CN111079123A - System and method for limiting unauthorized camera shooting by computer - Google Patents
System and method for limiting unauthorized camera shooting by computer Download PDFInfo
- Publication number
- CN111079123A CN111079123A CN201911320445.7A CN201911320445A CN111079123A CN 111079123 A CN111079123 A CN 111079123A CN 201911320445 A CN201911320445 A CN 201911320445A CN 111079123 A CN111079123 A CN 111079123A
- Authority
- CN
- China
- Prior art keywords
- information
- module
- software
- security
- submodule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a system and a method for limiting unauthorized camera shooting by a computer, wherein the system comprises the computer, and the computer internally comprises a software information acquisition module, an authority authentication module, a data analysis module, a network control module, a danger information alarm module and a central processing module; the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are sequentially connected through a network, the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are respectively connected with the central processing module through networks, downloaded programs and software can be authenticated by the authority authentication module, running data of the software is acquired by the software information acquisition module, information acquired by the software information acquisition module is analyzed in a segmented mode by the data analysis module, all modules are controlled and coordinated by the central processing module, and danger information is alarmed by the danger information alarm module.
Description
Technical Field
The invention relates to the field of computers, in particular to a system and a method for limiting unauthorized camera shooting by a computer.
Background
The computer is commonly called computer, is an electronic computer for high-speed calculation, can perform numerical calculation and logic calculation, and also has the function of storage and memory. The intelligent electronic device can be operated according to a program, and can automatically process mass data at a high speed. The most important thing in computer security is the security of stored data, and the main threats faced by the computer security comprise computer viruses, illegal access, computer electromagnetic radiation, hardware damage and the like.
Computer viruses are covert applets attached to computer software that are the same as other working programs of a computer, but can corrupt normal programs and data files. The malignant virus can cause the whole computer software system to crash and the data to be completely destroyed. The main aim of preventing virus attack is to strengthen management, not to access unsafe data, use antivirus software and upgrade and update in time.
Illegal access means that a pirate embezzles or forges a legal identity, enters a computer system, privately extracts data in the computer or modifies, transfers, copies and the like. The prevention method is to add a software system security mechanism to prevent a thief from entering the system with a legal identity. For example, the identification of the mark of a legal user is added, a password is added, different authorities are stipulated for the user, and the user cannot freely access a data area which is not accessed. And secondly, data are encrypted, so that even if a thief enters the system and does not have a secret key, the thief cannot read the data. Setting operation log in computer to record the read, write and modify of important data automatically.
At present, network security is a very serious problem, and hackers can remotely control a camera of a computer through malicious programs, so that daily life of users using the computer is shot, personal safety of the users is greatly harmed, and privacy rights of the users are violated.
Disclosure of Invention
The invention aims to provide a system and a method for limiting unauthorized camera shooting by a computer, which are used for solving the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a computer limits the system that the unauthorized camera shooting, the said system includes the computer, the computer includes the software information acquisition module, authority authentication module, data analysis module, network control module, danger information alarm module, central processing module inside;
the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are sequentially connected through a network, the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are respectively connected with the central processing module through the network, and the network control module is electrically connected with the computer.
According to the technical scheme: the authority authentication module comprises a software source analysis submodule and a password authentication unit, wherein the software source analysis submodule is connected with the password authentication unit through a network, the software source analysis submodule is used for authenticating sources of downloaded software and programs and avoiding dangerous source software and programs, and the password authentication unit is used for authenticating passwords of software and links needing to be downloaded.
According to the technical scheme: the software information acquisition module comprises a software authorization information acquisition submodule and a dynamic link information acquisition submodule; the output ends of the software authorization information acquisition submodule and the dynamic link information acquisition submodule are respectively connected with the data analysis module through a network; the software authorization information acquisition submodule is used for detecting information that the downloaded software needs computer authorization and sending the authorization information to the data analysis module for analysis, and the dynamic link information acquisition submodule is used for acquiring link data codes clicked by a user and sending the acquired information to the data analysis module for analysis.
According to the technical scheme: the data analysis module comprises an acquired information security subsection analysis submodule and an authorized shooting information key mark monitoring submodule, wherein the acquired information security subsection analysis submodule and the authorized shooting information key mark monitoring submodule are connected through a network, the acquired information security subsection analysis submodule is used for carrying out security analysis on information subsections acquired by the software information acquisition module, and the authorized shooting information key mark monitoring submodule is used for monitoring shooting information and shooting contents of software and link authorization of a computer.
According to the technical scheme: the central processing module comprises a PLC chip and a backup library, the PLC chip is used for controlling and coordinating all the modules, the backup library is used for backing up data analyzed by the data analysis module, the output end of the PLC chip is connected with the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module through a network, and the backup library is connected with the data analysis module through a network.
According to the technical scheme: the danger information alarm module comprises an alarm information pushing submodule and a forced deletion submodule, the alarm information pushing module is used for pushing alarm information to a user, and the forced deletion submodule is used for forcibly deleting the information when the information safety is lower than a set threshold.
According to the technical scheme: the network control module comprises a network card relay and a hard disk relay, the network card relay and the hard disk relay are respectively used for cutting off power supplies of the network card and the hard disk, and the network card and the hard disk are independently powered by a computer power supply.
A method for limiting unauthorized camera shooting by a computer is characterized in that:
s1: the software source analysis submodule is used for carrying out source authentication on the downloaded software and the downloaded program to avoid the software and the program of a dangerous source, the password authentication unit is used for carrying out password authentication on the software and the link to be downloaded, and after the authentication is successful, the authorization information is sent to the software information acquisition module;
s2: the software information acquisition module is used for acquiring running data of software, the software authorization-required information acquisition submodule detects information required by a computer for authorization of the downloaded software, and the dynamic link information acquisition submodule acquires link data codes clicked by a user and sends the information to the data analysis module for analysis;
s3: the data analysis module is used for carrying out sectional analysis on the information acquired by the software information acquisition module;
s4: the PLC chip in the central processing module is used for controlling and coordinating all the modules, and the backup library is used for backing up the data analyzed by the data analysis module;
s5: the danger information is alarmed by utilizing a danger information alarming module, the alarming information pushing module pushes alarming information to a user, and the information is forcibly deleted when the information safety is lower than a set threshold value by a forcible deletion submodule;
s6: when the computer is not used in the set time, the network control module is used to automatically cut off the power supply of the network card and the hard disk.
According to the technical scheme: in the step S3, in the step of performing the segmentation analysis on the information acquired by the software information acquisition module by using the data analysis module, the method further includes the following steps:
a1: carrying out piecewise analysis on the information acquired by the software information acquisition module by using the acquired information security piecewise analysis submodule;
a2: performing security integration on the information subjected to the segmented analysis, and sending security data to the central processing module when the security is lower than a set threshold;
a3: and the program and software shooting content and duration are monitored in a key mode by using the authorized shooting information key mark monitoring submodule to mark the program and software middle mark which needs to be authorized for computer shooting, and the data are sent to the danger information alarm module for processing.
According to the technical scheme: in the step a1, when the information acquired by the software information acquisition module is analyzed in a segmented manner by using the acquired information security segmented analysis submodule, the method further includes the following steps:
the acquired information is subjected to segmentation analysis, and the segmented information is set as C1、C2、C3、…、C(n-1)、CnThe sub-module for the safety segmentation analysis of the collected information carries out the safety analysis on the segmentation information, wherein the segmentation information C1、C2、C3、…、C(n-1)、CnIs monitored as R1、R2、R3、…、R(n-1)、RnSetting the security level as primary security, secondary security and tertiary security, wherein the threshold value of the primary security is T1 and secondary securityThe threshold for security is T2 and the threshold for tertiary security is T3, where T3E [0.3, 0.4 ∈]、T2∈[0.5,0.7]、T1∈[0.8,1]Monitoring segment information security R1、R2、R3、…、R(n-1)、RnComparing the safety of the segmented information with a set threshold value, and judging the safety R of the segmented information1、R2、R3、…、R(n-1)、RnWhen one item is smaller than a set safety threshold value, the acquired information is directly marked with low safety and is sent to a dangerous information alarm module for processing;
security of information when segmented R1、R2、R3、…、R(n-1)、RnSetting the total security of the segmented information to be R total when all the segmented information is greater than a set security threshold value, and according to a formula:calculating the overall security of the acquired information, comparing the calculated R with the security level, and according to a formula:
r total e T3 or R total e T2 or R total e T1
And judging the safety level of the R total, marking the safety level of the acquired information, and sending the level of the acquired information to a dangerous information alarm module for processing when the R total is in the third safety level.
Compared with the prior art, the invention has the beneficial effects that:
the system can screen programs, links and software downloaded by a computer, monitor the authorization information of the programs, the links and the software in a key mode, monitor the authorized camera shooting authority in a key mode, and prevent the camera of the computer from being accessed illegally.
The software source analysis submodule is used for carrying out source authentication on the downloaded software and the downloaded program to avoid the software and the program of a dangerous source, the password authentication unit is used for carrying out password authentication on the software and the link to be downloaded, and after the authentication is successful, the authorization information is sent to the software information acquisition module;
the software information acquisition module is used for acquiring running data of software, the software authorization-required information acquisition submodule detects information required by a computer for authorization of the downloaded software, and the dynamic link information acquisition submodule acquires link data codes clicked by a user and sends the information to the data analysis module for analysis;
the data analysis module is used for carrying out sectional analysis on the information acquired by the software information acquisition module; carrying out piecewise analysis on the information acquired by the software information acquisition module by using the acquired information security piecewise analysis submodule; performing security integration on the information subjected to the segmented analysis, and sending security data to the central processing module when the security is lower than a set threshold; the program and software middle mark which needs to authorize the computer to shoot is monitored by the authorized shooting information key mark monitoring submodule, the content and duration of the program and software shooting are monitored key, and the data are sent to the danger information alarm module to be processed
The PLC chip in the central processing module is used for controlling and coordinating all the modules, and the backup library is used for backing up the data analyzed by the data analysis module;
the danger information is alarmed by utilizing a danger information alarming module, the alarming information pushing module pushes alarming information to a user, and the information is forcibly deleted when the information safety is lower than a set threshold value by a forcible deletion submodule; when the computer is not used in the set time, the network control module is used to automatically cut off the power supply of the network card and the hard disk.
Drawings
In order that the present invention may be more readily and clearly understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
FIG. 1 is a block diagram of a system for restricting unauthorized camera shooting by a computer according to the present invention;
FIG. 2 is a schematic diagram illustrating steps of a method for restricting unauthorized photographing by a computer according to the present invention;
fig. 3 is a specific step diagram of step S3 of the method for restricting unauthorized image capturing by a computer according to the present invention;
fig. 4 is a schematic diagram of an implementation process of a method for limiting unauthorized image capturing by a computer according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a system and a method for limiting unauthorized camera shooting by a computer, wherein the system for limiting unauthorized camera shooting by the computer comprises the computer, a software information acquisition module, a permission authentication module, a data analysis module, a network control module, a danger information alarm module and a central processing module are arranged inside the computer;
the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are sequentially connected through a network, the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are respectively connected with the central processing module through the network, and the network control module is electrically connected with the computer.
According to the technical scheme: the authority authentication module comprises a software source analysis submodule and a password authentication unit, wherein the software source analysis submodule is connected with the password authentication unit through a network, the software source analysis submodule is used for authenticating sources of downloaded software and programs and avoiding dangerous source software and programs, and the password authentication unit is used for authenticating passwords of software and links needing to be downloaded.
According to the technical scheme: the software information acquisition module comprises a software authorization information acquisition submodule and a dynamic link information acquisition submodule; the output ends of the software authorization information acquisition submodule and the dynamic link information acquisition submodule are respectively connected with the data analysis module through a network; the software authorization information acquisition submodule is used for detecting information that the downloaded software needs computer authorization and sending the authorization information to the data analysis module for analysis, and the dynamic link information acquisition submodule is used for acquiring link data codes clicked by a user and sending the acquired information to the data analysis module for analysis.
According to the technical scheme: the data analysis module comprises an acquired information security subsection analysis submodule and an authorized shooting information key mark monitoring submodule, wherein the acquired information security subsection analysis submodule and the authorized shooting information key mark monitoring submodule are connected through a network, the acquired information security subsection analysis submodule is used for carrying out security analysis on information subsections acquired by the software information acquisition module, and the authorized shooting information key mark monitoring submodule is used for monitoring shooting information and shooting contents of software and link authorization of a computer.
According to the technical scheme: the central processing module comprises a PLC chip and a backup library, the PLC chip is used for controlling and coordinating all the modules, the backup library is used for backing up data analyzed by the data analysis module, the output end of the PLC chip is connected with the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module through a network, and the backup library is connected with the data analysis module through a network.
According to the technical scheme: the danger information alarm module comprises an alarm information pushing submodule and a forced deletion submodule, the alarm information pushing module is used for pushing alarm information to a user, and the forced deletion submodule is used for forcibly deleting the information when the information safety is lower than a set threshold.
According to the technical scheme: the network control module comprises a network card relay and a hard disk relay, the network card relay and the hard disk relay are respectively used for cutting off power supplies of the network card and the hard disk, and the network card and the hard disk are independently powered by a computer power supply.
A method for limiting unauthorized camera shooting by a computer is characterized in that:
s1: the software source analysis submodule is used for carrying out source authentication on the downloaded software and the downloaded program to avoid the software and the program of a dangerous source, the password authentication unit is used for carrying out password authentication on the software and the link to be downloaded, and after the authentication is successful, the authorization information is sent to the software information acquisition module;
s2: the software information acquisition module is used for acquiring running data of software, the software authorization-required information acquisition submodule detects information required by a computer for authorization of the downloaded software, and the dynamic link information acquisition submodule acquires link data codes clicked by a user and sends the information to the data analysis module for analysis;
s3: the data analysis module is used for carrying out sectional analysis on the information acquired by the software information acquisition module;
s4: the PLC chip in the central processing module is used for controlling and coordinating all the modules, and the backup library is used for backing up the data analyzed by the data analysis module;
s5: the danger information is alarmed by utilizing a danger information alarming module, the alarming information pushing module pushes alarming information to a user, and the information is forcibly deleted when the information safety is lower than a set threshold value by a forcible deletion submodule;
s6: when the computer is not used in the set time, the network control module is used to automatically cut off the power supply of the network card and the hard disk.
According to the technical scheme: in the step S3, in the step of performing the segmentation analysis on the information acquired by the software information acquisition module by using the data analysis module, the method further includes the following steps:
a1: carrying out piecewise analysis on the information acquired by the software information acquisition module by using the acquired information security piecewise analysis submodule;
a2: performing security integration on the information subjected to the segmented analysis, and sending security data to the central processing module when the security is lower than a set threshold;
a3: and the program and software shooting content and duration are monitored in a key mode by using the authorized shooting information key mark monitoring submodule to mark the program and software middle mark which needs to be authorized for computer shooting, and the data are sent to the danger information alarm module for processing.
According to the technical scheme: in the step a1, when the information acquired by the software information acquisition module is analyzed in a segmented manner by using the acquired information security segmented analysis submodule, the method further includes the following steps:
the acquired information is subjected to segmentation analysis, and the segmented information is set as C1、C2、C3、…、C(n-1)、CnThe sub-module for the safety segmentation analysis of the collected information carries out the safety analysis on the segmentation information, wherein the segmentation information C1、C2、C3、…、C(n-1)、CnIs monitored as R1、R2、R3、…、R(n-1)、RnSetting the security level as primary security, secondary security and tertiary security, wherein the threshold value of the primary security is T1, the threshold value of the secondary security is T2 and the threshold value of the tertiary security is T3, wherein T3 belongs to [0.3, 0.4 ]]、T2∈[0.5,0.7]、T1∈[0.8,1]Monitoring segment information security R1、R2、R3、…、R(n-1)、RnComparing the safety of the segmented information with a set threshold value, and judging the safety R of the segmented information1、R2、R3、…、R(n-1)、RnWhen one item is smaller than a set safety threshold value, the acquired information is directly marked with low safety and is sent to a dangerous information alarm module for processing;
security of information when segmented R1、R2、R3、…、R(n-1)、RnSetting the total security of the segmented information to be R total when all the segmented information is greater than a set security threshold value, and according to a formula:calculating the overall security of the acquired information, comparing the calculated R with the security level, and according to a formula:
r total e T3 or R total e T2 or R total e T1
And judging the safety level of the R total, marking the safety level of the acquired information, and sending the level of the acquired information to a dangerous information alarm module for processing when the R total is in the third safety level.
Example 1: the method comprises the following steps of limiting conditions, segmenting information by an acquired information security segmentation analysis submodule according to the proportion of 1:2:2:3:1:1, and carrying out security analysis on segmented information by an acquired information security segmentation analysis submodule, wherein the security of the segmented information is respectively detected to be 0.3, 0.5, 0.7, 0.6 and 0.8, the lowest threshold of the security of the segmented information is set to be 0.2, the security of the segmented information is compared with the set lowest threshold, and the security of the segmented information is higher than the set lowest threshold after comparison, according to a formula:comparing the R total with safety thresholds T1, T2 and T3, wherein the comparison result shows that the R total is 0.58 epsilon [0.5, 0.7 ∈ ]]And the data processing module carries out secondary security level marking on the acquired data, belonging to a secondary security level.
Example 2: the method comprises the following steps of limiting conditions, segmenting information by an acquired information security segmentation analysis submodule according to the proportion of 1:2:2:2:2:1, and carrying out security analysis on segmented information by an acquired information security segmentation analysis submodule, wherein the security of the segmented information is respectively detected to be 0.7, 0.8, 0.9 and 0.9, the lowest threshold of the security of the segmented information is set to be 0.2, the security of the segmented information is compared with the set lowest threshold, and the security of the segmented information is higher than the set lowest threshold after comparison, according to a formula:comparing the R total with safety thresholds T1, T2 and T3, wherein the comparison result shows that the R total is 0.82 epsilon [0.8, 1 ∈ []And the data processing module carries out primary security level marking on the acquired data.
Example 3: limiting stripThe information acquisition safety subsection analysis sub-module segments information according to the proportion of 1:2:2:2:2:1, and the information acquisition safety subsection analysis sub-module analyzes the safety of the segmented information, wherein the safety of the segmented information is respectively detected to be 0.3, 0.4, 0.3 and 0.5, the lowest threshold of the safety of the segmented information is set to be 0.2, the safety of the segmented information is compared with the set lowest threshold, and the safety of the segmented information is higher than the set lowest threshold after comparison, according to the formula:comparing the R total with safety thresholds T1, T2 and T3, wherein the comparison result shows that the R total is 0.36 epsilon [0.3, 0.4 ∈ ]]And the data processing module carries out three-level security level marking on the acquired data and simultaneously sends the level of the acquired information to the danger information alarm module for processing.
Example 4: and limiting conditions, segmenting information by an acquired information security segmentation analysis submodule according to the proportion of 1:1:4:2:1:1, and performing security analysis on the segmented information by an acquired information security segmentation analysis submodule, wherein the security of the segmented information is respectively detected as 0.1, 0.7, 0.8, 0.9 and 0.9, the lowest threshold of the security of the segmented information is set as 0.2, the security of the segmented information is compared with the set lowest threshold, one segment of the security of the segmented information is lower than the set lowest threshold after comparison, directly marking the acquired information as low, and sending the information to a danger information alarm module for processing.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (10)
1. A system for restricting unauthorized camera shooting by a computer, comprising: the system comprises a computer, wherein the computer internally comprises a software information acquisition module, a permission authentication module, a data analysis module, a network control module, a danger information alarm module and a central processing module;
the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are sequentially connected through a network, the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module are respectively connected with the central processing module through the network, and the network control module is electrically connected with the computer.
2. The system of claim 1, wherein the computer limits unauthorized camera shooting: the authority authentication module comprises a software source analysis submodule and a password authentication unit, wherein the software source analysis submodule is connected with the password authentication unit through a network, the software source analysis submodule is used for authenticating sources of downloaded software and programs and avoiding dangerous source software and programs, and the password authentication unit is used for authenticating passwords of software and links needing to be downloaded.
3. The system of claim 1, wherein the computer limits unauthorized camera shooting: the software information acquisition module comprises a software authorization information acquisition submodule and a dynamic link information acquisition submodule; the output ends of the software authorization information acquisition submodule and the dynamic link information acquisition submodule are respectively connected with the data analysis module through a network; the software authorization information acquisition submodule is used for detecting information that the downloaded software needs computer authorization and sending the authorization information to the data analysis module for analysis, and the dynamic link information acquisition submodule is used for acquiring link data codes clicked by a user and sending the acquired information to the data analysis module for analysis.
4. The system of claim 1, wherein the computer limits unauthorized camera shooting: the data analysis module comprises an acquired information security subsection analysis submodule and an authorized shooting information key mark monitoring submodule, wherein the acquired information security subsection analysis submodule and the authorized shooting information key mark monitoring submodule are connected through a network, the acquired information security subsection analysis submodule is used for carrying out security analysis on information subsections acquired by the software information acquisition module, and the authorized shooting information key mark monitoring submodule is used for monitoring shooting information and shooting contents of software and link authorization of a computer.
5. The system of claim 1, wherein the computer limits unauthorized camera shooting: the central processing module comprises a PLC chip and a backup library, the PLC chip is used for controlling and coordinating all the modules, the backup library is used for backing up data analyzed by the data analysis module, the output end of the PLC chip is connected with the authority authentication module, the software information acquisition module, the data analysis module and the danger information alarm module through a network, and the backup library is connected with the data analysis module through a network.
6. The system of claim 1, wherein the computer limits unauthorized camera shooting: the danger information alarm module comprises an alarm information pushing submodule and a forced deletion submodule, the alarm information pushing module is used for pushing alarm information to a user, and the forced deletion submodule is used for forcibly deleting the information when the information safety is lower than a set threshold.
7. The system of claim 1, wherein the computer limits unauthorized camera shooting: the network control module comprises a network card relay and a hard disk relay, the network card relay and the hard disk relay are respectively used for cutting off power supplies of the network card and the hard disk, and the network card and the hard disk are independently powered by a computer power supply.
8. A method for limiting unauthorized camera shooting by a computer is characterized in that:
s1: the software source analysis submodule is used for carrying out source authentication on the downloaded software and the downloaded program to avoid the software and the program of a dangerous source, the password authentication unit is used for carrying out password authentication on the software and the link to be downloaded, and after the authentication is successful, the authorization information is sent to the software information acquisition module;
s2: the software information acquisition module is used for acquiring running data of software, the software authorization-required information acquisition submodule detects information required by a computer for authorization of the downloaded software, and the dynamic link information acquisition submodule acquires link data codes clicked by a user and sends the information to the data analysis module for analysis;
s3: the data analysis module is used for carrying out sectional analysis on the information acquired by the software information acquisition module;
s4: the PLC chip in the central processing module is used for controlling and coordinating all the modules, and the backup library is used for backing up the data analyzed by the data analysis module;
s5: the danger information is alarmed by utilizing a danger information alarming module, the alarming information pushing module pushes alarming information to a user, and the information is forcibly deleted when the information safety is lower than a set threshold value by a forcible deletion submodule;
s6: when the computer is not used in the set time, the network control module is used to automatically cut off the power supply of the network card and the hard disk.
9. The method of claim 8, wherein the method comprises: in the step S3, in the step of performing the segmentation analysis on the information acquired by the software information acquisition module by using the data analysis module, the method further includes the following steps:
a1: carrying out piecewise analysis on the information acquired by the software information acquisition module by using the acquired information security piecewise analysis submodule;
a2: performing security integration on the information subjected to the segmented analysis, and sending security data to the central processing module when the security is lower than a set threshold;
a3: and the program and software shooting content and duration are monitored in a key mode by using the authorized shooting information key mark monitoring submodule to mark the program and software middle mark which needs to be authorized for computer shooting, and the data are sent to the danger information alarm module for processing.
10. The method of claim 9, wherein the method comprises: in the step a1, when the information acquired by the software information acquisition module is analyzed in a segmented manner by using the acquired information security segmented analysis submodule, the method further includes the following steps:
the acquired information is subjected to segmentation analysis, and the segmented information is set as C1、C2、C3、…、C(n-1)、CnThe sub-module for the safety segmentation analysis of the collected information carries out the safety analysis on the segmentation information, wherein the segmentation information C1、C2、C3、…、C(n-1)、CnIs monitored as R1、R2、R3、…、R(n-1)、RnSetting the security level as primary security, secondary security and tertiary security, wherein the threshold value of the primary security is T1, the threshold value of the secondary security is T2 and the threshold value of the tertiary security is T3, wherein T3 belongs to [0.3, 0.4 ]]、T2∈[0.5,0.7]、T1∈[0.8,1]Monitoring segment information security R1、R2、R3、…、R(n-1)、RnComparing the safety of the segmented information with a set threshold value, and judging the safety R of the segmented information1、R2、R3、…、R(n-1)、RnWhen one item is smaller than a set safety threshold value, the acquired information is directly marked with low safety and is sent to a dangerous information alarm module for processing;
security of information when segmented R1、R2、R3、…、R(n-1)、RnSetting the total security of the segmented information to be R total when all the segmented information is greater than a set security threshold value, and according to a formula:calculating the overall security of the acquired information, comparing the calculated R with the security level, and according to a formula:
r total e T3 or R total e T2 or R total e T1
And judging the safety level of the R total, marking the safety level of the acquired information, and sending the level of the acquired information to a dangerous information alarm module for processing when the R total is in the third safety level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911320445.7A CN111079123A (en) | 2019-12-19 | 2019-12-19 | System and method for limiting unauthorized camera shooting by computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911320445.7A CN111079123A (en) | 2019-12-19 | 2019-12-19 | System and method for limiting unauthorized camera shooting by computer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111079123A true CN111079123A (en) | 2020-04-28 |
Family
ID=70315933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911320445.7A Withdrawn CN111079123A (en) | 2019-12-19 | 2019-12-19 | System and method for limiting unauthorized camera shooting by computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111079123A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723095A (en) * | 2020-06-18 | 2020-09-29 | 安徽悟享信息科技有限公司 | Information acquisition method based on computer program operation |
-
2019
- 2019-12-19 CN CN201911320445.7A patent/CN111079123A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723095A (en) * | 2020-06-18 | 2020-09-29 | 安徽悟享信息科技有限公司 | Information acquisition method based on computer program operation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10394492B2 (en) | Securing a media storage device using write restriction mechanisms | |
US20040263315A1 (en) | Information security system interworking with entrance control device and control method thereof | |
CN115314286A (en) | Safety guarantee system | |
CN115758355A (en) | Lesojous software defense method and system based on fine-grained access control | |
CN116962076A (en) | Zero trust system of internet of things based on block chain | |
CN117708880A (en) | Intelligent security processing method and system for banking data | |
JP2023550960A (en) | Ransomware mitigation system and methods to mitigate ransomware attacks | |
CN116821928A (en) | Method and system for improving internal data security of power edge computing chip | |
CN112615842A (en) | Network security implementation system and method based on big data platform | |
CN111079123A (en) | System and method for limiting unauthorized camera shooting by computer | |
CN112199700B (en) | Safety management method and system for MES data system | |
GB2535579A (en) | Preventing unauthorized access to an application server | |
CN107273725A (en) | A kind of data back up method and system for classified information | |
CN111259405A (en) | Computer safety coefficient based on artificial intelligence | |
US20240070303A1 (en) | File Encapsulation Validation | |
CN110958236A (en) | Dynamic authorization method of operation and maintenance auditing system based on risk factor insight | |
US20150229667A1 (en) | Self-destructing content | |
CN108881260A (en) | A kind of novel computer network protection method | |
CN115017480A (en) | Computer safety protection management and control system based on intelligent control | |
Wang | Retracted: research on network security maintenance based on computer technology | |
CN107888593A (en) | One kind logs in safety patrol system | |
CN112905961A (en) | Network communication method for computer software protection | |
CN113110354A (en) | Ferry-based industrial data security system and method | |
CN2526907Y (en) | Information safety computer | |
CN112000953A (en) | Big data terminal safety protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200428 |