Intelligent information security anti-intrusion system

An information security and anti-intrusion technology, which is applied to the protection of individual input/output registers, instruments, internal/peripheral computer components, etc. the effect of stealing

Inactive Publication Date: 2019-10-15
吕光华
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In some spy war TV movies, agents are often seen sneaking into various secret bases to steal intelligence information. Therefore, in a broad sense, the value of information far exceeds the value of actual items. In the 21st century, people pay more attention to information security. , Traditional file encryption and other technologies have been difficult to meet people's needs for information security, and cannot guarantee real information security in front of experts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent information security anti-intrusion system
  • Intelligent information security anti-intrusion system
  • Intelligent information security anti-intrusion system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Example 1: See Figure 1-3 , an intelligent information security anti-intrusion system, comprising:

[0030] Front-end camera: arranged at the front-end smart lock position, used to collect front-end image information;

[0031] UPS power supply: used to provide uninterrupted power supply to front-end equipment;

[0032] Smart lock: used to detect human body information, make a response to open the electronic lock or issue an intrusion command;

[0033] Mechanical detection module: used to detect the security state of the electronic lock, and send an intrusion command when the electronic lock is forcibly destroyed;

[0034] Front-end wireless transmission module: respectively connected to the front-end camera, UPS power supply, smart lock and mechanical detection module, used to send the data transmitted by the smart lock, mechanical detection module and front-end camera to the back-end wireless transmission module and mobile devices;

[0035] Mobile devices: users' m...

Embodiment 2

[0042] Embodiment 2, on the basis of embodiment 1, intelligent lock comprises CPU, fingerprint reader, face recognizer, password input module, memory, electronic lock switch and voice module, CPU connects fingerprint recognizer, face recognizer, password respectively Input module, memory, electronic lock switch and voice module. The electronic lock switch can only be turned on when the fingerprint reader, the face recognizer, and the password input module meet the information matching at the same time, and the voice module is used to voice prompt the user for the steps of information verification.

[0043] Embodiment 2. On the basis of Embodiment 1, the mechanical detection module includes a vibration sensor, a filter module and a signal amplifier. The vibration sensor collects the mechanical state signal of the smart lock and transmits it to the filter module. The filter module is also connected to the signal amplifier. When the electronic lock is broken by violence, the mech...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent information security anti-intrusion system comprising a front-end camera which is arranged at the position of a front-end intelligent lock and used for collecting front-end image information; a UPS power supply which is used for providing uninterrupted power supply for the front-end equipment; an intelligent lock which is used for detecting human body information and making a response of unlocking the electronic lock or sending an intrusion instruction; a mechanical detection module which is used for detecting the safety state of the electronic lock and sending an intrusion instruction when the electronic lock is forcibly damaged. According to the intelligent information security anti-intrusion system, an intelligent lock security system in the priorart is upgraded; the information self-destruction device can remotely format information and prevent the information from being stolen in case of invasion, and can remotely destroy the storage equipment externally wrapped with combustible materials through the added information self-destruction device in case of emergency and no formatting time, so that the information is further prevented from being stolen, and the information security of a user is effectively protected.

Description

technical field [0001] The invention relates to the field of security technology, in particular to an intelligent information security anti-intrusion system. Background technique [0002] The subject of information security can be divided into two levels: narrow security and general security. The narrow security is based on the field of computer security based on cryptography. In the early days of Chinese information security, it was usually based on this, supplemented by computer technology and communication network technology. Information security in a broad sense is a comprehensive subject. From traditional computer security to information security, it is not only a name change but also an extension of security development. Security is no longer a purely technical issue, but It is the product of combining management, technology, law and other issues. [0003] In some spy war TV movies, agents are often seen sneaking into various secret bases to steal intelligence informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/71G06F21/88G07C9/00
CPCG06F21/71G06F21/88G07C9/00563G07C9/00571G07C9/00896
Inventor 吕光华
Owner 吕光华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products