Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack protection equipment and smart devices

A technology of protective equipment and smart equipment, applied in transmission systems, electrical components, etc., can solve problems such as illegal peeping of smart equipment information, no protection mechanism, and endangering user property safety

Active Publication Date: 2020-04-07
BEIJING KNOWNSEC INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing smart devices usually have no protection mechanism, which makes it very easy to forge accounts. With this forged account, malicious visitors can bind all smart devices under the same brand, and illegally peek at the information of these smart devices horizontally
In this way, the personal information of all users will be exposed, which will endanger the safety of users' property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack protection equipment and smart devices
  • Attack protection equipment and smart devices
  • Attack protection equipment and smart devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0027] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides attack protection equipment and intelligent equipment. The attack protection equipment is applied to the intelligent equipment, and the attack protection equipment is connected between the intelligent equipment and a network port in series. The attack protection equipment comprises a first internet access, a second internet access and a processing device, the first internet access and the second internet access are electrically connected with the processing device separately, the first internet access is electrically connected with the network port, and the second internet access is electrically connected with the intelligent equipment. The processing device is used for obtaining data entering from the first internet access, equipment information of source equipment sending the data is obtained from the data, whether or not the equipment information of the source equipment is contained in preset safety equipment is sought, if not, the data is determined as malicious data, and the malicious data is intercepted. In this way, the phenomenon that the intelligent equipment is attacked maliciously can be prevented on the condition that the hardware structure of the intelligent equipment is not modified.

Description

technical field [0001] The invention relates to the technical field of intelligent device protection, in particular to an attack protection device and an intelligent device. Background technique [0002] A smart device is a new type of hardware device that embeds a wireless receiver into the hardware and uses a WiFi channel. WiFi is a wireless network composed of AP (Access Point) and wireless network card. AP is generally called a network bridge or access point, and is regarded as a bridge between a traditional wired LAN and a wireless LAN. Therefore, any personal computer equipped with a wireless network card can share a wired LAN or an access point through the AP. WAN resources. Its working principle is equivalent to a built-in wireless transmitter HUB or router, and the wireless network card is responsible for receiving the signal transmitted by the AP client (Client) device. With an AP, like a switch or router in a typical wired network, wireless workstations can qui...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 付鹏飞胡铭德何丰宇孙浩然田春燕
Owner BEIJING KNOWNSEC INFORMATION TECH