CN114254286A - Data security prevention and control method and system and AR glasses - Google Patents

Data security prevention and control method and system and AR glasses Download PDF

Info

Publication number
CN114254286A
CN114254286A CN202111349232.4A CN202111349232A CN114254286A CN 114254286 A CN114254286 A CN 114254286A CN 202111349232 A CN202111349232 A CN 202111349232A CN 114254286 A CN114254286 A CN 114254286A
Authority
CN
China
Prior art keywords
user
working environment
control
risk
glasses
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111349232.4A
Other languages
Chinese (zh)
Inventor
章佳
金天龙
黄旭灵
许可
樊静
张铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Alibaba China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd filed Critical Alibaba China Co Ltd
Priority to CN202111349232.4A priority Critical patent/CN114254286A/en
Publication of CN114254286A publication Critical patent/CN114254286A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T19/00Manipulating 3D models or images for computer graphics
    • G06T19/006Mixed reality

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Computer Graphics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses a data security prevention and control method, a system and AR glasses, wherein the system comprises: the environment detection subsystem is used for carrying out image acquisition and risk behavior detection on a physical working environment in which a user works, and sending a safety control instruction to the safety control subsystem if the detected risk behavior triggers a preset control scheme; and the safety control subsystem is used for providing a software working environment for office work for the user terminal equipment, and carrying out safety control in a mode of executing corresponding control actions in the software working environment after receiving the safety control instruction. Through the embodiment of the application, the data security risk control can be carried out more comprehensively in a remote office scene.

Description

Data security prevention and control method and system and AR glasses
Technical Field
The application relates to the technical field of data security in a remote office scene, in particular to a data security prevention and control method, a data security prevention and control system and AR glasses.
Background
With the wide application of the internet in various fields and the popularization of various office equipment in homes, the home office becomes a working way that more and more people can try, and the connotation and the form of the home office are changed. For example, in a commodity object information service system, a customer service system is generally provided for a user to help the user to solve some related problems about orders, preferential policies, disputes, and the like. Also, such customer service systems may require that the customer service personnel be on-line for 24 hours at all times in order to be able to provide better service to the customer. In this case, the customer service person may have a need for home telecommuting, and so on.
The remote office mode can realize working at any time and any place, but in the remote office process, the problem of data safety wind control is firstly solved, and particularly, the problem of safety wind control is more prominent when high-risk-level scenes such as user information are involved.
Therefore, in a remote office scenario, how to perform data security risk control becomes a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The application provides a data security prevention and control method, a data security prevention and control system and AR glasses, which can more comprehensively control data security risks in a remote office scene.
The application provides the following scheme:
a data security prevention and control system comprises:
the environment detection subsystem is used for carrying out image acquisition and risk behavior detection on a physical working environment in which a user works, and sending a safety control instruction to the safety control subsystem if the detected risk behavior triggers a preset control scheme;
and the safety control subsystem is used for providing a software working environment for office work for the user terminal equipment, and carrying out safety control in a mode of executing corresponding control actions in the software working environment after receiving the safety control instruction.
The environment detection subsystem is further used for performing identity authentication on the user after receiving the first login request of the user, determining that the physical working environment where the user works is in a detectable state if identity authentication information passes, and providing the state information to the safety control subsystem;
and the safety control subsystem is also used for carrying out login control according to the state information provided by the environment detection subsystem when a second login request of the user is received.
The safety management and control subsystem is further used for providing the information whether the user is in the working state to the environment detection subsystem;
the environment detection subsystem is specifically configured to determine whether to enter a detection state of a physical working environment according to whether the user is in a working state.
The environment detection subsystem comprises hardware equipment and a detection server;
the hardware equipment is used for acquiring images of the physical working environment;
the hardware equipment and/or the detection server are used for analyzing the acquired images and judging whether risk behaviors exist in the physical working environment and corresponding risk types.
The hardware equipment comprises intelligent sound box equipment with an image acquisition module.
The hardware equipment comprises wearable equipment with a plurality of image acquisition modules, and the plurality of image acquisition modules are used for acquiring images from multiple angles in the physical working environment by taking the user as the center.
Wherein the wearable device is further configured to provide a single-modal or multi-modal reminder message to the user when the governing scheme is triggered.
Wherein the wearable device comprises Augmented Reality (AR) glasses;
the AR glasses are specifically configured to, when the management and control scheme is triggered, provide a reminder message in one or more of the following modalities: providing a visual alert message through the lenses of the AR glasses, a vibratory alert message through an associated vibrator, or a voice alert message through a bone conduction device.
The environment detection subsystem is specifically configured to determine risk levels according to types and occurrence frequencies of detected risk behaviors, and trigger different management and control schemes according to different risk levels.
And the environment detection subsystem is further used for sending a control instruction to the task system when the risk behavior with a higher risk level is detected, so that the task system stops task allocation to the user.
Wherein, different management and control schemes correspond to different management and control actions, and the management and control actions include: and providing a reminding message in a pop-up window mode, fuzzifying the content displayed in the current page of the terminal equipment, and/or locking the screen of the terminal equipment.
And the lower level management and control scheme is also associated with fatigue degree information, and the fatigue degree information is used for prolonging the execution interval of the management and control actions if the frequency of triggering the same management and control scheme reaches a target threshold value.
A data security prevention and control method comprises the following steps:
acquiring image information in a physical working environment where a user works;
carrying out risk behavior detection on the physical working environment according to the image information;
and if the detected risk behaviors trigger a preset control scheme, sending a safety control instruction to a safety control system, wherein the safety control system is used for providing a software working environment for office work for the terminal equipment of the user, and after receiving the safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment.
The image information is collected by hardware equipment in the physical working environment and uploaded according to a preset time interval;
the method further comprises the following steps:
and receiving a risk behavior detection result submitted by the hardware equipment, wherein the risk behavior detection result submitted by the hardware equipment is obtained by judging according to the image information acquired in real time.
A data security prevention and control method comprises the following steps:
acquiring image information in a physical working environment where a user works;
acquiring a risk behavior detection result according to the acquired image information;
and if the risk behaviors trigger a preset management and control scheme, providing a reminding message to the user.
Wherein, the collecting the image information in the physical work environment where the user works comprises:
acquiring image information in a physical working environment where the user works through an image acquisition module of intelligent sound box equipment;
the providing of the reminder message to the user includes:
and providing a voice reminding message for the user through the intelligent sound box device.
Wherein, the collecting the image information in the physical work environment where the user works comprises:
by means of the wearable device which is associated with the user and provided with a plurality of image acquisition modules, the image information in the physical working environment where the user works is acquired in multiple angles by taking the user as a center;
the providing of the reminder message to the user includes:
providing, by the wearable device, a single-modal or multi-modal reminder message to the user.
A data security prevention and control method comprises the following steps:
providing a software working environment for office work for terminal equipment of an office user;
after receiving a safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment;
the safety control instruction is generated after image acquisition and risk behavior detection are carried out on the physical working environment where the user works.
A smart sound box, comprising:
the image acquisition module is used for acquiring image information in a physical working environment where a user works; the image information is used for detecting risk behaviors in the physical working environment;
and the reminding module is used for providing a voice reminding message for the user when the detected risk behaviors trigger the control scheme.
Wherein, still include:
and the detection module is used for analyzing the acquired image information and detecting the risk behaviors in the physical working environment.
Wherein, still include:
and the detection result uploading module is used for uploading the detected risk behavior information to a server so that the server can summarize the risk behaviors and judge whether to trigger the management and control scheme.
Wherein, still include:
and the image acquisition information uploading module is used for uploading the acquired image information to a server according to a preset time interval, so that the server analyzes the received image information and detects the risk behaviors in the physical working environment.
Augmented Reality (AR) glasses comprising:
the system comprises a plurality of image acquisition modules, a plurality of image acquisition modules and a plurality of image acquisition modules, wherein the image acquisition modules are used for carrying out multi-angle acquisition on image information in a physical working environment where a user works by taking the user as a center; the image information is used for detecting risk behaviors in the physical working environment;
and the reminding module is used for providing a reminding message for the user when the detected risk behaviors trigger the control scheme.
The reminding module comprises a visual reminding module and is used for providing visual reminding messages through the lenses of the AR glasses.
The visual reminding module is specifically used for carrying out fuzzy processing on lenses of the AR glasses through outputting the virtual images, or outputting reminding information through the AR glasses, or blocking a target watched by a user through controlling the lenses of the AR glasses.
Wherein the AR glasses are also provided with a vibrator;
the reminding module comprises a vibration reminding module and is used for providing vibration reminding information through the vibrator.
Wherein the AR glasses further carry a bone conduction device;
the reminding module comprises a bone conduction reminding module and is used for providing voice reminding messages through the bone conduction device.
A data security prevention and control device comprising:
the image information acquisition unit is used for acquiring image information in a physical working environment where a user works;
the risk behavior detection unit is used for carrying out risk behavior detection on the physical working environment according to the image information;
and the instruction sending unit is used for sending a safety control instruction to a safety control system if the detected risk behavior triggers a preset control scheme, wherein the safety control system is used for providing a software working environment for office work for the terminal equipment of the user, and after receiving the safety control instruction, performing safety control in a mode of executing corresponding control action in the software working environment.
A data security prevention and control device comprising:
the image acquisition unit is used for acquiring image information in a physical working environment where a user works;
the risk behavior detection unit is used for acquiring a risk behavior detection result according to the acquired image information;
and the reminding unit is used for providing a reminding message for the user if the risk behavior triggers a preset management and control scheme.
A data security prevention and control device comprising:
the software working environment providing unit is used for providing a software working environment for office work for the terminal equipment of an office user;
the management and control action execution unit is used for performing safety management and control in a mode of executing corresponding management and control actions in the software working environment after receiving a safety management and control instruction;
the safety control instruction is generated after image acquisition and risk behavior detection are carried out on the physical working environment where the user works.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the preceding claims.
An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform the steps of the method of any of the preceding claims.
According to the specific embodiments provided herein, the present application discloses the following technical effects:
through the embodiment of the application, the environment detection subsystem can be provided, and the safety management and control subsystem is provided based on systems such as a virtual desktop. Therefore, while providing a software working environment for office work for the terminal equipment of the user through the virtual desktop system, the environment detection subsystem can also detect possible risk behaviors in the physical working environment where the user is located through the environment detection subsystem, and if the detected risk behaviors trigger a management and control scheme, the safety management and control subsystem can execute corresponding management and control actions in the software working environment, so that safety management and control on the user are achieved. Therefore, data safety guarantee can be carried out in two aspects of software working environment and physical working environment, and the safety wind control problem in office scenes such as remote office and the like can be better solved.
Of course, it is not necessary for any product to achieve all of the above-described advantages at the same time for the practice of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic diagram of a system provided by an embodiment of the present application;
FIG. 2 is a schematic view of AR glasses provided in an embodiment of the present application;
FIG. 3 is a flow chart of a first method provided by an embodiment of the present application;
FIG. 4 is a flow chart of a second method provided by embodiments of the present application;
FIG. 5 is a flow chart of a third method provided by embodiments of the present application;
fig. 6 is a schematic view of a smart sound box provided in an embodiment of the present application;
FIG. 7 is a schematic view of AR glasses provided by embodiments of the present application;
FIG. 8 is a schematic diagram of a first apparatus provided by an embodiment of the present application;
FIG. 9 is a schematic diagram of a second apparatus provided by an embodiment of the present application;
FIG. 10 is a schematic diagram of a third apparatus provided by an embodiment of the present application;
fig. 11 is a schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments that can be derived from the embodiments given herein by a person of ordinary skill in the art are intended to be within the scope of the present disclosure.
First, it should be noted that, in the prior art, regarding the problem of data security and wind control in remote office, data "do not fall to the local" is mainly implemented by a virtual desktop tool. That is, when a user works remotely, the user needs to open a virtual desktop tool first, and then performs data access and processing in the tool through a browser and the like, but specific data operation, storage and the like can be completed in a cloud server, and the specific data operation, storage and the like cannot reside in the local terminal device of the user. In this way, there is no concern about security breaches caused by data residing locally on the user's personal terminal device. However, the inventor of the present application finds in the implementation of the present application that data security risks in the remote office process may also come from the physical environment in which the user is located. For example, when a person is not working, a mobile terminal device such as a mobile phone is used to photograph business information or user data displayed on a screen of a working device such as a PC, or some information is recorded by handwriting, or there may be other irrelevant people around the working device during working, and so on. The existence of the above various factors exposes the data to the risk of leakage.
Therefore, in the embodiment of the present application, while the data "do not fall locally" can be realized by the virtual desktop tool, the functions of detecting and controlling the risk behaviors that may exist in the physical work environment where the user is located can be realized by deploying the related hardware devices and servers to combine with the virtual desktop tool. For example, image acquisition is performed on a physical work environment where an employee is located through hardware equipment, risk behavior detection is performed based on an image acquisition result, and if a detected specific risk behavior triggers a corresponding management and control scheme, management and control actions can be performed on the software work environment of a user through a virtual desktop tool, for example, prompt information is provided in a pop-up window mode, or screen locking processing can be performed, and the like. In addition, reminder information may also be provided via hardware devices, and the like. Wherein, regarding the specific hardware device, may include smart speaker device, or, may also include wearable device, and so on.
The following describes in detail specific implementations provided in embodiments of the present application.
Example one
First, the first embodiment provides a data security prevention and control system, referring to fig. 1, the system may specifically include:
the environment detection subsystem 11 is used for carrying out image acquisition and risk behavior detection on a physical working environment in which a user works, and sending a safety control instruction to the safety control subsystem if the detected risk behavior triggers a preset control scheme;
and the safety control subsystem 12 is configured to provide a software working environment for office work for the user terminal device, and perform safety control in a manner of executing a corresponding control action in the software working environment after receiving the safety control instruction.
The physical work environment may be an environment of a physical place where the user is located when the user performs a remote office. That is to say, in the embodiment of the application, in the process that a user works in a teleworking mode, a risk behavior that may exist in a physical working environment may be detected by an environment detection subsystem, and if a non-self login is found, or a mobile phone is used, or a surrounding person has a risk behavior such as a person watching, risk control may be performed on the software working environment of the user by a virtual desktop tool. Through this kind of mode, because virtual desktop can provide safe software operational environment for the user, on this basis, through managing and controlling the risk behavior in the physical operational environment, consequently, data security under the guarantee teleworking environment of can all-round. Of course, in practical applications, if risk management and control are required to be performed on a working environment in a non-teleworking scenario, the scheme provided by the present application may also be used, and a specific application scenario is not limited herein.
Specifically, as shown in fig. 1, the environment detection subsystem 11 may include a hardware device 111 and a detection server 112, where the hardware device 111 may be deployed in the physical work environment, and may be specifically configured to perform image acquisition on the physical work environment, and such acquired image information may be used to perform detection of a risk behavior. Specifically, the collected image may be analyzed by a hardware device and/or the detection server, and whether a risk behavior exists in the physical working environment and a corresponding risk type (during specific implementation, orientation information of the specific risk behavior may also be included, and the like) are determined. That is to say, the hardware device may upload the acquired image information to the server, and analyze the image at the server side to determine whether a risk behavior exists. Alternatively, the relevant application program may be run locally on the hardware device, and the image analysis and the risk behavior detection may be performed locally on the hardware device by the application program. Or, in another mode, the hardware device may be combined with a server, for example, some relatively simple risk behaviors may be detected by the hardware device according to image information acquired in real time, and meanwhile, the hardware device may also upload the acquired image information to the server at certain time intervals (for example, every second and the like), and detect some relatively complex risk behaviors by the server, and the like.
Of course, no matter whether the risk behavior detection is performed locally on the hardware device or in the server, if the risk behavior is detected, the corresponding risk type (for example, non-self login, or use of a mobile phone in the working process, or people around the mobile phone, etc.) can be determined, and the detection result can be summarized into the server, so that the statistics of the risk behavior can be uniformly performed in the server to determine whether to trigger a specific management and control scheme.
For example, in one mode, the specific hardware device may be a common camera-type device, and at this time, the hardware device may only have functions of image acquisition and uploading, and the specific risk behavior detection may be performed in the server. Or, in order to be able to perform some simple risk behavior detection in the hardware device, therefore, it may also be implemented using a smart speaker device with an image acquisition module. Specifically, image acquisition modules such as a camera can be equipped for intelligent sound box equipment, and thus, image information in the physical working environment can be acquired through the intelligent sound box equipment. In addition, since the smart speaker device usually also has an operating system, and can support installation of an application program, etc., a relevant application program can also be installed in the smart speaker device, and detection of risk behaviors locally at the smart speaker and uploading of detection results can be realized through the application program, etc. Moreover, because the smart speaker device further has a voice function, during specific implementation, corresponding voice prompt information may be provided for the user according to the specifically detected risk behavior or the triggering condition of the management and control scheme, for example, to remind the user to stop or pay attention to a certain risk behavior, and the like.
In another mode, the specific hardware device may further include a wearable device, and the wearable device may further be equipped with a plurality of image capturing modules. Through a plurality of image acquisition modules can with the user is the center, carries out the image acquisition of multi-angle to physics operational environment, for example, can deploy the camera through a plurality of positions such as all around wearing formula equipment, realize using the user as the center, to the image acquisition of 360 degrees of physics operational environment, etc.. In this way, since multi-angle image acquisition centered on the user can be realized, various risk behaviors possibly existing in the physical working environment can be found more conveniently and comprehensively. In a specific implementation manner, the specific wearable device may be an AR (Augmented Reality) glasses. For example, in one aspect, the AR glasses may be equipped with four cameras as shown in fig. 2, so as to obtain a detection view of the user within 360 degrees of the circumference of the user. And, because specific wearable equipment can be dressed on one's body, consequently, need not occupy user's station space. In addition, since the risk detection device can move along with the movement of the user, the dynamic detection of the risk behavior can be realized. Moreover, when the detected risk behavior triggers the management and control scheme, a single-mode or multi-mode reminding message can be provided for the user through the wearable device (that is, the user can be safely managed and controlled through a virtual desktop tool, and the user can be reminded through hardware equipment directly).
During specific implementation, due to the characteristics of the AR glasses, some processing can be performed visually to remind a user, and in addition, other auxiliary modules can be installed on the AR glasses to realize multi-mode reminding. For example, upon triggering the governing scheme, a visual alert message may be provided through the lenses of the AR glasses. Alternatively, a vibrator may also be mounted on the AR glasses, so that a vibratory alert message may be provided by the associated vibrator. Alternatively, a bone conduction device may be mounted on the AR glasses, so that a voice alert message may be provided through the bone conduction device.
For example, the lenses of the AR glasses may be subjected to blurring processing by outputting a virtual image (that is, in a normal state, the lenses of the AR glasses may be transparent, and after a management and control scheme is triggered, the lenses may be subjected to blurring processing), or reminding information is output by the AR glasses (for example, a specific reminding text is displayed on the lenses to remind them to stop related behaviors, or stop behaviors of surrounding people, or the like), or a target viewed by a user is shielded by controlling the lenses of the AR glasses (for example, a grid state in the lenses is processed, a part of sensitive content in a visual field of the user is shielded, or the like).
In a word, can regard as hardware equipment through wearing formula equipment such as camera equipment, intelligent audio amplifier equipment, AR glasses, realize the image acquisition to user's place physics operational environment, then, can cooperate with the server, realize the detection to the risk action. Then, the server may count various types of specifically detected risk behaviors to determine whether to trigger a specific management and control scheme, and may send a management and control instruction to the security management and control subsystem under the condition that the management and control scheme is triggered, and the security management and control subsystem executes a specific management and control action.
For example, if it is found that the user uses a mobile phone at a certain time, the type of the risk behavior, the corresponding occurrence time, the cumulative occurrence frequency of the risk behavior of the type, and the like may be recorded. Through the statistical information, whether a preset management and control scheme is triggered or not can be judged.
In specific implementation, the specific management and control schemes can be multiple and respectively correspond to different risk levels. With regard to risk ratings, however, the determination may be made based on the type, frequency, etc. of the particular risk activities. For example, if a user uses a cell phone more than three times in a half hour, a regulatory scheme is triggered, and so on. The specific management and control scheme may further be configured with corresponding sub-management and control action information, that is, different management and control actions may be executed according to different specific risk levels. For example, for some cases with a low risk level, the specific control action may be to provide a prompt message to the user in a pop-up window manner, or may also be to perform temporary fuzzification processing on the content displayed in the current page of the terminal device while the pop-up window prompts, and gradually resume the clear display of the content in the page after the user confirms that the prompt message is received in a pop-up window closing manner or the like. Or, for some cases with a medium risk level, the control action may be to lock the screen, and the user needs to unlock the screen by re-inputting the password. Alternatively, for some high risk situations, the governing action may be to force the screen to be locked, at which time the user is required to contact an administrator to be able to unlock, and so on.
It should be noted here that, since the specific security management and control subsystem may be implemented based on a virtual desktop tool, the virtual desktop tool can provide a software working environment for the user, that is, the user needs to open the virtual desktop tool in the terminal device during the remote office process, and then the software working environment required during the working process is provided by the virtual desktop tool, for example, a browser is opened in the virtual desktop tool, and the task is received and processed, and so on. Therefore, the specific virtual desktop system can control the software working environment of the user. Therefore, the safety management and control subsystem realized on the basis of the virtual desktop system can execute any management and control action in the software working environment provided by the safety management and control subsystem. For example, in the embodiment of the present application, a pop-up window reminder, an automatic screen locking, a forced screen locking, and the like may be included.
It should be noted that, in a specific implementation, the necessity requirements for management may be different due to different risk levels, for example, a lower level of risk may not require a user to be reminded too frequently, otherwise the actual work of the user may be disturbed too severely. For this reason, fatigue degree information may be associated with the management and control scheme corresponding to the lower-level risk, so that if the frequency of triggering the same management and control scheme reaches the target threshold, the execution interval of the management and control action may be extended. Of course, different fatigue degree information may be set for different management and control schemes, and the fatigue degree may not be set for the management and control scheme corresponding to the high risk level.
In addition, in the remote office process, a specific task system may distribute work tasks to users, and then the users receive specific task information through a software work environment provided by the specific virtual desktop system and execute corresponding tasks, for example, the work environment includes a wiring service provided by employees in a customer service system for consumer users, and the like. In this case, the environment detection subsystem and the task system may be communicated, so that when a risk behavior with a higher risk level is detected, a management and control instruction may be sent to the task system, so that the task system stops task allocation to the user. That is, if it is found that a relatively high risk factor exists in the physical working environment where the user is located, the task system can be directly notified to stop allocating tasks to the user, so as to avoid leakage of client information. Of course, if it is detected that a high risk factor exists in the physical environment of a certain employee, and the employee is in the process of providing service for a certain customer, the task system may also transfer the service currently being provided to other employees while stopping allocating a new task to the employee, so as to reduce the influence on the customer experience.
It should be noted that, in a specific implementation, the specific image analysis and the risk behavior detection may be implemented by an algorithm. Of course, an entry for manual detection may be provided, and specifically, a function of inputting a user name and other information of a certain user at the server side and viewing image information in the physical work environment where the user is currently located may be supported. If the risk behavior is found, a specific management and control scheme can be triggered manually, so that stronger management and control can be realized in an unscheduled manual sampling inspection mode.
In addition, when the system provided by the embodiment of the present application is used for security risk management and control, in an optimal manner, a user may be required to enter a state in which a physical working environment is detectable before work starts, and detection may be automatically ended until the user quits the work.
Specifically, to achieve the above purpose, the specific workflow may be: before the user starts working, the user can log in through the environment detection subsystem, after the system receives a first login request of the user, the user can be authenticated, and if the authentication information passes, the physical working environment where the user is located is determined to be in a detectable state.
That is, the user may log in the environment detection subsystem and the virtual desktop system, respectively. For example, in a specific implementation, a specific hardware device may be opened first, and a login request may be issued through the hardware device. Specifically, if the smart speaker device is used as a hardware device, the smart speaker device may further be equipped with a display screen, and a user may open a related application program through the smart speaker device, and input information such as a user name and a password therein, and may further perform face acquisition (or acquire other biometric information) through a camera of the smart speaker device, so that user identification may be performed through the user name and the password, and the user may be authenticated through the face information and the like. If the hardware device used is wearable device such as AR glasses, since the device may not have a display screen, etc., the wearable device may be bound with login information such as a user name and a password in some manner in advance, for example, the binding process may be completed by means of a smart terminal device such as a mobile phone. Like this, specifically after opening wearable equipment, can gather user's face image through camera etc. in this equipment, perhaps, also can gather user's iris characteristic information, gather user's fingerprint characteristic through the fingerprint collection device of picture frame equidistance setting, etc. Therefore, the identity of the user can be identified through the login information bound by the wearable device, and the identity of the user can be verified through the biological characteristics, and the like.
After the user finishes login and personal identity authentication through the hardware device, the state information can be actively provided to the security management and control subsystem, or provided to the security management and control subsystem under the request of the security management and control subsystem. In this way, the security management and control subsystem can also perform login control according to the state information provided by the environment detection subsystem when receiving a second login request of the user. For example, after the user completes login and authentication in the hardware device, the virtual desktop system may be opened in a terminal device such as a PC of the user, and login information such as a user name and a password may be input in the virtual desktop system (the login information may be the same as or have a corresponding relationship with the login information in the hardware device). After receiving the second login request, the security management and control subsystem in the virtual desktop system may first request to acquire state information of the corresponding user from the server of the environment detection subsystem, determine whether the current user has opened the hardware device and enters a detectable state, and if so, may complete a subsequent login process and may enter a specific working state; otherwise, the user may be prompted to first open the hardware device and log in, etc.
It should be noted here that after the user completes login and authentication in the hardware device, the environment detection subsystem may directly collect images in the physical environment, or, in a preferred embodiment, may determine whether to collect and detect images according to the actual working conditions of the user. That is, the safety management and control subsystem may further provide the information about whether the user is in the working state to the environment detection subsystem, so that the environment detection subsystem may determine whether to enter the detection state of the physical working environment according to whether the user is in the working state. For example, specifically, after the user completes login and authentication in the hardware device, the user enters a detectable state, but since the user has not completed login in the virtual desktop system, that is, has not entered a working state, image acquisition and risk behavior detection are not necessary for a while. After the user finishes logging in the virtual desktop system and enters a working state, the specific safety control subsystem can inform the environment detection subsystem, and at the moment, image acquisition and risk behavior detection are started. In addition, after the working state is entered, the user may also enter a rest state due to a midday rest and the like, at this time, the safety management and control subsystem may also notify the environment detection subsystem of the information that the user enters the rest state, and the environment detection subsystem may suspend the collection of images and the detection of risk behaviors, so as to reduce resource waste.
In short, the embodiment of the application can provide an environment detection subsystem and a safety management and control subsystem based on systems such as a virtual desktop. Therefore, while providing a software working environment for office work for the terminal equipment of the user through the virtual desktop system, the environment detection subsystem can also detect possible risk behaviors in the physical working environment where the user is located, and if the detected risk behaviors trigger a management and control scheme, the safety management and control subsystem can execute corresponding management and control actions in the software working environment, so that specific safety management and control are realized. Therefore, data safety guarantee can be carried out in two aspects of software working environment and physical working environment, and the safety wind control problem in working scenes such as remote office and the like can be better solved.
Example two
The second embodiment corresponds to the first embodiment, and provides a data security prevention and control method from the perspective of a server of an environment detection subsystem, and referring to fig. 3, the method may specifically include:
s301: acquiring image information in a physical working environment where a user works;
s302: carrying out risk behavior detection on the physical working environment according to the image information;
s303: and if the detected risk behaviors trigger a preset control scheme, sending a safety control instruction to a safety control system, wherein the safety control system is used for providing a software working environment for office work for the terminal equipment of the user, and after receiving the safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment.
In a specific implementation, the specific image information may be collected by a hardware device located in the physical working environment and uploaded at preset time intervals. At this time, in addition to performing risk behavior detection by the server according to the received image information, the hardware device may also perform some simple risk behavior detection locally according to the image information acquired in real time, and therefore, the server may also receive a risk behavior detection result submitted by the hardware device. Therefore, the risk behavior detection result submitted by the hardware equipment and the risk behavior detected by the server can be integrated to judge whether to trigger the management and control scheme.
EXAMPLE III
This third embodiment is also corresponding to the first embodiment, and provides a data security prevention and control method from the perspective of an application program associated with a hardware device in a specific environment detection subsystem, and referring to fig. 4, the method may include:
s401: acquiring image information in a physical working environment where a user works;
s402: acquiring a risk behavior detection result according to the acquired image information;
s403: and if the risk behaviors trigger a preset management and control scheme, providing a reminding message to the user.
Specifically, the hardware device may include a smart speaker device, that is, the image information in the physical working environment where the user is located may be acquired through an image acquisition module of the smart speaker device. At this time, a voice reminding message can be provided to the user through the smart sound box device.
Or, the specific hardware device may also include wearable devices, including AR glasses, and the like, and at this time, the image information in the physical work environment where the user is located may be collected from multiple angles by using the user as a center through the wearable device associated with the user and having the multiple image collection modules. In addition, in this case, a single-modal or multi-modal reminder message may also be provided to the user through the wearable device. For example, a visual alert message is provided through the lenses of the AR glasses, a vibratory alert message is provided through an associated vibrator, a voice alert message is provided through a bone conduction device, and so forth.
Example four
The fourth embodiment is also corresponding to the first embodiment, and from the perspective of the security management and control subsystem, there is provided a data security prevention and control method, referring to fig. 5, the method may include:
s501: providing a software working environment for office work for terminal equipment of an office user;
s502: after receiving a safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment; the safety control instruction is generated after image acquisition and risk behavior detection are carried out on the physical working environment where the user is located.
Therefore, when the management and control instruction is generated according to the specific management and control scheme, the management and control action to be executed can be carried in the management and control instruction, and thus, after the safety management and control subsystem receives the specific management and control instruction, the safety management and control subsystem can directly execute the corresponding management and control action in the software working environment of the user according to the management and control action information carried in the instruction. For example, the method includes providing a reminding message by means of a pop-up window, or performing screen locking processing on the terminal device (including automatic screen locking, unlocking by inputting a password by a user, or unlocking by contacting an administrator after forcibly locking the screen, and the like).
EXAMPLE five
This embodiment five still provides a smart sound box, see fig. 6, this smart sound box can include:
the image acquisition module 601 is used for acquiring image information in a physical working environment where a user works; the image information is used for detecting risk behaviors in the physical working environment;
a reminding module 602, configured to provide a voice reminding message to the user when the detected risk behavior triggers a management and control scheme.
During the concrete implementation, this intelligent audio amplifier can also include:
the detecting module 603 is configured to detect a risk behavior in the physical working environment by analyzing the acquired image information.
The specific detection result may be directly reminded to the user locally, or the smart speaker may further include:
the detection result uploading module 604 is configured to upload the detected risk behavior information to a server, so that the server summarizes the risk behaviors and determines whether to trigger the management and control scheme.
In addition, this smart sound box can also include:
an image collecting information uploading module 605, configured to upload the collected image information to a server according to a preset time interval, so that the server analyzes the received image information to detect a risk behavior in the physical working environment.
EXAMPLE six
This embodiment provides an augmented reality AR glasses, which, referring to fig. 7, may include:
the system comprises a plurality of image acquisition modules 701, a plurality of image acquisition modules and a plurality of image acquisition modules, wherein the image acquisition modules 701 are used for acquiring image information in a physical working environment where a user works in a multi-angle mode by taking the user as a center; the image information is used for detecting risk behaviors in the physical working environment;
a reminding module 702, configured to provide a reminding message to the user when the detected risk behavior triggers a management and control scheme.
Wherein the reminding module may include a visual reminding module for providing a visual reminding message through the lenses of the AR glasses.
Specifically, the visual reminding module may be specifically configured to output a virtual image to blur lenses of the AR glasses, or output reminding information through the AR glasses, or control the lenses of the AR glasses to shield a target viewed by a user.
Or, the AR glasses are also provided with a vibrator;
at this time, the reminding module comprises a vibration reminding module, and is used for providing a vibration reminding message through the vibrator.
Alternatively, the AR glasses also carry a bone conduction device;
at this time, the reminding module comprises a bone conduction reminding module, and is used for providing a voice reminding message through the bone conduction device.
For the parts of the second to sixth embodiments that are not described in detail, reference may be made to the descriptions of the first embodiment and other parts of the present specification, which are not described herein again.
It should be noted that, in the embodiments of the present application, the user data may be used, and in practical applications, the user-specific personal data may be used in the scheme described herein within the scope permitted by the applicable law, under the condition of meeting the requirements of the applicable law and regulations in the country (for example, the user explicitly agrees, the user is informed, etc.).
Corresponding to the second embodiment, the embodiment of the present application further provides a data security prevention and control device, referring to fig. 8, the device may include:
an image information acquisition unit 801 for acquiring image information in a physical work environment in which a user works;
a risk behavior detection unit 802, configured to perform risk behavior detection on the physical working environment according to the image information;
the instruction sending unit 803 is configured to send a security management and control instruction to a security management and control system if the detected risk behavior triggers a preset management and control scheme, where the security management and control system is configured to provide a software working environment for office work for the user's terminal device, and perform security management and control in a manner of executing a corresponding management and control action in the software working environment after receiving the security management and control instruction.
The image information is collected by hardware equipment in the physical working environment and uploaded according to a preset time interval;
at this time, the apparatus further includes:
and the detection result receiving unit is used for receiving the risk behavior detection result submitted by the hardware equipment, and the risk behavior detection result submitted by the hardware equipment is obtained by judging according to the image information acquired in real time.
Corresponding to the three phases of the embodiment, the embodiment of the present application further provides a data security prevention and control device, referring to fig. 9, the device may include:
an image collecting unit 901, configured to collect image information in a physical work environment where a user works;
a risk behavior detection unit 902, configured to obtain a risk behavior detection result according to the acquired image information;
a reminding unit 903, configured to provide a reminding message to the user if the risk behavior triggers a preset management and control scheme.
The image acquisition unit may specifically be configured to:
acquiring image information in a physical working environment where the user works through an image acquisition module of intelligent sound box equipment;
the reminding unit may specifically be configured to:
and providing a voice reminding message for the user through the intelligent sound box device.
Alternatively, the image acquisition unit may be specifically configured to:
by means of the wearable device which is associated with the user and provided with a plurality of image acquisition modules, the image information in the physical working environment where the user works is acquired in multiple angles by taking the user as a center;
at this time, the reminding unit may specifically be configured to:
providing, by the wearable device, a single-modal or multi-modal reminder message to the user.
Corresponding to the fourth embodiment, the embodiment of the present application further provides a data security prevention and control device, referring to fig. 10, the device may include:
a software working environment providing unit 1001 configured to provide a software working environment for office work for a terminal device of an office user;
the management and control action execution unit 1002 is configured to, after receiving a security management and control instruction, perform security management and control in a manner of executing a corresponding management and control action in the software working environment;
the safety control instruction is generated after image acquisition and risk behavior detection are carried out on the physical working environment where the user works.
In addition, the present application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method described in any of the preceding method embodiments.
And an electronic device comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform the steps of the method of any of the preceding method embodiments.
FIG. 11 illustrates an architecture of an electronic device, which may include, in particular, a processor 1110, a video display adapter 1111, a disk drive 1112, an input/output interface 1113, a network interface 1114, and a memory 1120. The processor 1110, the video display adapter 1111, the disk drive 1112, the input/output interface 1113, the network interface 1114, and the memory 1120 may be communicatively connected by a communication bus 1130.
The processor 1110 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solution provided by the present Application.
The Memory 1120 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1120 may store an operating system 1121 for controlling the operation of the electronic device 1100, a Basic Input Output System (BIOS) for controlling low-level operations of the electronic device 1100. In addition, a web browser 1123, a data storage management system 1124, a data security control processing system 1125, and the like may also be stored. The data security prevention and control processing system 1125 may be an application program that implements the operations of the foregoing steps in this embodiment. In summary, when the technical solution provided by the present application is implemented by software or firmware, the relevant program codes are stored in the memory 1120 and called for execution by the processor 1110.
The input/output interface 1113 is used for connecting an input/output module to realize information input and output. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
Network interface 1114 is used to connect to a communications module (not shown) to enable the device to interact with other devices for communication. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1130 includes a path that transfers information between the various components of the device, such as processor 1110, video display adapter 1111, disk drive 1112, input/output interface 1113, network interface 1114, and memory 1120.
It should be noted that although the above devices only show the processor 1110, the video display adapter 1111, the disk drive 1112, the input/output interface 1113, the network interface 1114, the memory 1120, the bus 1130 and so on, in a specific implementation, the devices may also include other components necessary for normal operation. Furthermore, it will be understood by those skilled in the art that the apparatus described above may also include only the components necessary to implement the solution of the present application, and not necessarily all of the components shown in the figures.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The data security prevention and control method, the data security prevention and control system and the AR glasses provided by the present application are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific embodiments and the application range may be changed. In view of the above, the description should not be taken as limiting the application.

Claims (14)

1. A data security prevention and control system is characterized by comprising:
the environment detection subsystem is used for carrying out image acquisition and risk behavior detection on a physical working environment in which a user works, and sending a safety control instruction to the safety control subsystem if the detected risk behavior triggers a preset control scheme;
and the safety control subsystem is used for providing a software working environment for office work for the user terminal equipment, and carrying out safety control in a mode of executing corresponding control actions in the software working environment after receiving the safety control instruction.
2. The system of claim 1,
the environment detection subsystem comprises hardware equipment and a detection server;
the hardware equipment is used for acquiring images of the physical working environment;
the hardware equipment and/or the detection server are used for analyzing the acquired images and judging whether risk behaviors exist in the physical working environment and corresponding risk types.
3. The system of claim 2,
the hardware equipment comprises intelligent sound box equipment with an image acquisition module;
alternatively, the first and second electrodes may be,
wearable equipment with a plurality of image acquisition modules, a plurality of image acquisition modules be used for with the user is the center, right the physics operational environment carries out the image acquisition of multi-angle.
4. The system of claim 3,
the wearable device is further configured to provide a single-modal or multi-modal reminder message to the user when the governing scheme is triggered.
5. The system of claim 1,
different management and control schemes correspond to different management and control actions, and the management and control actions comprise: and providing a reminding message in a pop-up window mode, fuzzifying the content displayed in the current page of the terminal equipment, and/or locking the screen of the terminal equipment.
6. A data security prevention and control method is characterized by comprising the following steps:
acquiring image information in a physical working environment where a user works;
carrying out risk behavior detection on the physical working environment according to the image information;
and if the detected risk behaviors trigger a preset control scheme, sending a safety control instruction to a safety control system, wherein the safety control system is used for providing a software working environment for office work for the terminal equipment of the user, and after receiving the safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment.
7. A data security prevention and control method is characterized by comprising the following steps:
acquiring image information in a physical working environment where a user works;
acquiring a risk behavior detection result according to the acquired image information;
and if the risk behaviors trigger a preset management and control scheme, providing a reminding message to the user.
8. A data security prevention and control method is characterized by comprising the following steps:
providing a software working environment for office work for terminal equipment of an office user;
after receiving a safety control instruction, performing safety control in a mode of executing corresponding control actions in the software working environment;
the safety control instruction is generated after image acquisition and risk behavior detection are carried out on the physical working environment where the user works.
9. An intelligent sound box, comprising:
the image acquisition module is used for acquiring image information in a physical working environment where a user works; the image information is used for detecting risk behaviors in the physical working environment;
and the reminding module is used for providing a voice reminding message for the user when the detected risk behaviors trigger the control scheme.
10. An Augmented Reality (AR) glasses, comprising:
the system comprises a plurality of image acquisition modules, a plurality of image acquisition modules and a plurality of image acquisition modules, wherein the image acquisition modules are used for carrying out multi-angle acquisition on image information in a physical working environment where a user works by taking the user as a center; the image information is used for detecting risk behaviors in the physical working environment;
and the reminding module is used for providing a reminding message for the user when the detected risk behaviors trigger the control scheme.
11. The AR glasses according to claim 10,
the reminding module comprises a visual reminding module used for providing visual reminding information through the lens of the AR glasses;
and/or the presence of a gas in the gas,
the AR glasses are also provided with a vibrator, and the reminding module comprises a vibration reminding module and is used for providing a vibration reminding message through the vibrator;
and/or the presence of a gas in the gas,
the AR glasses are further provided with a bone conduction device, and the reminding module comprises a bone conduction reminding module and is used for providing voice reminding messages through the bone conduction device.
12. The AR glasses according to claim 11,
the visual reminding module is specifically used for carrying out fuzzy processing on lenses of the AR glasses through outputting the virtual images, or outputting reminding information through the AR glasses, or blocking a target watched by a user through controlling the lenses of the AR glasses.
13. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 6 to 8.
14. An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform the steps of the method of any of claims 6 to 8.
CN202111349232.4A 2021-11-15 2021-11-15 Data security prevention and control method and system and AR glasses Pending CN114254286A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111349232.4A CN114254286A (en) 2021-11-15 2021-11-15 Data security prevention and control method and system and AR glasses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111349232.4A CN114254286A (en) 2021-11-15 2021-11-15 Data security prevention and control method and system and AR glasses

Publications (1)

Publication Number Publication Date
CN114254286A true CN114254286A (en) 2022-03-29

Family

ID=80792505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111349232.4A Pending CN114254286A (en) 2021-11-15 2021-11-15 Data security prevention and control method and system and AR glasses

Country Status (1)

Country Link
CN (1) CN114254286A (en)

Similar Documents

Publication Publication Date Title
EP3692461B1 (en) Removing personally identifiable data before transmission from a device
CA2713320C (en) Method and apparatus for detecting behavior in a monitoring system
CN109388532B (en) Test method, test device, electronic equipment and computer readable storage medium
CN110933103B (en) Anti-crawler method, device, equipment and medium
JP2003186850A (en) Computer or computer resource lock control device and method of implementing same
US10375114B1 (en) Systems and methods for enforcing access-control policies
CN104794827A (en) Method and apparatus for prevention of false alarms in monitoring systems
US20180249069A1 (en) Managing camera usage with warnings and/or disablement
CN111767840A (en) Method, apparatus, electronic device and computer-readable storage medium for verifying image
CN112926925A (en) Product supervision method and device, electronic equipment and storage medium
CN111259460B (en) Locking state information display method and device
CN115273231A (en) Information processing method, information processing apparatus, storage medium, and electronic device
CN111310612A (en) Behavior supervision method and device
KR20150000012A (en) Employee management system using screenshot capture function
JP2019117483A (en) Information processing device, control method, and program
CN114254286A (en) Data security prevention and control method and system and AR glasses
CN114553725B (en) Machine room monitoring alarm method and device, electronic equipment and storage medium
CN109756539B (en) Screen capture control method and related equipment
CN114445894A (en) Storage cabinet management method and device, storage cabinet, electronic equipment and storage medium
CN113483760A (en) Night patrol monitoring method and device, electronic equipment and computer readable storage medium
CN112950438A (en) Data processing method and device, computer equipment and storage medium
CN112153337A (en) Monitoring method and related equipment
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
CN111401153A (en) Method and device for controlling access of closed self-service equipment
CN114333098B (en) Night patrol method, night patrol device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination