A method and device for preventing illegal access monitoring
A technology for illegal access and wireless monitoring, applied in security devices, CCTV systems, electrical components, etc., to improve user experience and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] The present invention provides a method for preventing illegal access monitoring. The method is used to protect the safety of wireless monitoring equipment. electronic device identity information, and generate a first verification selection code, select a first approval device from the legal user list according to the first verification selection code, and send access request information to the first approval device, and the access The request information includes the acquired identity information of the first electronic device, and the holder of the first approval device judges whether to allow it to access the wireless monitoring device according to the identity information of the first electronic device. Connecting the first electronic device to the wireless monitoring device upon approval of the first approval signal.
[0026] Specifically, a legal user list is constructed, and the information of devices A, B, C, and D is correspondingly stored in the positions of l...
Embodiment 2
[0039] Another aspect of the present invention provides a device for preventing illegal access monitoring. The device is used to protect the safety of wireless monitoring equipment, and is characterized in that: a memory is used to store the constructed legal user list;
[0040] A receiving module, configured to receive the access request of the first electronic device, and the permission of the first electronic device to access the wireless monitoring device judged by the first approval device holder according to the identification information of the first electronic device Signal;
[0041] an acquiring module, configured to acquire the information of the first electronic device;
[0042] A verification selection code generating module, configured to generate a first verification selection code;
[0043] A selection module, configured to select a first approval device from a list of legitimate users according to the first verification selection code;
[0044] A sending modu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

