CN111447424A - Projection system with safety enhancement function - Google Patents
Projection system with safety enhancement function Download PDFInfo
- Publication number
- CN111447424A CN111447424A CN202010280397.XA CN202010280397A CN111447424A CN 111447424 A CN111447424 A CN 111447424A CN 202010280397 A CN202010280397 A CN 202010280397A CN 111447424 A CN111447424 A CN 111447424A
- Authority
- CN
- China
- Prior art keywords
- program
- projection system
- computer
- encryption
- chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 18
- 238000003860 storage Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/12—Picture reproducers
- H04N9/31—Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
- H04N9/3141—Constructional details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
Abstract
The invention discloses a projection system with a safety enhancement function, which comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body. The invention has the beneficial effects that: the security function is enhanced.
Description
Technical Field
The invention relates to the field of projectors, in particular to a projection system with a safety enhancement function.
Background
A projector belongs to a computer plug-in device. The projector is accessed to the secret-related network in the secret-related place, so that the serious risk of secret leakage exists. The information can be divulged through ways of reading internal storage data, built-in micro-cameras, built-in network interfaces or wireless transmitting modules, or random dismantling and anatomical analysis and the like.
Disclosure of Invention
The invention aims to solve the technical problem that information in a projector in the prior art is easy to leak, and provides a novel projection system with a safety enhancement function.
In order to achieve the purpose, the technical scheme of the invention is as follows: a projection system with a safety enhancement function comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
As a preferred scheme of the projection system with the safety enhancement function, the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
As a preferred scheme of the projection system with the safety enhancement function, the authority limit program comprises the steps that the identity of a user needs to be identified before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
As a preferred scheme of the projection system with the safety enhancement function, the encryption protection program comprises the functions of setting an encryption chip to prevent the unauthorized access of the firmware program, and the system cannot run after unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
As a preferable scheme of the projection system with the safety enhancement function, the projector body cancels the wireless transmission function.
Compared with the prior art, the invention has the beneficial effects that: the security function is enhanced.
In addition to the technical problems solved by the present invention, the technical features constituting the technical solutions, and the advantageous effects brought by the technical features of the technical solutions described above, other technical problems solved by the present invention, other technical features included in the technical solutions, and advantageous effects brought by the technical features will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic structural diagram according to an embodiment of the present invention.
Fig. 2 is an internal schematic view of an embodiment of the present invention.
Detailed Description
The invention will be described in further detail below with reference to specific embodiments and drawings. Here, the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Referring to fig. 1-2, a novel projection system with security enhancement is shown.
The projection system comprises a processor D L P chip, an identity recognition chip, an encryption chip, a storage chip and other components.
The anti-theft key of the processor D L P chip is written into the storage chip, the control code of each chip can only be operated by the corresponding chip, so that the identification and matching of the physical chip have uniqueness, and simultaneously, the encrypted library file corresponding to the chip is provided according to different platforms.
The encryption chip is used for receiving the anti-theft key from the processor D L P chip, verifying the anti-theft key, if the verification is passed, the system is electrified, the machine is started normally, and if the verification is not passed, the machine is in a standby state.
The processor D L P chip is internally provided with an encryption library, the processor D L P chip sends data serving as parameters to the encryption library for encryption operation, then transfers the encrypted data to the encryption chip through IIC, so as to realize data interaction between the processor D L P chip and the encryption chip, the encryption chip calls an internal algorithm function to decrypt the data after receiving the data, decrypts the data into system data to perform encryption operation by combining with a unique algorithm solidified in the chip, and returns the encrypted system data to an internal system through IIC.
And finally, correspondingly decrypting the data after the encryption library obtains the data to obtain decrypted system data, and verifying the decrypted system data with the system data in the encryption library. In the application stage of the system, a program segment in the encryption chip is operated by calling a function, the encryption chip sends an instruction to control the processor through the GPIO port after verification, a corresponding value is returned after verification is different, the result is used as input data for further operation of the user program, and the encryption chip becomes a part of software in the process, so that the possibility of program cracking is avoided.
The COS encryption system has the characteristics of safety, stability and reliability. The COS system is introduced into an embedded anti-copy board and data encryption and decryption algorithm transplanting scheme. Part of programs and parameters in the processor are transplanted to the encryption chip, and the safety protection of the transplanted programs and parameters is realized by means of the safety characteristic of a hardware platform of the encryption chip and the efficient safety management of a software COS system. No matter how the pirate cracks the product, the program and data in the encryption chip can not be obtained, and the safety of the whole product is replaced by the safety of partial codes and data.
1. The security projector does not have a picture capture function:
and the residual information in the projection is automatically cleared after the projection is normally shut down through software.
When the system is powered on again and returns to the standby state, the system automatically clears the residual information in the projection.
The machine main control board is not internally or externally connected with a large-capacity storage chip, and meanwhile, the main control board is not provided with an external port of a hard disk or other storage media.
2. The encryption chip function designed by the product prevents the unauthorized access of the firmware program, and the system can not run after the unauthorized removal. Data protection measures are taken, and even if the program is read in an unauthorized mode, the read program cannot be viewed. The ID number of each machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the software of the product is prevented from being stolen.
a, an identity recognition system; firstly, the identity of an operator is confirmed, so that whether the user has access and use authority to certain resources is determined, further, the access strategy of the system can be reliably and effectively executed, an attacker is prevented from impersonating a legal user to obtain the access authority of the resources, the safety of the system and data is ensured, and the legal benefit of the authorized visitor is ensured.
b, limitation of communication interface: the system does not contain WIFI, infrared, Bluetooth, USB and Ethernet interfaces.
c store interface restrictions: and does not contain storage devices such as hard disks, memory cards and the like and storage interfaces.
d, data protection measures: and encrypting the data by adopting a 32-bit high-security-level smart card encryption chip. The device has a unique serial number and management codes, and is designed to prevent time sequence attack and tamper; the chip contains various security detection sensors: the high-voltage and low-voltage sensor, the frequency sensor, the filter, the optical sensor, the pulse sensor and the temperature sensor have a sensor service life testing function, and once the chip detects illegal detection, the internal self-destruction function is started.
3. And (3) limiting the use permission of the product:
a) the password manager is additionally arranged, the user needs to be authenticated when the computer is started, the user information can be automatically recorded by the computer after the computer is started, and safety management personnel can check and track the use condition at any time.
b) When the user fails to authenticate for at most 5 consecutive times, the system should lock the account and generate an audit event with the relevant information.
c) The product provides a multi-factor authentication mechanism that allows an authorized administrator to define specific authentication measures, e.g., fingerprints, IC cards, etc
4. No wireless transmission interface is provided:
a) the security projector is not provided with a network interface or a wireless transmitting function, so that the machine cannot be connected with any wireless equipment.
Other protection
A protection switch: the hidden protection switch is added in the whole machine, and the machine cannot run after the whole machine is disassembled without permission.
Specially manufacturing a fixed connecting piece: in order to avoid unauthorized and private disassembly of the machine and enable a person with no particular interest to do hands and feet in the machine, the shell of the whole machine adopts a composite structural member which is independently developed, and the machine can be further operated only by a special tool of the company.
Maintenance and repair: the maintenance of the whole machine needs to be returned to the factory, if key devices are met: the main control chip, the flash and the like are directly destroyed.
The foregoing merely represents embodiments of the invention, which are described in some detail and detail, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (5)
1. A projection system with a safety enhancement function is characterized by comprising a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
2. The projection system with security enhancement function as claimed in claim 1, wherein the screen shot deleting program comprises detecting whether the projector is normally turned off; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
3. The projection system of claim 1, wherein the privilege limiting procedure comprises authenticating a user identity before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
4. The projection system of claim 1, wherein the encryption protection program comprises an encryption chip function configured to prevent unauthorized access to the firmware program, such that the system will not operate unless removed by unauthorized means; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
5. The projection system with security enhancement of claim 1, wherein the projector body eliminates wireless transmission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010280397.XA CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010280397.XA CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111447424A true CN111447424A (en) | 2020-07-24 |
CN111447424B CN111447424B (en) | 2022-04-22 |
Family
ID=71653018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010280397.XA Active CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111447424B (en) |
Citations (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909023A (en) * | 2005-08-02 | 2007-02-07 | 索尼株式会社 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith |
US20070229771A1 (en) * | 2006-04-04 | 2007-10-04 | Seiko Epson Corporation | Projector system |
CN101115316A (en) * | 2006-07-28 | 2008-01-30 | 株式会社东芝 | Projection type display device and control method thereof |
CN101127065A (en) * | 2006-08-18 | 2008-02-20 | 台达电子工业股份有限公司 | Device and method for canceling electronic device original password |
CN101281347A (en) * | 2007-04-04 | 2008-10-08 | 宏碁股份有限公司 | Electronic device with anti-theft function as well as anti-theft method of electronic device |
CN101360215A (en) * | 2007-07-30 | 2009-02-04 | 鸿富锦精密工业(深圳)有限公司 | Projector ciphering system and using method of projector ciphering system |
CN101510939A (en) * | 2008-02-15 | 2009-08-19 | 精工爱普生株式会社 | Image transfer device, image display apparatus, and image data transfer method |
CN101667161A (en) * | 2008-09-02 | 2010-03-10 | 联想(北京)有限公司 | Method and device for protecting data of storage device and computer system |
US20100211788A1 (en) * | 2009-02-17 | 2010-08-19 | Konica Minolta Business Technologies, Inc. | Network apparatus and communication controlling method |
US20100302465A1 (en) * | 2009-06-02 | 2010-12-02 | Seiko Epson Corporation | Image display device, projector, and method of controlling the same |
CN101924766A (en) * | 2010-08-20 | 2010-12-22 | 河南省电力公司 | Double-network communication method |
JP2011211320A (en) * | 2010-03-29 | 2011-10-20 | Nec Corp | Method of deleting secret information, secret information deleting device, and program for the same |
CN102236611A (en) * | 2010-05-06 | 2011-11-09 | 新汉电脑股份有限公司 | Data deletion method for computer memory device |
CN102572346A (en) * | 2010-12-29 | 2012-07-11 | 精工爱普生株式会社 | Projection display device and method for controlling projection display device |
US20130257588A1 (en) * | 2012-03-29 | 2013-10-03 | Seiko Epson Corporation | Image display device, image display system, and method of controlling image display device |
KR20130134918A (en) * | 2012-05-31 | 2013-12-10 | 삼성전자주식회사 | Computer system having non-volatile memory and operating method thereof |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
US20140064495A1 (en) * | 2013-09-27 | 2014-03-06 | James A. Cashin | Secure system and method for audio processing |
CN103713937A (en) * | 2013-12-13 | 2014-04-09 | 广东电网公司信息中心 | Running method for transformer substation terminal system |
US8806571B2 (en) * | 2001-08-28 | 2014-08-12 | Seiko Epson Corporation | Projector projecting password |
US20140237405A1 (en) * | 2011-10-26 | 2014-08-21 | Huawei Device Co., Ltd | Method and Apparatus for Taking Screenshot of Screen of Application in Mobile Terminal |
US20140298451A1 (en) * | 2005-04-28 | 2014-10-02 | Hitachi Consumer Electronics Co., Ltd | Projection Type Image Display Device |
US20150062613A1 (en) * | 2013-08-27 | 2015-03-05 | Canon Kabushiki Kaisha | Image forming apparatus capable of preventing data leakage and control method therefor, and storage medium |
US20150143513A1 (en) * | 2011-07-05 | 2015-05-21 | Seiko Epson Corporation | Projector and control method for projector |
CN105335629A (en) * | 2015-09-22 | 2016-02-17 | 电子科技大学 | Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology |
CN105760226A (en) * | 2016-02-01 | 2016-07-13 | 广东欧珀移动通信有限公司 | Method and device for rapidly starting mobile terminal camera and mobile terminal |
CN105872501A (en) * | 2015-02-10 | 2016-08-17 | 精工爱普生株式会社 | Projector and control method |
CN107515509A (en) * | 2016-06-15 | 2017-12-26 | 香港彩亿科技有限公司 | Projector and method for automatic brightness adjustment |
CN107844244A (en) * | 2017-11-15 | 2018-03-27 | 珠海市魅族科技有限公司 | Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves |
CN207623670U (en) * | 2017-09-26 | 2018-07-17 | 同帅科技(天津)有限公司 | Touch projection machine |
CN109471488A (en) * | 2018-11-12 | 2019-03-15 | 中影环球(北京)科技有限公司 | A kind of projector clocking method and system |
CN110012276A (en) * | 2019-04-30 | 2019-07-12 | 成都市极米科技有限公司 | Method for controlling projection, projector controller and optical projection system |
CN110121170A (en) * | 2019-04-17 | 2019-08-13 | 广东电网有限责任公司信息中心 | Mobile network's auth method based on encryption technology |
-
2020
- 2020-04-10 CN CN202010280397.XA patent/CN111447424B/en active Active
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8806571B2 (en) * | 2001-08-28 | 2014-08-12 | Seiko Epson Corporation | Projector projecting password |
US20140298451A1 (en) * | 2005-04-28 | 2014-10-02 | Hitachi Consumer Electronics Co., Ltd | Projection Type Image Display Device |
CN1909023A (en) * | 2005-08-02 | 2007-02-07 | 索尼株式会社 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith |
US20070229771A1 (en) * | 2006-04-04 | 2007-10-04 | Seiko Epson Corporation | Projector system |
CN101115316A (en) * | 2006-07-28 | 2008-01-30 | 株式会社东芝 | Projection type display device and control method thereof |
CN101127065A (en) * | 2006-08-18 | 2008-02-20 | 台达电子工业股份有限公司 | Device and method for canceling electronic device original password |
CN101281347A (en) * | 2007-04-04 | 2008-10-08 | 宏碁股份有限公司 | Electronic device with anti-theft function as well as anti-theft method of electronic device |
CN101360215A (en) * | 2007-07-30 | 2009-02-04 | 鸿富锦精密工业(深圳)有限公司 | Projector ciphering system and using method of projector ciphering system |
CN101510939A (en) * | 2008-02-15 | 2009-08-19 | 精工爱普生株式会社 | Image transfer device, image display apparatus, and image data transfer method |
CN101667161A (en) * | 2008-09-02 | 2010-03-10 | 联想(北京)有限公司 | Method and device for protecting data of storage device and computer system |
US20100211788A1 (en) * | 2009-02-17 | 2010-08-19 | Konica Minolta Business Technologies, Inc. | Network apparatus and communication controlling method |
CN101827086A (en) * | 2009-02-17 | 2010-09-08 | 柯尼卡美能达商用科技株式会社 | The network equipment and communication control method |
US20100302465A1 (en) * | 2009-06-02 | 2010-12-02 | Seiko Epson Corporation | Image display device, projector, and method of controlling the same |
JP2011211320A (en) * | 2010-03-29 | 2011-10-20 | Nec Corp | Method of deleting secret information, secret information deleting device, and program for the same |
CN102236611A (en) * | 2010-05-06 | 2011-11-09 | 新汉电脑股份有限公司 | Data deletion method for computer memory device |
CN101924766A (en) * | 2010-08-20 | 2010-12-22 | 河南省电力公司 | Double-network communication method |
CN102572346A (en) * | 2010-12-29 | 2012-07-11 | 精工爱普生株式会社 | Projection display device and method for controlling projection display device |
US20150143513A1 (en) * | 2011-07-05 | 2015-05-21 | Seiko Epson Corporation | Projector and control method for projector |
US20140237405A1 (en) * | 2011-10-26 | 2014-08-21 | Huawei Device Co., Ltd | Method and Apparatus for Taking Screenshot of Screen of Application in Mobile Terminal |
US20130257588A1 (en) * | 2012-03-29 | 2013-10-03 | Seiko Epson Corporation | Image display device, image display system, and method of controlling image display device |
KR20130134918A (en) * | 2012-05-31 | 2013-12-10 | 삼성전자주식회사 | Computer system having non-volatile memory and operating method thereof |
US20150062613A1 (en) * | 2013-08-27 | 2015-03-05 | Canon Kabushiki Kaisha | Image forming apparatus capable of preventing data leakage and control method therefor, and storage medium |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
US20140064495A1 (en) * | 2013-09-27 | 2014-03-06 | James A. Cashin | Secure system and method for audio processing |
CN103713937A (en) * | 2013-12-13 | 2014-04-09 | 广东电网公司信息中心 | Running method for transformer substation terminal system |
CN105872501A (en) * | 2015-02-10 | 2016-08-17 | 精工爱普生株式会社 | Projector and control method |
CN105335629A (en) * | 2015-09-22 | 2016-02-17 | 电子科技大学 | Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology |
CN105760226A (en) * | 2016-02-01 | 2016-07-13 | 广东欧珀移动通信有限公司 | Method and device for rapidly starting mobile terminal camera and mobile terminal |
CN107515509A (en) * | 2016-06-15 | 2017-12-26 | 香港彩亿科技有限公司 | Projector and method for automatic brightness adjustment |
CN207623670U (en) * | 2017-09-26 | 2018-07-17 | 同帅科技(天津)有限公司 | Touch projection machine |
CN107844244A (en) * | 2017-11-15 | 2018-03-27 | 珠海市魅族科技有限公司 | Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves |
CN109471488A (en) * | 2018-11-12 | 2019-03-15 | 中影环球(北京)科技有限公司 | A kind of projector clocking method and system |
CN110121170A (en) * | 2019-04-17 | 2019-08-13 | 广东电网有限责任公司信息中心 | Mobile network's auth method based on encryption technology |
CN110012276A (en) * | 2019-04-30 | 2019-07-12 | 成都市极米科技有限公司 | Method for controlling projection, projector controller and optical projection system |
Non-Patent Citations (3)
Title |
---|
丁源主编: "存储安全的应用实例", 《税收数据终端泄露防范及案例分析》 * |
小T: "别让SnagIt出卖你的隐私", 《电脑迷》 * |
林丽华: "截图也要注意隐私", 《电脑迷》 * |
Also Published As
Publication number | Publication date |
---|---|
CN111447424B (en) | 2022-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7205883B2 (en) | Tamper detection and secure power failure recovery circuit | |
CN103886234B (en) | A kind of fail-safe computer based on encryption hard disk and data security control method thereof | |
CN103946806B (en) | Devices, systems and methods for providing memory access control | |
US20060101047A1 (en) | Method and system for fortifying software | |
CN101458743A (en) | Method for protecting computer system | |
CN203746071U (en) | Security computer based on encrypted hard disc | |
CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
CN104756127A (en) | Secure data handling by a virtual machine | |
CN109035519B (en) | Biological feature recognition device and method | |
KR20060134037A (en) | Use authentication method, use authentication program, information processing device, and recording medium | |
WO2009009052A1 (en) | Memory data shredder | |
US9042553B2 (en) | Communicating device and communicating method | |
CN101795261A (en) | Information protection system and method based on mobile data safety | |
CN102316449B (en) | Security terminal system and authentication and interruption method thereof | |
Cheng et al. | A secure and practical key management mechanism for NFC read-write mode | |
CN102236607B (en) | Data security protection method and data security protection device | |
CN103729310A (en) | Method for protecting hardware data | |
JP2005157930A (en) | Confidential information processing system and lsi | |
JP2006227930A (en) | Game machine operation authentication system and game machine | |
JP2008005408A (en) | Recorded data processing apparatus | |
JP4137468B2 (en) | Program usage authentication method | |
CN102346716A (en) | Encryption method and decryption method of hard disk storage device and encryption and decryption system used for hard disk storage device | |
CN104361298B (en) | The method and apparatus of Information Security | |
JP2005293490A (en) | Biometrics system | |
CN111447424B (en) | Projection system with safety enhancement function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |