CN111015691B - Auxiliary machine in data security - Google Patents

Auxiliary machine in data security Download PDF

Info

Publication number
CN111015691B
CN111015691B CN201911419986.5A CN201911419986A CN111015691B CN 111015691 B CN111015691 B CN 111015691B CN 201911419986 A CN201911419986 A CN 201911419986A CN 111015691 B CN111015691 B CN 111015691B
Authority
CN
China
Prior art keywords
finger
robot
printing head
inflatable
printing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911419986.5A
Other languages
Chinese (zh)
Other versions
CN111015691A (en
Inventor
杨腾霄
于红岩
乔梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Niudun Technology Co ltd
Original Assignee
Shanghai Niudun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Niudun Technology Co ltd filed Critical Shanghai Niudun Technology Co ltd
Priority to CN201911419986.5A priority Critical patent/CN111015691B/en
Publication of CN111015691A publication Critical patent/CN111015691A/en
Application granted granted Critical
Publication of CN111015691B publication Critical patent/CN111015691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B25HAND TOOLS; PORTABLE POWER-DRIVEN TOOLS; MANIPULATORS
    • B25JMANIPULATORS; CHAMBERS PROVIDED WITH MANIPULATION DEVICES
    • B25J11/00Manipulators not otherwise provided for
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B25HAND TOOLS; PORTABLE POWER-DRIVEN TOOLS; MANIPULATORS
    • B25JMANIPULATORS; CHAMBERS PROVIDED WITH MANIPULATION DEVICES
    • B25J9/00Programme-controlled manipulators
    • B25J9/16Programme controls
    • B25J9/1656Programme controls characterised by programming, planning systems for manipulators
    • B25J9/1664Programme controls characterised by programming, planning systems for manipulators characterised by motion, path, trajectory planning
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J2/00Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed
    • B41J2/315Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed characterised by selective application of heat to a heat sensitive printing or impression-transfer material
    • B41J2/32Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed characterised by selective application of heat to a heat sensitive printing or impression-transfer material using thermal heads

Abstract

The invention provides an auxiliary machine in data security, which is a robot and comprises a robot head, a robot body, a robot displacement structure and a robot arm, wherein a printing head type finger is arranged on the robot arm, and the printing head type finger is a finger of the robot and can displace along with the robot arm and is provided with a printing structure required by a printing head. The invention has the advantage that annotation information, or other information content, can be conveniently printed on various occasions by the auxiliary machine.

Description

Auxiliary machine in data security
Technical Field
The invention belongs to the technical field of information security.
Background
The application of network technology has been widely advanced in various fields including industry, agriculture, national defense, and resident life, entertainment, education, finance, medical treatment, etc. Although the network technology brings great value, the network security problem brings great hidden trouble.
For example, network viruses have grown in endless form since their creation, severely threatening various network applications. The network attack means with various patterns, the hidden Trojan horse of the tamper and the continuously emerging novel software and hardware which threaten the network security are all potential network safety hazards. This potential has different effects at different levels. Such as small private units; a trimethyl hospital; a body of a ground city; nationwide financial departments, such as people's bank, or traffic bank, large banking institutions such as construction banks, and securities institutions; and some heavy, such as nuclear power plants; a national high-speed rail transportation network; a national defense security network; and government communication and management systems, etc. Different objects often have different levels of network security requirements.
The function of the hierarchical protection system is to distinguish between different levels of hierarchical protection systems. Grade protection, abbreviated as equity protection. The current level protection is divided into five levels altogether. Thus, how to define the level of hierarchical protection at which different units are located and whether the level of hierarchical protection is met is a vital task for implementing network security.
In the process of implementing the level protection technology, how to collect network security equipment information, network terminal data information, network application data information and how to evaluate the level protection condition, how to carry out defect lifting, solution description and the like in the unit is time-consuming and labor-consuming, and consumes huge manpower and material resources. If part of the work in the level protection can be achieved in a more convenient way. It is possible to facilitate the efficiency improvement of the level protection.
Disclosure of Invention
The present invention provides an auxiliary machine in data security, thereby facilitating printing operations.
The utility model provides an auxiliary machine in data security, the machine be the robot, including robot head, robot body, robot displacement structure to and robot arm, the robot arm on be provided with and beat printer head type finger, should beat printer head type finger and be the finger of robot, can follow the robot arm carries out the displacement, has the required printing structure that possesses of printer head simultaneously.
Further, the printing head finger is provided with a printing head finger joint, and the printing head finger joint can bend by an angle so as to change the printing position.
Further, the print head type finger is an inkjet print head, and the ink box is pre-stored in the robot arm.
Further, the print head type finger is of a heat-sensitive structure, can generate heat, and forms images on the heat-sensitive paper by generating heat in the moving process of the heat-sensitive material.
Further, corresponding to the print head type finger on the robot arm, a spring-pressing type finger joint is provided for pressing the object to be printed.
Further, the head of the spring finger joint is an elastic structure with high resistance.
Furthermore, the head of the elastic finger joint is provided with an inflatable elastic finger.
Further, a limiting grid is arranged on the outer side of the inflatable finger-pressing air bag, a strip-shaped or grid-shaped limiting structure is provided, and in an inflated state, the air bag has flexibility, and the flexible part of the air bag extends outwards through a blank area on the limiting grid.
The invention has the advantage that annotation information, or other information content, can be conveniently printed on various occasions by the auxiliary machine.
Drawings
Fig. 1 is a flow chart of the method described in the present invention.
Fig. 2 is a schematic view of a robot according to the present invention, which is an embodiment.
Fig. 3 is a schematic view of a robot according to the present invention, which is another embodiment.
Fig. 4 is a schematic view of a robot according to the present invention, which is another embodiment.
Reference numerals illustrate:
a robot 200;
a robot head 210;
a robot body 220, a robot display structure 221;
a robot displacement structure 230;
a robotic arm 240;
a robot finger 250;
a print head type finger 260; a sprung finger 261, a printhead knuckle 262.
Detailed Description
Referring to fig. 1, there is shown an embodiment of the present invention, which specifically includes the following steps:
step 110, corresponding to the network application object, setting active RFID as a detection tag capable of realizing detection.
The detection tag needs a wireless data emission source capable of emitting a detectable electromagnetic signal, and the detection tag is not particularly limited, but is low in cost and portable as much as possible. In practice, RFID is an excellent alternative.
Passive RFID can be configured in a cost-effective manner. But the effective detection distance corresponding to passive RFID is very short. Thus, it is more preferable to use active RFID, by which the detection path can be extended widely.
The network application object refers to all terminal devices which are used by units needing to perform waiting and guaranteeing evaluation and can contact a network, and connecting wires used for connecting the network devices. In actual operation, the network application object particularly refers to a target object which needs to be subjected to an isosceles test.
The manner in which the user sets the active RFID at the network application terminal is not limited, but it is preferable that the active RFID is disposed on the network application object, at least beside, and there is no other network application terminal between the active RFID and the network application terminal to be designated, so as to avoid confusion.
Each deployed active RFID represents at least one network application terminal. The recommended implementation mode is that each network application terminal needing to be detected corresponds to one active RFID uniquely, so that the control is facilitated.
Step 120, a travel path corresponding to the probe tag is calculated.
After the setting of the detection tag is completed, the positions of all network application objects needing data acquisition are determined. How to complete the probing of each network application terminal at the shortest distance, or at the shortest travel time, is a computationally demanding effort. The distances traveled by the respective paths may be calculated for comparison, and the path having the shortest travel distance may be selected as the preferred travel path.
And step 130, advancing to the network application object corresponding to the detection label according to the advancing path to acquire data.
When the invention is used for collecting data of each network application terminal, the data can be implemented manually or by a machine. The machine mode is a more preferable mode, and the main reason is that the difficulty of operators can be reduced in the mode, so that the technical popularization can be more conveniently carried out, and the cost is reduced.
The foregoing machine, in particular, is an intelligent machine; the intelligent machine is especially a robot.
The inspection operation can be conveniently performed along the path obtained in the previous step in the way of inspection by the robot.
When the robot patrols and examines the network application terminal, the preset data content can be acquired according to a preset mode through a data acquisition structure arranged on the robot. These data contents are data meeting the level protection requirements.
And 140, classifying the acquired data and establishing a grade protection data acquisition information list.
And in the data content acquired in the previous step, according to the data content required to be acquired by different network application terminals in the grade protection, acquiring and summarizing to form a grade protection data list.
And 150, comparing the acquired grade protection data acquisition information list with the grade protection data standard to generate a grade protection machine detection result.
Currently, the level protection is implemented by a designated department, and has relatively strict execution standards. The execution standard is classified according to the grade protection data collected by the machine, so that the grade protection data standard can be established. The acquired data is compared with the standard of the level protection data to judge whether the acquired data meets the preset standard or not, and the difference can be conveniently searched.
Based on the mode described above, the acquisition and comparison of the grade protection data can be conveniently performed by combining the detection tag in an intelligent machine mode, and the comparison result can be obtained.
In the implementation process, the data corresponding to the detection tag may not meet the requirements of the user. In this case, additional wireless data source correction tags may be set based on the information of the acquired web application object. The additional wireless data source corrects the label, which means adding a new label, and the purpose of setting additional information is achieved through the new label. The content of the additional information is not limited.
The robot described above refers to a robot having an image capturing structure and a travel driving structure. The image shooting mechanism is at least a data acquisition mechanism which needs to be arranged. In the invention, the robot can realize various functions besides the data acquisition function.
For example, an identification code may be set corresponding to the aforementioned probe tag. The identification code corresponds to digital content and can be implemented through at least one of a number, a bar code or a two-dimensional code. With such an identification code, it is possible to conveniently distinguish between different detection tags.
Further, the two-dimensional code may be set on the basis of the identification code. At present, most people have smart phones, and two-dimension codes can be conveniently scanned by using the smart phones, so that the set two-dimension codes can express more data information. For example, under the condition that the corresponding network application terminal does not meet the requirements, the contents which do not meet the requirements can be arranged in the server and correspond to the set two-dimensional code, so that a user can acquire required data information through scanning of the smart phone, and the method is very convenient.
The invention provides a convenient operation scheme by adopting the setting mode of the two-dimension code:
first, the identification code on the detection label is identified, and the digital information set on the identification code is obtained.
On the other hand, telephone number information corresponding to the unit is collected. The telephone number may be a public telephone number of the unit or a telephone number of a particular contact of the unit.
Further, the numerical value in the previous digital information and the numerical value in the telephone number are collected, and the numerical value in the previous telephone number are multiplied to obtain a multiplication value.
Then, subtracting the number randomly set by the user or the system from the product value to obtain the number result information aiming at the label. The number is mainly used for achieving the anti-counterfeiting purpose.
And finally, converting the digital result information into a two-dimensional code.
The obtained two-dimensional code can be arranged by the robot.
Referring to fig. 2, a robot 200 is shown. The robot 200 comprises four main parts, a robot head 210, a robot body 220, a robot displacement structure 230, and a robot arm 240, respectively. The whole is humanoid.
The robot head 210 is provided with a data acquisition structure including a camera and a microphone.
The robot body 220 is provided with a robot display structure 221 on which indication information can be displayed. In the embodiment shown in the present figure, two-dimensional code image information to be printed is shown.
The robot displacement structure 230 is realized by two legs in this embodiment. Of course, this can be achieved by wheels or other displacement structures as well.
In the present embodiment, a novel structure is provided corresponding to the robot finger 250, in which the print head type finger 260 is first included. That is, the print head type finger 260 is first a finger of the robot 200, and can change its position according to the displacement of the robot arm 240, and has a print function required for the print head.
Further, a print head knuckle 262 may be provided corresponding to the print head finger 260, and the print position may be changed or the print effect may be changed by the print head knuckle 262 being bendable.
By way of example, the printhead finger 260 is an inkjet printhead. In this case, the robot arm 240 may pre-store the ink cartridge. Ink can be supplied to the printhead finger 260 by the ink cartridge.
Of course, the print head type finger 260 may also be of a heat sensitive structure capable of generating heat by moving over a heat sensitive material such as thermal paper and generating heat during the movement to image on the thermal paper.
In order to further improve the printing effect during printing, a snap-on knuckle 261 is also provided in the present invention. The spring finger joint 261 means that the head of the spring finger joint 261 is an elastic structure with high resistance, such as an elastic rubber. This structure can press the surface of the object to be printed, thereby allowing the print head type finger 260 to achieve a better printing effect.
Referring to fig. 3, in the embodiment shown in the present figure, an inflatable spring finger 263 is further provided, and the inflation amount of the air bag on the inflatable spring finger 263 can be adjusted according to needs, so as to adjust the strength of the touch and the magnitude of the friction force.
Referring to fig. 4, in the embodiment shown in this figure, there is also provided an inflatable snap finger 263, and in order to further optimize the use effect, a limiting grid 264 is provided on the outer side of the air bag of the inflatable snap finger 263, and a strip-shaped or grid-shaped limiting structure is provided, and in the inflated state, the air bag has flexibility, and its flexible portion extends outwards through the space area on the limiting grid 264, through which a more effective pressing effect is achieved, and the friction force to the contact surface can be more effectively increased.
Other technical features are referred to the previous embodiments and will not be described here again.
In the above description, the disclosure of the present invention is not intended to limit itself to these aspects. Rather, the components may be selectively and operatively combined in any number within the scope of the present disclosure. In addition, terms like "comprising," "including," and "having" should be construed by default as inclusive or open-ended, rather than exclusive or closed-ended, unless expressly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Common terms found in dictionaries should not be too idealized or too unrealistically interpreted in the context of the relevant technical document unless the present disclosure explicitly defines them as such. Any alterations and modifications of the present invention, which are made by those of ordinary skill in the art based on the above disclosure, are intended to be within the scope of the appended claims.

Claims (2)

1. The utility model provides an auxiliary machine in data security, the machine be the robot for in implementing network level protection technique's in-process, network security equipment information, network terminal data information in the collection unit, including robot head, robot body, robot displacement structure, and robot arm, its characterized in that: the robot arm is provided with a printing head type finger which is a finger of a robot and can displace along with the robot arm, and the printing head type finger also has a printing structure required by a printing head,
wherein the printing head type finger is of a heat-sensitive structure and can generate heat, and the heat is generated in the moving process of the heat-sensitive material to form images on the heat-sensitive paper,
wherein the printing head finger is provided with a printing head finger joint through which the bending angle can be changed to change the printing position,
wherein, corresponding to the printing head type finger on the robot arm, a spring type finger joint is arranged for pressing the object to be printed, the head of the spring type finger joint is an elastic structure with rich resistance,
wherein the head of the spring finger joint is provided with an inflatable spring finger to form an inflatable spring finger, the inflation amount of the air bag on the inflatable spring finger is adjusted according to the requirement, thereby adjusting the strength of touch and pressure and the friction force,
the inflatable finger-pressing airbag comprises an inflatable finger-pressing airbag, a limiting grid, a strip-shaped or grid-shaped limiting structure, and a flexible part of the inflatable finger-pressing airbag extends outwards through a space area on the limiting grid under the inflation state because of the flexibility of the inflatable finger-pressing airbag.
2. The data security auxiliary machine of claim 1, wherein: the printing head type finger is an ink-jet type printing head, and an ink box is prestored in the robot arm.
CN201911419986.5A 2019-12-31 2019-12-31 Auxiliary machine in data security Active CN111015691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911419986.5A CN111015691B (en) 2019-12-31 2019-12-31 Auxiliary machine in data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911419986.5A CN111015691B (en) 2019-12-31 2019-12-31 Auxiliary machine in data security

Publications (2)

Publication Number Publication Date
CN111015691A CN111015691A (en) 2020-04-17
CN111015691B true CN111015691B (en) 2024-03-01

Family

ID=70201449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911419986.5A Active CN111015691B (en) 2019-12-31 2019-12-31 Auxiliary machine in data security

Country Status (1)

Country Link
CN (1) CN111015691B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104440924A (en) * 2013-09-22 2015-03-25 沈阳芯源微电子设备有限公司 Mechanical arm collision protecting device
CN104527068A (en) * 2014-12-24 2015-04-22 上海大学 Colour 3D printing robot
JP3210525U (en) * 2016-03-09 2017-05-25 ハイデルベルガー ドルツクマシーネン アクチエンゲゼルシヤフトHeidelberger Druckmaschinen AG Multi-axis robot with drag chain for guiding drive, tool head and flexible conduit
CN106956283A (en) * 2017-05-27 2017-07-18 北方工业大学 Five-finger humanoid manipulator based on 3D printing
CN107263858A (en) * 2017-07-03 2017-10-20 华中科技大学 A kind of heterogeneous many material increasing material manufacturing systems
CN108186170A (en) * 2018-01-11 2018-06-22 长春市漫思教育科技有限公司 A kind of printing prosthetic hand and its manufacturing method
CN109703017A (en) * 2019-01-23 2019-05-03 河北工业大学 A kind of both arms collaboration 3D printing robot
CN213082719U (en) * 2019-12-31 2021-04-30 上海纽盾科技股份有限公司 Auxiliary machine in data security

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104440924A (en) * 2013-09-22 2015-03-25 沈阳芯源微电子设备有限公司 Mechanical arm collision protecting device
CN104527068A (en) * 2014-12-24 2015-04-22 上海大学 Colour 3D printing robot
JP3210525U (en) * 2016-03-09 2017-05-25 ハイデルベルガー ドルツクマシーネン アクチエンゲゼルシヤフトHeidelberger Druckmaschinen AG Multi-axis robot with drag chain for guiding drive, tool head and flexible conduit
CN106956283A (en) * 2017-05-27 2017-07-18 北方工业大学 Five-finger humanoid manipulator based on 3D printing
CN107263858A (en) * 2017-07-03 2017-10-20 华中科技大学 A kind of heterogeneous many material increasing material manufacturing systems
CN108186170A (en) * 2018-01-11 2018-06-22 长春市漫思教育科技有限公司 A kind of printing prosthetic hand and its manufacturing method
CN109703017A (en) * 2019-01-23 2019-05-03 河北工业大学 A kind of both arms collaboration 3D printing robot
CN213082719U (en) * 2019-12-31 2021-04-30 上海纽盾科技股份有限公司 Auxiliary machine in data security

Also Published As

Publication number Publication date
CN111015691A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
US7720286B2 (en) System and method for associating handwritten information with one or more objects via discontinuous regions of a printed pattern
EP1532577B1 (en) Position-coding pattern
US6722574B2 (en) Business card
US20080238613A1 (en) Using Rfid Tags with an Incorporated Chip to Identify and Locate Persons
JP2006302046A (en) Electronic white board system, information processing program, information processing device, and information processing method
DE60140249D1 (en)
US9329704B2 (en) Information input apparatus, information input system, and information input method
CN107832647A (en) A kind of phase type gesture identification method based on passive RF label
KR20120047973A (en) Systems and methods for pressure-based authentication of a signature on a touch screen
CN110002263A (en) For handling the device and method of material roll
CN213082719U (en) Auxiliary machine in data security
EP2672363A2 (en) Display device and method using a plurality of display panels
CN111015691B (en) Auxiliary machine in data security
EP2591441B1 (en) Dot code pattern for absolute position and other information using an optical pen, process of printing the dot code, process of reading the dot code
CN106891619B (en) A kind of Quick Response Code print system and two-dimensional code generation method
CN107369097A (en) Insurance policy and its information input method and device based on optical lattice technology
WO2020159638A1 (en) System and method for unsupervised domain adaptation via sliced-wasserstein distance
GB2431269A (en) Detector for generating a model representing a form of markings for a pattern
JP4542050B2 (en) Digital pen input system
CN111222129A (en) Data acquisition method in grade protection
JP2014038411A (en) Password generation system, control program
JP6064738B2 (en) Information generating apparatus, electronic pen system, and program
CN105678505A (en) On-site standardized operation guidance system based on smart phone
JP2012063850A (en) Augmented reality display system, augmented reality display method and augmented reality display program
Liu et al. Part-based adaptive detection of workpieces using differential evolution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200441 floor 11, No. 2, Lane 99, Changjiang South Road, Baoshan District, Shanghai

Applicant after: SHANGHAI NIUDUN TECHNOLOGY Co.,Ltd.

Address before: 200433 floor 11, building A5, Lane 1688, Guoquan North Road, Yangpu District, Shanghai

Applicant before: SHANGHAI NIUDUN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant