Multi-strategy Internet of Things safety protection method

A technology of security protection and strategic objects, applied in security devices, machine-to-machine/machine-type communication services, electrical components, etc., to overcome easy illegal use, improve use safety, and avoid information leakage.

Pending Publication Date: 2021-08-27
EVOC INTELLIGENT TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the management of drone flight areas, preventing drones from being manipulated by criminals into sensitive areas such as military and politics is the current key research direction. At present, there are three main technologies for drone supervision: drone electronic fence, drone Cloud, detection and strike, but only use the simple map matching method based on the UAV itself to control the UAV to avoid entering the above-mentioned areas. Criminals can easily enter sensitive areas by evading existing prevention methods through illegal means

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-strategy Internet of Things safety protection method
  • Multi-strategy Internet of Things safety protection method
  • Multi-strategy Internet of Things safety protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0029] Embodiments of the present invention provide a multi-strategy IoT security protection method, such as figure 1 shown, including:

[0030] like figure 2 As shown, the no-fly area is divided into a transition area, a warning area and a sensitive area, and communication nodes are respectively set in the trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-strategy Internet of Things safety protection method, which comprises the following steps: dividing a no-fly zone into a transition zone, a warning zone and a sensitive zone, setting communication nodes in the transition zone, the warning zone and the sensitive zone respectively, and setting an attack device in the sensitive zone; communication nodes of a transition region, a warning region and a sensitive region are controlled to detect unmanned aerial vehicles in the transition region, the warning region and the sensitive region, and corresponding no-fly region recognition information is sent to the unmanned aerial vehicles; and when the unmanned aerial vehicle does not comply with the recognition information of the no-fly zone and enters the sensitive zone for 10 meters or more, starting the attack device to attack the unmanned aerial vehicle. According to the invention, level-to-level management is carried out on the no-fly zone, the protection level can be improved level by level, when the unmanned aerial vehicle does not comply with the no-fly zone identifier, an attack can be initiated in time, and the protection of the no-fly zone can be ensured.

Description

technical field [0001] The invention relates to the technical field of Internet of Things protection, in particular to a multi-strategy Internet of Things security protection method. Background technique [0002] The intelligence of UAVs has made the UAV market popularized and promoted the prosperity of the entire UAV industry. However, with the increase of users, there have been frequent occurrences of drone flight safety incidents such as crashes and black flying. Since UAVs cannot transmit real-time flight data to regulatory authorities, civil aviation authorities cannot monitor their flight conditions, and thus have no way of knowing the safe flight status of UAVs. [0003] How to ensure the safe and standardized use of drones has become the focus of civil aviation technology development. In the management of drone flight areas, preventing drones from being manipulated by criminals and entering sensitive areas such as military and politics is the current key research d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/02H04W4/021H04W4/40H04W4/70H04W12/122H04W12/63H04W12/67
CPCH04W4/021H04W4/025H04W12/02H04W4/40H04W4/70
Inventor 庞观士马先明沈航徐成泽胡钢
Owner EVOC INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products