Nothing Special   »   [go: up one dir, main page]

CN111447424B - Projection system with safety enhancement function - Google Patents

Projection system with safety enhancement function Download PDF

Info

Publication number
CN111447424B
CN111447424B CN202010280397.XA CN202010280397A CN111447424B CN 111447424 B CN111447424 B CN 111447424B CN 202010280397 A CN202010280397 A CN 202010280397A CN 111447424 B CN111447424 B CN 111447424B
Authority
CN
China
Prior art keywords
program
computer
encryption
picture
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010280397.XA
Other languages
Chinese (zh)
Other versions
CN111447424A (en
Inventor
罗露根
莫志君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avic Guohua Shanghai Laser Display Technology Co ltd
Original Assignee
Avic Guohua Shanghai Laser Display Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avic Guohua Shanghai Laser Display Technology Co ltd filed Critical Avic Guohua Shanghai Laser Display Technology Co ltd
Priority to CN202010280397.XA priority Critical patent/CN111447424B/en
Publication of CN111447424A publication Critical patent/CN111447424A/en
Application granted granted Critical
Publication of CN111447424B publication Critical patent/CN111447424B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/12Picture reproducers
    • H04N9/31Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
    • H04N9/3141Constructional details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Projection Apparatus (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

The invention discloses a projection system with a safety enhancement function, which comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body. The invention has the beneficial effects that: the security function is enhanced.

Description

Projection system with safety enhancement function
Technical Field
The invention relates to the field of projectors, in particular to a projection system with a safety enhancement function.
Background
A projector belongs to a computer plug-in device. The projector is accessed to the secret-related network in the secret-related place, so that the serious risk of secret leakage exists. The information can be divulged through ways of reading internal storage data, built-in micro-cameras, built-in network interfaces or wireless transmitting modules, or random dismantling and anatomical analysis and the like.
Disclosure of Invention
The invention aims to solve the technical problem that information in a projector in the prior art is easy to leak, and provides a novel projection system with a safety enhancement function.
In order to achieve the purpose, the technical scheme of the invention is as follows: a projection system with a safety enhancement function comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
As a preferred scheme of the projection system with the safety enhancement function, the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
As a preferred scheme of the projection system with the safety enhancement function, the authority limit program comprises the steps that the identity of a user needs to be identified before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
As a preferred scheme of the projection system with the safety enhancement function, the encryption protection program comprises the functions of setting an encryption chip to prevent the unauthorized access of the firmware program, and the system cannot run after unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
As a preferable scheme of the projection system with the safety enhancement function, the projector body cancels the wireless transmission function.
Compared with the prior art, the invention has the beneficial effects that: the security function is enhanced.
In addition to the technical problems solved by the present invention, the technical features constituting the technical solutions, and the advantageous effects brought by the technical features of the technical solutions described above, other technical problems solved by the present invention, other technical features included in the technical solutions, and advantageous effects brought by the technical features will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic structural diagram according to an embodiment of the present invention.
Fig. 2 is an internal schematic view of an embodiment of the present invention.
Detailed Description
The invention will be described in further detail below with reference to specific embodiments and drawings. Here, the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Referring to fig. 1-2, a novel projection system with security enhancement is shown.
The projection system is composed of a processor DLP chip, an identity recognition chip, an encryption chip, a storage chip and other components.
And an anti-theft key of the processor DLP chip is written into the storage chip. The control code of each chip can only be operated by the corresponding chip, so that the identification and matching of the physical chip have uniqueness, and simultaneously, the encrypted library file corresponding to the chip is provided according to different platforms.
The encryption chip is used for receiving an anti-theft key from the processor DLP chip. Verifying the anti-theft key: if the verification is passed, the system is powered on, and the machine is started normally. If the verification is not passed, the machine enters a standby state.
An encryption library is built in the processor DLP chip. And the processor DLP chip sends data serving as parameters to the encryption library for encryption operation. And then transmitting the encrypted data to the encryption chip through IIC to realize data interaction between the processor DLP chip and the encryption chip. The encryption chip calls an internal algorithm function to decrypt the data after receiving the data, decrypts the data into system data, combines the system data with a unique algorithm solidified in the chip to perform encryption operation, and returns the encrypted system data to an internal system through the IIC.
And finally, correspondingly decrypting the data after the encryption library obtains the data to obtain decrypted system data, and verifying the decrypted system data with the system data in the encryption library. In the application stage of the system, a program segment in the encryption chip is operated by calling a function, the encryption chip sends an instruction to control the processor through the GPIO port after verification, a corresponding value is returned after verification is different, the result is used as input data for further operation of the user program, and the encryption chip becomes a part of software in the process, so that the possibility of program cracking is avoided.
The COS encryption system has the characteristics of safety, stability and reliability. The COS system is introduced into an embedded anti-copy board and data encryption and decryption algorithm transplanting scheme. Part of programs and parameters in the processor are transplanted to the encryption chip, and the safety protection of the transplanted programs and parameters is realized by means of the safety characteristic of a hardware platform of the encryption chip and the efficient safety management of a software COS system. No matter how the pirate cracks the product, the program and data in the encryption chip can not be obtained, and the safety of the whole product is replaced by the safety of partial codes and data.
1. The security projector does not have a picture capture function:
and the residual information in the projection is automatically cleared after the projection is normally shut down through software.
When the system is powered on again and returns to the standby state, the system automatically clears the residual information in the projection.
The machine main control board is not internally or externally connected with a large-capacity storage chip, and meanwhile, the main control board is not provided with an external port of a hard disk or other storage media.
2. The encryption chip function designed by the product prevents the unauthorized access of the firmware program, and the system can not run after the unauthorized removal. Data protection measures are taken, and even if the program is read in an unauthorized mode, the read program cannot be viewed. The ID number of each machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the software of the product is prevented from being stolen.
a, an identity recognition system; firstly, the identity of an operator is confirmed, so that whether the user has access and use authority to certain resources is determined, further, the access strategy of the system can be reliably and effectively executed, an attacker is prevented from impersonating a legal user to obtain the access authority of the resources, the safety of the system and data is ensured, and the legal benefit of the authorized visitor is ensured.
b, limitation of communication interface: the system does not contain WIFI, infrared, Bluetooth, USB and Ethernet interfaces.
c store interface restrictions: and does not contain storage devices such as hard disks, memory cards and the like and storage interfaces.
d, data protection measures: and encrypting the data by adopting a 32-bit high-security-level smart card encryption chip. The device has a unique serial number and management codes, and is designed to prevent time sequence attack and tamper; the chip contains various security detection sensors: the high-voltage and low-voltage sensor, the frequency sensor, the filter, the optical sensor, the pulse sensor and the temperature sensor have a sensor service life testing function, and once the chip detects illegal detection, the internal self-destruction function is started.
3. And (3) limiting the use permission of the product:
a) the password manager is additionally arranged, the user needs to be authenticated when the computer is started, the user information can be automatically recorded by the computer after the computer is started, and safety management personnel can check and track the use condition at any time.
b) When the user fails to authenticate for at most 5 consecutive times, the system should lock the account and generate an audit event with the relevant information.
c) The product provides a multi-factor authentication mechanism that allows an authorized administrator to define specific authentication measures, e.g., fingerprints, IC cards, etc
4. No wireless transmission interface is provided:
a) the security projector is not provided with a network interface or a wireless transmitting function, so that the machine cannot be connected with any wireless equipment.
Other protection
A protection switch: the hidden protection switch is added in the whole machine, and the machine cannot run after the whole machine is disassembled without permission.
Specially manufacturing a fixed connecting piece: in order to avoid unauthorized and private disassembly of the machine and enable a person with no particular interest to do hands and feet in the machine, the shell of the whole machine adopts a composite structural member which is independently developed, and the machine can be further operated only by a special tool of the company.
Maintenance and repair: the maintenance of the whole machine needs to be returned to the factory, if key devices are met: the main control chip, the flash and the like are directly destroyed.
The foregoing merely represents embodiments of the invention, which are described in some detail and detail, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (1)

1. A projection system with a safety enhancement function is characterized by comprising a projector body, wherein a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body;
the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, removing the screenshot information of the picture remained in the computer when the computer is powered on to the standby picture next time;
the authority limit program comprises a program for identifying the identity of the user before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of a user is automatically recorded for a manager to check and track;
the encryption protection program comprises an encryption chip function, which is used for preventing the unauthorized access of the firmware program, and the system can not run after the unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen;
the projector body cancels the wireless transmission function.
CN202010280397.XA 2020-04-10 2020-04-10 Projection system with safety enhancement function Active CN111447424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010280397.XA CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010280397.XA CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Publications (2)

Publication Number Publication Date
CN111447424A CN111447424A (en) 2020-07-24
CN111447424B true CN111447424B (en) 2022-04-22

Family

ID=71653018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010280397.XA Active CN111447424B (en) 2020-04-10 2020-04-10 Projection system with safety enhancement function

Country Status (1)

Country Link
CN (1) CN111447424B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909023A (en) * 2005-08-02 2007-02-07 索尼株式会社 Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
CN101115316A (en) * 2006-07-28 2008-01-30 株式会社东芝 Projection type display device and control method thereof
CN101127065A (en) * 2006-08-18 2008-02-20 台达电子工业股份有限公司 Device and method for canceling electronic device original password
CN101281347A (en) * 2007-04-04 2008-10-08 宏碁股份有限公司 Electronic device with anti-theft function as well as anti-theft method of electronic device
CN101360215A (en) * 2007-07-30 2009-02-04 鸿富锦精密工业(深圳)有限公司 Projector ciphering system and using method of projector ciphering system
CN101510939A (en) * 2008-02-15 2009-08-19 精工爱普生株式会社 Image transfer device, image display apparatus, and image data transfer method
CN101924766A (en) * 2010-08-20 2010-12-22 河南省电力公司 Double-network communication method
CN102572346A (en) * 2010-12-29 2012-07-11 精工爱普生株式会社 Projection display device and method for controlling projection display device
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
US8806571B2 (en) * 2001-08-28 2014-08-12 Seiko Epson Corporation Projector projecting password
CN105872501A (en) * 2015-02-10 2016-08-17 精工爱普生株式会社 Projector and control method
CN107515509A (en) * 2016-06-15 2017-12-26 香港彩亿科技有限公司 Projector and method for automatic brightness adjustment
CN207623670U (en) * 2017-09-26 2018-07-17 同帅科技(天津)有限公司 Touch projection machine
CN109471488A (en) * 2018-11-12 2019-03-15 中影环球(北京)科技有限公司 A kind of projector clocking method and system
CN110012276A (en) * 2019-04-30 2019-07-12 成都市极米科技有限公司 Method for controlling projection, projector controller and optical projection system
CN110121170A (en) * 2019-04-17 2019-08-13 广东电网有限责任公司信息中心 Mobile network's auth method based on encryption technology

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8044880B2 (en) * 2005-04-28 2011-10-25 Hitachi, Ltd. Projection type image display device
JP5040341B2 (en) * 2006-04-04 2012-10-03 セイコーエプソン株式会社 Projector system
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system
JP4784877B2 (en) * 2009-02-17 2011-10-05 コニカミノルタビジネステクノロジーズ株式会社 Image forming apparatus and communication control method
JP2010283423A (en) * 2009-06-02 2010-12-16 Seiko Epson Corp Image display device, projector and method of controlling image display device
JP5565030B2 (en) * 2010-03-29 2014-08-06 日本電気株式会社 Confidential information erasing method, confidential information erasing device and program thereof
CN102236611B (en) * 2010-05-06 2013-11-06 新汉电脑股份有限公司 Data deletion method for computer memory device
JP5708312B2 (en) * 2011-07-05 2015-04-30 セイコーエプソン株式会社 projector
CN102521020B (en) * 2011-10-26 2014-05-21 华为终端有限公司 Application screen capture method and application screen capture device for mobile terminals
JP5811004B2 (en) * 2012-03-29 2015-11-11 セイコーエプソン株式会社 Image display device, image display system, and control method of image display device
KR20130134918A (en) * 2012-05-31 2013-12-10 삼성전자주식회사 Computer system having non-volatile memory and operating method thereof
JP6270377B2 (en) * 2013-08-27 2018-01-31 キヤノン株式会社 Image forming apparatus
US8751832B2 (en) * 2013-09-27 2014-06-10 James A Cashin Secure system and method for audio processing
CN103713937B (en) * 2013-12-13 2017-08-25 广东电网公司信息中心 Transformer substation terminal system operation method
CN105335629A (en) * 2015-09-22 2016-02-17 电子科技大学 Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN105760226B (en) * 2016-02-01 2019-06-28 Oppo广东移动通信有限公司 A kind of method, device and mobile terminal of quick start mobile terminal camera
CN107844244A (en) * 2017-11-15 2018-03-27 珠海市魅族科技有限公司 Control method, terminal, computer equipment and the readable storage medium storing program for executing that sectional drawing preserves

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806571B2 (en) * 2001-08-28 2014-08-12 Seiko Epson Corporation Projector projecting password
CN1909023A (en) * 2005-08-02 2007-02-07 索尼株式会社 Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
CN101115316A (en) * 2006-07-28 2008-01-30 株式会社东芝 Projection type display device and control method thereof
CN101127065A (en) * 2006-08-18 2008-02-20 台达电子工业股份有限公司 Device and method for canceling electronic device original password
CN101281347A (en) * 2007-04-04 2008-10-08 宏碁股份有限公司 Electronic device with anti-theft function as well as anti-theft method of electronic device
CN101360215A (en) * 2007-07-30 2009-02-04 鸿富锦精密工业(深圳)有限公司 Projector ciphering system and using method of projector ciphering system
CN101510939A (en) * 2008-02-15 2009-08-19 精工爱普生株式会社 Image transfer device, image display apparatus, and image data transfer method
CN101924766A (en) * 2010-08-20 2010-12-22 河南省电力公司 Double-network communication method
CN102572346A (en) * 2010-12-29 2012-07-11 精工爱普生株式会社 Projection display device and method for controlling projection display device
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN105872501A (en) * 2015-02-10 2016-08-17 精工爱普生株式会社 Projector and control method
CN107515509A (en) * 2016-06-15 2017-12-26 香港彩亿科技有限公司 Projector and method for automatic brightness adjustment
CN207623670U (en) * 2017-09-26 2018-07-17 同帅科技(天津)有限公司 Touch projection machine
CN109471488A (en) * 2018-11-12 2019-03-15 中影环球(北京)科技有限公司 A kind of projector clocking method and system
CN110121170A (en) * 2019-04-17 2019-08-13 广东电网有限责任公司信息中心 Mobile network's auth method based on encryption technology
CN110012276A (en) * 2019-04-30 2019-07-12 成都市极米科技有限公司 Method for controlling projection, projector controller and optical projection system

Also Published As

Publication number Publication date
CN111447424A (en) 2020-07-24

Similar Documents

Publication Publication Date Title
US7205883B2 (en) Tamper detection and secure power failure recovery circuit
CN103886234B (en) A kind of fail-safe computer based on encryption hard disk and data security control method thereof
CN103946806B (en) Devices, systems and methods for providing memory access control
JP6275653B2 (en) Data protection method and system
CN101458743A (en) Method for protecting computer system
US20060101047A1 (en) Method and system for fortifying software
CN102495982B (en) Process threading-based copy-protection system and copy-protection storage medium
US20090173790A1 (en) Encrypting the output of a card reader in a card authentication system
CN107563213B (en) Safety secrecy control device for preventing data extraction of storage equipment
CN104756127A (en) Secure data handling by a virtual machine
CN203746071U (en) Security computer based on encrypted hard disc
CN101795261A (en) Information protection system and method based on mobile data safety
CN109035519B (en) Biological feature recognition device and method
CN103198037B (en) Reliable pipe control method and system for IO (input output) equipment
CN102316449B (en) Security terminal system and authentication and interruption method thereof
US20120224695A1 (en) Communicating device and communicating method
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN102236607B (en) Data security protection method and data security protection device
CN103729310A (en) Method for protecting hardware data
JP2008005408A (en) Recorded data processing apparatus
JP4137468B2 (en) Program usage authentication method
JP2005293490A (en) Biometrics system
CN116193167A (en) Vehicle-mounted monitoring video file processing method and device
CN104361298B (en) The method and apparatus of Information Security
JP2004070828A (en) Electronic apparatus, its fraudulent usage preventing method, and its fraudulent usage preventing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant