CN111311863A - Unattended financial indoor safety early warning method - Google Patents

Unattended financial indoor safety early warning method Download PDF

Info

Publication number
CN111311863A
CN111311863A CN202010297456.4A CN202010297456A CN111311863A CN 111311863 A CN111311863 A CN 111311863A CN 202010297456 A CN202010297456 A CN 202010297456A CN 111311863 A CN111311863 A CN 111311863A
Authority
CN
China
Prior art keywords
information
data
module
authority
staff
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010297456.4A
Other languages
Chinese (zh)
Inventor
李洁
李金芳
吕海东
李韦佳
孙明
陈然
朱琦楠
田朝阳
臧荷芳
张瑞军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Railway Vocational and Technical College
Original Assignee
Zhengzhou Railway Vocational and Technical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Railway Vocational and Technical College filed Critical Zhengzhou Railway Vocational and Technical College
Priority to CN202010297456.4A priority Critical patent/CN111311863A/en
Publication of CN111311863A publication Critical patent/CN111311863A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an unattended financial indoor safety early warning method, which comprises the following steps: step one, collecting intrusion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, and comprehensively packaging and sending the information to an information fusion module; step two, information fusion judgment is executed, the information fusion module decompresses the packaged information and comprehensively analyzes the intrusion possibility and the intrusion type according to the decompressed information; and step three, encrypting backup operation, namely starting data encryption backup or early warning operation according to the invasion possibility and the invasion type. The invention can realize the operations of data security encryption backup and the like before being subjected to security infringement or in the infringement implementation process by improving the intelligent early warning capability, thereby improving the security level of a financial room.

Description

Unattended financial indoor safety early warning method
Technical Field
The invention relates to the technical field of safety early warning, in particular to an unattended financial indoor safety early warning method.
Background
The finance room is the most important place for the company, and has various most important data, and some data can not be recovered once being damaged. At present, the safety of a financial room is protected mostly by means of science and technology, the situation in the financial room is recorded by a camera all the time, and once a problem is found, the problem can be detected by calling a video record.
As shown in fig. 1, the prior art discloses an indoor safety emergency early warning system as application No. 201621356257.1, which includes: including wireless transmission module, a collection module for real-time supervision building condition, terminal equipment and alarm system module, be connected through wireless transmission module signal transmission between collection module and the terminal equipment, the alarm system module is connected with terminal equipment, this collection module includes sensor acquisition module and camera acquisition module, camera acquisition module embeds there is the first WIFI transmission module who is used for carrying out network transmission with terminal equipment, camera acquisition module including the camera that is used for gathering analog video signal that connects gradually, will analog video signal turns into digital signal's AD chip, will the CPU of digital signal code compression IP data is used for transmitting IP data to terminal equipment's first WIFI module.
As shown in fig. 2, the prior art discloses an intelligent security monitoring system for a financial room as application No. 201621312230.2, which includes video monitoring groups, a ZigBee coordinator and a monitoring center, which are respectively disposed at each monitoring position in the financial room, each video monitoring group includes two cameras, a control unit and a ZigBee module, one of the cameras is controlled by a clock circuit connected to the control unit to control the working time period of the camera, the other camera is controlled by a sensing unit connected to the control unit to realize intelligent control of the working of the camera, each video monitoring group further includes a storage unit, and the storage unit is used for storing monitoring information of each video monitoring group; each video monitoring group is connected with a ZigBee coordinator through a ZigBee module, and the ZigBee coordinator is connected with a monitoring center.
However, the prior art only monitors the situation of the financial room, the obtained information is single, the early warning degree and the security level are low when the financial room is illegally invaded, and the increasingly complex security management requirements of the financial data cannot be met.
Disclosure of Invention
The invention provides an unattended indoor financial security early warning method, which can realize operations such as data security encryption backup and the like before being subjected to security infringement or in an infringement implementation process by improving the intelligent early warning capacity, reduce recoverable loss and improve the security level of a financial room.
In order to realize the functions, the invention adopts a technical scheme that:
an indoor security early warning method based on unattended finance comprises the following steps:
firstly, collecting intrusion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information, and comprehensively packaging and sending the information to an information fusion module.
And secondly, performing information fusion judgment, decompressing the packed information by the information fusion module, and comprehensively analyzing the intrusion possibility and the intrusion type according to the decompressed information.
And thirdly, encrypting backup operation, namely starting data encryption backup or early warning operation according to the intrusion possibility and the intrusion type.
Preferably, the information fusion judgment in the step two is specifically as follows: the information fusion module runs an information fusion algorithm, the information fusion algorithm integrates information such as staff license plate information, video head portrait attitude information, staff license plate information, route information, perimeter alarm information and the like, firstly, whether unauthorized destructive intrusion exists is judged, namely whether perimeter alarm destructive entry exists is judged, and whether unauthorized staff exists is judged by combining the video head portrait attitude information; secondly, judging whether the staff is in unauthorized invasion, namely judging the identity of the staff according to license plate information, video head portrait posture information and staff license plate information, and judging whether unauthorized behaviors (such as abnormal routes or illegal invasion to non-permission places such as financial rooms) exist by combining route information; and finally, judging whether the authorized staff has complete authorized data, namely the authorized staff can realize the operation by an authorized operation party needing different persons at a higher level or the same level when carrying out non-authorized operation.
Preferably, the data encryption in step three is data encryption operation performed dynamically in real time according to the possibility of intrusion and the type of intrusion, for example, the data encryption operation is performed in a manner of reconstructing data in an encryption manner or a hard encryption manner preset by an authorized person.
Preferably, the data encryption further includes distributing authorized decryption information, the authorized decryption information includes a short message verification code, an application software generated decryption code and the like, after the data encryption operation, the authorized decryption information required for decrypting the data is distributed to each authority person, and the information can be decrypted after the authorized decryption information of each authority person is integrated.
Preferably, the data encryption backup operation in step three is specifically as follows: when the result output by the information fusion module is unauthorized destructive intrusion, starting backup data to a safe cloud end, and starting a data self-destruction step; if the unauthorized invasion of the employee is detected, data encryption is performed firstly, information such as a verification code and the like required by decryption information is distributed to authority personnel, if the authority personnel authorize the unauthorized invasion of the employee, only the encrypted data is backed up to a safety cloud, an early warning module is controlled to record the unauthorized invasion behavior of the employee and distribute the unauthorized invasion behavior to all authority personnel for knowing, and if the authorization of the corresponding authority personnel is not obtained, a data self-destruction step is started; if the authority is the authority, the authority data of the authority is not encrypted or backed up, if the authority accesses the non-authority data, the non-authority data is backed up at a safety cloud and a verification code is distributed to the corresponding authority, the authority can normally access the non-authority data after obtaining the authorization of the non-authority data, and otherwise, a data self-destruction step is started.
Preferably, the data self-destruction step includes: data encryption, namely encrypting the security data; data backup, namely backing up the encrypted data to a safe cloud; data self-destruction, which initiates a data self-destruction procedure upon detecting that a destructive intrusion has arrived at the financial room.
The invention also comprises an unattended financial indoor safety early warning system, which comprises an information acquisition module, an information fusion module, a data encryption backup module and an early warning module; wherein the content of the first and second substances,
the information collected by the information collecting module includes but is not limited to the following information: staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information.
The information fusion module comprehensively judges and analyzes the intrusion possibility and the intrusion type according to the information acquired by the information acquisition module, and controls the data encryption backup module to carry out encryption and backup operations, wherein the encryption operation sets a corresponding encryption level according to the intrusion possibility.
The data encryption backup module can encrypt the financial data, wherein the encryption can be implemented as soft encryption or hard encryption, and can also implement backup operation on the financial data, wherein the backup comprises cloud backup, distributed encryption backup and other modes.
The early warning module is connected with the information fusion module and used for judging whether to send out early warning and what kind of early warning to send out according to the analysis result of the information fusion module.
Preferably, the information acquisition module comprises a central processing module, an access control module, a video acquisition module, a face posture recognition module, a perimeter detection module, an alarm module, a communication module and a local storage module; the central processing module is in communication connection with the access control module, the video acquisition module, the face gesture recognition module, the perimeter detection module, the alarm module, the communication module and the local storage module respectively.
Preferably, the entrance guard control module is connected with the central processing module, the entrance guard control module is used for reading and verifying ID identity to control entrance guard opening or closing, and simultaneously transmitting the read ID identity information to the central processing module in real time, the entrance guard control module comprises but is not limited to license plate recognition entrance guard, elevator entrance guard and entrance guard entering workplaces, wherein the ID information comprises license plate information, employee identity information and authorized identity information, and the authorized identity information comprises security information such as passwords and passwords; the entrance guard control module can adopt a mode of accessing a license plate recognition parking system and collecting license plate recognition information in real time, and also can adopt a mode of wireless sensor network communication to concentrate all entrance guard information to the relay node, and then the relay node transmits data to the entrance guard control module. The method comprises the steps that a wireless communication node is additionally integrated in a license plate recognition camera module, when a license plate is recognized, the wireless communication node is triggered to read license plate information, and the license plate information is transmitted to an entrance guard control module through a wireless sensor network; the access control module can also access a gate access control system or an access control management system to read the identity information of the employee card, and similarly, the access control module can also adopt a wireless sensor network mode to acquire the swiping card information of the employee card of the access control department.
The video acquisition module is arranged at each part of an office building, a monitoring module in a video monitoring machine room can be adopted, video information in the monitoring module is transmitted to the face gesture recognition module in real time, the face gesture recognition module recognizes face information, if the face information is unauthorized people, the face information is directly transmitted to the central processing module to control the alarm module to carry out alarm processing, and if the face information is authorized people, the face gesture recognition module continues to recognize and analyze gestures and route information of authorized people and transmits the information to the central processing module.
Wherein, the perimeter alarm information includes but is not limited to the following information: electronic fence information, video monitoring abnormal information, door lock damage information and the like; the perimeter alarm module can adopt an optical fiber vibration protection system capable of identifying illegal abnormal invasion and transmits alarm information detected by the alarm host to the central processing module.
The communication module is connected with the information fusion module in a wired or wireless mode, and the communication mode between the information acquisition module and the information fusion module can adopt a communication mode which can realize communication between a lower computer and an upper computer, such as an RS232 interface, WIFI communication, RJ45 network port communication mode and the like;
the local storage module is used for temporarily storing the acquired entrance guard ID information, the useful video segments acquired by the video acquisition module, the face posture recognition result, the perimeter detection alarm information, the ID information sent by the information fusion module and the like;
the central processing module packages employee license plate information, video head portrait attitude information, employee license plate information, route information, perimeter alarm information or default packages of the information acquired and analyzed by the access control module, the face attitude recognition module and the perimeter detection module, and transmits the packaged data to the information fusion module in real time through the communication module.
The information fusion module is connected with the central processing module through the communication module, receives the packed data sent by the central processing module, decompresses the packed data and analyzes and processes the decompressed packed data, and the information fusion module, the data encryption backup module and the early warning module are all arranged in the financial room.
The data encryption backup module is used for carrying out corresponding encryption and backup operations on data needing to be ensured to be safe, such as financial data, business secrets and the like according to the judgment result of the information fusion module.
According to the invention, various information of the personnel entering and exiting are collected by the information collection module and sent to the information fusion module for information fusion judgment, and then corresponding encryption backup operation is executed, so that the safety of a financial room can be evaluated in real time, and the method can adapt to complex external safety threats; meanwhile, the data is encrypted and backed up or even self-destructed according to the judgment result output by the information fusion module to realize the real-time safety control of the data; not only is the timely early warning of a financial room realized, but also the real-time encryption and backup of data safety are realized, and compared with a fixed encryption backup mode in the prior art, the data encryption backup method is not easy to crack and invade, and the safety level of the data is improved.
Drawings
Fig. 1 is a system diagram of an indoor safety emergency early warning system in the prior art.
Fig. 2 is a system diagram of an indoor security system of the prior art.
Fig. 3 is a system block diagram of an unattended financial indoor security early warning system.
Fig. 4 is a block diagram of a specific implementation of the information acquisition module 1.
Fig. 5 is a flow chart of an unattended financial indoor security early warning method.
FIG. 6 is a flow chart of data self-destruction.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 3-4, an unattended financial indoor security early warning system includes an information acquisition module 1, an information fusion module 2, a data encryption backup module 3, and an early warning module 4; wherein the content of the first and second substances,
the information collected by the information collecting module 1 includes but is not limited to the following information: staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information.
The information fusion module 2 comprehensively judges and analyzes the intrusion possibility and the intrusion type according to the information acquired by the information acquisition module 1, and controls the data encryption backup module 3 to implement encryption and backup operations, wherein the encryption operation sets a corresponding encryption level according to the intrusion possibility.
The data encryption backup module 3 may encrypt the financial data, where the encryption may be implemented as soft encryption or hard encryption, and may also implement backup operation on the financial data, where the backup includes cloud backup and distributed encryption backup.
The early warning module 4 is connected with the information fusion module 2, and judges whether to send out early warning and what kind of early warning to send out according to the result analyzed by the information fusion module 2.
The information acquisition module 1 comprises a central processing module 1-1, an entrance guard control module 1-2, a video acquisition module 1-3, a face posture recognition module 1-4, a perimeter detection module 1-5, an alarm module 1-6, a communication module 1-7 and a local storage module 1-8; the central processing module 1-1 is respectively in communication connection with the access control module 1-2, the video acquisition module 1-3, the face posture recognition module 1-4, the perimeter detection module 1-5, the alarm module 1-6, the communication module 1-7 and the local storage module 1-8;
the entrance guard control module 1-2 is connected with the central processing module 1-1, the entrance guard control module 1-2 is used for reading and verifying ID identity to control entrance guard opening or closing, and simultaneously transmitting the read ID identity information to the central processing module 1-1 in real time, the entrance guard control module 1-2 comprises but is not limited to license plate recognition entrance guard, elevator entrance guard and entrance guard entering a workplace, wherein the ID information comprises license plate information, employee identity information and authorized identity information, and the authorized identity information comprises security information such as passwords and passwords; the access control module 1-2 can adopt a mode of accessing a license plate recognition parking system and collecting license plate recognition information in real time, and can also adopt a mode of wireless sensor network communication to centralize each piece of access information to a relay node, and then the relay node transmits data to the access control module 1-2. The method comprises the steps that a wireless communication node is additionally integrated in a license plate recognition camera module, when a license plate is recognized, the wireless communication node is triggered to read license plate information, and the license plate information is transmitted to an entrance guard control module 1-2 through a wireless sensor network; the entrance guard control module 1-2 can also access a gate entrance guard system or an entrance guard management system to read the identity information of the employee card, and similarly, can also adopt a wireless sensor network mode to acquire the swiping card information of the employee card at the entrance guard;
the video acquisition 1-3 module is arranged at each part of an office building, a monitoring module in a video monitoring machine room can be adopted, video information in the monitoring module is transmitted to the face gesture recognition module 1-4 in real time, the face gesture recognition module 1-4 recognizes face information, if the face gesture recognition module is an unauthorized person, the face information is directly transmitted to the central processing 1-1 module to control the alarm module 1-6 to carry out alarm processing, and if the face gesture recognition module is an authorized person, the face gesture recognition module 1-4 continues to recognize and analyze gesture and route information of the authorized person and transmits the information to the central processing 1-1 module.
Wherein, the perimeter alarm information includes but is not limited to the following information: electronic fence information, video monitoring abnormal information, door lock damage information and the like; the perimeter alarm module 1-6 can adopt an optical fiber vibration protection system capable of identifying illegal abnormal invasion and transmits alarm information detected by an alarm host to the central processing module 1-1.
The communication modules 1-7 are connected with the information fusion module 2 in a wired or wireless mode, and the communication mode between the information acquisition module 1 and the information fusion module 2 can adopt a communication mode capable of realizing communication between a lower computer and an upper computer, such as RS232 interface, WIFI communication, RJ45 network port communication mode and the like;
the local storage module 1-8 is used for temporarily storing the collected entrance guard ID information, the useful video segments collected by the video collection 1-3 module, the face gesture recognition result, the perimeter detection alarm information, the ID information sent by the information fusion module 2 and the like.
The central processing module 1-1 packages the employee license plate information, video head portrait posture information, employee license plate information, route information, perimeter alarm information or default package of the information acquired and analyzed by the access control module 1-2, the human face posture recognition module 1-4 and the perimeter detection module 1-5, and transmits the package data to the information fusion module 2 in real time through the communication module 1-7;
the information fusion module 2 is connected with the central processing module 1-1 through the communication module 1-7, receives the packed data sent by the central processing module 1-1, decompresses the packed data and analyzes and processes the decompressed data, and the information fusion module 2, the data encryption backup module 3 and the early warning module 4 are all arranged in a financial room.
The data encryption backup module 3 is used for performing corresponding encryption and backup operations on data which needs to be secured, such as financial data, business secrets and the like, according to the judgment result of the information fusion module 2.
Example 2
As shown in fig. 5, an unattended financial indoor security early warning method adopts the above system and includes the following steps:
step one, collecting intrusion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, and comprehensively packaging and sending the information to an information fusion module 2;
step two, information fusion judgment is executed, the information fusion module 2 decompresses the packaged information and comprehensively analyzes the intrusion possibility and the intrusion type according to the decompressed information;
and step three, encrypting backup operation, namely starting data encryption backup or early warning operation according to the invasion possibility and the invasion type.
Example 3
As shown in fig. 6, the present embodiment is otherwise the same as embodiment 2, except that: the information fusion judgment in the step two is specifically as follows: the information fusion module 2 runs an information fusion algorithm, the information fusion algorithm integrates information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, firstly, whether unauthorized destructive intrusion is judged, namely whether perimeter alarm destructive entry is judged, and whether unauthorized staff is judged by combining the video head portrait posture information; secondly, judging whether the staff is in unauthorized invasion, namely judging the identity of the staff according to license plate information, video head portrait posture information and staff license plate information, and judging whether unauthorized behaviors (such as abnormal routes or illegal invasion to non-permission places such as financial rooms) exist by combining route information; and finally, judging whether the authorized staff has complete authorized data, namely the authorized staff can realize the operation by an authorized operation party needing different persons at a higher level or the same level when carrying out non-authorized operation.
Example 4
In this embodiment, the others are the same as those in embodiment 2, except that: the data encryption in step three is data encryption operation performed dynamically in real time according to the intrusion possibility and the intrusion type, for example, encryption is performed in a way of reconstructing data by adopting an encryption mode preset by an authorized person or a hard encryption mode.
The data encryption also comprises distributing authorization decryption information, the authorization decryption information comprises a short message verification code, an application software generation decryption code and the like, after the data encryption operation, the authorization decryption information required by the decryption data is distributed to each authority personnel, and the information can be decrypted after the authorization decryption information of each authority personnel is integrated.
Example 5
In this embodiment, the others are the same as those in embodiment 2, except that: the data encryption backup operation in step three is specifically as follows: when the result output by the information fusion module 2 is unauthorized destructive intrusion, starting backup data to a safe cloud end, and starting a data self-destruction step; if the unauthorized invasion of the employee is detected, data encryption is performed firstly, information such as a verification code and the like required by decryption information is distributed to authority personnel, if the authority personnel authorize the unauthorized invasion of the employee, only the encrypted data is backed up to a safety cloud, the early warning module 4 is controlled to record the unauthorized invasion of the employee and distribute the unauthorized invasion to all authority personnel for knowing, and if the authorization of the corresponding authority personnel is not obtained, a data self-destruction step is started; if the authority is the authority, the authority data of the authority is not encrypted or backed up, if the authority accesses the non-authority data, the non-authority data is backed up at a safety cloud and a verification code is distributed to the corresponding authority, the authority can normally access the non-authority data after obtaining the authorization of the non-authority data, and otherwise, a data self-destruction step is started.
The data self-destruction step comprises the following steps: data encryption, namely encrypting the security data; data backup, namely backing up the encrypted data to a safe cloud; data self-destruction, which initiates a data self-destruction procedure upon detecting that a destructive intrusion has arrived at the financial room.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. An indoor financial security early warning method based on unattended operation is characterized by comprising the following steps:
step one, collecting invasion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, and comprehensively packaging and sending the invasion information to an information fusion module (2);
step two, information fusion judgment is executed, and the information fusion module (2) decompresses the packaged information and comprehensively analyzes the intrusion possibility and the intrusion type according to the decompressed information;
and step three, encrypting backup operation, namely starting data encryption backup or early warning operation according to the invasion possibility and the invasion type.
2. The unattended indoor financial security early warning method according to claim 1, wherein the information fusion module in the second step runs an information fusion algorithm, and the information fusion algorithm specifically comprises:
firstly, judging whether unauthorized destructive intrusion exists, namely judging whether perimeter alarm destructive entry exists, and judging whether unauthorized staff exist by combining video head portrait posture information;
secondly, judging whether the staff is in unauthorized invasion or not, namely judging the identity of the staff according to the license plate information, the video head portrait posture information and the staff license plate information, and judging whether unauthorized behaviors exist or not by combining with the route information.
3. The unattended financial indoor security early warning method according to claims 1 and 2, wherein the data encryption backup operation in the third step is as follows: when the result output by the information fusion module is unauthorized destructive intrusion, starting backup data to a safe cloud end, and starting a data self-destruction step; if the unauthorized access of the staff is required, data encryption is performed firstly, information such as a verification code required by decryption information is distributed to authority staff, if the authority staff authorizes the unauthorized access staff, only the encrypted data is backed up to a safe cloud end, an early warning module is controlled to record the unauthorized access behavior of the staff and distribute the unauthorized access behavior to all authority staff for knowing, and if the authorization of the corresponding authority staff is not obtained, a data self-destruction step is started.
4. The unattended-based indoor financial security early warning method according to claim 2, further comprising determining whether authorized personnel have complete authorization data after determining whether the unauthorized activity exists.
5. The unattended financial indoor security early warning method according to claim 3, wherein the data encryption backup operation in the third step further comprises: if the authority is the authority, the authority data of the authority is not encrypted or backed up, if the authority accesses the non-authority data, the non-authority data is backed up at a safety cloud and a verification code is distributed to the corresponding authority, the authority can normally access the non-authority data after obtaining the authorization of the non-authority data, and otherwise, a data self-destruction step is started.
6. The unattended financial indoor security pre-warning method according to claim 1, wherein the data encryption in the third step is a data encryption operation performed dynamically in real time according to an intrusion possibility and an intrusion type.
CN202010297456.4A 2020-04-16 2020-04-16 Unattended financial indoor safety early warning method Pending CN111311863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010297456.4A CN111311863A (en) 2020-04-16 2020-04-16 Unattended financial indoor safety early warning method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010297456.4A CN111311863A (en) 2020-04-16 2020-04-16 Unattended financial indoor safety early warning method

Publications (1)

Publication Number Publication Date
CN111311863A true CN111311863A (en) 2020-06-19

Family

ID=71148270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010297456.4A Pending CN111311863A (en) 2020-04-16 2020-04-16 Unattended financial indoor safety early warning method

Country Status (1)

Country Link
CN (1) CN111311863A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115909617A (en) * 2023-01-06 2023-04-04 之江实验室 Visitor early warning method, system and device based on multi-source heterogeneous data
CN116886409A (en) * 2023-08-08 2023-10-13 芜湖青穗信息科技有限公司 Network security policy management method based on network slicing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN104243569A (en) * 2014-09-09 2014-12-24 安徽四创电子股份有限公司 City operation system
CN206097257U (en) * 2016-10-10 2017-04-12 云南铸庚科技有限公司 Security protection intelligent monitoring system
US20170195386A1 (en) * 2014-07-22 2017-07-06 Intellivision Technologies Corp. System and Method for Scalable Cloud Services
CN107742268A (en) * 2017-09-27 2018-02-27 刘业兴 The important machine-operated anti-terrorism crime prevention system of country and method
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
US20170195386A1 (en) * 2014-07-22 2017-07-06 Intellivision Technologies Corp. System and Method for Scalable Cloud Services
CN104243569A (en) * 2014-09-09 2014-12-24 安徽四创电子股份有限公司 City operation system
CN206097257U (en) * 2016-10-10 2017-04-12 云南铸庚科技有限公司 Security protection intelligent monitoring system
CN107742268A (en) * 2017-09-27 2018-02-27 刘业兴 The important machine-operated anti-terrorism crime prevention system of country and method
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115909617A (en) * 2023-01-06 2023-04-04 之江实验室 Visitor early warning method, system and device based on multi-source heterogeneous data
CN116886409A (en) * 2023-08-08 2023-10-13 芜湖青穗信息科技有限公司 Network security policy management method based on network slicing
CN116886409B (en) * 2023-08-08 2024-01-26 芜湖青穗信息科技有限公司 Network security policy management method based on network slicing

Similar Documents

Publication Publication Date Title
US11682278B2 (en) Data-secure sensor system
CN107888609A (en) A kind of information security of computer network system
CA2713320C (en) Method and apparatus for detecting behavior in a monitoring system
CN110741615B (en) Securing SCADA network access from a remote terminal unit
CN111311863A (en) Unattended financial indoor safety early warning method
CN110543761A (en) big data analysis method applied to information security field
CN107196932A (en) Managing and control system in a kind of document sets based on virtualization
CN115499844B (en) Mobile terminal information safety protection system and method
CN112291222A (en) Electric power edge calculation safety protection system and method
CN111046405B (en) Data processing method, device, equipment and storage medium
JP2005502944A (en) Apparatus and method for recognizing at least one individual, apparatus and system for monitoring access, and corresponding use
CN212229720U (en) Intelligent access control system based on block chain
KR102365571B1 (en) Method and apparatus for managing password including one-time password issuance function for integrally managing closed-circuit television
CN108521431A (en) A kind of information security of computer network system
CN107315974A (en) A kind of image-forming media protection device based on Internet of Things
CN111429680A (en) Indoor safety early warning system of financial affairs
CN111583493A (en) Intelligent access control system based on block chain
CN107277320A (en) A kind of safe picture pick-up device encryption method and safe picture pick-up device
CN111159674A (en) Novel safe and confidential intelligent information acquisition device and method
CN106162083B (en) A kind of HD video superposition processing system and its method for carrying out safety certification
CN115952477A (en) User data protection system of safety computer
CN115600189A (en) Commercial password application security evaluation system
JP5353147B2 (en) Face matching system
KR20160023516A (en) Cloud security identifying system
KR20040049714A (en) System for a security using internet and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination