CN111181734B - Network security detection device - Google Patents

Network security detection device Download PDF

Info

Publication number
CN111181734B
CN111181734B CN201911148131.3A CN201911148131A CN111181734B CN 111181734 B CN111181734 B CN 111181734B CN 201911148131 A CN201911148131 A CN 201911148131A CN 111181734 B CN111181734 B CN 111181734B
Authority
CN
China
Prior art keywords
groove
top surface
wire
stopper
rectangular block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201911148131.3A
Other languages
Chinese (zh)
Other versions
CN111181734A (en
Inventor
刘绪崇
卢庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Police Academy
Original Assignee
Hunan Police Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Police Academy filed Critical Hunan Police Academy
Priority to CN201911148131.3A priority Critical patent/CN111181734B/en
Publication of CN111181734A publication Critical patent/CN111181734A/en
Application granted granted Critical
Publication of CN111181734B publication Critical patent/CN111181734B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Emergency Lowering Means (AREA)

Abstract

The utility model provides a network safety detection device, including the L template, the spout of T type is seted up to the top surface front side of L template horizontal plate, the both sides difference movable mounting slider of spout, support fixed mounting motor is passed through to the horizontal plate top surface rear side of L template, the output fixed mounting line wheel of motor, the one end of the bottom surface upper portion fixed mounting cotton rope of cam, the other end and the line wheel fixed connection of cotton rope, and the cotton rope passes first wire casing in proper order, the spacing groove, the second wire casing, the upper portion fixed mounting stopper of cotton rope, the stopper is located the spacing inslot, and the stopper can reciprocate at the spacing inslot, when the stopper is located initial position, the top surface of stopper and the top surface contact cooperation of spacing groove, the several screw is seted up to one side of the vertical board of L template, screw thread mounting bolt. The invention can be directly fixedly arranged on the outer side of the computer host through the bolt, and the installation is convenient.

Description

Network security detection device
Technical Field
The invention belongs to the field of network security, and particularly relates to a network security detection device.
Background
Internet technology is becoming more and more mature, and in the process that the society is moving to intellectualization and informatization which are mainly based on internet technology, information safety is always a high concern of people in the development process of network technology, and important information is often stored in computers, especially the information stored in computers in laboratories is more important. In the prior art, a method for ensuring information security is to establish a firewall of information at a network end, or install an internet of things management system in a computer. The extremely low security of "firewall" is not good to the effect that information security stores. The security performance of the security protection software is relatively high. CN201811594267.2 discloses a security detection method and a detection device for a management system of internet of things in a laboratory, wherein when a PC is attacked by a virus program to steal information, the management system of internet of things can identify the virus program and perform isolation processing of the virus program, thereby preventing the attack of the virus program from preventing the information from being stolen, but the isolation processing of the management system of internet of things on the virus program cannot completely eliminate the virus program, as long as the virus program is still in the PC, the information of the PC can be stolen, and the capability of the management system of internet of things to process the virus program is limited, if a large number of virus programs appear in the same time period, the management system of internet of things can still have other virus programs to steal information when isolating a part of the virus programs, so that the management system of internet of things can identify the virus program but cannot completely prevent the virus program from stealing information, the user can only receive the prompt of the PC end and then carry out network disconnection or power-off operation on the computer to prevent information from being stolen, if the user does not find the prompt of the PC end in time, the possibility of information stealing is increased if the user fails to carry out network disconnection or power-off operation on the computer in time, and the safe storage of important information in a laboratory is seriously influenced.
Disclosure of Invention
The invention provides a network security detection device, which is used for overcoming the defects in the prior art.
The invention is realized by the following technical scheme:
a network safety detection device comprises an L-shaped plate, wherein a T-shaped sliding groove is formed in the front side of the top surface of a horizontal plate of the L-shaped plate, sliding blocks are movably mounted on two sides of the sliding groove respectively, one side of each sliding block is connected with one end of the corresponding sliding groove through a spring, the top surfaces of the sliding blocks are hinged with the bottom ends of supporting rods respectively, the top ends of the supporting rods are hinged with the bottom surface of a rectangular block together, a clamping groove is formed in one side of the top surface of the rectangular block, a through groove is formed in the bottom surface of the rectangular block and communicated with the clamping groove, a mounting groove is formed in one side of the front surface of the rectangular block and communicated with the clamping groove, a rotating shaft is mounted in a bearing in the groove, a torsional spring is arranged on the periphery of the rotating shaft and can rotate clockwise, a cam is fixedly mounted on the periphery of the rotating shaft, a limiting groove is formed in the rectangular block, and a first wire groove is formed in the top surface of the limiting groove, first wire casing communicates with each other with the recess is inside, the second wire casing is seted up at the bottom surface center of rectangular block, the second wire casing communicates with each other with the spacing inslot portion, support fixed mounting motor is passed through to the horizontal plate top surface rear side of L template, the output fixed mounting line wheel of motor, the one end of the bottom surface upper portion fixed mounting cotton rope of cam, the other end and the line wheel fixed connection of cotton rope, and the cotton rope passes first wire casing in proper order, the spacing groove, the second wire casing, the upper portion fixed mounting stopper of cotton rope, the stopper is located the spacing inslot, and the stopper can reciprocate at the spacing inslot, when the stopper is located initial position, the top surface of stopper and the top surface contact cooperation of spacing groove, several screw is seted up to one side of the vertical board of L template, screw thread mounting bolt.
In the network safety detection device, the rope is wear-resistant rope, such as aramid rope or nylon rope.
According to the network security detection device, the double-sided adhesive tape is adhered to the inner side of the vertical plate of the L-shaped plate.
In the network security detection device, the L-shaped plate is made of a metal material, such as stainless steel.
According to the network security detection device, the anti-skid pad is fixedly arranged on the inner wall of the clamping groove.
According to the network safety detection device, the button switch is fixedly installed in the center of the top face of the horizontal plate of the L-shaped plate and connected with the power circuit, the audible and visual alarm is fixedly installed on the outer side of the vertical plate of the L-shaped plate and connected with the button switch circuit, the audible and visual alarm is connected with the PC side circuit, and the button of the button switch can be pressed on the bottom face of the rectangular block.
The invention has the advantages that: the invention can be directly fixedly arranged on the outer side of the computer host through the bolt, and the installation is convenient. When the computer network cable is used, the network cable with the crystal head penetrates through the mounting groove, the crystal head is positioned above the rectangular block during mounting, the network cable penetrates through the mounting groove and then is arranged in the transparent groove, then the network cable is pulled towards the lower part of the rectangular block to clamp the crystal head into the clamping groove, the crystal head is inserted into the network cable connecting port of the computer host after being mounted, and then the computer can be normally networked to work. When a PC (personal computer) end is attacked by a virus program, a laboratory relay system A, a laboratory Internet of things management system server B and a server connection terminal C are connected with each other through network information and radio information, malicious programs and software sample sets are collected in real time in the running process of the equipment, the sample sets are decompiled, and authority information of each program and software in the sample sets is extracted to form an authority feature set; formatting the collected authority feature set to form input format authority data suitable for a detection algorithm; inputting the processed authority data into a detection algorithm according to the classification of malicious programs and software, firstly scanning the data for the first time to form an authority FP-Tree, and then scanning the data again to obtain an authority frequent item set of the malicious programs and the software; extracting authority frequent item sets of all malicious programs and software in the sample set by using an algorithm, and constructing an authority relation feature library for detection; when an unknown program and software are detected, extracting the unknown program and software permission frequent item set through the same steps, comparing the unknown program and software permission frequent item set with the permission relation feature library, and judging the properties of the unknown program and software; after the judgment of the unknown program and the software is finished, adding the acquired frequently-authorized item sets of the judged unknown program and the judged software into an authorization relation feature library to increase the capacity of a sample library; installing unknown programs and software which are not judged to a simulator and operating the simulator, and collecting system call data generated by the unknown programs and the software to confirm the properties of the unknown programs and the software by using behaviors of the unknown programs and the software during operation; processing and analyzing collected system calling data, constructing a system calling characteristic sample library, controlling a motor to work by a PC end output signal, driving a wire wheel to rotate together by an output shaft of the motor, enabling a wire rope to be always in a tensioned state, winding the wire rope around the periphery of the wire wheel when the wire wheel starts to take up the wire, pulling a cam to rotate anticlockwise by the wire rope, enabling a limiting block to move downwards along the inner wall of a limiting groove along with the movement of the wire rope, enabling a spring plate of a crystal head to be in a pressing state when the bottom surface of the limiting block is in contact fit with the bottom surface of the limiting groove, enabling the crystal head to be separated from a network connection port of a computer host at the moment, enabling the wire wheel to continue to take up the wire, enabling a rectangular block and the crystal head to be pulled downwards due to the blocking effect of the limiting block, enabling the rectangular block to extrude a supporting rod, enabling a sliding block to move towards two sides respectively under the effect of the supporting rod, and realizing network breaking when the crystal head is separated from the network connection port of the computer host, and the transmission of network data is blocked in time, so that the leakage of information is avoided. When the button of button switch was pressed to the bottom surface of rectangular block, audible-visual annunciator circular telegram, audible-visual annunciator sent warning sound and constantly glimmered, and timely warning user PC end receives malicious program's attack, and PC end discernment audible-visual annunciator is just working, and output signal control motor stall avoids the rectangular block overload to appear when can not continue to remove the motor, prevents that the motor from burning out. The invention can timely pull out the network cable by matching a plurality of components such as the rectangular block, the motor, the cord and the like, realizes the safe storage of the network disconnection protection information of the PC end, and is suitable for a computer which stores important information in a laboratory.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic structural view of the invention; FIG. 2 is a schematic view of the structure of the mounting groove of the present invention; FIG. 3 is an enlarged view of section I of FIG. 1; FIG. 4 is an enlarged view of section II of FIG. 3; fig. 5 is a circuit block diagram of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A network safety detection device comprises an L-shaped plate 1, wherein a T-shaped chute 2 is formed in the front side of the top surface of a horizontal plate of the L-shaped plate 1, sliding blocks 3 are movably mounted on two sides of the chute 2 respectively, the sliding blocks 3 can horizontally move in the chute 2, one side of each sliding block 3 is connected with one end of the chute 2 through springs 4 respectively, the top surfaces of the sliding blocks 3 are hinged with the bottom end of a supporting rod 5 respectively, the top ends of the supporting rods 5 are hinged with the bottom surface of a rectangular block 6 together, the hinged point of each supporting rod 5 and the rectangular block 6 is positioned on two sides of the bottom surface of the rectangular block 6, one side of the top surface of the rectangular block 6 is provided with a clamping groove 7, a crystal head can be positioned in the clamping groove 7, the inner wall of the clamping groove 7 is in close contact fit with the periphery of the crystal head, a through groove 8 is formed in the bottom surface of the rectangular block 6, the through groove 8 is communicated with the clamping groove 7, a network cable can pass through, one side of the front surface of the rectangular block 6 is provided with a mounting groove 9, the mounting groove 9 is communicated with the clamping groove 7, the mounting groove 9 is communicated with the through groove 8, the top surface and the bottom surface of the mounting groove 9 are communicated with the outside, a network cable can pass through the mounting groove 9 and be positioned in the clamping groove 7 and the through groove 8, one side of the clamping groove 7 is provided with a groove 10, a rotating shaft 11 is arranged in the groove 10 in a bearing way, two ends of the rotating shaft 11 are respectively connected with the front surface and the back surface of the groove 10 through bearings, the periphery of the rotating shaft 11 is provided with a torsional spring, the rotating shaft 11 is fixedly connected with the torsional spring, the rotating shaft 11 can rotate clockwise, the periphery of the rotating shaft 11 is fixedly provided with a cam 12, the cam 12 can press the elastic sheet of the crystal head towards the crystal head direction when rotating, the inside of the rectangular block 6 is provided with a limiting groove 13, the limiting groove 13 is positioned below the groove 10, the top surface of the limiting groove 13 is provided with a first wire groove 14, the first wire groove 14 is communicated with the inside of the groove 10, the center of the bottom surface of the rectangular block 6 is provided with a second wire groove 15, the second wire groove 15 is communicated with the inside of the limit groove 13, the motor 16 is fixedly installed on the rear side of the top surface of the horizontal plate of the L-shaped plate 1 through a support, the motor 16 is connected with a PC end circuit, the motor 16 is connected with a power circuit, the output end of the motor 16 is fixedly installed with a wire wheel 17, the vertical center line of the wire wheel 17 is collinear with the center line of the second wire groove 15, one end of a wire rope 18 is fixedly installed on the upper portion of the bottom surface of the cam 12, the other end of the wire rope 18 is fixedly connected with the wire wheel 17, the wire rope 18 sequentially penetrates through the first wire groove 14, the limit groove 13 and the second wire groove 15, a limit block 19 is fixedly installed on the upper portion of the wire rope 18, the limit block 19 is located in the limit groove 13 and can move up and down in the limit groove 13, when the limit block 19 is located at an initial position, the top surface of the limit block 19 is in contact fit with the top surface of the limit groove 13, the cam 12 is not contacted with the elastic sheet of the crystal head, when the bottom surface of the limiting block 19 is contacted and matched with the bottom surface of the limiting groove 13, the cam 12 presses the elastic sheet of the crystal head to the crystal head, the crystal head can be separated from a network cable interface on a computer host at the moment, one side of the vertical plate of the L-shaped plate 1 is provided with a plurality of screw holes 20, the screw holes 20 are internally threaded with mounting bolts 21, one side of the computer host is provided with a plurality of same screw holes 20, and the bolts 21 can simultaneously pass through the corresponding screw holes 20. The invention can be directly fixedly arranged on the outer side of the computer host through the bolt 21, and the installation is convenient. When the computer network cable is used, the network cable with the crystal head penetrates through the mounting groove 9, the crystal head is positioned above the rectangular block 6 during mounting, the network cable penetrates through the mounting groove 9 and then is arranged in the transparent groove 8, then the network cable is pulled towards the lower part of the rectangular block 6 to clamp the crystal head into the clamping groove 7, and the crystal head is inserted into the network cable connecting port of the computer host after being mounted, so that the computer can be normally networked to work. When a PC (personal computer) end is attacked by a virus program, a laboratory relay system A, a laboratory Internet of things management system server B and a server connection terminal C are connected with each other through network information and radio information, malicious programs and software sample sets are collected in real time in the running process of the equipment, the sample sets are decompiled, and authority information of each program and software in the sample sets is extracted to form an authority feature set; formatting the collected authority feature set to form input format authority data suitable for a detection algorithm; inputting the processed authority data into a detection algorithm according to the classification of malicious programs and software, firstly scanning the data for the first time to form an authority FP-Tree, and then scanning the data again to obtain an authority frequent item set of the malicious programs and the software; extracting authority frequent item sets of all malicious programs and software in the sample set by using an algorithm, and constructing an authority relation feature library for detection; when an unknown program and software are detected, extracting the unknown program and software permission frequent item set through the same steps, comparing the unknown program and software permission frequent item set with the permission relation feature library, and judging the properties of the unknown program and software; after the judgment of the unknown program and the software is finished, adding the acquired frequently-authorized item sets of the judged unknown program and the judged software into an authorization relation feature library to increase the capacity of a sample library; installing unknown programs and software which are not judged to a simulator and operating the simulator, and collecting system call data generated by the unknown programs and the software to confirm the properties of the unknown programs and the software by using behaviors of the unknown programs and the software during operation; processing and analyzing collected system calling data, constructing a system calling characteristic sample library, controlling the work of a motor 16 by a PC end output signal, driving a wire wheel 17 to rotate together by an output shaft of the motor 16, enabling a wire 18 to be always in a tensioned state, enabling the wire 18 to be wound on the periphery of the wire wheel 17 when the wire wheel 17 starts to take up the wire, enabling the wire 18 to pull a cam 12 to rotate anticlockwise, enabling a limiting block 19 to move downwards along the inner wall of a limiting groove 13 along with the movement of the wire 18, enabling a cam 18 to be in a compression state on an elastic sheet of a crystal head when the bottom surface of the limiting block 19 is in contact fit with the bottom surface of the limiting groove 13, enabling the crystal head to be separated from a network connection port of a computer host at the moment, enabling the wire wheel 17 to continue to take up the wire, enabling the whole rectangular block 6 and the crystal head to be pulled downwards due to the obstruction of the limiting block 19, enabling the rectangular block 6 to extrude a supporting rod 5, enabling a sliding block 3 to respectively move towards two sides under the action of the supporting rod 5, when the crystal head is separated from the network cable connection port of the computer host, the network is disconnected, the transmission of network data is blocked in time, and the information leakage is avoided. When the button of the button switch 22 is pressed on the bottom surface of the rectangular block 6, the audible and visual alarm 23 is powered on, the audible and visual alarm 23 gives out warning sound and continuously flickers, the PC end of a user is timely reminded of being attacked by malicious programs, the PC end recognizes that the audible and visual alarm is working, the motor 16 is controlled to stop rotating by an output signal, overload of the motor 16 is avoided when the rectangular block 6 cannot continuously move, and the motor 16 is prevented from being burnt. According to the invention, through the matching among the rectangular block 6, the motor 16, the cord 18 and other parts, the cord can be pulled out in time, the safe storage of the broken-network protection information of the PC end is realized, and the computer is suitable for being used for computers which store important information in laboratories.
Specifically, as shown in fig. 3, the cords 18 of the present embodiment are wear-resistant cords, such as aramid cords or nylon cords. The aramid fiber rope and the nylon rope have high wear resistance and low price, and can prolong the service life and reduce the production cost.
Specifically, as shown in fig. 1, a double-sided tape is adhered to the inner side of the vertical plate of the L-shaped plate 1 according to this embodiment. The structural design can ensure that the connection between the L-shaped plate 1 and the computer host is more stable, further prevent the L-shaped plate 1 from falling off from the side surface of the computer host, and improve the reliability of the invention.
Further, as shown in fig. 1, the L-shaped plate 1 according to the present embodiment is made of a metal material, such as stainless steel. The stainless steel has high hardness and good wear resistance, and is not easy to rust, so that the service life of the stainless steel can be prolonged.
Furthermore, as shown in fig. 3, the inner wall of the slot 7 of the present embodiment is fixedly installed with a non-slip mat. Not shown in the figure, this structural design can increase the frictional force between draw-in groove 7 and the quartzy head, further prevents that the quartzy head from droing in draw-in groove 7 to the outward appearance that can protect the quartzy head is not damaged when installing in draw-in groove 7.
Furthermore, as shown in fig. 1, a button switch 22 is fixedly installed at the center of the top surface of the horizontal plate of the L-shaped plate 1 in the embodiment, the button switch 22 is connected with a power circuit, an audible and visual alarm 23 is fixedly installed at the outer side of the vertical plate of the L-shaped plate 1, the audible and visual alarm 23 is connected with the button switch 22 through a circuit, the audible and visual alarm 23 is connected with a PC end circuit, the PC end can identify the working state of the audible and visual alarm 23, and the bottom surface of the rectangular block 6 can press the button of the button switch 22. When the button of the button switch 22 is pressed, the audible and visual alarm 23 is powered on, and the audible and visual alarm gives out warning sound and continuously flickers, so that the function of reminding can be achieved.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (6)

1. A network security detection device, characterized by: comprises an L-shaped plate (1), a T-shaped chute (2) is arranged on the front side of the top surface of a horizontal plate of the L-shaped plate (1), sliders (3) are movably arranged on two sides of the chute (2) respectively, the sliders (3) can horizontally move in the chute (2), one side of each slider (3) is connected with one end of the chute (2) through a spring (4), the top surfaces of the sliders (3) are hinged with the bottom ends of supporting rods (5) respectively, the top ends of the supporting rods (5) are hinged with the bottom surface of a rectangular block (6) together, one side of the top surface of the rectangular block (6) is provided with a clamping groove (7), a crystal head can be positioned in the clamping groove (7), the inner wall of the clamping groove (7) is in close contact fit with the periphery of the crystal head, a transparent groove (8) is arranged on the bottom surface of the rectangular block (6), the transparent groove (8) is communicated with the clamping groove (7), a network cable can pass through the transparent groove (8), a mounting groove (9) is arranged on one side of the front surface of the rectangular block (6), the mounting groove (9) is communicated with the clamping groove (7), a network cable can penetrate through the mounting groove (9) and is positioned in the clamping groove (7) and the through groove (8), the mounting groove (9) is communicated with the through groove (8), the top surface and the bottom surface of the mounting groove (9) are both communicated with the outside, one side of the clamping groove (7) is provided with a groove (10), a rotating shaft (11) is mounted in the groove (10) through a bearing, two ends of the rotating shaft (11) are respectively connected with the front surface and the rear surface of the groove (10) through bearings, the periphery of the rotating shaft (11) is provided with a torsion spring, the torsion spring can enable the rotating shaft (11) to rotate clockwise, the periphery of the rotating shaft (11) is fixedly provided with a cam (12), the cam (12) can press an elastic sheet of a crystal head towards the crystal head when rotating, the limiting groove (13) is formed in the rectangular block (6), the limiting groove (13) is positioned below the groove (10), and the top surface of the limiting groove (13) is provided with a first wire slot (14), the first wire groove (14) is communicated with the inside of the groove (10), a second wire groove (15) is formed in the center of the bottom surface of the rectangular block (6), the second wire groove (15) is communicated with the inside of the limiting groove (13), a motor (16) is fixedly installed on the rear side of the top surface of a horizontal plate of the L-shaped plate (1) through a support, the motor (16) is electrically connected with a PC (personal computer) circuit, the motor (16) is connected with a power circuit, a wire wheel (17) is fixedly installed at the output end of the motor (16), the central line of the vertical direction of the wire wheel (17) is collinear with the central line of the second wire groove (15), one end of a wire rope (18) is fixedly installed on the upper portion of the bottom surface of the cam (12), the other end of the wire rope (18) is fixedly connected with the wire wheel (17), the wire rope (18) sequentially penetrates through the first wire groove (14), the limiting groove (13) and the second wire groove (15), a limiting block (19) is fixedly installed on the upper portion of the wire rope (18), and the limiting block (19) is located in the limiting groove (13), and stopper (19) can reciprocate in spacing groove (13), when stopper (19) were located initial position, the top surface of stopper (19) and the top surface contact cooperation of spacing groove (13), when the top surface of stopper (19) and the top surface contact cooperation of spacing groove (13), cam (12) were not contacted with the shell fragment of quartzy head, when the bottom surface contact cooperation of stopper (19) and the bottom surface of spacing groove (13), cam (12) had pressed the shell fragment of quartzy head to quartzy head, quartzy head can break away from the net twine interface on the computer this moment, several screw (20) are seted up to one side of the vertical board of L template (1), screw (20) internal thread mounting bolt (21), several the same screw (20) are seted up to one side of computer, bolt (21) can pass corresponding screw (20) simultaneously.
2. The network security detection device of claim 1, wherein: the thread rope (18) is wear-resistant thread rope, such as aramid fiber rope and nylon rope.
3. The network security detection device of claim 1, wherein: and double-sided adhesive tapes are adhered to the inner sides of the vertical plates of the L-shaped plates (1).
4. The network security detection device of claim 1, wherein: the L-shaped plate (1) is made of a metal material, such as stainless steel.
5. The network security detection device of claim 1, wherein: and the inner wall of the clamping groove (7) is fixedly provided with an anti-skid pad.
6. The network security detection device of claim 1, wherein: the button switch (22) is fixedly installed in the center of the top surface of the horizontal plate of the L-shaped plate (1), the button switch (22) is connected with a power circuit, the audible and visual alarm (23) is fixedly installed on the outer side of the vertical plate of the L-shaped plate (1), the audible and visual alarm (23) is connected with the button switch (22) through a circuit, the audible and visual alarm (23) is connected with a PC (personal computer) side circuit, and the button of the button switch (22) can be pressed on the bottom surface of the rectangular block (6).
CN201911148131.3A 2019-11-21 2019-11-21 Network security detection device Expired - Fee Related CN111181734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911148131.3A CN111181734B (en) 2019-11-21 2019-11-21 Network security detection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911148131.3A CN111181734B (en) 2019-11-21 2019-11-21 Network security detection device

Publications (2)

Publication Number Publication Date
CN111181734A CN111181734A (en) 2020-05-19
CN111181734B true CN111181734B (en) 2021-10-22

Family

ID=70648754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911148131.3A Expired - Fee Related CN111181734B (en) 2019-11-21 2019-11-21 Network security detection device

Country Status (1)

Country Link
CN (1) CN111181734B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007199880A (en) * 2006-01-25 2007-08-09 Nec Corp Communication system, network for qualification examination and setting, communication device, and networking method for use therewith
CN205725796U (en) * 2016-06-15 2016-11-23 东华理工大学 A kind of network security automatic suspension device
CN106657004B (en) * 2016-11-16 2020-04-03 渤海大学 Internal and external network physical anti-attack conversion device
CN107682754B (en) * 2017-10-10 2020-03-24 温州大学瓯江学院 Cognitive radio equipment
CN208522781U (en) * 2018-05-31 2019-02-19 北京市龙腾佳讯科技股份公司 A kind of new network safety insulating device
CN109086636B (en) * 2018-09-18 2020-05-08 山东交通职业学院 Computer network safety isolation device
CN208955304U (en) * 2018-11-12 2019-06-07 中国人民公安大学 A kind of network security intelligence suspension device
CN110110558A (en) * 2019-05-17 2019-08-09 嘉兴怀莲贸易有限公司 A kind of network security detection system

Also Published As

Publication number Publication date
CN111181734A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN103353969B (en) Business hall intelligence management system based on experiential marketing
CN203441259U (en) Intelligent safety cabinet
CN106774023A (en) Remote cabinet visual intelligent real-time monitoring system
CN106251531A (en) A kind of thief-proof electricity meter box
CN108089040B (en) Electricity stealing prevention device with alarm function
CN111181734B (en) Network security detection device
CN203659179U (en) Operating environment comprehensive monitoring system of electric power switching station
CN110689706A (en) Method, device and system for monitoring large construction vehicle under overhead line
CN102737464B (en) Method, device and system for sensing state of intrusion alarm system
CN218850459U (en) Transformer substation protection hard pressing plate state monitoring device
CN204029066U (en) The security system of self-help bank
CN202711440U (en) Self-check system of intrusion detector
CN214376863U (en) Call for help alarm system
CN103106719A (en) Image electronic lock controlled by mobile phone
CN109326060B (en) Remote intelligent monitoring system for electric power self-service payment terminal
CN204651781U (en) Earth connection remote monitoring cabinet
CN220796030U (en) Alarm device based on network security
CN207216810U (en) The intelligent anti-intrusion robbing device of bank
CN202217363U (en) Electric fire hazard monitoring system with multiple comprehensive deduction
CN210670385U (en) Detection apparatus for security protection intelligent monitoring equipment safe operation
CN105278436A (en) Information machine room visualized monitoring method
CN111131762A (en) Power communication optical cable video monitoring method and device
CN111147545A (en) Intelligent electricity stealing prevention system based on NB-IoT
CN216388279U (en) Remote monitoring electric fire detector
CN205028363U (en) Access control case

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 410138 Hunan Police College, No.9, Yuanda Third Road, Changsha County, Changsha City, Hunan Province

Applicant after: HUNAN POLICE ACADEMY

Address before: 410138 Hunan Police Academy, 9 Yuanda three road, Changsha, Hunan

Applicant before: HUNAN POLICE ACADEMY

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20211022

CF01 Termination of patent right due to non-payment of annual fee