Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection method and system and terminal

A security protection and identification code technology, applied in the field of intelligent control management, to achieve the effect of data security and personal and property security

Inactive Publication Date: 2013-03-20
周万荣
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method, system and terminal for security protection to solve security protection problems brought about by various mobile application modes supported by information and Internet of Things technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and system and terminal
  • Safety protection method and system and terminal
  • Safety protection method and system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to facilitate the understanding of the present invention, specific examples will be given below for further description.

[0024] The first embodiment of the present invention provides a method for security protection, such as figure 1 As shown, the steps are as follows:

[0025] Step S101, preset the common identification code and security protection identification code corresponding to the user.

[0026] Step S102, preset the common application mode and application corresponding to the common identification code and the security protection mode and application corresponding to the security protection identification code.

[0027] Step S103, determine the type of the identification code input by the user, if it is an ordinary identification code, call the ordinary application mode and application corresponding to the ordinary identification code; if it is a security protection identification code, call the security protection corresponding to the security pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection method and a system and a terminal. The method includes the following steps: a common identification code and a safety protection identification code are preset, wherein the common identification code and the safety protection identification code correspond to a user; a common applied mode and application corresponding to the common identification code and a safety protection mode and application corresponding to the safety protection identification code are preset. Types of the identification code input by the user are judged. The common applied mode and application corresponding to the common identification code is invoked if the type is the common identification code. The safety protection mode and application corresponding to the safety protection identification code is invoked if the type is the safety protection identification code. Operations and behaviors of operators are monitored and recorded on the basis of preset monitored projects, and / or alarming information is sent to designated equipment. Various types are invoked through the discrimination of the common identification code and safety protection identification code. Personal and property safety of the user is guaranteed through the use of the corresponding application of the safety protection identification code.

Description

technical field [0001] The invention relates to the field of intelligent control management, in particular to a method, system and terminal for security protection. Background technique [0002] The rapid development of information and Internet of Things technology has brought many new fast application modes to people, including remote identification and access through mobile devices with specific functions, mobile payment anytime and anywhere, and moving to different places to obtain valuable Items (including coins) and many other application scenarios. [0003] But what follows is the security requirements in the corresponding application scenarios. The rapid dissemination of information has enabled some unscrupulous people to quickly explore or learn to use remote identification, remote mobile payment and other means to obtain ill-gotten gains. An example is that bank card holders or mobile devices with mobile payment functions hold After a person is held hostage, he is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/50
Inventor 周万荣
Owner 周万荣