Disclosure of Invention
The invention aims to solve the technical problem that information in a projector in the prior art is easy to leak, and provides a novel projection system with a safety enhancement function.
In order to achieve the purpose, the technical scheme of the invention is as follows: a projection system with a safety enhancement function comprises a projector body, wherein any one, any two or all of a picture screenshot deleting program, an authority limiting program and an encryption protection program are stored in the projector body.
As a preferred scheme of the projection system with the safety enhancement function, the screen capture deleting program comprises the steps of detecting whether the projector is normally shut down; if yes, removing the picture screenshot information remained in the computer in the shutdown process; if not, clearing the screenshot information remained in the computer when the computer is powered on to the standby screen next time.
As a preferred scheme of the projection system with the safety enhancement function, the authority limit program comprises the steps that the identity of a user needs to be identified before starting up; if the current time passes, starting up the computer; if the event does not pass through the input account, starting up the computer is not executed, and if the number of times of failure passes continuously reaches at most N times, wherein N is an integer greater than 1, the input account of the user is further locked and an event is generated; after the computer is started, the whole-course use condition of the user is automatically recorded for a manager to check and track.
As a preferred scheme of the projection system with the safety enhancement function, the encryption protection program comprises the functions of setting an encryption chip to prevent the unauthorized access of the firmware program, and the system cannot run after unauthorized removal; taking data protection measures; the ID number of the machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the product software is prevented from being stolen.
As a preferable scheme of the projection system with the safety enhancement function, the projector body cancels the wireless transmission function.
Compared with the prior art, the invention has the beneficial effects that: the security function is enhanced.
In addition to the technical problems solved by the present invention, the technical features constituting the technical solutions, and the advantageous effects brought by the technical features of the technical solutions described above, other technical problems solved by the present invention, other technical features included in the technical solutions, and advantageous effects brought by the technical features will be described in further detail with reference to the accompanying drawings.
Detailed Description
The invention will be described in further detail below with reference to specific embodiments and drawings. Here, the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Referring to fig. 1-2, a novel projection system with security enhancement is shown.
The projection system is composed of a processor DLP chip, an identity recognition chip, an encryption chip, a storage chip and other components.
And an anti-theft key of the processor DLP chip is written into the storage chip. The control code of each chip can only be operated by the corresponding chip, so that the identification and matching of the physical chip have uniqueness, and simultaneously, the encrypted library file corresponding to the chip is provided according to different platforms.
The encryption chip is used for receiving an anti-theft key from the processor DLP chip. Verifying the anti-theft key: if the verification is passed, the system is powered on, and the machine is started normally. If the verification is not passed, the machine enters a standby state.
An encryption library is built in the processor DLP chip. And the processor DLP chip sends data serving as parameters to the encryption library for encryption operation. And then transmitting the encrypted data to the encryption chip through IIC to realize data interaction between the processor DLP chip and the encryption chip. The encryption chip calls an internal algorithm function to decrypt the data after receiving the data, decrypts the data into system data, combines the system data with a unique algorithm solidified in the chip to perform encryption operation, and returns the encrypted system data to an internal system through the IIC.
And finally, correspondingly decrypting the data after the encryption library obtains the data to obtain decrypted system data, and verifying the decrypted system data with the system data in the encryption library. In the application stage of the system, a program segment in the encryption chip is operated by calling a function, the encryption chip sends an instruction to control the processor through the GPIO port after verification, a corresponding value is returned after verification is different, the result is used as input data for further operation of the user program, and the encryption chip becomes a part of software in the process, so that the possibility of program cracking is avoided.
The COS encryption system has the characteristics of safety, stability and reliability. The COS system is introduced into an embedded anti-copy board and data encryption and decryption algorithm transplanting scheme. Part of programs and parameters in the processor are transplanted to the encryption chip, and the safety protection of the transplanted programs and parameters is realized by means of the safety characteristic of a hardware platform of the encryption chip and the efficient safety management of a software COS system. No matter how the pirate cracks the product, the program and data in the encryption chip can not be obtained, and the safety of the whole product is replaced by the safety of partial codes and data.
1. The security projector does not have a picture capture function:
and the residual information in the projection is automatically cleared after the projection is normally shut down through software.
When the system is powered on again and returns to the standby state, the system automatically clears the residual information in the projection.
The machine main control board is not internally or externally connected with a large-capacity storage chip, and meanwhile, the main control board is not provided with an external port of a hard disk or other storage media.
2. The encryption chip function designed by the product prevents the unauthorized access of the firmware program, and the system can not run after the unauthorized removal. Data protection measures are taken, and even if the program is read in an unauthorized mode, the read program cannot be viewed. The ID number of each machine processor corresponds to the encryption program, and only the product matched with the ID number of the processor can be started, so that the software of the product is prevented from being stolen.
a, an identity recognition system; firstly, the identity of an operator is confirmed, so that whether the user has access and use authority to certain resources is determined, further, the access strategy of the system can be reliably and effectively executed, an attacker is prevented from impersonating a legal user to obtain the access authority of the resources, the safety of the system and data is ensured, and the legal benefit of the authorized visitor is ensured.
b, limitation of communication interface: the system does not contain WIFI, infrared, Bluetooth, USB and Ethernet interfaces.
c store interface restrictions: and does not contain storage devices such as hard disks, memory cards and the like and storage interfaces.
d, data protection measures: and encrypting the data by adopting a 32-bit high-security-level smart card encryption chip. The device has a unique serial number and management codes, and is designed to prevent time sequence attack and tamper; the chip contains various security detection sensors: the high-voltage and low-voltage sensor, the frequency sensor, the filter, the optical sensor, the pulse sensor and the temperature sensor have a sensor service life testing function, and once the chip detects illegal detection, the internal self-destruction function is started.
3. And (3) limiting the use permission of the product:
a) the password manager is additionally arranged, the user needs to be authenticated when the computer is started, the user information can be automatically recorded by the computer after the computer is started, and safety management personnel can check and track the use condition at any time.
b) When the user fails to authenticate for at most 5 consecutive times, the system should lock the account and generate an audit event with the relevant information.
c) The product provides a multi-factor authentication mechanism that allows an authorized administrator to define specific authentication measures, e.g., fingerprints, IC cards, etc
4. No wireless transmission interface is provided:
a) the security projector is not provided with a network interface or a wireless transmitting function, so that the machine cannot be connected with any wireless equipment.
Other protection
A protection switch: the hidden protection switch is added in the whole machine, and the machine cannot run after the whole machine is disassembled without permission.
Specially manufacturing a fixed connecting piece: in order to avoid unauthorized and private disassembly of the machine and enable a person with no particular interest to do hands and feet in the machine, the shell of the whole machine adopts a composite structural member which is independently developed, and the machine can be further operated only by a special tool of the company.
Maintenance and repair: the maintenance of the whole machine needs to be returned to the factory, if key devices are met: the main control chip, the flash and the like are directly destroyed.
The foregoing merely represents embodiments of the invention, which are described in some detail and detail, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.