RFID-based confidential carrier intelligent monitoring system and monitoring method of the same

A secret-related carrier and secret-related technology, applied in the field of information security, can solve the problem of failure to grasp the core and essence of "civil defense" thinking, methods and strategies of "civil defense" that have not kept pace with the times, and physical carriers of secret-related information that cannot be carried out individually. monitoring and other issues to achieve the effect of enhancing reliability and safety and improving work efficiency

Active Publication Date: 2012-06-27
武汉华工安鼎信息技术有限责任公司
View PDF7 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, the management of classified information systems still adopts the traditional management concept and method of "three-point technology and seven-point management" combining "technical defense" and "civil defense". However, secret-related networks are generally physically separated from public networks , and the various information security products and protection strategies of "Technical Defense" effectively constrain the digital classified information within a specific controllable range. Therefore, most of the classified incidents occur due to the loopholes of "People's Defense". As a result, most of the methods are that internal employees intentionally or unintentionally take the secret-related carrier out of the unit or a specific security range
[0006] Regarding the above-mentioned "human defense" loopholes, the main reason is that the "human defense" methods and strategies in the classified field have not kept pace with the times, and the protection focus of classified information security is too biased towards "technical defense", while for "human defense" The methods adopted are all too traditional and conservative, and have not grasped the core and essence of the "civil defense" thinking, resulting in the inability of individual monitoring of the most critical physical carrier of classified information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID-based confidential carrier intelligent monitoring system and monitoring method of the same
  • RFID-based confidential carrier intelligent monitoring system and monitoring method of the same
  • RFID-based confidential carrier intelligent monitoring system and monitoring method of the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] like figure 1 As shown, as a carrier of secret-related carrier information and applications, the secret network physically covers secret-related offices, secret-related archives, secret-related carrier warehouses, secret-related buildings, secret-related unit parks, and secret-related carrier transportation and external areas. The area along the way logically carries the intelligent monitoring system of secret-related carriers, including the monitoring system of secret-related offices, the monitoring system of secret-related archives, the monitoring system of secret-related buildings, the monitoring system of parks of secret-related units, the monitoring system of secret-related carrier warehouses and The application system provided around the security monitoring requirements of secret-related carriers, such as the transportation of secret-related carriers and the take-out monitoring system, realizes the procurement, distribution, transportation, warehousing, access, tak...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a RFID(Radio Frequency Identification)-based confidential carrier intelligent monitoring system and a monitoring method of the same. The system comprises interconnected upper computer system and lower computer system, wherein the lower computer system is arranged in a confidential region (800); the upper computer system comprises an information center server (100); the lower computer system comprises a RFID identification system (200), an access control system (300), a warning system (400) and a photographing sensing device, which respectively keep network connection with the information center server (100); and the RFID identification system (200) is further contacted with a confidential carrier (700). The invention further provides a monitoring method of the system. The system and the method can establish a uniform confidential carrier centralized monitoring network for the confidential field, and realize automatic intelligent management on the confidential carrier in the whole life cycle.

Description

technical field [0001] The invention relates to the field of information security, in particular to an RFID-based intelligent monitoring system for secret-related carriers and an information management method thereof. Background technique [0002] With the rapid development of my country's economy, information security has been promoted to a national strategic position in the "Twelfth Five-Year Plan". The "Twelfth Five-Year Plan" will be a period of great development of information technology. The development and application of technical architectures such as the Internet of Things, cloud computing, mobile Internet, and triple play will be further improved. Facing such development requirements, the information security industry will also do With corresponding adjustments, technical fields such as cloud security, Internet of Things security, mobile Internet security, and Web security will achieve substantial development. [0003] The Internet of Things is a network of "every...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06K17/00G07C9/00G08B21/00
Inventor 余鹏飞
Owner 武汉华工安鼎信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products