Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless secret-stealing detection method

A detection method and wireless technology, applied in the field of communication, can solve problems such as unscientific detection technology, difficult visual inspection, stealing secrets, etc., and achieve the effects of avoiding leakage of secret information, ensuring information security, and high detection success rate

Inactive Publication Date: 2017-10-24
北京中密安信息安全技术有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the advancement of science and technology, the means of wireless stealing are also constantly developing. The size of the wireless eavesdropping camera is becoming smaller and smaller, and it is highly concealed. It can be hidden in any object, and it is difficult to check through simple visual inspection.
[0003] For the ever-growing wireless stealing equipment, although some detection equipment and monitoring methods have been proposed, these existing detection technologies are not scientific and there are many detection loopholes
After using unscientific methods for detection, there may still be potential safety hazards in the detected places, which will lead to the occurrence of secret theft incidents
[0004] At present, no effective solution has been proposed for how to effectively detect wireless stealing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless secret-stealing detection method
  • Wireless secret-stealing detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0035] According to an embodiment of the present invention, a wireless stealth detection method is provided.

[0036] Such as figure 1 Shown, according to the wireless secret theft detection method of the present invention comprises:

[0037] Step S101, collecting signals in the venue;

[0038] Step S103, when the signal is collected, perform spectrum analysis on the collected signal to determine the intensity corresponding to each frequency point of the signal;

[0039] Step S105, according to the spectrum analysis result, determine whether the collected signal is a suspicious signal;

[0040] Step S107, if the determination result is yes, the collected signal is demo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless secret-stealing detection method. The method comprises: signal acquisition is carried out in a field; when a signal is collected, a spectrum analysis is carried out on the collected signal and corresponding intensities of the signal at all frequency points are determined; according to a spectrum analysis result, whether the collected signal is a suspected signal is determined; if so, the collected signal is demodulated and whether a secret-stealing device exits in the field is determined based on the demodulation result. According to the invention, because collection, analysis and demodulation are carried out on the wireless signal sent out by the secret-stealing device, the secret-stealing device can be detected accurately and effectively even though the wireless secret-stealing device is installed in a hidden manner, so that the detection success rate is high. Therefore, information security is guaranteed and secret information leakage is avoided.

Description

technical field [0001] The present invention relates to a communication field, and in particular, relates to a wireless stealth detection method. Background technique [0002] With the advancement of science and technology, wireless stealing methods are also constantly developing. The size of wireless eavesdropping and candid devices is becoming smaller and smaller, and they are highly concealed. They can be hidden in any object, and it is difficult to check through simple visual inspection. [0003] For the ever-growing wireless stealing equipment, although some detection equipment and monitoring methods have been proposed, these existing detection technologies are not scientific and there are many detection loopholes. After using unscientific methods for detection, there may still be potential safety hazards in the detected places, which will lead to the occurrence of secret theft incidents. [0004] At present, no effective solution has been proposed for how to effective...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B17/318H04B10/079H04L29/06
CPCH04B17/318H04B10/0795H04L63/30
Inventor 康清军
Owner 北京中密安信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products