Intrusion monitoring method, intrusion monitoring device and equipment

A technology of terminal equipment and gateway equipment, applied in the computer field, can solve the problems of monitoring blind spots and inability to monitor blind spots in monitoring methods, and achieve the effect of quick intrusion alarm and optimized applicability

Inactive Publication Date: 2018-01-23
广州中国科学院计算机网络信息中心
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially the technical defect that there is a monitoring blind spot in the current monitoring method and cannot monitor the state of the blind spot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion monitoring method, intrusion monitoring device and equipment
  • Intrusion monitoring method, intrusion monitoring device and equipment
  • Intrusion monitoring method, intrusion monitoring device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] For further explanation to the intrusion monitoring method of the present invention, please refer to figure 1 :

[0057] Wherein, this embodiment may be implemented on one device, or may be implemented on a system composed of several devices. Specifically, in this embodiment, the device implemented is named after a master controller.

[0058] S11 acquires the MAC code of the network card of the terminal device scanned by the gateway device;

[0059] Specifically, a gateway (Gateway) device, also known as a network connector or a protocol transfer device, is a computer system or device that provides data conversion services between multiple networks. It can be said that a gateway device is a connector between different networks, and a device that needs to be "negotiated" when data is transferred from one network to another. Gateway devices enable them to be processed by another system by repackaging information. In this regard, gateway devices also have the ability to ...

Embodiment 2

[0081] Different from the intrusion monitoring method described in Embodiment 1, combining image 3 , in this embodiment, before sending out the warning information, the following steps are also included:

[0082] S31 Acquiring the moving route characteristics of the terminal device, the moving route characteristics including at least one of moving route, moving speed, staying position, and moving time;

[0083] Specifically, those skilled in the art know that the feature of the moving route can be obtained through prior art detection, for example, according to the data obtained by the gateway device from the terminal device to connect to the gateway device, the data is processed to obtain the location of the terminal device; In addition, other detection techniques can also be used to obtain the characteristics of the moving route. The moving route is the path that the terminal device moves after entering the coverage area of ​​the gateway device. It is mainly used to confirm...

Embodiment 3

[0100] Different from the above-mentioned embodiments, in combination with Figure 4 , in this embodiment, the MAC code of the known network card is the MAC code of the authorized network card of the gateway device;

[0101] Specifically, the MAC code of the authorized network card is a MAC code of a network card that does not have a connection record with the gateway device but is allowed to access normally. For example, the gateway device is a newly installed device without any connection record at present, but the MAC code of the network card that allows normal access can be preset through the main controller.

[0102] After the step S11 obtains the MAC code of the network card of the terminal device scanned by the gateway device, it also includes:

[0103] S41 acquires the characteristics of the moving route of the terminal device;

[0104] The characteristics of the movement route are consistent with those described in Embodiment 2, and will not be described in detail h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intrusion monitoring method. The intrusion monitoring method comprises the steps of: obtaining a terminal equipment network card MAC code scanned by gateway equipment; comparing the scanned terminal equipment network card MAC code with a recorded known network card MAC code; confirming that the scanned terminal equipment network card MAC code does not belong to the recorded known network card MAC code; and sending warning information. Due to implementation of the scheme, intrusion monitoring is realized by utilization of the uniqueness of the terminal equipment network card MAC code. The invention further provides an intrusion monitoring device and equipment.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular, the present invention relates to an intrusion monitoring method, device and equipment. Background technique [0002] In some specific areas, such as bank vaults, large communities, and personal living environments, daily security management mainly relies on the installation of surveillance cameras or full-time personnel for security monitoring. However, there is a problem of monitoring blind spots in the way of installing surveillance cameras. Once an intruder uses the method of avoiding the camera or using the blind spot of the camera to invade, the information of the intruder will not be captured by the method of using the surveillance camera; Personnel monitoring, because the monitoring personnel mainly rely on the intercom system for communication, they cannot obtain and record the alarm situation in time to track and monitor possible intruders, which brings certain l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021H04W4/029G08B13/00H04L29/06H04W4/14H04W12/06
Inventor 徐佳郑宇宁张正顺欧建城黄月珍
Owner 广州中国科学院计算机网络信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products