Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for preventing illegal access monitoring

A technology for illegal access and wireless monitoring, applied in security devices, CCTV systems, electrical components, etc., to improve user experience and security

Active Publication Date: 2021-12-28
中科大路(青岛)科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the deficiencies in the prior art, and propose a method and device for preventing illegal access monitoring, through the pre-set legal user list, randomly select the approval equipment for access verification, which can effectively avoid illegal After the user obtains the only legal user information, he connects to the wireless monitoring device, and when the only legal user fails to verify in time, the wireless monitoring device cannot be accessed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for preventing illegal access monitoring
  • A method and device for preventing illegal access monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The present invention provides a method for preventing illegal access monitoring. The method is used to protect the safety of wireless monitoring equipment. electronic device identity information, and generate a first verification selection code, select a first approval device from the legal user list according to the first verification selection code, and send access request information to the first approval device, and the access The request information includes the acquired identity information of the first electronic device, and the holder of the first approval device judges whether to allow it to access the wireless monitoring device according to the identity information of the first electronic device. Connecting the first electronic device to the wireless monitoring device upon approval of the first approval signal.

[0026] Specifically, a legal user list is constructed, and the information of devices A, B, C, and D is correspondingly stored in the positions of l...

Embodiment 2

[0039] Another aspect of the present invention provides a device for preventing illegal access monitoring. The device is used to protect the safety of wireless monitoring equipment, and is characterized in that: a memory is used to store the constructed legal user list;

[0040] A receiving module, configured to receive the access request of the first electronic device, and the permission of the first electronic device to access the wireless monitoring device judged by the first approval device holder according to the identification information of the first electronic device Signal;

[0041] an acquiring module, configured to acquire the information of the first electronic device;

[0042] A verification selection code generating module, configured to generate a first verification selection code;

[0043] A selection module, configured to select a first approval device from a list of legitimate users according to the first verification selection code;

[0044] A sending modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for preventing illegal access monitoring, which are used to protect the safety of wireless monitoring equipment, construct a legal user list, and obtain the identity information of the first electronic equipment when receiving an access request from the first electronic equipment , and generate a first verification selection code, select a first approval device from the legal user list according to the first verification selection code, and send access request information to the first approval device, and the access request information includes the acquired The identity information of the first electronic device determines whether to allow the first electronic device to access the wireless monitoring device according to the result fed back by the first approval device. By randomly selecting an approval device from a plurality of legal devices to verify the electronic device requesting access, the intrusion of illegal users can be effectively prevented and effective access of legal users can be ensured.

Description

technical field [0001] The invention relates to the security field of monitoring equipment, in particular to a method and device for preventing illegal access monitoring. Background technique [0002] Remote intelligent wireless monitoring equipment is currently not only used in many public places such as military, customs, public security, fire protection, forestry, dams, airports, railways, ports, urban transportation, etc., with the advancement of technology and the reduction of costs, it will gradually spread to home security Prevention and entertainment applications have also experienced tremendous progress from analog video surveillance to digital video surveillance, especially in the past two or three years, with the rapid increase in network bandwidth, computer processing power and memory capacity, and various practical video information processing technologies The emergence of video surveillance has entered the era of fully digital network. [0003] With the develo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04N7/18H04W12/08H04W12/71
Inventor 王玉坤刘美连艾葳张锐贾娜
Owner 中科大路(青岛)科技有限公司