CN111447424A - Projection system with safety enhancement function - Google Patents

Projection system with safety enhancement function Download PDF

Info

Publication number
CN111447424A
CN111447424A CN202010280397.XA CN202010280397A CN111447424A CN 111447424 A CN111447424 A CN 111447424A CN 202010280397 A CN202010280397 A CN 202010280397A CN 111447424 A CN111447424 A CN 111447424A
Authority
CN
China
Prior art keywords
program
projection system
computer
encryption
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010280397.XA
Other languages
Chinese (zh)
Other versions
CN111447424B (en
Inventor
罗露根
莫志君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avic Guohua Shanghai Laser Display Technology Co ltd
Original Assignee
Avic Guohua Shanghai Laser Display Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avic Guohua Shanghai Laser Display Technology Co ltd filed Critical Avic Guohua Shanghai Laser Display Technology Co ltd
Priority to CN202010280397.XA priority Critical patent/CN111447424B/en
Publication of CN111447424A publication Critical patent/CN111447424A/en
Application granted granted Critical
Publication of CN111447424B publication Critical patent/CN111447424B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/12Picture reproducers
    • H04N9/31Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
    • H04N9/3141Constructional details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Abstract

The invention discloses a projection system with a safety enhancement function, which comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body. The invention has the beneficial effects that: the security function is enhanced.

Description

Projection system with safety enhancement function
Technical Field
The invention relates to the field of projectors, in particular to a projection system with a safety enhancement function.
Background
A projector belongs to a computer plug-in device. The projector is accessed to the secret-related network in the secret-related place, so that the serious risk of secret leakage exists. The information can be divulged through ways of reading internal storage data, built-in micro-cameras, built-in network interfaces or wireless transmitting modules, or random dismantling and anatomical analysis and the like.
Disclosure of Invention
The invention aims to solve the technical problem that information in a projector in the prior art is easy to leak, and provides a novel projection system with a safety enhancement function.
In order to achieve the purpose, the technical scheme of the invention is as follows: a projection system with a safety enhancement function comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
As a preferred scheme of the projection system with the safety enhancement function, the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
As a preferred scheme of the projection system with the safety enhancement function, the authority limit program comprises the steps that the identity of a user needs to be identified before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
As a preferred scheme of the projection system with the safety enhancement function, the encryption protection program comprises the functions of setting an encryption chip to prevent the unauthorized access of the firmware program, and the system cannot run after unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
As a preferable scheme of the projection system with the safety enhancement function, the projector body cancels the wireless transmission function.
Compared with the prior art, the invention has the beneficial effects that: the security function is enhanced.
In addition to the technical problems solved by the present invention, the technical features constituting the technical solutions, and the advantageous effects brought by the technical features of the technical solutions described above, other technical problems solved by the present invention, other technical features included in the technical solutions, and advantageous effects brought by the technical features will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic structural diagram according to an embodiment of the present invention.
Fig. 2 is an internal schematic view of an embodiment of the present invention.
Detailed Description
The invention will be described in further detail below with reference to specific embodiments and drawings. Here, the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Referring to fig. 1-2, a novel projection system with security enhancement is shown.
The projection system comprises a processor D L P chip, an identity recognition chip, an encryption chip, a storage chip and other components.
The anti-theft key of the processor D L P chip is written into the storage chip, the control code of each chip can only be operated by the corresponding chip, so that the identification and matching of the physical chip have uniqueness, and simultaneously, the encrypted library file corresponding to the chip is provided according to different platforms.
The encryption chip is used for receiving the anti-theft key from the processor D L P chip, verifying the anti-theft key, if the verification is passed, the system is electrified, the machine is started normally, and if the verification is not passed, the machine is in a standby state.
The processor D L P chip is internally provided with an encryption library, the processor D L P chip sends data serving as parameters to the encryption library for encryption operation, then transfers the encrypted data to the encryption chip through IIC, so as to realize data interaction between the processor D L P chip and the encryption chip, the encryption chip calls an internal algorithm function to decrypt the data after receiving the data, decrypts the data into system data to perform encryption operation by combining with a unique algorithm solidified in the chip, and returns the encrypted system data to an internal system through IIC.
And finally, correspondingly decrypting the data after the encryption library obtains the data to obtain decrypted system data, and verifying the decrypted system data with the system data in the encryption library. In the application stage of the system, a program segment in the encryption chip is operated by calling a function, the encryption chip sends an instruction to control the processor through the GPIO port after verification, a corresponding value is returned after verification is different, the result is used as input data for further operation of the user program, and the encryption chip becomes a part of software in the process, so that the possibility of program cracking is avoided.
The COS encryption system has the characteristics of safety, stability and reliability. The COS system is introduced into an embedded anti-copy board and data encryption and decryption algorithm transplanting scheme. Part of programs and parameters in the processor are transplanted to the encryption chip, and the safety protection of the transplanted programs and parameters is realized by means of the safety characteristic of a hardware platform of the encryption chip and the efficient safety management of a software COS system. No matter how the pirate cracks the product, the program and data in the encryption chip can not be obtained, and the safety of the whole product is replaced by the safety of partial codes and data.
1. The security projector does not have a picture capture function:
and the residual information in the projection is automatically cleared after the projection is normally shut down through software.
When the system is powered on again and returns to the standby state, the system automatically clears the residual information in the projection.
The machine main control board is not internally or externally connected with a large-capacity storage chip, and meanwhile, the main control board is not provided with an external port of a hard disk or other storage media.
2. The encryption chip function designed by the product prevents the unauthorized access of the firmware program, and the system can not run after the unauthorized removal. Data protection measures are taken, and even if the program is read in an unauthorized mode, the read program cannot be viewed. The ID number of each machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the software of the product is prevented from being stolen.
a, an identity recognition system; firstly, the identity of an operator is confirmed, so that whether the user has access and use authority to certain resources is determined, further, the access strategy of the system can be reliably and effectively executed, an attacker is prevented from impersonating a legal user to obtain the access authority of the resources, the safety of the system and data is ensured, and the legal benefit of the authorized visitor is ensured.
b, limitation of communication interface: the system does not contain WIFI, infrared, Bluetooth, USB and Ethernet interfaces.
c store interface restrictions: and does not contain storage devices such as hard disks, memory cards and the like and storage interfaces.
d, data protection measures: and encrypting the data by adopting a 32-bit high-security-level smart card encryption chip. The device has a unique serial number and management codes, and is designed to prevent time sequence attack and tamper; the chip contains various security detection sensors: the high-voltage and low-voltage sensor, the frequency sensor, the filter, the optical sensor, the pulse sensor and the temperature sensor have a sensor service life testing function, and once the chip detects illegal detection, the internal self-destruction function is started.
3. And (3) limiting the use permission of the product:
a) the password manager is additionally arranged, the user needs to be authenticated when the computer is started, the user information can be automatically recorded by the computer after the computer is started, and safety management personnel can check and track the use condition at any time.
b) When the user fails to authenticate for at most 5 consecutive times, the system should lock the account and generate an audit event with the relevant information.
c) The product provides a multi-factor authentication mechanism that allows an authorized administrator to define specific authentication measures, e.g., fingerprints, IC cards, etc
4. No wireless transmission interface is provided:
a) the security projector is not provided with a network interface or a wireless transmitting function, so that the machine cannot be connected with any wireless equipment.
Other protection
A protection switch: the hidden protection switch is added in the whole machine, and the machine cannot run after the whole machine is disassembled without permission.
Specially manufacturing a fixed connecting piece: in order to avoid unauthorized and private disassembly of the machine and enable a person with no particular interest to do hands and feet in the machine, the shell of the whole machine adopts a composite structural member which is independently developed, and the machine can be further operated only by a special tool of the company.
Maintenance and repair: the maintenance of the whole machine needs to be returned to the factory, if key devices are met: the main control chip, the flash and the like are directly destroyed.
The foregoing merely represents embodiments of the invention, which are described in some detail and detail, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (5)

1. A projection system with a safety enhancement function is characterized by comprising a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
2. The projection system with security enhancement function as claimed in claim 1, wherein the screen shot deleting program comprises detecting whether the projector is normally turned off; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
3. The projection system of claim 1, wherein the privilege limiting procedure comprises authenticating a user identity before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
4. The projection system of claim 1, wherein the encryption protection program comprises an encryption chip function configured to prevent unauthorized access to the firmware program, such that the system will not operate unless removed by unauthorized means; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
5. The projection system with security enhancement of claim 1, wherein the projector body eliminates wireless transmission.
CN202010280397.XA 2020-04-10 2020-04-10 Projection system with safety enhancement function Active CN111447424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010280397.XA CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010280397.XA CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Publications (2)

Publication Number Publication Date
CN111447424A true CN111447424A (en) 2020-07-24
CN111447424B CN111447424B (en) 2022-04-22

Family

ID=71653018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010280397.XA Active CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Country Status (1)

Country Link
CN (1) CN111447424B (en)

Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909023A (en) * 2005-08-02 2007-02-07 索尼株式会社 Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
US20070229771A1 (en) * 2006-04-04 2007-10-04 Seiko Epson Corporation Projector system
CN101115316A (en) * 2006-07-28 2008-01-30 株式会社东芝 Projection type display device and control method thereof
CN101127065A (en) * 2006-08-18 2008-02-20 台达电子工业股份有限公司 Device and method for canceling electronic device original password
CN101281347A (en) * 2007-04-04 2008-10-08 宏碁股份有限公司 Electronic device with anti-theft function as well as anti-theft method of electronic device
CN101360215A (en) * 2007-07-30 2009-02-04 鸿富锦精密工业(深圳)有限公司 Projector ciphering system and using method of projector ciphering system
CN101510939A (en) * 2008-02-15 2009-08-19 精工爱普生株式会社 Image transfer device, image display apparatus, and image data transfer method
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system
US20100211788A1 (en) * 2009-02-17 2010-08-19 Konica Minolta Business Technologies, Inc. Network apparatus and communication controlling method
US20100302465A1 (en) * 2009-06-02 2010-12-02 Seiko Epson Corporation Image display device, projector, and method of controlling the same
CN101924766A (en) * 2010-08-20 2010-12-22 河南省电力公司 Double-network communication method
JP2011211320A (en) * 2010-03-29 2011-10-20 Nec Corp Method of deleting secret information, secret information deleting device, and program for the same
CN102236611A (en) * 2010-05-06 2011-11-09 新汉电脑股份有限公司 Data deletion method for computer memory device
CN102572346A (en) * 2010-12-29 2012-07-11 精工爱普生株式会社 Projection display device and method for controlling projection display device
US20130257588A1 (en) * 2012-03-29 2013-10-03 Seiko Epson Corporation Image display device, image display system, and method of controlling image display device
KR20130134918A (en) * 2012-05-31 2013-12-10 삼성전자주식회사 Computer system having non-volatile memory and operating method thereof
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
US20140064495A1 (en) * 2013-09-27 2014-03-06 James A. Cashin Secure system and method for audio processing
CN103713937A (en) * 2013-12-13 2014-04-09 广东电网公司信息中心 Running method for transformer substation terminal system
US8806571B2 (en) * 2001-08-28 2014-08-12 Seiko Epson Corporation Projector projecting password
US20140237405A1 (en) * 2011-10-26 2014-08-21 Huawei Device Co., Ltd Method and Apparatus for Taking Screenshot of Screen of Application in Mobile Terminal
US20140298451A1 (en) * 2005-04-28 2014-10-02 Hitachi Consumer Electronics Co., Ltd Projection Type Image Display Device
US20150062613A1 (en) * 2013-08-27 2015-03-05 Canon Kabushiki Kaisha Image forming apparatus capable of preventing data leakage and control method therefor, and storage medium
US20150143513A1 (en) * 2011-07-05 2015-05-21 Seiko Epson Corporation Projector and control method for projector
CN105335629A (en) * 2015-09-22 2016-02-17 电子科技大学 Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN105760226A (en) * 2016-02-01 2016-07-13 广东欧珀移动通信有限公司 Method and device for rapidly starting mobile terminal camera and mobile terminal
CN105872501A (en) * 2015-02-10 2016-08-17 精工爱普生株式会社 Projector and control method
CN107515509A (en) * 2016-06-15 2017-12-26 香港彩亿科技有限公司 Projector and method for automatic brightness adjustment
CN107844244A (en) * 2017-11-15 2018-03-27 珠海市魅族科技有限公司 Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves
CN207623670U (en) * 2017-09-26 2018-07-17 同帅科技(天津)有限公司 Touch projection machine
CN109471488A (en) * 2018-11-12 2019-03-15 中影环球(北京)科技有限公司 A kind of projector clocking method and system
CN110012276A (en) * 2019-04-30 2019-07-12 成都市极米科技有限公司 Method for controlling projection, projector controller and optical projection system
CN110121170A (en) * 2019-04-17 2019-08-13 广东电网有限责任公司信息中心 Mobile network's auth method based on encryption technology

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806571B2 (en) * 2001-08-28 2014-08-12 Seiko Epson Corporation Projector projecting password
US20140298451A1 (en) * 2005-04-28 2014-10-02 Hitachi Consumer Electronics Co., Ltd Projection Type Image Display Device
CN1909023A (en) * 2005-08-02 2007-02-07 索尼株式会社 Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
US20070229771A1 (en) * 2006-04-04 2007-10-04 Seiko Epson Corporation Projector system
CN101115316A (en) * 2006-07-28 2008-01-30 株式会社东芝 Projection type display device and control method thereof
CN101127065A (en) * 2006-08-18 2008-02-20 台达电子工业股份有限公司 Device and method for canceling electronic device original password
CN101281347A (en) * 2007-04-04 2008-10-08 宏碁股份有限公司 Electronic device with anti-theft function as well as anti-theft method of electronic device
CN101360215A (en) * 2007-07-30 2009-02-04 鸿富锦精密工业(深圳)有限公司 Projector ciphering system and using method of projector ciphering system
CN101510939A (en) * 2008-02-15 2009-08-19 精工爱普生株式会社 Image transfer device, image display apparatus, and image data transfer method
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system
US20100211788A1 (en) * 2009-02-17 2010-08-19 Konica Minolta Business Technologies, Inc. Network apparatus and communication controlling method
CN101827086A (en) * 2009-02-17 2010-09-08 柯尼卡美能达商用科技株式会社 The network equipment and communication control method
US20100302465A1 (en) * 2009-06-02 2010-12-02 Seiko Epson Corporation Image display device, projector, and method of controlling the same
JP2011211320A (en) * 2010-03-29 2011-10-20 Nec Corp Method of deleting secret information, secret information deleting device, and program for the same
CN102236611A (en) * 2010-05-06 2011-11-09 新汉电脑股份有限公司 Data deletion method for computer memory device
CN101924766A (en) * 2010-08-20 2010-12-22 河南省电力公司 Double-network communication method
CN102572346A (en) * 2010-12-29 2012-07-11 精工爱普生株式会社 Projection display device and method for controlling projection display device
US20150143513A1 (en) * 2011-07-05 2015-05-21 Seiko Epson Corporation Projector and control method for projector
US20140237405A1 (en) * 2011-10-26 2014-08-21 Huawei Device Co., Ltd Method and Apparatus for Taking Screenshot of Screen of Application in Mobile Terminal
US20130257588A1 (en) * 2012-03-29 2013-10-03 Seiko Epson Corporation Image display device, image display system, and method of controlling image display device
KR20130134918A (en) * 2012-05-31 2013-12-10 삼성전자주식회사 Computer system having non-volatile memory and operating method thereof
US20150062613A1 (en) * 2013-08-27 2015-03-05 Canon Kabushiki Kaisha Image forming apparatus capable of preventing data leakage and control method therefor, and storage medium
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
US20140064495A1 (en) * 2013-09-27 2014-03-06 James A. Cashin Secure system and method for audio processing
CN103713937A (en) * 2013-12-13 2014-04-09 广东电网公司信息中心 Running method for transformer substation terminal system
CN105872501A (en) * 2015-02-10 2016-08-17 精工爱普生株式会社 Projector and control method
CN105335629A (en) * 2015-09-22 2016-02-17 电子科技大学 Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN105760226A (en) * 2016-02-01 2016-07-13 广东欧珀移动通信有限公司 Method and device for rapidly starting mobile terminal camera and mobile terminal
CN107515509A (en) * 2016-06-15 2017-12-26 香港彩亿科技有限公司 Projector and method for automatic brightness adjustment
CN207623670U (en) * 2017-09-26 2018-07-17 同帅科技(天津)有限公司 Touch projection machine
CN107844244A (en) * 2017-11-15 2018-03-27 珠海市魅族科技有限公司 Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves
CN109471488A (en) * 2018-11-12 2019-03-15 中影环球(北京)科技有限公司 A kind of projector clocking method and system
CN110121170A (en) * 2019-04-17 2019-08-13 广东电网有限责任公司信息中心 Mobile network's auth method based on encryption technology
CN110012276A (en) * 2019-04-30 2019-07-12 成都市极米科技有限公司 Method for controlling projection, projector controller and optical projection system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
丁源主编: "存储安全的应用实例", 《税收数据终端泄露防范及案例分析》 *
小T: "别让SnagIt出卖你的隐私", 《电脑迷》 *
林丽华: "截图也要注意隐私", 《电脑迷》 *

Also Published As

Publication number Publication date
CN111447424B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
US7205883B2 (en) Tamper detection and secure power failure recovery circuit
CN103886234B (en) A kind of fail-safe computer based on encryption hard disk and data security control method thereof
CN103946806B (en) Devices, systems and methods for providing memory access control
US20060101047A1 (en) Method and system for fortifying software
CN101458743A (en) Method for protecting computer system
CN203746071U (en) Security computer based on encrypted hard disc
CN107563213B (en) Safety secrecy control device for preventing data extraction of storage equipment
CN104756127A (en) Secure data handling by a virtual machine
CN109035519B (en) Biological feature recognition device and method
KR20060134037A (en) Use authentication method, use authentication program, information processing device, and recording medium
WO2009009052A1 (en) Memory data shredder
US9042553B2 (en) Communicating device and communicating method
CN101795261A (en) Information protection system and method based on mobile data safety
CN102316449B (en) Security terminal system and authentication and interruption method thereof
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN102236607B (en) Data security protection method and data security protection device
CN103729310A (en) Method for protecting hardware data
JP2005157930A (en) Confidential information processing system and lsi
JP2006227930A (en) Game machine operation authentication system and game machine
JP2008005408A (en) Recorded data processing apparatus
JP4137468B2 (en) Program usage authentication method
CN102346716A (en) Encryption method and decryption method of hard disk storage device and encryption and decryption system used for hard disk storage device
CN104361298B (en) The method and apparatus of Information Security
JP2005293490A (en) Biometrics system
CN111447424B (en) Projection system with safety enhancement function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant