Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for executing security operation by using security device

A technology for safe operation and safety equipment, applied in the field of electronics, can solve problems such as unfavorable work efficiency, inability to provide better user experience, inability to operate, etc.

Active Publication Date: 2018-06-22
TENDYRON CORP
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the employees of the enterprise log in to the server, how to monitor the employee's work status, such as whether they leave the office for a period of time while logged in, etc. If they do not log out of the system in time, some business information will be leaked, leading to attacks on the information security of the enterprise, etc. Problems are all problems to be solved urgently by those skilled in the art
[0005] In addition, at present, it is generally connected to the PC through the keyboard, and the client on the PC is used to log in to the remote server, but the PC is needed. If there is no PC, it cannot be operated. Move with employees, and generally a PC is fixedly assigned to an employee. When the mobility of the working environment is high, it cannot provide a better user experience and is not conducive to improving work efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for executing security operation by using security device
  • Method and system for executing security operation by using security device
  • Method and system for executing security operation by using security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment provides a method for using a security device to perform a security operation, using the system architecture mentioned above. The method specifically includes a step of using a security device to read a card to log in (S101-110) and a step of using the security device to control and execute a security operation after logging in (S111-S120).

[0046] Specifically, such as image 3 As shown, the steps of using the security device to read and log in provided by this embodiment are as follows (steps S101-S110):

[0047] In step S101, the security chip of the security device inputs login information to the login terminal through the communication interface, and the login information includes: user account number and password.

[0048] The security chip (such as Z8D64U (national secret batch number SSX43) and Z32 (national secret batch number SSX20) of National Technology Co., Ltd.) has an independent processor and storage unit inside, which can store PKI dig...

Embodiment 2

[0107] This embodiment also provides a method for using a security device to perform a security operation, using the system architecture mentioned above. The difference between this method and the method provided in Embodiment 1 is that the security chip does not make a judgment after receiving the first collection information, but calls the communication interface to send the first collection information to the login terminal, and the login terminal makes a judgment. And execute a security operation or send a security operation request to the login processing end according to the judgment result.

[0108] Among them, the steps of using the security device to read the card to log in are the same as those in Embodiment 1, and will not be repeated here. Please refer to the attached image 3 . Such as Figure 5 As shown, the steps of using the security device control to perform security operations after logging in include (S211-S218):

[0109] Step S211 to step S214 are the sa...

Embodiment 3

[0115] This embodiment also provides a system for using security equipment to perform security operations. Adopt the method for utilizing the safety device of embodiment 1 to perform safety operation, its specific structure is as follows figure 1 and figure 2 shown. For specific device functions, refer to the specific description in Embodiment 1. This embodiment is only briefly described.

[0116] Such as figure 1 and figure 2 As shown, the system using security devices to perform security operations includes: a security device 10 , a smart card 20 , a login terminal 30 and a login processing terminal 40 . Wherein, the security device 10 includes: a security chip 101, a card reader 102, a communication interface 103 and a camera 104;

[0117] The security chip 101 is used to input login information to the login terminal 30 through the communication interface 103. The login information includes: user account number and password; it is also used to receive the check fact...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for performing a security operation by using a security device. The method comprises the following steps: a security chip acquires login information and interacts with a smart card to obtain verification information, and sends the verification information to a login processing terminal through a login terminal, the login processing terminal verifies the login information and the verification information, and executes a login operation, after login success, the security chip sends an image collection instruction to a camera device, receives first collection information sent by the camera device, judges whether the collection information contains human face information, if so, judges whether the human face information is consistent with a user facepicture, if not, executes the security operation, if not, judges whether at least one of the disenabling conditions is satisfied, and if so, executes the security operation; or, the security chip sends the first collection information to the login terminal, the login terminal performs judgment, and executes the security operation according to the judgment result, therefore the business secret of the employee who logs in by using the security device is protected, and the unrelated personnel are prevented from using the security device.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method and system for using safety equipment to perform safety operations. Background technique [0002] People have realized that the benefits of computer virtualization lie in greatly increasing the computing efficiency and flexibility of computing hardware platforms. For example, computer virtualization allows multiple virtual computing machines (computing machines) to run on a common computing hardware platform. [0003] Server-based computing allows networked client systems (located remotely from a server) to access computing resources on the server. For example, a client can use a remote desktop protocol (such as RDP or VNC) to remotely access a desktop and communicate user input (such as keyboard or mouse input) to the remote system. Also, the user must remain connected to the network to be able to access the user's desktop stored on the server. As an alte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/35
CPCG06F21/35H04L63/08H04L63/083H04L63/0853H04L63/0861
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products