CN109961586A - The safety protecting method and device of sensitive information - Google Patents

The safety protecting method and device of sensitive information Download PDF

Info

Publication number
CN109961586A
CN109961586A CN201711432083.1A CN201711432083A CN109961586A CN 109961586 A CN109961586 A CN 109961586A CN 201711432083 A CN201711432083 A CN 201711432083A CN 109961586 A CN109961586 A CN 109961586A
Authority
CN
China
Prior art keywords
sensitive information
ambient image
capture
risk factor
local environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711432083.1A
Other languages
Chinese (zh)
Inventor
赵成军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201711432083.1A priority Critical patent/CN109961586A/en
Publication of CN109961586A publication Critical patent/CN109961586A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/201Accessories of ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/207Surveillance aspects at ATMs

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention provides a kind of safety protecting method of sensitive information and device, method includes: to analyze the ambient image of capture, determines the risk factor using local environment when the sensitive information;According to the risk factor determined, safety protection structure of the control configuration in the equipment for receiving sensitive information is moved, security protection is provided with the input for the sensitive information, it at least can be suitably used for the technical solution for preventing password to be stolen when ATM is withdrawn the money to provide one kind, improve safety when withdrawal, meanwhile password is inputted for user and is provided convenience, and improves input efficiency.

Description

The safety protecting method and device of sensitive information
Technical field
The present embodiments relate to security technology area more particularly to the safety protecting methods and dress of a kind of sensitive information It sets.
Background technique
In user using ATM or during sales counter transacting business, it is often necessary to input password by keyboard.
In the prior art, it is peeped when inputting password in order to prevent, baffle can be provided with around keyboard, blocks other people Sight.If being not provided with the too low of baffle or baffle plate setting, comprehensive protection can not be played to the input of user;If Baffle plate setting it is too high, will lead to user input password when it is very inconvenient, input efficiency reduce.
Summary of the invention
In view of this, one of the technical issues of embodiment of the present invention is solved is that the safety for providing a kind of sensitive information is anti- Maintaining method and device, to overcome above-mentioned technological deficiency in the prior art.
The embodiment of the invention provides a kind of safety protecting methods of sensitive information comprising:
The ambient image of capture is analyzed, determines the risk factor using local environment when the sensitive information;
According to the risk factor determined, safety protection structure of the control configuration in the equipment for receiving sensitive information It is moved, provides security protection with the input for the sensitive information.
Optionally, in any of the embodiments of the present invention, the sensitive information includes that user name, password, card number, short message are tested Demonstrate,prove at least one of code.
Optionally, in any of the embodiments of the present invention, the risk factor includes that illegal user, illegal image are taken on the sly list At least one of member.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is analyzed, is determined using described quick The risk factor of local environment includes: when feeling information
The ambient image of capture is compared with iconic model, determines the danger using local environment when the sensitive information Dangerous factor.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is compared with iconic model, is determined Risk factor using local environment when the sensitive information includes:
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined Factor.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is compared with iconic model, is determined Risk factor using local environment when the sensitive information includes:
According to object each in ambient image and the positional relationship between the unit that sensitive information inputs is received, determines environment map As the positional relationship between upper object.
Optionally, in any of the embodiments of the present invention, the ambient image of capture is analyzed, is determined using described quick The risk factor of local environment includes: when feeling information
It is locating when determining using the sensitive information according to the difference in the ambient image of capture between neighboring static picture The risk factor of environment.
Optionally, in any of the embodiments of the present invention, according in the ambient image of capture between neighboring static picture Difference determines that the risk factor of local environment when using the sensitive information includes:
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined Factor.
Optionally, in any of the embodiments of the present invention, further includes: in user when withdrawing the money on cash dispenser, starting The camera capturing ambient image being arranged on cash dispenser.
Optionally, in any of the embodiments of the present invention, safety of the control configuration in the equipment for receiving sensitive information is anti- It includes: that driving unit drive actions unit of the control configuration in the equipment for receiving sensitive information is moved that protection structure, which carries out movement, Dynamic, the full protection structure includes at least one described driving unit and at least one described motor unit, a drive Moving cell controls a motor unit.
Optionally, in any of the embodiments of the present invention, further includes: determine risk factor and the legitimate user of local environment Direction relations;
Accordingly, the safety protection structure that control configures in the equipment for receiving sensitive information carries out movement and includes:
According to the direction light, one motor unit of selection is carried out from multiple motor units and is started, to be described The input of sensitive information is provided along the security protection on the direction.
The embodiment of the present invention also provides a kind of safety device of sensitive information comprising:
First unit is determined for analyzing the ambient image of capture using local environment when the sensitive information Risk factor;
Second unit, for according to the risk factor determined, control configuration to be in the equipment for receiving sensitive information Safety protection structure moved, provide security protection with the input for the sensitive information.
Optionally, in any of the embodiments of the present invention, the first unit is image analyzing unit.
Optionally, in any of the embodiments of the present invention, the second unit is controller.
In the embodiment of the present invention, by analyzing the ambient image of capture, determines and use sensitive information when institute Locate the risk factor of environment;According to the risk factor determined, peace of the control configuration in the equipment for receiving sensitive information Full protection structure is moved, and provides security protection with the input for the sensitive information, so that providing one kind can at least fit The technical solution for preventing password to be stolen when being withdrawn the money for ATM improves safety when withdrawal, meanwhile, it is User inputs password and provides convenience, and improves input efficiency.
Detailed description of the invention
The some specific of the embodiment of the present invention is described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter Embodiment.Identical appended drawing reference denotes same or similar part or part in attached drawing.Those skilled in the art should manage Solution, the drawings are not necessarily drawn to scale.In attached drawing:
Fig. 1 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention one;
Fig. 2 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention two;
Fig. 3 is the occlusion method flow diagram of mobile password in the embodiment of the present invention three;
Fig. 4 is the occlusion method flow diagram of mobile password in the embodiment of the present invention four;
Fig. 5 is the occlusion method flow diagram of mobile password in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the safety device of sensitive information in the embodiment of the present invention six.
Specific embodiment
Any technical solution for implementing the embodiment of the present invention must be not necessarily required to reach simultaneously above all advantages.
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality Applying example only is a part of the embodiment of the embodiment of the present invention, instead of all the embodiments.Based on the implementation in the embodiment of the present invention The range of protection of the embodiment of the present invention all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
In the embodiment of the present invention, by analyzing the ambient image of capture, determines and use sensitive information when institute Locate the risk factor of environment;Further according to the risk factor determined, control configuration is in the equipment for receiving sensitive information Safety protection structure is moved, and provides security protection with the input for the sensitive information, at least can to provide one kind The technical solution for preventing password to be stolen when being withdrawn the money suitable for ATM improves safety when withdrawal.
Below with reference to attached drawing of the embodiment of the present invention the embodiment of the present invention will be further explained specific implementation.
Fig. 1 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention one;As shown in Figure 1, it is wrapped It includes:
S101, the ambient image of capture is compared with iconic model, locating ring when determining using the sensitive information The risk factor in border.
In the present embodiment, the sensitive information includes at least one of user name, password, card number, short message verification code.
In the present embodiment, the risk factor includes that illegal user, illegal image are taken on the sly at least one of unit.
In the present embodiment, the ambient image of capture is compared with iconic model in step S101, is determined described in use When sensitive information when the risk factor of local environment, it can specifically include:
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined Factor.
Further, it wherein being compared to the ambient image of capture with iconic model, determines using the sensitive letter When breath when the risk factor of local environment, according to object each in ambient image and it can receive between the unit that sensitive information inputs Positional relationship, determine the positional relationship in ambient image between object.
It in the specific implementation, can there is no risk factor foundation first against local environment when using the sensitive information Ecotopia iconic model, in above-mentioned steps S101 when being compared, by the ambient image captured in real time and ecotopia Model is compared, so that it is determined that the illegal factor.
In the specific implementation, the comparison of the ambient image and ecotopia model that capture in real time, can be directly based upon gray scale Value is compared, to quickly determine out illegal factor.When comparing, it can be determined that ambient image and ecotopia model Whether gray value difference is greater than the threshold value of setting, if it is greater, then showing that corresponding pixel belongs to risk factor or danger Factor causes to generate indirectly.
S102, according to the risk factor determined, safety of the control configuration in the equipment for receiving sensitive information is anti- Protection structure is moved, and provides security protection with the input for the sensitive information.
In the present embodiment, the movement of safety protection structure can include but is not limited to that sliding, lifting, that light can be achieved is fuzzy The modes such as mobile realize.
The security protection can specifically be realized by the modes such as blocking, interfering, as long as can guarantee the sensitive information Not because illegal factor there are due to be leaked or steal.
The movement of safety protection structure can also be driven automatically by manual actuation, and automatic driving is such as motor Etc. modes.
Fig. 2 is the safety protecting method flow diagram of sensitive information in the embodiment of the present invention two;As shown in Fig. 2, it is wrapped It includes:
S201, according to the difference in the ambient image of capture between neighboring static picture, determine and use the sensitive information When local environment risk factor.
It is true in the difference in the ambient image according to capture between neighboring static picture in step S201 in the present embodiment When using the sensitive information surely when the risk factor of local environment, it can specifically include: the ambient image of capture is cut Get multiframe static images;According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;According to ring Positional relationship on the image of border between object determines the risk factor using local environment when the sensitive information.
In the specific implementation, the object includes legitimate user and illegal user, if legal user and illegal user Positional relationship can lead to above-mentioned sensitive information and can be stolen or reveal, then corresponding illegal user is to need by starting step 2102 objects being directed to.
In the specific implementation, the difference between adjacent picture frame can be gray value differences value, or color value difference, Accordingly, difference threshold is set, if the difference between adjacent picture frame is greater than difference threshold, shows that corresponding pixel belongs to Illegal element or illegal element cause to generate.
S202, according to the risk factor determined, safety of the control configuration in the equipment for receiving sensitive information is anti- Protection structure is moved, and provides security protection with the input for the sensitive information.
In the present embodiment, the related description of step S202 can refer to the record of above-mentioned Fig. 1.
In the specific implementation, safety protection structure includes driving unit and motor unit, and the quantity of the two units is not done It is particularly limited to, as long as sensitive information can be prevented to be leaked or be stolen.
Motor unit and driving unit can be directly integrated on the terminal device in application scenarios.
Fig. 3 is the occlusion method flow diagram of mobile password in the embodiment of the present invention three;In the present embodiment, to be applied to Example on cash dispenser, to hold or legitimate user provides and blocks when carrying out Password Input on code keyboard, to prevent from inputting Password illegally stolen, specifically, a whole baffle around shape is set around code keyboard.Specifically, such as Fig. 3 institute Show comprising:
Camera on S301, starting cash dispenser carries out image capture;
In the present embodiment, position of the camera on cash dispenser can there are many selections, such as cash dispenser to show screen Surrounding, alternatively, on the side wall of cash dispenser fuselage surrounding.In addition, camera can also be set up directly on baffle.
S302, captured image is analyzed, determines card user;
In the present embodiment, being analyzed captured image collection in detail can be as above-described embodiment one or embodiment two are remembered It carries.Based on the analysis of above-mentioned image, determine that user nearest apart from cash dispenser on image is card user.Alternatively, apart from close The nearest user of code key disk is card user.
S303, captured image is analyzed, judges card user local environment when carrying out Password Input Illegal user;
In described image in addition to card user, if there are multiple human body images, locate outside the corresponding human body image of card user, Other may be defined as illegal user.
S304, if it exists illegal user, then one globality control baffle is gone up and down.
In the present embodiment, once it is determined that there are illegal user, in order to prevent sensitive password to be leaked or be stolen as far as possible It takes, or in other words, the security protection of highest level is provided.
In the present embodiment, the baffle is as the motor unit in above-mentioned Fig. 1-Fig. 2.
Fig. 4 is the occlusion method flow diagram of mobile password in the embodiment of the present invention four;Unlike above-mentioned Fig. 3, In the present embodiment, multiple independent baffles are set in code keyboard periphery, each baffle individually controls.
Camera on S401, starting cash dispenser carries out image capture;
S402, captured image is analyzed, determines card user;
S403, captured image is analyzed, judges card user local environment when carrying out Password Input Illegal user;
In the present embodiment, step S401-S403 is similar to the step S301-S303 in above-mentioned Fig. 3.
S404, if it exists illegal user, it is determined that the direction relations of illegal user and code keyboard;
It, can be with direction of the illegal user relative to code keyboard be all around indicated, for example, password in the present embodiment Left front, right back of keyboard etc.;Direction of the illegal user relative to code keyboard, example can also be indicated with the four corners of the world Such as, west by north 30 ° of code keyboard, 45 ° of the east by south of keyboard etc., these direction relations can flexibly be set.
S405, according to the direction relations, at least one baffle controlled in multiple baffles is gone up and down, with stop described in Illegal user on direction snatches password information.
Optionally, in any of the embodiments of the present invention, safety of the control configuration in the equipment for receiving sensitive information is anti- It includes: that driving unit drive actions unit of the control configuration in the equipment for receiving sensitive information is moved that protection structure, which carries out movement, Make, the full protection structure includes at least one described driving unit and at least one described motor unit, a drive Moving cell controls a motor unit.
For example, the west by north direction of code keyboard there are other people, then a block baffle is risen in west by north direction;In another example close Code key disk is west by north and respectively there is a people in west by south direction, then rises a block baffle respectively in both direction, to input to user Password carries out comprehensive secret protection.
Further, the baffle can rotate in a certain range, after determining the position of illegal user, can will keep off Plate turns to the position that can block illegal user's sight to greatest extent.For example, when illegal user is located at northwest corner, Ke Yisheng The baffle for playing northwest corner can move the baffle of northwest corner clockwise when illegal user is located at northwest corner position more by north It moves a bit, when illegal user is located at northwest corner position more to the west, the baffle of northwest corner can be moved a bit counterclockwise.
Fig. 5 is the occlusion method flow diagram of mobile password in the embodiment of the present invention five;It is identical with above-mentioned Fig. 4 to be, In the present embodiment, multiple independent baffles are set in code keyboard periphery, each baffle individually controls.Unlike, it is controlling When baffle is gone up and down, with reference to the distance between card user and illegal user.
Camera on S501, starting cash dispenser carries out image capture;
S502, captured image is analyzed, determines card user;
S503, captured image is analyzed, judges card user local environment when carrying out Password Input Illegal user;
S504, if it exists illegal user, the then distance relation of illegal user and code keyboard;
S505, according to the distance relation, at least one baffle controlled in multiple baffles is gone up and down, with stop described in Illegal user on direction snatches password information.
It is not both in the present embodiment, to be controlled according to the distance relation of illegal user and code keyboard with above-mentioned Fig. 4 embodiment The movement of baffle processed.
The distance between keyboard is closer, and baffle rises higher;The distance between keyboard is remoter, and what baffle rose gets over It is low.
For example, the illegal user of code keyboard direction northwest is apart from 1 meter of code keyboard, the baffle of direction northwest rises 5cm; For the illegal user of code keyboard southeastern direction apart from 2 meters of code keyboard, the baffle of southeastern direction rises 2.5cm.If certain baffle pair When the direction answered there are multiple illegal users, then calculated with the nearest artificial standard of distance.
In the above-described embodiments, the movement of baffle can also be carried out with reference to the height of illegal user, therefore, to carry out figure As shooting, and then judge the height of personage, can be realized with multiple cameras: one or more can be installed on cash dispenser roof A camera determines the relative position between personage and face keyboard for the personage that takes a crane shot, and judges direction of the user relative to keyboard And distance;In addition to this it is possible to camera that be arranged multiple fixations on wall or around keyboard or moveable, for from Front, side or the back side shoot personage, so that it is determined that the height of personage.
It is illustrated by taking camera there are four four baffles corresponding around code keyboard are also set up as an example.Firstly, root According to the image that the camera on roof is shot, judge there is illegal user in which direction and its between keyboard in keyboard preset range Distance, it is assumed that judge that keyboard northwest corner has other people here, and the distance between he and keyboard are 1 meter.It is then possible to obtain close The image of the camera shooting of code key disk northwest corner, judges the height of character contour in the picture by image recognition, in conjunction with The height of the distance between people and keyboard illegal user.
For example, the ratio at user and 1 meter of keyboard distance, between the character contour and the practical height of personage of camera shooting Example is 1:10, then, if a height of 17.5cm of user profile in image, the practical height of personage is 175cm;In another example user with At 2 meters of keyboard distance, the ratio between the user profile and the practical height of user of camera shooting is 1:20, then, if The a height of 9cm of user profile in image, then the practical height of user is 180cm.
Further, when lifting to control baffle, can be previously stored with distance, height and baffle lifting heights it Between mapping table, the corresponding relationship of three can obtain by previous experiments.For example, illegal user is apart from 1 meter of keyboard, body High 180cm, baffle, which needs to rise 5cm and is just avoided that, to be peeped;Illegal user needs to rise apart from 1 meter of keyboard, height 160cm, baffle 4.4cm is played just to be avoided that and peep;Apart from 2 meters of keyboard, height 180cm, baffle needs to rise 2.5cm and is just avoided that steathily illegal user It peeps.
Other than the method tabled look-up, the height that baffle needs to rise can also be calculated by formula (1):
H=(h1-h2) * l1/l2 (1)
Wherein, h1 is the height of people, and h2 is height of the code keyboard relative to ground, and l1 is that code keyboard is farthest apart from people A little the distance between with baffle, if keyboard is square, l1 can be approximated to be the catercorner length of code keyboard, and l2 is Code keyboard apart from people it is farthest a little the distance between with people, may be approximately equal to l1 and add between calculated people and keyboard Distance.
If the corresponding direction of certain baffle have it is multiple other people, be respectively calculated, and with calculated maximum height come Baffle is controlled to rise.If other people corresponding multiple profiles of the direction are difficult to differentiate between, baffle directly can be raised to highest; Alternatively, cancelling height constraint, the height of baffle is determined according only to nearest distance.
In above-mentioned Fig. 4 Fig. 5 embodiment, selectively controls muti-piece baffle and gone up and down respectively, only rising there are other The corresponding baffle in the position of people, remaining baffle can not have to rise, and effectively increase activity space when user inputs password, into One step improves Password Input efficiency.
When user inputs password, it can determine that baffle rises relative to the distance between code keyboard according to illegal user Height, distance it is closer, baffle rises higher, can guarantee user input password do not peeped under the premise of, effectively The height of baffle, compromise between security and Password Input efficiency are reduced, user experience is improved.
Further, if integrating the height that determining baffle rises in conjunction with the height of illegal user, the closer, body of distance Gao Yuegao, baffle rise higher, and distance is remoter, height is lower, and baffle rises lower, can be on the basis of considering distance The height that baffle is further determined according to height, under the premise of guaranteeing that the password of user's input is not peeped, to greatest extent Ground reduces the height of baffle, improves Password Input efficiency and user experience.
Fig. 6 is the structural schematic diagram of the safety device of sensitive information in the embodiment of the present invention six;As shown in fig. 6, its Include:
First unit 601, for analyzing the ambient image of capture, locating ring when determining using the sensitive information The risk factor in border;For this purpose, the first unit 601 can be referred to as image analyzing unit again.
Second unit 602, for according to the risk factor determined, control configuration to be in the equipment for receiving sensitive information On safety protection structure moved, provide security protection with the input for the sensitive information.
The first unit 601 is further used for that the ambient image of capture is compared with iconic model, determines and uses The risk factor of local environment when the sensitive information.
The first unit 601 is further used for that the ambient image of capture is compared with iconic model, determines environment Object in image;According to the positional relationship in ambient image between object, determine using local environment when the sensitive information Risk factor.
The first unit 601 is further used for according to object each in ambient image and receives the unit of sensitive information input Between positional relationship, determine the positional relationship in ambient image between object.
The first unit 601 is further used for the difference in the ambient image according to capture between neighboring static picture, Determine the risk factor using local environment when the sensitive information.
The first unit 601 is further used for:
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, the danger using local environment when the sensitive information is determined Factor.
The first unit 601 is further used in user when withdrawing the money on cash dispenser, starts and is arranged on cash dispenser Camera capturing ambient image.
The second unit 602 is further used for driving unit driving of the control configuration in the equipment for receiving sensitive information Motor unit is moved, and the full protection structure includes that at least one described driving unit and at least one described movement are single Member, a driving unit control a motor unit.
The second unit 602 is further used for determining the risk factor of local environment and the direction relations of legitimate user; Further for according to the direction light, one motor unit of selection is carried out from multiple motor units and is started, with for The input of the sensitive information is provided along the security protection on the direction.
When the motor unit is baffle, accordingly, the second unit 602 is further used for control configuration and is receiving Baffle in the equipment of sensitive information is gone up and down.
In above-described embodiment, safety protection structure can also include being used as institute other than including driving unit, motor unit The control unit of second unit is stated, control unit is such as controller, and driving unit is such as motor (such as micromotor), control Device issues control instruction, drives driving unit, and driving unit drives motor unit to be moved in turn.
The apparatus embodiments described above are merely exemplary, wherein described, module can as illustrated by the separation member It is physically separated with being or may not be, the component shown as module may or may not be physics mould Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, the computer readable recording medium include for Any mechanism of the readable form storage of computer (such as computer) or transmission information.For example, machine readable media includes only Read memory (ROM), random access memory (RAM), magnetic disk storage medium, optical storage media, flash medium, electricity, light, Sound or the transmitting signal (for example, carrier wave, infrared signal, digital signal etc.) of other forms etc., which includes Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively Method described in certain parts of a embodiment or embodiment.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the embodiment of the present invention, rather than it is limited System;Although the present invention is described in detail referring to the foregoing embodiments, those skilled in the art should understand that: its It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is equal Replacement;And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution Spirit and scope.
It will be understood by those skilled in the art that the embodiment of the embodiment of the present invention can provide as method, apparatus (equipment) or Computer program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine soft The form of the embodiment of part and hardware aspect.Moreover, it wherein includes to calculate that the embodiment of the present invention, which can be used in one or more, Computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, the optical memory of machine usable program code Deng) on the form of computer program product implemented.
The embodiment of the present invention referring to according to the method for the embodiment of the present invention, device (equipment) and computer program product Flowchart and/or the block diagram describes.It should be understood that can be realized by computer program instructions every in flowchart and/or the block diagram The combination of process and/or box in one process and/or box and flowchart and/or the block diagram.It can provide these computers Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.

Claims (15)

1. a kind of safety protecting method of sensitive information characterized by comprising
The ambient image of capture is analyzed, determines the risk factor using local environment when the sensitive information;
According to the risk factor, safety protection structure of the control configuration in the equipment for receiving sensitive information is moved, with Input for the sensitive information provides security protection.
2. the method according to claim 1, wherein the sensitive information include user name, it is password, card number, short Believe at least one of identifying code.
3. the method according to claim 1, wherein the risk factor includes that illegal user, illegal image are stolen Clap at least one of unit.
4. determining the method according to claim 1, wherein the ambient image to capture is analyzed and using institute The risk factor of local environment includes: when stating sensitive information
The ambient image of capture is compared with iconic model, determine local environment when using the sensitive information it is dangerous because Element.
5. the method according to claim 1, wherein the ambient image to capture is compared with iconic model, It determines and includes: using the risk factor of local environment when the sensitive information
The ambient image of capture is compared with iconic model, determines the object in ambient image;
According to the positional relationship in ambient image between object, determine using when the sensitive information local environment it is dangerous because Element.
6. according to the method described in claim 5, it is characterized in that, the ambient image to capture is compared with iconic model, It determines and includes: using the risk factor of local environment when the sensitive information
According to object each in ambient image and the positional relationship between the unit that sensitive information inputs is received, is determined in ambient image Positional relationship between object.
7. determining the method according to claim 1, wherein the ambient image to capture is analyzed and using institute The risk factor of local environment includes: when stating sensitive information
According to the difference in the ambient image of capture between neighboring static picture, determine using local environment when the sensitive information Risk factor.
8. the method according to the description of claim 7 is characterized in that according in the ambient image of capture between neighboring static picture Difference, the risk factor of local environment includes: when determining using the sensitive information
Cutting is carried out to the ambient image of capture and obtains multiframe static images;
According to the pixel value difference between adjacent two width picture, the object in ambient image is determined;
According to the positional relationship in ambient image between object, determine using when the sensitive information local environment it is dangerous because Element.
9. method according to claim 1-8, which is characterized in that further include: it is carried out on cash dispenser in user When withdrawal, start the camera capturing ambient image being arranged on cash dispenser.
10. according to the method described in claim 9, it is characterized in that, peace of the control configuration in the equipment for receiving sensitive information Full protection structure carry out movement include: control configuration receive sensitive information equipment on driving unit drive actions unit into Row movement, the full protection structure includes at least one described driving unit and at least one described motor unit, an institute It states driving unit and controls a motor unit.
11. according to the method described in claim 10, it is characterized by further comprising: determining the risk factor and conjunction of local environment The direction relations of method user;
Accordingly, the safety protection structure that control configures in the equipment for receiving sensitive information carries out movement and includes:
According to the direction light, one motor unit of selection is carried out from multiple motor units and is started, for the sensitivity The input of information is provided along the security protection on the direction.
12. according to the method for claim 11, which is characterized in that the motor unit is baffle, accordingly, control configuration It includes: control configuration in the equipment for receiving sensitive information that safety protection structure in the equipment for receiving sensitive information, which carries out movement, On baffle gone up and down.
13. a kind of safety device of sensitive information characterized by comprising
First unit determines the danger using local environment when the sensitive information for analyzing the ambient image of capture Dangerous factor;
Second unit, for according to the risk factor determined, peace of the control configuration in the equipment for receiving sensitive information Full protection structure is moved, and provides security protection with the input for the sensitive information.
14. protective device according to claim 13, which is characterized in that the first unit is image analyzing unit.
15. protective device according to claim 13, which is characterized in that the second unit is controller.
CN201711432083.1A 2017-12-26 2017-12-26 The safety protecting method and device of sensitive information Pending CN109961586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711432083.1A CN109961586A (en) 2017-12-26 2017-12-26 The safety protecting method and device of sensitive information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711432083.1A CN109961586A (en) 2017-12-26 2017-12-26 The safety protecting method and device of sensitive information

Publications (1)

Publication Number Publication Date
CN109961586A true CN109961586A (en) 2019-07-02

Family

ID=67022020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711432083.1A Pending CN109961586A (en) 2017-12-26 2017-12-26 The safety protecting method and device of sensitive information

Country Status (1)

Country Link
CN (1) CN109961586A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
CN111145476A (en) * 2019-12-26 2020-05-12 星络智能科技有限公司 Anti-falling control method for children
CN111191231A (en) * 2019-12-30 2020-05-22 绵阳师范学院 Safety protection method and system for sensitive information

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11123109A (en) * 1997-10-22 1999-05-11 Shukoh Co Ltd Desk with shield plate
JP2001353028A (en) * 2000-06-13 2001-12-25 Itoki Crebio Corp Wagon desk having vertically movable panel
CN200976317Y (en) * 2006-09-28 2007-11-14 董俊 Bank cipher anti-theft input box
US7377144B1 (en) * 2007-01-15 2008-05-27 I-Tek Metal Mfg. Co., Ltd. Protective device for electronic lock
CN101211484A (en) * 2006-12-25 2008-07-02 成都三泰电子实业股份有限公司 Method and device for preventing peep of cipher when withdrawing at ATM
CN101303785A (en) * 2008-06-26 2008-11-12 北京中星微电子有限公司 System and method for monitoring safety of ATM
CN101344980A (en) * 2008-08-21 2009-01-14 中国工商银行股份有限公司 Safety detection system and method for ATM equipment
CN101556717A (en) * 2009-05-19 2009-10-14 上海海隆软件股份有限公司 ATM intelligent security system and monitoring method
CN101719216A (en) * 2009-12-21 2010-06-02 西安电子科技大学 Movement human abnormal behavior identification method based on template matching
CN201716789U (en) * 2010-03-03 2011-01-19 杭州创导安全技术有限公司 ATM foreign matter invasion detection alarm device
CN102034318A (en) * 2010-11-01 2011-04-27 秦小枢 Safety monitoring device matched with ATM (automatic teller machine) machine
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN104349125A (en) * 2013-08-05 2015-02-11 浙江大华技术股份有限公司 Area monitoring method and device
WO2015147664A1 (en) * 2014-03-28 2015-10-01 BERNACKI, Krzysztof The system and method of active antiskimming protection especially for devices like teller machines, cash deposit machines, slot machines, parcel lockers, vending machines.
CN105468961A (en) * 2015-11-18 2016-04-06 广东欧珀移动通信有限公司 Password setting method and apparatus for mobile terminal
CN105761261A (en) * 2016-02-17 2016-07-13 南京工程学院 Method for detecting artificial malicious damage to camera
CN205428062U (en) * 2016-03-22 2016-08-03 许昌学院 ATM cash dispenser code keypad floodgate machine
CN206209985U (en) * 2016-11-30 2017-05-31 广州智萃电子科技有限公司 A kind of input information theft-preventing structure for input keyboard
CN206213579U (en) * 2016-08-22 2017-06-06 梁家文 A kind of school desk
CN206505487U (en) * 2017-03-02 2017-09-19 山东科技大学 The automatic blocker in ATM Password Input area
CN107369273A (en) * 2017-07-21 2017-11-21 京东方科技集团股份有限公司 Self-help drawing money machine glance prevention method, apparatus and system
CN107393215A (en) * 2017-07-20 2017-11-24 深圳怡化电脑股份有限公司 A kind of control method, device and the financial terminal equipment of movable watching shield cover

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11123109A (en) * 1997-10-22 1999-05-11 Shukoh Co Ltd Desk with shield plate
JP2001353028A (en) * 2000-06-13 2001-12-25 Itoki Crebio Corp Wagon desk having vertically movable panel
CN200976317Y (en) * 2006-09-28 2007-11-14 董俊 Bank cipher anti-theft input box
CN101211484A (en) * 2006-12-25 2008-07-02 成都三泰电子实业股份有限公司 Method and device for preventing peep of cipher when withdrawing at ATM
US7377144B1 (en) * 2007-01-15 2008-05-27 I-Tek Metal Mfg. Co., Ltd. Protective device for electronic lock
CN101303785A (en) * 2008-06-26 2008-11-12 北京中星微电子有限公司 System and method for monitoring safety of ATM
CN101344980A (en) * 2008-08-21 2009-01-14 中国工商银行股份有限公司 Safety detection system and method for ATM equipment
CN101556717A (en) * 2009-05-19 2009-10-14 上海海隆软件股份有限公司 ATM intelligent security system and monitoring method
CN101719216A (en) * 2009-12-21 2010-06-02 西安电子科技大学 Movement human abnormal behavior identification method based on template matching
CN201716789U (en) * 2010-03-03 2011-01-19 杭州创导安全技术有限公司 ATM foreign matter invasion detection alarm device
CN102034318A (en) * 2010-11-01 2011-04-27 秦小枢 Safety monitoring device matched with ATM (automatic teller machine) machine
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN104349125A (en) * 2013-08-05 2015-02-11 浙江大华技术股份有限公司 Area monitoring method and device
WO2015147664A1 (en) * 2014-03-28 2015-10-01 BERNACKI, Krzysztof The system and method of active antiskimming protection especially for devices like teller machines, cash deposit machines, slot machines, parcel lockers, vending machines.
CN105468961A (en) * 2015-11-18 2016-04-06 广东欧珀移动通信有限公司 Password setting method and apparatus for mobile terminal
CN105761261A (en) * 2016-02-17 2016-07-13 南京工程学院 Method for detecting artificial malicious damage to camera
CN205428062U (en) * 2016-03-22 2016-08-03 许昌学院 ATM cash dispenser code keypad floodgate machine
CN206213579U (en) * 2016-08-22 2017-06-06 梁家文 A kind of school desk
CN206209985U (en) * 2016-11-30 2017-05-31 广州智萃电子科技有限公司 A kind of input information theft-preventing structure for input keyboard
CN206505487U (en) * 2017-03-02 2017-09-19 山东科技大学 The automatic blocker in ATM Password Input area
CN107393215A (en) * 2017-07-20 2017-11-24 深圳怡化电脑股份有限公司 A kind of control method, device and the financial terminal equipment of movable watching shield cover
CN107369273A (en) * 2017-07-21 2017-11-21 京东方科技集团股份有限公司 Self-help drawing money machine glance prevention method, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
方辽洋: "《人身安全手册》", 30 April 2015, pages: 43 - 45 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
CN110443016B (en) * 2019-07-04 2023-10-10 深圳壹账通智能科技有限公司 Information leakage prevention method, electronic device and storage medium
CN111145476A (en) * 2019-12-26 2020-05-12 星络智能科技有限公司 Anti-falling control method for children
CN111191231A (en) * 2019-12-30 2020-05-22 绵阳师范学院 Safety protection method and system for sensitive information

Similar Documents

Publication Publication Date Title
CN109961586A (en) The safety protecting method and device of sensitive information
EP3373202A1 (en) Verification method and system
CN110121710A (en) System, method and software for user authentication
US20140013422A1 (en) Continuous Multi-factor Authentication
CN109074441A (en) Based on the certification watched attentively
CN107256555A (en) A kind of image processing method, device and storage medium
JP2020520511A (en) Access control method and apparatus, system, electronic device, program and medium
CN102509053A (en) Authentication and authorization method, processor, equipment and mobile terminal
CN107622246B (en) Face recognition method and related product
CN104036586B (en) Eye-controlled display device and display method thereof and ATM (Automatic Teller Machine) machine system
CN110163053B (en) Method and device for generating negative sample for face recognition and computer equipment
CN104361302A (en) Method for protecting private information based on communication equipment and communication equipment
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN101625716A (en) Method for preventing peep on computer and computer with method
CN108235105A (en) A kind of barrage rendering method, recording medium, electronic equipment, information processing system
CN110135262A (en) The anti-peeping processing method of sensitive data, device, equipment and storage medium
EP4156081A1 (en) Image processing method and apparatus
CN108469893A (en) Control method, device, equipment and the computer readable storage medium of display screen
CN109446822A (en) Right management method and system
CN109696955B (en) Adjusting method of intelligent toilet mirror and intelligent toilet mirror
CN110084235A (en) Information collecting method, device and acquisition equipment based on point of interest
CN106778194A (en) Verification method, device and electronic equipment
CN111353475A (en) Self-service transaction equipment abnormality identification method and self-service transaction equipment
CN106709310A (en) Virtual reality system interface login method and device
CN107093395A (en) A kind of transparent display and its method for displaying image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702

RJ01 Rejection of invention patent application after publication