Security information protection secret-related equipment processing system and method based on wsn base station control

A base station control and security information technology, applied in the field of security processing, can solve the problems of confidential equipment data leakage and leakage, and achieve the effect of high security and trustworthiness

Active Publication Date: 2015-09-02
重庆瑞坤科技发展股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A major disadvantage of this method of keeping secrets is that the secret-related system depends on the computer itself. If the computer is stolen (for example, by an internal employee), the thief may read the information of the secret-related equipment through the computer. In addition, if the password Leakage will also cause data leakage of classified equipment; another major disadvantage is that for portable laptops, mobile hard disks, USB flash drives, etc., if they are taken out on business trips, they may be used in public and unintentionally leaked. Ordinary encryption Even if the password cannot be cracked after being stolen, as long as the secret equipment is not damaged, it can be cracked by reading the source code byte by byte.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security information protection secret-related equipment processing system and method based on wsn base station control
  • Security information protection secret-related equipment processing system and method based on wsn base station control
  • Security information protection secret-related equipment processing system and method based on wsn base station control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following describes in further detail a secret-related equipment processing system and method with security information protection function based on WSN base station control in conjunction with the accompanying drawings and embodiments. . It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0056] Such as figure 1 As shown, a security information protection secret-related equipment processing system based on WSN base station control according to an embodiment of the present invention includes a WSN wireless sensor network composed of a plurality of WSN base stations 1 wirelessly interconnected, and at least one wireless sensor network as the WSN wireless sensor network. Secret-related equipment of sensor network nodes2.

[0057] The WSN base station includes a WSN...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network (WSN)-base-station-control-based processing system and a WSN-base-station-control-based processing method for security equipment with a security information protection function. The system comprises a WSN base station and the security equipment. The WSN base station comprises a checking module, wherein the checking module is used for reading information about a user and the operation right of the user from a user data storage database, checking an operating user and right thereof, generating a checking result and transmitting the checking result to the security equipment. The security equipment comprises an active WSN processing module, wherein the active WSN processing module is used for reading the information about the operating user and the operation right data of the operating user for checking when the security equipment is started, receiving the checking result returned from the WSN base station, and controlling the security equipment according to the checking result. The security equipment can be monitored and used in an authorization way, and has a self-destruction function and quite high security and reliability.

Description

Technical field [0001] The present invention relates to the technical field of security processing, in particular to a secret-related equipment processing system and method with a security information protection function based on WSN base station control. Background technique [0002] At present, the domestic supervision of secret-related equipment is nothing more than system management. It is impossible to prevent employees from bringing secret-related equipment (including but not limited to hard drives, mobile hard drives, U disks, laptops, etc.) out of the country, even if they are allowed to travel on business. Carrying also exists in the use of non-secret-related equipment or use in non-designated areas. Once lost or stolen by people with ulterior motives, the consequences are very dangerous. [0003] In order to ensure the confidentiality of secret-related equipment, the existing technology adopts the so-called encryption technology, relying on the mutual communication betwee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06
Inventor 王煜廖原
Owner 重庆瑞坤科技发展股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products