Safety control method, device and system

A technology of security control and security control module, applied in the field of electronics, can solve the problems of illegal attacks on office systems, inability to monitor user usage status in real time, information leakage, etc.

Active Publication Date: 2020-12-29
TENDYRON CORP
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the above-mentioned security control means, after the user authentication is passed, the user's usage status cannot be monitored in real time. In the case that the user does not have the user's manual logout and login status or manual lock screen, no matter whether the user is on site or not, security control will not be implemented. , but in actual use, after passing the authentication, before manually logging out of the login status or manually locking the screen, the user is likely to leave the office temporarily. During this period, the office system does not implement security controls, and other users may illegally use the office system, resulting in information leakage or illegal attacks on office systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method, device and system
  • Safety control method, device and system
  • Safety control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides a safety control system.

[0036] figure 1 A schematic diagram of the architecture of a safety control system provided in this embodiment, such as figure 1 As shown, the security control system mainly includes: office equipment 10 and user equipment 20 . In this embodiment, the office device 10 may be a computer, or a peripheral device with a certain processing capability, such as a security keyboard. The user equipment 20 may be an electronic device that is convenient for the user to carry with him, such as a mobile phone, or a smart card, etc., and the user equipment 20 may store a unique user identification, such as a user ID, through which the user's identity can be determined.

[0037] In this embodiment, the office equipment 10 establishes a short-range wireless communication connection with the user equipment 20 . In a specific application, wireless communication can be established between the office equipment 10 and the user equipment...

Embodiment 2

[0072] An embodiment of the present invention provides a safety control method, which can be implemented by the safety control system described in Embodiment 1.

[0073] figure 2 is a flowchart of a security control method provided by an embodiment of the present invention, such as figure 2 As shown, the method mainly includes the following steps:

[0074] Step 201, the office equipment establishes a short-range wireless communication connection with the user equipment.

[0075] In a specific application, wireless communication may be established between the office equipment and the user equipment through Bluetooth, WIFI, etc., which is not specifically limited in this embodiment.

[0076] In a specific application, before the wireless communication connection is established between the office equipment and the user equipment, identity authentication can be performed between the user equipment by swiping cards, scanning codes, and the like. For example, if a card reader m...

Embodiment 3

[0117]This embodiment provides a safety control device, which can be set in the office equipment described in Embodiment 1, and used to implement the safety control method described in Embodiment 2.

[0118] image 3 A schematic structural diagram of a safety control device provided in this embodiment, such as image 3 As shown, the security control device mainly includes: a communication establishment module 301, an authentication factor negotiation module 302, a cycle monitoring module 303, an authentication factor rolling module 304, a heartbeat detection module 305, an authentication factor verification module 306, a connection verification module 307, a return The data monitoring module 308 and the security control module 309 are connected. The functions of each module of the safety control device are mainly described below, and other relevant matters may refer to the descriptions of Embodiment 1 and Embodiment 2.

[0119] In the embodiment of the present invention, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety control method, device and system. The method comprises the steps of 1 building communication connection; 2 negotiating an authentication factor; 3 monitoring an authentication factor rolling period and an authentication scanning period; 4 taking the next authentication factor as the current first authentication factor of the office equipment when an authenticationfactor rolling period is reached; 5 scanning a second authentication factor when an authentication scanning period is reached; 6 scanning the second authentication factor, judging whether the second authentication factor is consistent with the first authentication factor or not, if yes, performing the step 3, and otherwise, performing the step 9; 7 if the second authentication factor is not scanned, judging whether the time interval from the last scanning to the second authentication factor exceeds a first preset time, if so, performing the step 9, and otherwise, performing the step 8; 8 waiting for a second preset time, scanning the second authentication factor sent by the user equipment, if the second authentication factor is scanned, performing the step 6, and if the second authentication factor is not scanned, performing the step 7; and 9 executing a first safety control operation.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a safety control method, device and system. Background technique [0002] At present, in order to ensure the security of the office system, the traditional solution is that when the user logs into the office system for the first time, the user enters the user name and password or password, and the system authenticates the user name and password or password entered by the user. After the authentication is passed, The user can use the office system until the user manually logs out of the login status or manually locks the screen, and needs to be authenticated again when using it again. [0003] With the above-mentioned security control means, after the user authentication is passed, the user's usage status cannot be monitored in real time. In the case that the user does not have the user's manual logout and login status or manual lock screen, no matter whether the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04W4/80H04W12/04H04W12/06H04W76/14
CPCH04L9/3231H04L9/3226H04L9/0838H04L9/3247H04L9/3297H04L63/0815H04W4/80H04W12/06H04W76/14H04L63/20H04L9/32H04W12/04H04L9/08H04L9/40
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products