CN109961586A - The safety protecting method and device of sensitive information - Google Patents
The safety protecting method and device of sensitive information Download PDFInfo
- Publication number
- CN109961586A CN109961586A CN201711432083.1A CN201711432083A CN109961586A CN 109961586 A CN109961586 A CN 109961586A CN 201711432083 A CN201711432083 A CN 201711432083A CN 109961586 A CN109961586 A CN 109961586A
- Authority
- CN
- China
- Prior art keywords
- sensitive information
- ambient image
- capture
- risk factor
- local environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/201—Accessories of ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention provides a kind of safety protecting method of sensitive information and device, method includes: to analyze the ambient image of capture, determines the risk factor using local environment when the sensitive information;According to the risk factor determined, safety protection structure of the control configuration in the equipment for receiving sensitive information is moved, security protection is provided with the input for the sensitive information, it at least can be suitably used for the technical solution for preventing password to be stolen when ATM is withdrawn the money to provide one kind, improve safety when withdrawal, meanwhile password is inputted for user and is provided convenience, and improves input efficiency.
Description
Technical field
The present embodiments relate to security technology area more particularly to the safety protecting methods and dress of a kind of sensitive information
It sets.
Background technique
In user using ATM or during sales counter transacting business, it is often necessary to input password by keyboard.
In the prior art, it is peeped when inputting password in order to prevent, baffle can be provided with around keyboard, blocks other people
Sight.If being not provided with the too low of baffle or baffle plate setting, comprehensive protection can not be played to the input of user;If
Baffle plate setting it is too high, will lead to user input password when it is very inconvenient, input efficiency reduce.
Summary of the invention
In view of this, one of the technical issues of embodiment of the present invention is solved is that the safety for providing a kind of sensitive information is anti-
Maintaining method and device, to overcome above-mentioned technological deficiency in the prior art.
The embodiment of the invention provides a kind of safety protecting methods of sensitive information comprising:
The ambient image of capture is analyzed, determines the risk factor using local environment when the sensitive information;
According to the risk factor determined, safety protection structure of the control configuration in the equipment for receiving sensitive information
It is moved, provides security protection with the input for the sensitive information.
Optionally, in any of the embodiments of the present invention, the sensitive information includes that user name, password, card number, short message are tested
Demonstrate,prove at least one of code.
Optionally, in any of the embodiments of the present invention, the risk factor includes that illegal user, illegal image are taken on the sly list
At least one of member.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is analyzed, is determined using described quick
The risk factor of local environment includes: when feeling information
The ambient image of capture is compared with iconic model, determines the danger using local environment when the sensitive information
Dangerous factor.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is compared with iconic model, is determined
Risk factor using local environment when the sensitive information includes:
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined
Factor.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is compared with iconic model, is determined
Risk factor using local environment when the sensitive information includes:
According to object each in ambient image and the positional relationship between the unit that sensitive information inputs is received, determines environment map
As the positional relationship between upper object.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is analyzed, is determined using described quick
The risk factor of local environment includes: when feeling information
It is locating when determining using the sensitive information according to the difference in the ambient image of capture between neighboring static picture
The risk factor of environment.
Optionally, in any of the embodiments of the present invention, according in the ambient image of capture between neighboring static picture
Difference determines that the risk factor of local environment when using the sensitive information includes:
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined
Factor.
Optionally, in any of the embodiments of the present invention, further includes: in user when withdrawing the money on cash dispenser, starting
The camera capturing ambient image being arranged on cash dispenser.
Optionally, in any of the embodiments of the present invention, safety of the control configuration in the equipment for receiving sensitive information is anti-
It includes: that driving unit drive actions unit of the control configuration in the equipment for receiving sensitive information is moved that protection structure, which carries out movement,
Dynamic, the full protection structure includes at least one described driving unit and at least one described motor unit, a drive
Moving cell controls a motor unit.
Optionally, in any of the embodiments of the present invention, further includes: determine risk factor and the legitimate user of local environment
Direction relations;
Accordingly, the safety protection structure that control configures in the equipment for receiving sensitive information carries out movement and includes:
According to the direction light, one motor unit of selection is carried out from multiple motor units and is started, to be described
The input of sensitive information is provided along the security protection on the direction.
The embodiment of the present invention also provides a kind of safety device of sensitive information comprising:
First unit is determined for analyzing the ambient image of capture using local environment when the sensitive information
Risk factor;
Second unit, for according to the risk factor determined, control configuration to be in the equipment for receiving sensitive information
Safety protection structure moved, provide security protection with the input for the sensitive information.
Optionally, in any of the embodiments of the present invention, the first unit is image analyzing unit.
Optionally, in any of the embodiments of the present invention, the second unit is controller.
In the embodiment of the present invention, by analyzing the ambient image of capture, determines and use sensitive information when institute
Locate the risk factor of environment;According to the risk factor determined, peace of the control configuration in the equipment for receiving sensitive information
Full protection structure is moved, and provides security protection with the input for the sensitive information, so that providing one kind can at least fit
The technical solution for preventing password to be stolen when being withdrawn the money for ATM improves safety when withdrawal, meanwhile, it is
User inputs password and provides convenience, and improves input efficiency.
Detailed description of the invention
The some specific of the embodiment of the present invention is described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter
Embodiment.Identical appended drawing reference denotes same or similar part or part in attached drawing.Those skilled in the art should manage
Solution, the drawings are not necessarily drawn to scale.In attached drawing:
Fig. 1 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention one;
Fig. 2 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention two;
Fig. 3 is the occlusion method flow diagram of mobile password in the embodiment of the present invention three;
Fig. 4 is the occlusion method flow diagram of mobile password in the embodiment of the present invention four;
Fig. 5 is the occlusion method flow diagram of mobile password in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the safety device of sensitive information in the embodiment of the present invention six.
Specific embodiment
Any technical solution for implementing the embodiment of the present invention must be not necessarily required to reach simultaneously above all advantages.
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality
Applying example only is a part of the embodiment of the embodiment of the present invention, instead of all the embodiments.Based on the implementation in the embodiment of the present invention
The range of protection of the embodiment of the present invention all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
In the embodiment of the present invention, by analyzing the ambient image of capture, determines and use sensitive information when institute
Locate the risk factor of environment;Further according to the risk factor determined, control configuration is in the equipment for receiving sensitive information
Safety protection structure is moved, and provides security protection with the input for the sensitive information, at least can to provide one kind
The technical solution for preventing password to be stolen when being withdrawn the money suitable for ATM improves safety when withdrawal.
Below with reference to attached drawing of the embodiment of the present invention the embodiment of the present invention will be further explained specific implementation.
Fig. 1 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention one;As shown in Figure 1, it is wrapped
It includes:
S101, the ambient image of capture is compared with iconic model, locating ring when determining using the sensitive information
The risk factor in border.
In the present embodiment, the sensitive information includes at least one of user name, password, card number, short message verification code.
In the present embodiment, the risk factor includes that illegal user, illegal image are taken on the sly at least one of unit.
In the present embodiment, the ambient image of capture is compared with iconic model in step S101, is determined described in use
When sensitive information when the risk factor of local environment, it can specifically include:
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined
Factor.
Further, it wherein being compared to the ambient image of capture with iconic model, determines using the sensitive letter
When breath when the risk factor of local environment, according to object each in ambient image and it can receive between the unit that sensitive information inputs
Positional relationship, determine the positional relationship in ambient image between object.
It in the specific implementation, can there is no risk factor foundation first against local environment when using the sensitive information
Ecotopia iconic model, in above-mentioned steps S101 when being compared, by the ambient image captured in real time and ecotopia
Model is compared, so that it is determined that the illegal factor.
In the specific implementation, the comparison of the ambient image and ecotopia model that capture in real time, can be directly based upon gray scale
Value is compared, to quickly determine out illegal factor.When comparing, it can be determined that ambient image and ecotopia model
Whether gray value difference is greater than the threshold value of setting, if it is greater, then showing that corresponding pixel belongs to risk factor or danger
Factor causes to generate indirectly.
S102, according to the risk factor determined, safety of the control configuration in the equipment for receiving sensitive information is anti-
Protection structure is moved, and provides security protection with the input for the sensitive information.
In the present embodiment, the movement of safety protection structure can include but is not limited to that sliding, lifting, that light can be achieved is fuzzy
The modes such as mobile realize.
The security protection can specifically be realized by the modes such as blocking, interfering, as long as can guarantee the sensitive information
Not because illegal factor there are due to be leaked or steal.
The movement of safety protection structure can also be driven automatically by manual actuation, and automatic driving is such as motor
Etc. modes.
Fig. 2 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention two;As shown in Fig. 2, it is wrapped
It includes:
S201, according to the difference in the ambient image of capture between neighboring static picture, determine and use the sensitive information
When local environment risk factor.
It is true in the difference in the ambient image according to capture between neighboring static picture in step S201 in the present embodiment
When using the sensitive information surely when the risk factor of local environment, it can specifically include: the ambient image of capture is cut
Get multiframe static images;According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;According to ring
Positional relationship on the image of border between object determines the risk factor using local environment when the sensitive information.
In the specific implementation, the object includes legitimate user and illegal user, if legal user and illegal user
Positional relationship can lead to above-mentioned sensitive information and can be stolen or reveal, then corresponding illegal user is to need by starting step
2102 objects being directed to.
In the specific implementation, the difference between adjacent picture frame can be gray value differences value, or color value difference,
Accordingly, difference threshold is set, if the difference between adjacent picture frame is greater than difference threshold, shows that corresponding pixel belongs to
Illegal element or illegal element cause to generate.
S202, according to the risk factor determined, safety of the control configuration in the equipment for receiving sensitive information is anti-
Protection structure is moved, and provides security protection with the input for the sensitive information.
In the present embodiment, the related description of step S202 can refer to the record of above-mentioned Fig. 1.
In the specific implementation, safety protection structure includes driving unit and motor unit, and the quantity of the two units is not done
It is particularly limited to, as long as sensitive information can be prevented to be leaked or be stolen.
Motor unit and driving unit can be directly integrated on the terminal device in application scenarios.
Fig. 3 is the occlusion method flow diagram of mobile password in the embodiment of the present invention three;In the present embodiment, to be applied to
Example on cash dispenser, to hold or legitimate user provides and blocks when carrying out Password Input on code keyboard, to prevent from inputting
Password illegally stolen, specifically, a whole baffle around shape is set around code keyboard.Specifically, such as Fig. 3 institute
Show comprising:
Camera on S301, starting cash dispenser carries out image capture;
In the present embodiment, position of the camera on cash dispenser can there are many selections, such as cash dispenser to show screen
Surrounding, alternatively, on the side wall of cash dispenser fuselage surrounding.In addition, camera can also be set up directly on baffle.
S302, captured image is analyzed, determines card user;
In the present embodiment, being analyzed captured image collection in detail can be as above-described embodiment one or embodiment two are remembered
It carries.Based on the analysis of above-mentioned image, determine that user nearest apart from cash dispenser on image is card user.Alternatively, apart from close
The nearest user of code key disk is card user.
S303, captured image is analyzed, judges card user local environment when carrying out Password Input
Illegal user;
In described image in addition to card user, if there are multiple human body images, locate outside the corresponding human body image of card user,
Other may be defined as illegal user.
S304, if it exists illegal user, then one globality control baffle is gone up and down.
In the present embodiment, once it is determined that there are illegal user, in order to prevent sensitive password to be leaked or be stolen as far as possible
It takes, or in other words, the security protection of highest level is provided.
In the present embodiment, the baffle is as the motor unit in above-mentioned Fig. 1-Fig. 2.
Fig. 4 is the occlusion method flow diagram of mobile password in the embodiment of the present invention four;Unlike above-mentioned Fig. 3,
In the present embodiment, multiple independent baffles are set in code keyboard periphery, each baffle individually controls.
Camera on S401, starting cash dispenser carries out image capture;
S402, captured image is analyzed, determines card user;
S403, captured image is analyzed, judges card user local environment when carrying out Password Input
Illegal user;
In the present embodiment, step S401-S403 is similar to the step S301-S303 in above-mentioned Fig. 3.
S404, if it exists illegal user, it is determined that the direction relations of illegal user and code keyboard;
It, can be with direction of the illegal user relative to code keyboard be all around indicated, for example, password in the present embodiment
Left front, right back of keyboard etc.;Direction of the illegal user relative to code keyboard, example can also be indicated with the four corners of the world
Such as, west by north 30 ° of code keyboard, 45 ° of the east by south of keyboard etc., these direction relations can flexibly be set.
S405, according to the direction relations, at least one baffle controlled in multiple baffles is gone up and down, with stop described in
Illegal user on direction snatches password information.
Optionally, in any of the embodiments of the present invention, safety of the control configuration in the equipment for receiving sensitive information is anti-
It includes: that driving unit drive actions unit of the control configuration in the equipment for receiving sensitive information is moved that protection structure, which carries out movement,
Make, the full protection structure includes at least one described driving unit and at least one described motor unit, a drive
Moving cell controls a motor unit.
For example, the west by north direction of code keyboard there are other people, then a block baffle is risen in west by north direction;In another example close
Code key disk is west by north and respectively there is a people in west by south direction, then rises a block baffle respectively in both direction, to input to user
Password carries out comprehensive secret protection.
Further, the baffle can rotate in a certain range, after determining the position of illegal user, can will keep off
Plate turns to the position that can block illegal user's sight to greatest extent.For example, when illegal user is located at northwest corner, Ke Yisheng
The baffle for playing northwest corner can move the baffle of northwest corner clockwise when illegal user is located at northwest corner position more by north
It moves a bit, when illegal user is located at northwest corner position more to the west, the baffle of northwest corner can be moved a bit counterclockwise.
Fig. 5 is the occlusion method flow diagram of mobile password in the embodiment of the present invention five;It is identical with above-mentioned Fig. 4 to be,
In the present embodiment, multiple independent baffles are set in code keyboard periphery, each baffle individually controls.Unlike, it is controlling
When baffle is gone up and down, with reference to the distance between card user and illegal user.
Camera on S501, starting cash dispenser carries out image capture;
S502, captured image is analyzed, determines card user;
S503, captured image is analyzed, judges card user local environment when carrying out Password Input
Illegal user;
S504, if it exists illegal user, the then distance relation of illegal user and code keyboard;
S505, according to the distance relation, at least one baffle controlled in multiple baffles is gone up and down, with stop described in
Illegal user on direction snatches password information.
It is not both in the present embodiment, to be controlled according to the distance relation of illegal user and code keyboard with above-mentioned Fig. 4 embodiment
The movement of baffle processed.
The distance between keyboard is closer, and baffle rises higher;The distance between keyboard is remoter, and what baffle rose gets over
It is low.
For example, the illegal user of code keyboard direction northwest is apart from 1 meter of code keyboard, the baffle of direction northwest rises 5cm;
For the illegal user of code keyboard southeastern direction apart from 2 meters of code keyboard, the baffle of southeastern direction rises 2.5cm.If certain baffle pair
When the direction answered there are multiple illegal users, then calculated with the nearest artificial standard of distance.
In the above-described embodiments, the movement of baffle can also be carried out with reference to the height of illegal user, therefore, to carry out figure
As shooting, and then judge the height of personage, can be realized with multiple cameras: one or more can be installed on cash dispenser roof
A camera determines the relative position between personage and face keyboard for the personage that takes a crane shot, and judges direction of the user relative to keyboard
And distance;In addition to this it is possible to camera that be arranged multiple fixations on wall or around keyboard or moveable, for from
Front, side or the back side shoot personage, so that it is determined that the height of personage.
It is illustrated by taking camera there are four four baffles corresponding around code keyboard are also set up as an example.Firstly, root
According to the image that the camera on roof is shot, judge there is illegal user in which direction and its between keyboard in keyboard preset range
Distance, it is assumed that judge that keyboard northwest corner has other people here, and the distance between he and keyboard are 1 meter.It is then possible to obtain close
The image of the camera shooting of code key disk northwest corner, judges the height of character contour in the picture by image recognition, in conjunction with
The height of the distance between people and keyboard illegal user.
For example, the ratio at user and 1 meter of keyboard distance, between the character contour and the practical height of personage of camera shooting
Example is 1:10, then, if a height of 17.5cm of user profile in image, the practical height of personage is 175cm;In another example user with
At 2 meters of keyboard distance, the ratio between the user profile and the practical height of user of camera shooting is 1:20, then, if
The a height of 9cm of user profile in image, then the practical height of user is 180cm.
Further, when lifting to control baffle, can be previously stored with distance, height and baffle lifting heights it
Between mapping table, the corresponding relationship of three can obtain by previous experiments.For example, illegal user is apart from 1 meter of keyboard, body
High 180cm, baffle, which needs to rise 5cm and is just avoided that, to be peeped;Illegal user needs to rise apart from 1 meter of keyboard, height 160cm, baffle
4.4cm is played just to be avoided that and peep;Apart from 2 meters of keyboard, height 180cm, baffle needs to rise 2.5cm and is just avoided that steathily illegal user
It peeps.
Other than the method tabled look-up, the height that baffle needs to rise can also be calculated by formula (1):
H=(h1-h2) * l1/l2 (1)
Wherein, h1 is the height of people, and h2 is height of the code keyboard relative to ground, and l1 is that code keyboard is farthest apart from people
A little the distance between with baffle, if keyboard is square, l1 can be approximated to be the catercorner length of code keyboard, and l2 is
Code keyboard apart from people it is farthest a little the distance between with people, may be approximately equal to l1 and add between calculated people and keyboard
Distance.
If the corresponding direction of certain baffle have it is multiple other people, be respectively calculated, and with calculated maximum height come
Baffle is controlled to rise.If other people corresponding multiple profiles of the direction are difficult to differentiate between, baffle directly can be raised to highest;
Alternatively, cancelling height constraint, the height of baffle is determined according only to nearest distance.
In above-mentioned Fig. 4 Fig. 5 embodiment, selectively controls muti-piece baffle and gone up and down respectively, only rising there are other
The corresponding baffle in the position of people, remaining baffle can not have to rise, and effectively increase activity space when user inputs password, into
One step improves Password Input efficiency.
When user inputs password, it can determine that baffle rises relative to the distance between code keyboard according to illegal user
Height, distance it is closer, baffle rises higher, can guarantee user input password do not peeped under the premise of, effectively
The height of baffle, compromise between security and Password Input efficiency are reduced, user experience is improved.
Further, if integrating the height that determining baffle rises in conjunction with the height of illegal user, the closer, body of distance
Gao Yuegao, baffle rise higher, and distance is remoter, height is lower, and baffle rises lower, can be on the basis of considering distance
The height that baffle is further determined according to height, under the premise of guaranteeing that the password of user's input is not peeped, to greatest extent
Ground reduces the height of baffle, improves Password Input efficiency and user experience.
Fig. 6 is the structural schematic diagram of the safety device of sensitive information in the embodiment of the present invention six;As shown in fig. 6, its
Include:
First unit 601, for analyzing the ambient image of capture, locating ring when determining using the sensitive information
The risk factor in border;For this purpose, the first unit 601 can be referred to as image analyzing unit again.
Second unit 602, for according to the risk factor determined, control configuration to be in the equipment for receiving sensitive information
On safety protection structure moved, provide security protection with the input for the sensitive information.
The first unit 601 is further used for that the ambient image of capture is compared with iconic model, determines and uses
The risk factor of local environment when the sensitive information.
The first unit 601 is further used for that the ambient image of capture is compared with iconic model, determines environment
Object in image;According to the positional relationship in ambient image between object, determine using local environment when the sensitive information
Risk factor.
The first unit 601 is further used for according to object each in ambient image and receives the unit of sensitive information input
Between positional relationship, determine the positional relationship in ambient image between object.
The first unit 601 is further used for the difference in the ambient image according to capture between neighboring static picture,
Determine the risk factor using local environment when the sensitive information.
The first unit 601 is further used for:
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined
Factor.
The first unit 601 is further used in user when withdrawing the money on cash dispenser, starts and is arranged on cash dispenser
Camera capturing ambient image.
The second unit 602 is further used for driving unit driving of the control configuration in the equipment for receiving sensitive information
Motor unit is moved, and the full protection structure includes that at least one described driving unit and at least one described movement are single
Member, a driving unit control a motor unit.
The second unit 602 is further used for determining the risk factor of local environment and the direction relations of legitimate user;
Further for according to the direction light, one motor unit of selection is carried out from multiple motor units and is started, with for
The input of the sensitive information is provided along the security protection on the direction.
When the motor unit is baffle, accordingly, the second unit 602 is further used for control configuration and is receiving
Baffle in the equipment of sensitive information is gone up and down.
In above-described embodiment, safety protection structure can also include being used as institute other than including driving unit, motor unit
The control unit of second unit is stated, control unit is such as controller, and driving unit is such as motor (such as micromotor), control
Device issues control instruction, drives driving unit, and driving unit drives motor unit to be moved in turn.
The apparatus embodiments described above are merely exemplary, wherein described, module can as illustrated by the separation member
It is physically separated with being or may not be, the component shown as module may or may not be physics mould
Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs
In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness
Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, the computer readable recording medium include for
Any mechanism of the readable form storage of computer (such as computer) or transmission information.For example, machine readable media includes only
Read memory (ROM), random access memory (RAM), magnetic disk storage medium, optical storage media, flash medium, electricity, light,
Sound or the transmitting signal (for example, carrier wave, infrared signal, digital signal etc.) of other forms etc., which includes
Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively
Method described in certain parts of a embodiment or embodiment.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the embodiment of the present invention, rather than it is limited
System;Although the present invention is described in detail referring to the foregoing embodiments, those skilled in the art should understand that: its
It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is equal
Replacement;And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution
Spirit and scope.
It will be understood by those skilled in the art that the embodiment of the embodiment of the present invention can provide as method, apparatus (equipment) or
Computer program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine soft
The form of the embodiment of part and hardware aspect.Moreover, it wherein includes to calculate that the embodiment of the present invention, which can be used in one or more,
Computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, the optical memory of machine usable program code
Deng) on the form of computer program product implemented.
The embodiment of the present invention referring to according to the method for the embodiment of the present invention, device (equipment) and computer program product
Flowchart and/or the block diagram describes.It should be understood that can be realized by computer program instructions every in flowchart and/or the block diagram
The combination of process and/or box in one process and/or box and flowchart and/or the block diagram.It can provide these computers
Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute
In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram
It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Claims (15)
1. a kind of safety protecting method of sensitive information characterized by comprising
The ambient image of capture is analyzed, determines the risk factor using local environment when the sensitive information;
According to the risk factor, safety protection structure of the control configuration in the equipment for receiving sensitive information is moved, with
Input for the sensitive information provides security protection.
2. the method according to claim 1, wherein the sensitive information include user name, it is password, card number, short
Believe at least one of identifying code.
3. the method according to claim 1, wherein the risk factor includes that illegal user, illegal image are stolen
Clap at least one of unit.
4. determining the method according to claim 1, wherein the ambient image to capture is analyzed and using institute
The risk factor of local environment includes: when stating sensitive information
The ambient image of capture is compared with iconic model, determine local environment when using the sensitive information it is dangerous because
Element.
5. the method according to claim 1, wherein the ambient image to capture is compared with iconic model,
It determines and includes: using the risk factor of local environment when the sensitive information
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, determine using when the sensitive information local environment it is dangerous because
Element.
6. according to the method described in claim 5, it is characterized in that, the ambient image to capture is compared with iconic model,
It determines and includes: using the risk factor of local environment when the sensitive information
According to object each in ambient image and the positional relationship between the unit that sensitive information inputs is received, is determined in ambient image
Positional relationship between object.
7. determining the method according to claim 1, wherein the ambient image to capture is analyzed and using institute
The risk factor of local environment includes: when stating sensitive information
According to the difference in the ambient image of capture between neighboring static picture, determine using local environment when the sensitive information
Risk factor.
8. the method according to the description of claim 7 is characterized in that according in the ambient image of capture between neighboring static picture
Difference, the risk factor of local environment includes: when determining using the sensitive information
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, determine using when the sensitive information local environment it is dangerous because
Element.
9. method according to claim 1-8, which is characterized in that further include: it is carried out on cash dispenser in user
When withdrawal, start the camera capturing ambient image being arranged on cash dispenser.
10. according to the method described in claim 9, it is characterized in that, peace of the control configuration in the equipment for receiving sensitive information
Full protection structure carry out movement include: control configuration receive sensitive information equipment on driving unit drive actions unit into
Row movement, the full protection structure includes at least one described driving unit and at least one described motor unit, an institute
It states driving unit and controls a motor unit.
11. according to the method described in claim 10, it is characterized by further comprising: determining the risk factor and conjunction of local environment
The direction relations of method user;
Accordingly, the safety protection structure that control configures in the equipment for receiving sensitive information carries out movement and includes:
According to the direction light, one motor unit of selection is carried out from multiple motor units and is started, for the sensitivity
The input of information is provided along the security protection on the direction.
12. according to the method for claim 11, which is characterized in that the motor unit is baffle, accordingly, control configuration
It includes: control configuration in the equipment for receiving sensitive information that safety protection structure in the equipment for receiving sensitive information, which carries out movement,
On baffle gone up and down.
13. a kind of safety device of sensitive information characterized by comprising
First unit determines the danger using local environment when the sensitive information for analyzing the ambient image of capture
Dangerous factor;
Second unit, for according to the risk factor determined, peace of the control configuration in the equipment for receiving sensitive information
Full protection structure is moved, and provides security protection with the input for the sensitive information.
14. protective device according to claim 13, which is characterized in that the first unit is image analyzing unit.
15. protective device according to claim 13, which is characterized in that the second unit is controller.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711432083.1A CN109961586A (en) | 2017-12-26 | 2017-12-26 | The safety protecting method and device of sensitive information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711432083.1A CN109961586A (en) | 2017-12-26 | 2017-12-26 | The safety protecting method and device of sensitive information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109961586A true CN109961586A (en) | 2019-07-02 |
Family
ID=67022020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711432083.1A Pending CN109961586A (en) | 2017-12-26 | 2017-12-26 | The safety protecting method and device of sensitive information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109961586A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110443016A (en) * | 2019-07-04 | 2019-11-12 | 深圳壹账通智能科技有限公司 | Information leakage preventing method, electronic device and storage medium |
CN111145476A (en) * | 2019-12-26 | 2020-05-12 | 星络智能科技有限公司 | Anti-falling control method for children |
CN111191231A (en) * | 2019-12-30 | 2020-05-22 | 绵阳师范学院 | Safety protection method and system for sensitive information |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11123109A (en) * | 1997-10-22 | 1999-05-11 | Shukoh Co Ltd | Desk with shield plate |
JP2001353028A (en) * | 2000-06-13 | 2001-12-25 | Itoki Crebio Corp | Wagon desk having vertically movable panel |
CN200976317Y (en) * | 2006-09-28 | 2007-11-14 | 董俊 | Bank cipher anti-theft input box |
US7377144B1 (en) * | 2007-01-15 | 2008-05-27 | I-Tek Metal Mfg. Co., Ltd. | Protective device for electronic lock |
CN101211484A (en) * | 2006-12-25 | 2008-07-02 | 成都三泰电子实业股份有限公司 | Method and device for preventing peep of cipher when withdrawing at ATM |
CN101303785A (en) * | 2008-06-26 | 2008-11-12 | 北京中星微电子有限公司 | System and method for monitoring safety of ATM |
CN101344980A (en) * | 2008-08-21 | 2009-01-14 | 中国工商银行股份有限公司 | Safety detection system and method for ATM equipment |
CN101556717A (en) * | 2009-05-19 | 2009-10-14 | 上海海隆软件股份有限公司 | ATM intelligent security system and monitoring method |
CN101719216A (en) * | 2009-12-21 | 2010-06-02 | 西安电子科技大学 | Movement human abnormal behavior identification method based on template matching |
CN201716789U (en) * | 2010-03-03 | 2011-01-19 | 杭州创导安全技术有限公司 | ATM foreign matter invasion detection alarm device |
CN102034318A (en) * | 2010-11-01 | 2011-04-27 | 秦小枢 | Safety monitoring device matched with ATM (automatic teller machine) machine |
CN102610035A (en) * | 2012-04-05 | 2012-07-25 | 广州广电运通金融电子股份有限公司 | Financial self-service device and anti-peeping system and anti-peeping method thereof |
CN104349125A (en) * | 2013-08-05 | 2015-02-11 | 浙江大华技术股份有限公司 | Area monitoring method and device |
WO2015147664A1 (en) * | 2014-03-28 | 2015-10-01 | BERNACKI, Krzysztof | The system and method of active antiskimming protection especially for devices like teller machines, cash deposit machines, slot machines, parcel lockers, vending machines. |
CN105468961A (en) * | 2015-11-18 | 2016-04-06 | 广东欧珀移动通信有限公司 | Password setting method and apparatus for mobile terminal |
CN105761261A (en) * | 2016-02-17 | 2016-07-13 | 南京工程学院 | Method for detecting artificial malicious damage to camera |
CN205428062U (en) * | 2016-03-22 | 2016-08-03 | 许昌学院 | ATM cash dispenser code keypad floodgate machine |
CN206209985U (en) * | 2016-11-30 | 2017-05-31 | 广州智萃电子科技有限公司 | A kind of input information theft-preventing structure for input keyboard |
CN206213579U (en) * | 2016-08-22 | 2017-06-06 | 梁家文 | A kind of school desk |
CN206505487U (en) * | 2017-03-02 | 2017-09-19 | 山东科技大学 | The automatic blocker in ATM Password Input area |
CN107369273A (en) * | 2017-07-21 | 2017-11-21 | 京东方科技集团股份有限公司 | Self-help drawing money machine glance prevention method, apparatus and system |
CN107393215A (en) * | 2017-07-20 | 2017-11-24 | 深圳怡化电脑股份有限公司 | A kind of control method, device and the financial terminal equipment of movable watching shield cover |
-
2017
- 2017-12-26 CN CN201711432083.1A patent/CN109961586A/en active Pending
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11123109A (en) * | 1997-10-22 | 1999-05-11 | Shukoh Co Ltd | Desk with shield plate |
JP2001353028A (en) * | 2000-06-13 | 2001-12-25 | Itoki Crebio Corp | Wagon desk having vertically movable panel |
CN200976317Y (en) * | 2006-09-28 | 2007-11-14 | 董俊 | Bank cipher anti-theft input box |
CN101211484A (en) * | 2006-12-25 | 2008-07-02 | 成都三泰电子实业股份有限公司 | Method and device for preventing peep of cipher when withdrawing at ATM |
US7377144B1 (en) * | 2007-01-15 | 2008-05-27 | I-Tek Metal Mfg. Co., Ltd. | Protective device for electronic lock |
CN101303785A (en) * | 2008-06-26 | 2008-11-12 | 北京中星微电子有限公司 | System and method for monitoring safety of ATM |
CN101344980A (en) * | 2008-08-21 | 2009-01-14 | 中国工商银行股份有限公司 | Safety detection system and method for ATM equipment |
CN101556717A (en) * | 2009-05-19 | 2009-10-14 | 上海海隆软件股份有限公司 | ATM intelligent security system and monitoring method |
CN101719216A (en) * | 2009-12-21 | 2010-06-02 | 西安电子科技大学 | Movement human abnormal behavior identification method based on template matching |
CN201716789U (en) * | 2010-03-03 | 2011-01-19 | 杭州创导安全技术有限公司 | ATM foreign matter invasion detection alarm device |
CN102034318A (en) * | 2010-11-01 | 2011-04-27 | 秦小枢 | Safety monitoring device matched with ATM (automatic teller machine) machine |
CN102610035A (en) * | 2012-04-05 | 2012-07-25 | 广州广电运通金融电子股份有限公司 | Financial self-service device and anti-peeping system and anti-peeping method thereof |
CN104349125A (en) * | 2013-08-05 | 2015-02-11 | 浙江大华技术股份有限公司 | Area monitoring method and device |
WO2015147664A1 (en) * | 2014-03-28 | 2015-10-01 | BERNACKI, Krzysztof | The system and method of active antiskimming protection especially for devices like teller machines, cash deposit machines, slot machines, parcel lockers, vending machines. |
CN105468961A (en) * | 2015-11-18 | 2016-04-06 | 广东欧珀移动通信有限公司 | Password setting method and apparatus for mobile terminal |
CN105761261A (en) * | 2016-02-17 | 2016-07-13 | 南京工程学院 | Method for detecting artificial malicious damage to camera |
CN205428062U (en) * | 2016-03-22 | 2016-08-03 | 许昌学院 | ATM cash dispenser code keypad floodgate machine |
CN206213579U (en) * | 2016-08-22 | 2017-06-06 | 梁家文 | A kind of school desk |
CN206209985U (en) * | 2016-11-30 | 2017-05-31 | 广州智萃电子科技有限公司 | A kind of input information theft-preventing structure for input keyboard |
CN206505487U (en) * | 2017-03-02 | 2017-09-19 | 山东科技大学 | The automatic blocker in ATM Password Input area |
CN107393215A (en) * | 2017-07-20 | 2017-11-24 | 深圳怡化电脑股份有限公司 | A kind of control method, device and the financial terminal equipment of movable watching shield cover |
CN107369273A (en) * | 2017-07-21 | 2017-11-21 | 京东方科技集团股份有限公司 | Self-help drawing money machine glance prevention method, apparatus and system |
Non-Patent Citations (1)
Title |
---|
方辽洋: "《人身安全手册》", 30 April 2015, pages: 43 - 45 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110443016A (en) * | 2019-07-04 | 2019-11-12 | 深圳壹账通智能科技有限公司 | Information leakage preventing method, electronic device and storage medium |
CN110443016B (en) * | 2019-07-04 | 2023-10-10 | 深圳壹账通智能科技有限公司 | Information leakage prevention method, electronic device and storage medium |
CN111145476A (en) * | 2019-12-26 | 2020-05-12 | 星络智能科技有限公司 | Anti-falling control method for children |
CN111191231A (en) * | 2019-12-30 | 2020-05-22 | 绵阳师范学院 | Safety protection method and system for sensitive information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109961586A (en) | The safety protecting method and device of sensitive information | |
EP3373202A1 (en) | Verification method and system | |
CN110121710A (en) | System, method and software for user authentication | |
US20140013422A1 (en) | Continuous Multi-factor Authentication | |
CN109074441A (en) | Based on the certification watched attentively | |
CN107256555A (en) | A kind of image processing method, device and storage medium | |
JP2020520511A (en) | Access control method and apparatus, system, electronic device, program and medium | |
CN102509053A (en) | Authentication and authorization method, processor, equipment and mobile terminal | |
CN107622246B (en) | Face recognition method and related product | |
CN104036586B (en) | Eye-controlled display device and display method thereof and ATM (Automatic Teller Machine) machine system | |
CN110163053B (en) | Method and device for generating negative sample for face recognition and computer equipment | |
CN104361302A (en) | Method for protecting private information based on communication equipment and communication equipment | |
CN110675539B (en) | Identity verification method and device, electronic equipment and storage medium | |
CN101625716A (en) | Method for preventing peep on computer and computer with method | |
CN108235105A (en) | A kind of barrage rendering method, recording medium, electronic equipment, information processing system | |
CN110135262A (en) | The anti-peeping processing method of sensitive data, device, equipment and storage medium | |
EP4156081A1 (en) | Image processing method and apparatus | |
CN108469893A (en) | Control method, device, equipment and the computer readable storage medium of display screen | |
CN109446822A (en) | Right management method and system | |
CN109696955B (en) | Adjusting method of intelligent toilet mirror and intelligent toilet mirror | |
CN110084235A (en) | Information collecting method, device and acquisition equipment based on point of interest | |
CN106778194A (en) | Verification method, device and electronic equipment | |
CN111353475A (en) | Self-service transaction equipment abnormality identification method and self-service transaction equipment | |
CN106709310A (en) | Virtual reality system interface login method and device | |
CN107093395A (en) | A kind of transparent display and its method for displaying image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190702 |
|
RJ01 | Rejection of invention patent application after publication |