Data security verification method, device, equipment and storage medium of zero terminal

文档序号:136065 发布日期:2021-10-22 浏览:21次 中文

阅读说明:本技术 一种零终端的数据安全验证方法、装置、设备及存储介质 (Data security verification method, device, equipment and storage medium of zero terminal ) 是由 张文华 于 2021-06-17 设计创作,主要内容包括:本公开提供一种零终端的数据安全验证方法、装置、设备及存储介质,涉及数据安全技术领域,能够解决现有技术中零终端的数据安全不能保障的问题。具体技术方案为:首先获取零终端显示屏的当前信息,当前信息包括零终端显示屏第一预设距离内的头像信息;然后根据预存的用户信息,对当前信息进行判断,预存的用户信息包括零终端用户的头像信息;最后根据判断结果,按照预先设置的规则,执行相应的措施。本公开用于零终端的数据安全。(The disclosure provides a data security verification method, a data security verification device, equipment and a storage medium of a zero terminal, relates to the technical field of data security, and can solve the problem that the data security of the zero terminal in the prior art cannot be guaranteed. The specific technical scheme is as follows: the method comprises the steps of firstly, obtaining current information of a zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen; then, judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of a zero-terminal user; and finally, executing corresponding measures according to the judgment result and the preset rule. The data security system is used for data security of the zero terminal.)

1. A data security verification method of a zero terminal is characterized by comprising the following steps:

acquiring current information of the zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen;

judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of the zero terminal user;

and executing corresponding measures according to the judgment result and a preset rule.

2. The data security verification method of the zero terminal according to claim 1, wherein the performing corresponding measures according to the judgment result and the preset rule comprises:

and when the current information is judged to comprise user head portrait information and is consistent with the pre-stored user information, continuously acquiring the current information and judging the current information.

3. The data security verification method of the zero terminal according to claim 2, wherein the method further comprises:

and when judging that the head portrait information of the user in the current information exceeds a second preset distance, controlling the display screen of the zero terminal to lock or turn off the screen.

4. The data security verification method of the zero terminal according to claim 1, wherein the performing corresponding measures according to the judgment result and the preset rule comprises:

and when judging that the current information does not comprise the pre-stored user information, controlling a display screen information screen of the zero terminal.

5. The data security verification method of the zero terminal according to claim 1, wherein the performing corresponding measures according to the judgment result and the preset rule comprises:

when the current information is judged to include that the head portrait information of at least two users exceeds a first preset time and the current information includes the pre-stored user information, determining that the zero terminal environment is unsafe;

sending reminding information to a display screen of the zero terminal, wherein the reminding information is used for indicating that the environment of the zero terminal is unsafe;

and after the second preset time, if the environment of the zero terminal is determined to be unsafe, controlling a display screen of the zero terminal.

6. The zero terminal data security verification method according to any one of claims 1 to 5, wherein the current information further includes shooting behavior information within a third preset distance of the zero terminal display screen;

the method further comprises the following steps:

and when the current information is judged to include the shooting behavior, controlling the display screen of the zero terminal to perform at least one of color cast processing, anti-shooting watermark and screen-off.

7. The data security verification method of the zero terminal according to claim 1, wherein the method further comprises:

when judging that the non-prestored user operates the zero terminal, controlling the zero terminal external device to be forbidden, wherein the zero terminal external device at least comprises: the system comprises a mouse and a keyboard, wherein the pre-stored user is a user consistent with the pre-stored user information.

8. A data security verification device of a zero terminal is characterized by comprising: the device comprises an acquisition module, a judgment module and a processing module;

the acquisition module is used for acquiring current information of the zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen;

the judging module is used for judging the current information according to prestored user information, wherein the prestored user information comprises head portrait information of the zero terminal user;

and the processing module is used for executing corresponding measures according to the judgment result and the preset rule.

9. A zero-terminal data security verification device, characterized in that the zero-terminal data security verification device comprises a processor and a memory, wherein the memory stores at least one computer instruction, and the instruction is loaded and executed by the processor to implement the steps executed in the zero-terminal data security verification method according to any one of claims 1 to 7.

10. A computer-readable storage medium having stored thereon at least one computer instruction, which is loaded and executed by a processor, to implement the steps performed in the data security authentication method of a zero terminal according to any one of claims 1 to 7.

Technical Field

The present disclosure relates to the field of data security technologies, and in particular, to a method, an apparatus, a device, and a storage medium for data security verification of a zero terminal.

Background

The zero terminal product is an exquisite and unique network computer without a Central Processing Unit (CPU), a memory and a hard disk zero terminal.

Currently, zero-end products do not perform data security verification and protection at the user end. Although the zero terminal product does not store data at the terminal, certain potential safety hazard still exists, and the safety of the data cannot be guaranteed.

Disclosure of Invention

The embodiment of the disclosure provides a data security verification method, a data security verification device and a storage medium for a zero terminal, which can solve the problem that the data security of the zero terminal cannot be guaranteed in the prior art. The technical scheme is as follows:

according to a first aspect of the embodiments of the present disclosure, a data security verification method for a zero terminal is provided, where the method includes:

acquiring current information of the zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen;

judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of the zero terminal user;

and executing corresponding measures according to the judgment result and a preset rule.

The data security verification method of the zero terminal provided by the embodiment of the disclosure includes the steps of firstly, obtaining current information of a zero terminal display screen, wherein the current information includes head portrait information within a first preset distance of the zero terminal display screen; then, judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of a zero-terminal user; and finally, executing corresponding measures according to the judgment result and the preset rule. According to the zero-terminal data security verification method, the camera is used for obtaining the head portrait information in front of the zero-terminal screen, and the head portrait information is compared with the pre-stored head portrait information of the user to judge the security of the environment, the method is reliable, and the security of the zero-terminal data is greatly improved.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

and when the current information is judged to comprise user head portrait information and is consistent with the pre-stored user information, continuously acquiring the current information and judging the current information.

In one embodiment, the method further comprises:

and when judging that the head portrait information of the user in the current information exceeds a second preset distance, controlling the display screen of the zero terminal to lock or turn off the screen.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

and when judging that the current information does not comprise the pre-stored user information, controlling a display screen information screen of the zero terminal.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

when the current information is judged to include that the head portrait information of at least two users exceeds a first preset time and the current information includes the pre-stored user information, determining that the zero terminal environment is unsafe;

sending reminding information to a display screen of the zero terminal, wherein the reminding information is used for indicating that the environment of the zero terminal is unsafe;

and after the second preset time, if the environment of the zero terminal is determined to be unsafe, controlling a display screen of the zero terminal.

In one embodiment, the current information further includes shooting behavior information within a third preset distance of the zero terminal display screen;

the method further comprises the following steps:

and when the current information is judged to include the shooting behavior, controlling the display screen of the zero terminal to perform at least one of color cast processing, anti-shooting watermark and screen-off.

In one embodiment, the method further comprises:

when judging that the non-prestored user operates the zero terminal, controlling the zero terminal external device to be forbidden, wherein the zero terminal external device at least comprises: the system comprises a mouse and a keyboard, wherein the pre-stored user is a user consistent with the pre-stored user information.

According to a second aspect of the embodiments of the present disclosure, there is provided a data security verification apparatus for a null terminal, including: the device comprises an acquisition module, a judgment module and a processing module;

the acquisition module is used for acquiring current information of the zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen;

the judging module is used for judging the current information according to prestored user information, wherein the prestored user information comprises head portrait information of the zero terminal user;

and the processing module is used for executing corresponding measures according to the judgment result and the preset rule.

The device provided by the embodiment of the disclosure comprises an acquisition module, a judgment module and a processing module; the acquisition module is used for acquiring current information of the zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen; the judging module is used for judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of a zero-terminal user; and the processing module is used for executing corresponding measures according to the judgment result and the preset rule. According to the zero-terminal data security verification device, the camera is used for acquiring the head portrait information in front of the zero-terminal screen, and the head portrait information is compared with the pre-stored head portrait information of the user to judge the security of the environment, the method is reliable, and the security of the zero-terminal data is greatly improved.

According to a third aspect of the embodiments of the present disclosure, there is provided a data security verification apparatus of a zero terminal, where the data security verification apparatus of the zero terminal includes a processor and a memory, where the memory stores at least one computer instruction, and the instruction is loaded and executed by the processor to implement the steps performed in the data security verification method of the zero terminal.

According to a fourth aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium, having at least one computer instruction stored therein, where the instruction is loaded and executed by a processor to implement the steps performed in the data security authentication method of the zero terminal.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.

Drawings

The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.

Fig. 1 is a flowchart of a data security verification method for a zero terminal according to an embodiment of the present disclosure;

fig. 2 is a flowchart of a data security verification method for a zero terminal according to an embodiment of the present disclosure;

fig. 3 is a schematic structural diagram of a data security verification apparatus of a null terminal according to an embodiment of the present disclosure.

Detailed Description

Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.

The embodiment of the present disclosure provides a data security verification method for a zero terminal, as shown in fig. 1, the data security verification method for the zero terminal includes the following steps:

step 101, obtaining current information of a zero terminal display screen, wherein the current information comprises head portrait information within a first preset distance of the zero terminal display screen;

specifically, the embodiment of the present disclosure obtains environment information in front of a display screen of the zero terminal through an AI camera, where the environment information includes avatar information.

And 102, judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of a zero-terminal user.

In the embodiment of the disclosure, the AI camera stores the head portrait and face information of the user in advance, and when the AI camera is used, whether the AI camera is the user himself or not or whether other people appear in front of the screen besides the user himself or herself is judged according to the acquired current information.

And 103, executing corresponding measures according to the judgment result and a preset rule.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

and when the current information is judged to comprise user head portrait information and is consistent with the pre-stored user information, continuously acquiring the current information and judging the current information.

When only the user appears, the environment is safe, and the current information is continuously acquired.

In one embodiment, the method further comprises:

and when the user head portrait information in the current information exceeds the second preset distance, controlling the display screen of the zero terminal to lock or screen.

In the embodiment of the disclosure, when the AI camera judges that the user himself leaves the screen and the leaving time exceeds the preset time (the preset leaving time can be set according to the requirements of the user, such as 1m, 3m and the like), it is judged that the environment is possibly unsafe at this time, and the screen locking or screen saving setting can be performed on the user side, so that the user data is protected and the leakage is avoided.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

and when judging that the current information does not comprise the pre-stored user information, controlling a display screen information screen of the zero terminal.

In this embodiment, when the AI camera determines that the current user is not the user's own person, it indicates that the environment is unsafe, and the user side can be set to screen saver.

In one embodiment, according to the judgment result, according to a preset rule, performing a corresponding measure includes:

when judging that the current information comprises head portrait information of at least two users exceeds a first preset time and the current information comprises pre-stored user information, determining that the zero terminal environment is unsafe;

sending reminding information to a display screen of the zero terminal, wherein the reminding information is used for indicating that the environment of the zero terminal is unsafe;

and after the second preset time, if the environment of the zero terminal is determined to be unsafe, controlling a display screen of the zero terminal.

In actual use, the AI camera judges that other people except the user exist in front of the screen, the staying time exceeds the preset time (the preset staying time can be set according to the user requirements, such as 5S and 10S), the environment of the user is judged to be unsafe, a reminding message can be sent to the display screen of the user to inform that the environment is unsafe, and whether unsafe factors need to be eliminated or not. If the unsafe factors are not eliminated for a period of time after the reminding information is sent, screen displaying processing can be carried out on the user screen, and user data are protected.

In one embodiment, the current information further includes shooting behavior information within a third preset distance of the zero terminal display screen;

the method further comprises the following steps:

and when the current information is judged to include the shooting behavior, controlling a display screen of the zero terminal to perform at least one of color cast processing, anti-shooting watermark and screen information.

In the embodiment of the disclosure, the AI camera can also acquire character behaviors, such as whether to take a mobile phone to take a picture, and the like. The present disclosure also includes such a scenario: and if the AI camera judges that a shooting action appears, the environment is judged to be unsafe, and color cast processing can be performed on a user screen at the moment, or anti-shooting and embezzlement watermark is added, or screen saving processing is performed. These processes may be preset according to the user's selection.

In one embodiment, the method further comprises:

when judging that the non-prestore user operates the zero terminal, controlling the zero terminal external device to be forbidden, wherein the zero terminal external device at least comprises: the mouse and the keyboard are used for pre-storing the user which is consistent with the pre-stored user information.

In actual use, when the AI camera judges that a user operates the terminal by other people except the user, the judgment environment is unsafe, all external equipment, including equipment such as a keyboard and a mouse, can be forbidden immediately, and user data is prevented from being tampered or forwarded.

The method is applied to the office scene of a PC or a cloud desktop, and can also be applied to mobile equipment such as a mobile phone. The mobile phone comprises a PC or a display, and the mobile phone comprises a processor, a memory, a camera or an external camera, wherein the camera is used for acquiring face data and sending the face data to the processor, the processor is connected with the memory, and the memory stores the face data for setting.

The data security verification method of the zero terminal provided by the embodiment of the disclosure includes the steps of firstly, obtaining current information of a zero terminal display screen, wherein the current information includes head portrait information within a first preset distance of the zero terminal display screen; then, judging the current information according to pre-stored user information, wherein the pre-stored user information comprises head portrait information of a zero-terminal user; and finally, executing corresponding measures according to the judgment result and the preset rule. According to the zero-terminal data security verification method, the camera is used for obtaining the head portrait information in front of the zero-terminal screen, and the head portrait information is compared with the pre-stored head portrait information of the user to judge the security of the environment, the method is reliable, and the security of the zero-terminal data is greatly improved.

Based on the data security verification method of the zero terminal provided in the embodiment corresponding to fig. 1, another embodiment of the present disclosure provides a data security verification method of the zero terminal, as shown in fig. 2.

Step 201, monitoring a human face in real time or periodically;

in this step, the host or the box is externally connected with a camera, or the display is embedded with a camera. Periodic detection, such as once in 5 ms.

If a face is detected, go to step 202; if no face is detected, the process continues to step 201. If multiple faces are detected, step 203 is performed.

Step 202, comparing whether the face data of the user is consistent with the face data of the user stored in the data;

if the two are consistent, the owner and the person are indicated to operate normally.

If not, indicating an inactive, step 206 is performed.

If yes, go to step 207.

And the data acquired by the AI camera is sent to the processor, and the processor identifies the behaviors of the human face and the figure based on a mature image algorithm.

Whether the owner is in the owner or not is identified based on the face data, and the behavior of the person is analyzed, such as whether the owner takes the mobile phone to take a picture or not.

Step 203, detecting whether a plurality of people contain face data of the owner;

if not, go to step 206;

if so, perform step 204.

Step 204, recording the detected durations of the multiple faces;

if the duration is longer than 5s/10s, the system sends reminding information to the display end to remind the user that the surrounding environment is possibly unsafe.

And step 205, after the reminding information is sent, the reminding information is not changed for more than 10s, and the display end (R end) performs screen calling operation to protect user data.

And step 206, when a plurality of people of the owner are not included, the screen is turned on immediately.

And step 207, when the photographing action exists, performing color cast processing on the display or turning off the screen.

According to the data security verification method for the zero terminal, whether the current user environment is safe or not is judged by monitoring through the AI camera, and under the condition of insecurity, corresponding security protection measures are taken to protect the user data.

Based on the data security verification method of the zero terminal described in the embodiments corresponding to fig. 1 and fig. 2, the following is an embodiment of the apparatus of the present disclosure, and may be used to execute the embodiment of the method of the present disclosure.

The embodiment of the present disclosure provides a data security verification apparatus for a zero terminal, as shown in fig. 3, the apparatus includes an obtaining module 301, a determining module 302, and a processing module 303;

the acquiring module 301 is configured to acquire current information of the zero terminal display screen, where the current information includes avatar information within a first preset distance of the zero terminal display screen;

a judging module 302, configured to judge current information according to pre-stored user information, where the pre-stored user information includes avatar information of a zero-terminal user;

and the processing module 303 is configured to execute corresponding measures according to the judgment result and a preset rule.

The device provided by the embodiment of the present disclosure includes an obtaining module 301, a determining module 302, and a processing module 303; the acquiring module 301 is configured to acquire current information of the zero terminal display screen, where the current information includes avatar information within a first preset distance of the zero terminal display screen; a judging module 302, configured to judge current information according to pre-stored user information, where the pre-stored user information includes avatar information of a zero-terminal user; and the processing module 303 is configured to execute corresponding measures according to the judgment result and a preset rule. According to the zero-terminal data security verification device, the camera is used for acquiring the head portrait information in front of the zero-terminal screen, and the head portrait information is compared with the pre-stored head portrait information of the user to judge the security of the environment, the method is reliable, and the security of the zero-terminal data is greatly improved.

Based on the data security verification method of the zero terminal described in the embodiment corresponding to fig. 1 and fig. 2, another embodiment of the present disclosure further provides a data security verification device of the zero terminal, where the data security verification device of the zero terminal includes a processor and a memory, and the memory stores at least one computer instruction, and the instruction is loaded and executed by the processor to implement the data security verification method of the zero terminal described in the embodiment corresponding to fig. 1 and fig. 2.

Based on the data security verification method of the zero terminal described in the embodiments corresponding to fig. 1 and fig. 2, the embodiments of the present disclosure further provide a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores at least one computer instruction for executing the data security verification method of the zero terminal described in the embodiment corresponding to fig. 1 and fig. 2, which is not described herein again.

Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

11页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:身份验证方法、装置、电子设备及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类