Unlock instant, AI-driven research and patent intelligence for your innovation.

External terminal protection device and protection system including face information verification

A technology of face information and protective equipment, applied in internal/peripheral computer component protection, digital data authentication, etc., can solve problems such as lack of recognition ability, external protective equipment does not have privacy protection, and lack of security awareness

Pending Publication Date: 2020-10-30
北京中科麒麟信息工程有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. Non-standard external equipment, as well as system misoperation or deliberate destruction, will cause adverse effects or even heavy losses on agencies, enterprises and institutions.
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station / worker station in some industrial fields, these hosts / equipment are often not suitable for such systems on the market due to the particularity of the system. Security protection software, or the installation of security software may easily cause compatibility problems with the original software of the host, or even affect performance
In addition, the hosts of these engineer stations / worker stations basically do not upgrade the operating system after they go online. Even after installing security software, they often do not update the anti-malware software version and malicious code library in time, and cannot achieve comprehensive security protection.
[0005] In addition, for some external protective devices, due to the lack of identification ability for specific users, they are easy to be cracked, invaded or stolen by unauthorized users, resulting in the relevant external protective devices not having privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External terminal protection device and protection system including face information verification
  • External terminal protection device and protection system including face information verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0029] According to a preferred embodiment of the present invention, the file monitoring module includes:

[0030] The identity information storage unit is used to temporarily store the face information of the user;

[0031] The identity recognition unit is used to verify whether the face information of the user satisfies the preset access authority.

[0032] According to a preferred embodiment of the present invention, the identity information storage unit is further used for pre-storing identity information of users satisfying access rights, and the identity information includes face information.

[0033] According to a preferred embodiment of the present invention, when the external interface is connected to an external device, the identity recognition unit combines the face information collected from the user with the person in the pre-stored user identity information that meets the access authority. Face information is matched, and if the match is successful, the user me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an external terminal protection device and protection system including face information verification. The external terminal protection device comprises a plurality of externalinterfaces used for being connected with one or more external devices and a protected device respectively; a face information acquisition module which is used for acquiring face information of a userin real time; a file monitoring module which is connected with the face information acquisition module, is used for verifying face information, and is also used for controlling security authenticationof external equipment accessed to the external interface; and a file transmission module which is connected with the file monitoring module and is used for transmitting the file data imported by theexternal equipment to the protected equipment under the control of the file monitoring module. According to the method and the system, the purpose of performing safety protection on the protected equipment can be achieved without installing safety protection software on the protected equipment, and the use permission of the current operator is determined in a face recognition mode, so the system safety risk is greatly reduced, and the potential safety hazard possibly generated by each interface is comprehensively solved.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an external terminal protection device and a protection system including face information verification. Background technique [0002] In recent years, the rapid development of computer and information technology has greatly promoted the popularization of the network. When people enjoy the convenience brought by this computer and information technology, it is also the data in the computer used by people in production / life. Security has brought new threats, such as common unauthorized access, posing as a legitimate user, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses, and man-in-the-middle eavesdropping and so on. [0003] There are many technical means to solve intranet security problems, such as installing and using network security products such as firewalls, anti-viruses, and intrusion de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/85
CPCG06F21/32G06F21/85
Inventor 褚峨维张昊张春然
Owner 北京中科麒麟信息工程有限责任公司