 3, wherein the forming of the sequence of portrait pictures of the operator further comprises:
and screening according to the time sequence, and acquiring the newly generated preset number of operator portrait pictures from the portrait picture sequence of the operator.
5. The method of claim 4, wherein the calculating the difference between the portrait session of the operator and the portrait session of the owner of the account of the information system comprises:
calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
6. The method for information system security peep prevention according to any one of claims 1-5, wherein the determining whether the difference value is greater than a difference threshold value, if so, the information system is peeped, otherwise, after the information system is not peeped, further comprises:
when the information system is peeked, automatically transferring to a login page of the information system and quitting the information system;
when the information system is not peered, the operator continues to use the information system.
7. An information system security peep-proof device, comprising:
the acquisition module is used for acquiring a portrait picture of an account owner of the information system when an operator logs in the information system;
the generation module is used for generating a portrait picture of an operator through a video stream of the operator acquired in real time;
the calculation module is used for calculating a difference value between the portrait picture of the operator and the portrait picture of the information system account owner;
and the determining module is used for judging whether the difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
8. The information system security peep-proof device according to claim 7, wherein the computing module is specifically configured to:
calculating a difference value between each operator portrait picture and each account owner portrait picture to obtain a difference value matrix;
calculating an average differential value from the differential values in the matrix of differential values;
correspondingly, the determining module is specifically configured to:
and judging whether the average difference value is larger than the difference threshold value, if so, determining that the information system is peened, and otherwise, determining that the information system is not peened.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method for information system security peeking according to any one of claims 1 to 6 when executing the program.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for secure peeking of an information system according to any one of claims 1 to 6.
CN201911201807.0A 2019-11-29 2019-11-29 Information system security peep-proof method, device, electronic equipment and storage medium Pending CN110909334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911201807.0A CN110909334A (en) 2019-11-29 2019-11-29 Information system security peep-proof method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911201807.0A CN110909334A (en) 2019-11-29 2019-11-29 Information system security peep-proof method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110909334A true CN110909334A (en) 2020-03-24

Family

ID=69820690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911201807.0A Pending CN110909334A (en) 2019-11-29 2019-11-29 Information system security peep-proof method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110909334A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377355A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and peeping proof method and device thereof
CN108062490A (en) * 2018-01-03 2018-05-22 深圳市金立通信设备有限公司 Glance prevention method, terminal and computer-readable medium
CN108470131A (en) * 2018-03-27 2018-08-31 百度在线网络技术(北京)有限公司 Method and apparatus for generating prompt message
CN109165534A (en) * 2018-08-31 2019-01-08 努比亚技术有限公司 terminal control method, terminal and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377355A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and peeping proof method and device thereof
CN108062490A (en) * 2018-01-03 2018-05-22 深圳市金立通信设备有限公司 Glance prevention method, terminal and computer-readable medium
CN108470131A (en) * 2018-03-27 2018-08-31 百度在线网络技术(北京)有限公司 Method and apparatus for generating prompt message
CN109165534A (en) * 2018-08-31 2019-01-08 努比亚技术有限公司 terminal control method, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11138312B2 (en) Cyber range integrating technical and non-technical participants, participant substitution with AI bots, and AI bot training
CN106797417B (en) Contact center anti-fraud monitoring, detection and prevention scheme
US9396323B2 (en) Unauthorized account access lockout reduction
DE112012004114T5 (en) Assess the social risk due to exposure to potential threats from connected contacts
US20160004870A1 (en) Personal Security Agent
CN110599659A (en) Access control permission synchronization method and device
US11863523B2 (en) Protecting the integrity and privacy of data shared over a remote connection from risks in the remote environment
CN109688109B (en) Verification method and device of verification code based on client information identification
CN108881929B (en) Method and device for setting login prompt of live broadcast room
CN110909334A (en) Information system security peep-proof method, device, electronic equipment and storage medium
CN107612882B (en) User behavior identification method and device based on intermediate log
CN102196099B (en) Voice call detection method and device
CN103841199B (en) A kind of method for realizing browser countdown
CN112800849A (en) Video monitoring method, video monitoring device, electronic equipment and storage medium
CN112491869A (en) Application layer DDOS attack detection and protection method and system based on IP credit
CN110502896A (en) A kind of leakage monitoring method, system and the relevant apparatus of site information
CN106789889B (en) Network monitoring method and device based on mesh structure
CN114661507A (en) Data processing method and device based on time-associated data and electronic equipment
CN110516430B (en) Identity authentication method, server and client
CN109819327B (en) Illegal broadcasting processing method and device
CN109995703B (en) Data source security inspection method and edge server
CN108694682B (en) Method and system for setting user head portrait
CN110933195A (en) Matching method, device and equipment based on portrait, MAC, IMSI and license plate
CN109450917B (en) Account login method and device, computing equipment and storage medium
CN114386097B (en) User information management method based on cloud architecture and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200324

RJ01 Rejection of invention patent application after publication