CN111447424B - Projection system with safety enhancement function - Google Patents
Projection system with safety enhancement function Download PDFInfo
- Publication number
- CN111447424B CN111447424B CN202010280397.XA CN202010280397A CN111447424B CN 111447424 B CN111447424 B CN 111447424B CN 202010280397 A CN202010280397 A CN 202010280397A CN 111447424 B CN111447424 B CN 111447424B
- Authority
- CN
- China
- Prior art keywords
- program
- computer
- encryption
- picture
- chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 18
- 238000003860 storage Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/12—Picture reproducers
- H04N9/31—Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
- H04N9/3141—Constructional details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Projection Apparatus (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
The invention discloses a projection system with a safety enhancement function, which comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body. The invention has the beneficial effects that: the security function is enhanced.
Description
Technical Field
The invention relates to the field of projectors, in particular to a projection system with a safety enhancement function.
Background
A projector belongs to a computer plug-in device. The projector is accessed to the secret-related network in the secret-related place, so that the serious risk of secret leakage exists. The information can be divulged through ways of reading internal storage data, built-in micro-cameras, built-in network interfaces or wireless transmitting modules, or random dismantling and anatomical analysis and the like.
Disclosure of Invention
The invention aims to solve the technical problem that information in a projector in the prior art is easy to leak, and provides a novel projection system with a safety enhancement function.
In order to achieve the purpose, the technical scheme of the invention is as follows: a projection system with a safety enhancement function comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
As a preferred scheme of the projection system with the safety enhancement function, the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
As a preferred scheme of the projection system with the safety enhancement function, the authority limit program comprises the steps that the identity of a user needs to be identified before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
As a preferred scheme of the projection system with the safety enhancement function, the encryption protection program comprises the functions of setting an encryption chip to prevent the unauthorized access of the firmware program, and the system cannot run after unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
As a preferable scheme of the projection system with the safety enhancement function, the projector body cancels the wireless transmission function.
Compared with the prior art, the invention has the beneficial effects that: the security function is enhanced.
In addition to the technical problems solved by the present invention, the technical features constituting the technical solutions, and the advantageous effects brought by the technical features of the technical solutions described above, other technical problems solved by the present invention, other technical features included in the technical solutions, and advantageous effects brought by the technical features will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic structural diagram according to an embodiment of the present invention.
Fig. 2 is an internal schematic view of an embodiment of the present invention.
Detailed Description
The invention will be described in further detail below with reference to specific embodiments and drawings. Here, the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Referring to fig. 1-2, a novel projection system with security enhancement is shown.
The projection system is composed of a processor DLP chip, an identity recognition chip, an encryption chip, a storage chip and other components.
And an anti-theft key of the processor DLP chip is written into the storage chip. The control code of each chip can only be operated by the corresponding chip, so that the identification and matching of the physical chip have uniqueness, and simultaneously, the encrypted library file corresponding to the chip is provided according to different platforms.
The encryption chip is used for receiving an anti-theft key from the processor DLP chip. Verifying the anti-theft key: if the verification is passed, the system is powered on, and the machine is started normally. If the verification is not passed, the machine enters a standby state.
An encryption library is built in the processor DLP chip. And the processor DLP chip sends data serving as parameters to the encryption library for encryption operation. And then transmitting the encrypted data to the encryption chip through IIC to realize data interaction between the processor DLP chip and the encryption chip. The encryption chip calls an internal algorithm function to decrypt the data after receiving the data, decrypts the data into system data, combines the system data with a unique algorithm solidified in the chip to perform encryption operation, and returns the encrypted system data to an internal system through the IIC.
And finally, correspondingly decrypting the data after the encryption library obtains the data to obtain decrypted system data, and verifying the decrypted system data with the system data in the encryption library. In the application stage of the system, a program segment in the encryption chip is operated by calling a function, the encryption chip sends an instruction to control the processor through the GPIO port after verification, a corresponding value is returned after verification is different, the result is used as input data for further operation of the user program, and the encryption chip becomes a part of software in the process, so that the possibility of program cracking is avoided.
The COS encryption system has the characteristics of safety, stability and reliability. The COS system is introduced into an embedded anti-copy board and data encryption and decryption algorithm transplanting scheme. Part of programs and parameters in the processor are transplanted to the encryption chip, and the safety protection of the transplanted programs and parameters is realized by means of the safety characteristic of a hardware platform of the encryption chip and the efficient safety management of a software COS system. No matter how the pirate cracks the product, the program and data in the encryption chip can not be obtained, and the safety of the whole product is replaced by the safety of partial codes and data.
1. The security projector does not have a picture capture function:
and the residual information in the projection is automatically cleared after the projection is normally shut down through software.
When the system is powered on again and returns to the standby state, the system automatically clears the residual information in the projection.
The machine main control board is not internally or externally connected with a large-capacity storage chip, and meanwhile, the main control board is not provided with an external port of a hard disk or other storage media.
2. The encryption chip function designed by the product prevents the unauthorized access of the firmware program, and the system can not run after the unauthorized removal. Data protection measures are taken, and even if the program is read in an unauthorized mode, the read program cannot be viewed. The ID number of each machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the software of the product is prevented from being stolen.
a, an identity recognition system; firstly, the identity of an operator is confirmed, so that whether the user has access and use authority to certain resources is determined, further, the access strategy of the system can be reliably and effectively executed, an attacker is prevented from impersonating a legal user to obtain the access authority of the resources, the safety of the system and data is ensured, and the legal benefit of the authorized visitor is ensured.
b, limitation of communication interface: the system does not contain WIFI, infrared, Bluetooth, USB and Ethernet interfaces.
c store interface restrictions: and does not contain storage devices such as hard disks, memory cards and the like and storage interfaces.
d, data protection measures: and encrypting the data by adopting a 32-bit high-security-level smart card encryption chip. The device has a unique serial number and management codes, and is designed to prevent time sequence attack and tamper; the chip contains various security detection sensors: the high-voltage and low-voltage sensor, the frequency sensor, the filter, the optical sensor, the pulse sensor and the temperature sensor have a sensor service life testing function, and once the chip detects illegal detection, the internal self-destruction function is started.
3. And (3) limiting the use permission of the product:
a) the password manager is additionally arranged, the user needs to be authenticated when the computer is started, the user information can be automatically recorded by the computer after the computer is started, and safety management personnel can check and track the use condition at any time.
b) When the user fails to authenticate for at most 5 consecutive times, the system should lock the account and generate an audit event with the relevant information.
c) The product provides a multi-factor authentication mechanism that allows an authorized administrator to define specific authentication measures, e.g., fingerprints, IC cards, etc
4. No wireless transmission interface is provided:
a) the security projector is not provided with a network interface or a wireless transmitting function, so that the machine cannot be connected with any wireless equipment.
Other protection
A protection switch: the hidden protection switch is added in the whole machine, and the machine cannot run after the whole machine is disassembled without permission.
Specially manufacturing a fixed connecting piece: in order to avoid unauthorized and private disassembly of the machine and enable a person with no particular interest to do hands and feet in the machine, the shell of the whole machine adopts a composite structural member which is independently developed, and the machine can be further operated only by a special tool of the company.
Maintenance and repair: the maintenance of the whole machine needs to be returned to the factory, if key devices are met: the main control chip, the flash and the like are directly destroyed.
The foregoing merely represents embodiments of the invention, which are described in some detail and detail, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (1)
1. A projection system with a safety enhancement function is characterized by comprising a projector body, wherein a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body;
the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, removing the screenshot information of the picture remained in the computer when the computer is powered on to the standby picture next time;
the authority limit program comprises a program for identifying the identity of the user before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of a user is automatically recorded for a manager to check and track;
the encryption protection program comprises an encryption chip function, which is used for preventing the unauthorized access of the firmware program, and the system can not run after the unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen;
the projector body cancels the wireless transmission function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010280397.XA CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010280397.XA CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111447424A CN111447424A (en) | 2020-07-24 |
CN111447424B true CN111447424B (en) | 2022-04-22 |
Family
ID=71653018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010280397.XA Active CN111447424B (en) | 2020-04-10 | 2020-04-10 | Projection system with safety enhancement function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111447424B (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909023A (en) * | 2005-08-02 | 2007-02-07 | 索尼株式会社 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith |
CN101115316A (en) * | 2006-07-28 | 2008-01-30 | 株式会社东芝 | Projection type display device and control method thereof |
CN101127065A (en) * | 2006-08-18 | 2008-02-20 | 台达电子工业股份有限公司 | Device and method for canceling electronic device original password |
CN101281347A (en) * | 2007-04-04 | 2008-10-08 | 宏碁股份有限公司 | Electronic device with anti-theft function as well as anti-theft method of electronic device |
CN101360215A (en) * | 2007-07-30 | 2009-02-04 | 鸿富锦精密工业(深圳)有限公司 | Projector ciphering system and using method of projector ciphering system |
CN101510939A (en) * | 2008-02-15 | 2009-08-19 | 精工爱普生株式会社 | Image transfer device, image display apparatus, and image data transfer method |
CN101924766A (en) * | 2010-08-20 | 2010-12-22 | 河南省电力公司 | Double-network communication method |
CN102572346A (en) * | 2010-12-29 | 2012-07-11 | 精工爱普生株式会社 | Projection display device and method for controlling projection display device |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
US8806571B2 (en) * | 2001-08-28 | 2014-08-12 | Seiko Epson Corporation | Projector projecting password |
CN105872501A (en) * | 2015-02-10 | 2016-08-17 | 精工爱普生株式会社 | Projector and control method |
CN107515509A (en) * | 2016-06-15 | 2017-12-26 | 香港彩亿科技有限公司 | Projector and method for automatic brightness adjustment |
CN207623670U (en) * | 2017-09-26 | 2018-07-17 | 同帅科技(天津)有限公司 | Touch projection machine |
CN109471488A (en) * | 2018-11-12 | 2019-03-15 | 中影环球(北京)科技有限公司 | A kind of projector clocking method and system |
CN110012276A (en) * | 2019-04-30 | 2019-07-12 | 成都市极米科技有限公司 | Method for controlling projection, projector controller and optical projection system |
CN110121170A (en) * | 2019-04-17 | 2019-08-13 | 广东电网有限责任公司信息中心 | Mobile network's auth method based on encryption technology |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8044880B2 (en) * | 2005-04-28 | 2011-10-25 | Hitachi, Ltd. | Projection type image display device |
JP5040341B2 (en) * | 2006-04-04 | 2012-10-03 | セイコーエプソン株式会社 | Projector system |
CN101667161A (en) * | 2008-09-02 | 2010-03-10 | 联想(北京)有限公司 | Method and device for protecting data of storage device and computer system |
JP4784877B2 (en) * | 2009-02-17 | 2011-10-05 | コニカミノルタビジネステクノロジーズ株式会社 | Image forming apparatus and communication control method |
JP2010283423A (en) * | 2009-06-02 | 2010-12-16 | Seiko Epson Corp | Image display device, projector and method of controlling image display device |
JP5565030B2 (en) * | 2010-03-29 | 2014-08-06 | 日本電気株式会社 | Confidential information erasing method, confidential information erasing device and program thereof |
CN102236611B (en) * | 2010-05-06 | 2013-11-06 | 新汉电脑股份有限公司 | Data deletion method for computer memory device |
JP5708312B2 (en) * | 2011-07-05 | 2015-04-30 | セイコーエプソン株式会社 | projector |
CN102521020B (en) * | 2011-10-26 | 2014-05-21 | 华为终端有限公司 | Application screen capture method and application screen capture device for mobile terminals |
JP5811004B2 (en) * | 2012-03-29 | 2015-11-11 | セイコーエプソン株式会社 | Image display device, image display system, and control method of image display device |
KR20130134918A (en) * | 2012-05-31 | 2013-12-10 | 삼성전자주식회사 | Computer system having non-volatile memory and operating method thereof |
JP6270377B2 (en) * | 2013-08-27 | 2018-01-31 | キヤノン株式会社 | Image forming apparatus |
US8751832B2 (en) * | 2013-09-27 | 2014-06-10 | James A Cashin | Secure system and method for audio processing |
CN103713937B (en) * | 2013-12-13 | 2017-08-25 | 广东电网公司信息中心 | Transformer substation terminal system operation method |
CN105335629A (en) * | 2015-09-22 | 2016-02-17 | 电子科技大学 | Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology |
CN105760226B (en) * | 2016-02-01 | 2019-06-28 | Oppo广东移动通信有限公司 | A kind of method, device and mobile terminal of quick start mobile terminal camera |
CN107844244A (en) * | 2017-11-15 | 2018-03-27 | 珠海市魅族科技有限公司 | Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves |
-
2020
- 2020-04-10 CN CN202010280397.XA patent/CN111447424B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8806571B2 (en) * | 2001-08-28 | 2014-08-12 | Seiko Epson Corporation | Projector projecting password |
CN1909023A (en) * | 2005-08-02 | 2007-02-07 | 索尼株式会社 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith |
CN101115316A (en) * | 2006-07-28 | 2008-01-30 | 株式会社东芝 | Projection type display device and control method thereof |
CN101127065A (en) * | 2006-08-18 | 2008-02-20 | 台达电子工业股份有限公司 | Device and method for canceling electronic device original password |
CN101281347A (en) * | 2007-04-04 | 2008-10-08 | 宏碁股份有限公司 | Electronic device with anti-theft function as well as anti-theft method of electronic device |
CN101360215A (en) * | 2007-07-30 | 2009-02-04 | 鸿富锦精密工业(深圳)有限公司 | Projector ciphering system and using method of projector ciphering system |
CN101510939A (en) * | 2008-02-15 | 2009-08-19 | 精工爱普生株式会社 | Image transfer device, image display apparatus, and image data transfer method |
CN101924766A (en) * | 2010-08-20 | 2010-12-22 | 河南省电力公司 | Double-network communication method |
CN102572346A (en) * | 2010-12-29 | 2012-07-11 | 精工爱普生株式会社 | Projection display device and method for controlling projection display device |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
CN105872501A (en) * | 2015-02-10 | 2016-08-17 | 精工爱普生株式会社 | Projector and control method |
CN107515509A (en) * | 2016-06-15 | 2017-12-26 | 香港彩亿科技有限公司 | Projector and method for automatic brightness adjustment |
CN207623670U (en) * | 2017-09-26 | 2018-07-17 | 同帅科技(天津)有限公司 | Touch projection machine |
CN109471488A (en) * | 2018-11-12 | 2019-03-15 | 中影环球(北京)科技有限公司 | A kind of projector clocking method and system |
CN110121170A (en) * | 2019-04-17 | 2019-08-13 | 广东电网有限责任公司信息中心 | Mobile network's auth method based on encryption technology |
CN110012276A (en) * | 2019-04-30 | 2019-07-12 | 成都市极米科技有限公司 | Method for controlling projection, projector controller and optical projection system |
Also Published As
Publication number | Publication date |
---|---|
CN111447424A (en) | 2020-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7205883B2 (en) | Tamper detection and secure power failure recovery circuit | |
CN103886234B (en) | A kind of fail-safe computer based on encryption hard disk and data security control method thereof | |
CN103946806B (en) | Devices, systems and methods for providing memory access control | |
JP6275653B2 (en) | Data protection method and system | |
CN101458743A (en) | Method for protecting computer system | |
US20060101047A1 (en) | Method and system for fortifying software | |
CN102495982B (en) | Process threading-based copy-protection system and copy-protection storage medium | |
US20090173790A1 (en) | Encrypting the output of a card reader in a card authentication system | |
CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
CN104756127A (en) | Secure data handling by a virtual machine | |
CN203746071U (en) | Security computer based on encrypted hard disc | |
CN101795261A (en) | Information protection system and method based on mobile data safety | |
CN109035519B (en) | Biological feature recognition device and method | |
CN103198037B (en) | Reliable pipe control method and system for IO (input output) equipment | |
CN102316449B (en) | Security terminal system and authentication and interruption method thereof | |
US20120224695A1 (en) | Communicating device and communicating method | |
Cheng et al. | A secure and practical key management mechanism for NFC read-write mode | |
CN102236607B (en) | Data security protection method and data security protection device | |
CN103729310A (en) | Method for protecting hardware data | |
JP2008005408A (en) | Recorded data processing apparatus | |
JP4137468B2 (en) | Program usage authentication method | |
JP2005293490A (en) | Biometrics system | |
CN116193167A (en) | Vehicle-mounted monitoring video file processing method and device | |
CN104361298B (en) | The method and apparatus of Information Security | |
JP2004070828A (en) | Electronic apparatus, its fraudulent usage preventing method, and its fraudulent usage preventing program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |