Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security processing method based on big data

A technology of information security and processing methods, applied in data processing applications, instruments, character and pattern recognition, etc., can solve problems such as dry eyes, affecting the health of office personnel, oil loss, etc., and achieve the effect of avoiding dryness and pain

Pending Publication Date: 2022-04-12
苏州工业园区网捷恒信科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of computer technology and network technology, the role of electronic computers in daily work is particularly important, bringing various conveniences to people's work, study, and life, especially office staff rely on computers to work, and office staff's daily work Basically, they sit in front of the computer to process documents. Basically, it takes a whole day to sit. However, the office staff concentrates on the screen for a long time, and the brightness of the computer screen does not change for a long time, the writing is dense, and the indoor light is not suitable. It is easy to cause visual fatigue, especially in winter, when the weather is dry, the moisture in the tears will be reduced, the oil will be lost, and the eyes will feel obvious dryness and pain, which will affect the health of office personnel, and it cannot be turned on all the time in the cold winter Facial humidifier, when the humidifier is blown on the face, it will indeed give people a cool and moist feeling immediately, but if it is like this for a long time, the moisture in the humidifier evaporates very quickly in the air, and the moisture on the surface and inside of the human skin will be removed. "Catch" away together, resulting in drier skin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security processing method based on big data
  • Information security processing method based on big data
  • Information security processing method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Example 1: The office staff is in a state of continuous energy and concentrated work. By tracking the eyes of the office staff, the range of the office staff's gaze is judged, and the size of the text extracted within the range is S=5. According to the formula K=2, M=0.4 can be obtained, and the extracted color feature value is N=3, according to the formula α=2, V=0.8 can be obtained, the current brightness of the computer screen is P=0.3, and the working time of the office staff is t=0.2h, according to the formula β=0.5, Q=66.7% can be obtained, and the timing sub-module controls the facial humidifier to be turned on for 5 minutes.

Embodiment 2

[0077] Embodiment 2: The office staff is in a state of continuous energy and concentrated work. By tracking the eyes of the office staff, the range of the office staff's gaze can be judged, and the size of the text extracted within the range is S=2. According to the formula K=2, M=1 can be obtained, and the extracted color feature value is N=6, according to the formula α=2, we can get V=2, the brightness of the current computer screen is P=0.6, and the working time of the office staff is t=2h, according to the formula β=0.5, Q=15.4% can be obtained, the timing sub-module controls the facial humidifier to be turned on for 20 minutes, and the warning module displays a rest warning on the computer.

Embodiment 3

[0078] Embodiment 3: The office staff is in a state of continuous energy and concentrated work. By tracking the eyes of the office staff, the range of the office staff's gaze is judged, and the size of the text extracted within the range is S=8. According to the formula K=2, M=0.25 can be obtained, and the extracted color feature value is N=3, according to the formula α=2, we can get V=0.5, the brightness of the current computer screen is P=0.4, and the working time of the office staff is t=0.2h, according to the formula β=0.5, Q=69.4% can be obtained, and the timer sub-module controls the facial humidifier to be turned on for 5 minutes.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security processing method based on big data, comprising a scanning judgment end, a detection analysis end and a control end, the scanning judgment end is electrically connected with the detection analysis end, the detection analysis end is electrically connected with the control end, the scanning judgment end is used for detecting the office state of office staff, and the control end is used for controlling the detection analysis end. The detection analysis end is used for analyzing and judging eye information of office staff, and the control end is used for controlling and adjusting a face humidifier on a table; the scanning judgment end comprises a scanning module and a state judgment module, the scanning module is electrically connected with the state judgment module, the scanning module is used for scanning office staff in front of a computer, and the scanning module comprises an imaging sub-module, an eye movement tracking sub-module, an image processing sub-module and an image judgment sub-module. The imaging submodule is electrically connected with the eye movement tracking submodule, and the system has the advantages of being high in safety and practicability.

Description

technical field [0001] The invention relates to the technical field of information security processing, in particular to an information security processing method based on big data. Background technique [0002] With the rapid development of computer technology and network technology, the role of electronic computers in daily work is particularly important, bringing various conveniences to people's work, study, and life, especially office staff rely on computers to work, and office staff's daily work Basically, they sit in front of the computer to process documents. Basically, it takes a whole day to sit. However, the office staff concentrates on the screen for a long time, and the brightness of the computer screen does not change for a long time, the writing is dense, and the indoor light is not suitable. It is easy to cause visual fatigue, especially in winter, when the weather is dry, the moisture in the tears will be reduced, the oil will be lost, and the eyes will feel ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/10G06V40/18G06V20/62G06V10/56
Inventor 林宗杰
Owner 苏州工业园区网捷恒信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products