CN111429680A - Indoor safety early warning system of financial affairs - Google Patents

Indoor safety early warning system of financial affairs Download PDF

Info

Publication number
CN111429680A
CN111429680A CN202010297430.XA CN202010297430A CN111429680A CN 111429680 A CN111429680 A CN 111429680A CN 202010297430 A CN202010297430 A CN 202010297430A CN 111429680 A CN111429680 A CN 111429680A
Authority
CN
China
Prior art keywords
module
information
early warning
encryption
financial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010297430.XA
Other languages
Chinese (zh)
Inventor
李洁
李金芳
吕海东
李韦佳
孙明
陈然
朱琦楠
田朝阳
臧荷芳
张瑞军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010297430.XA priority Critical patent/CN111429680A/en
Publication of CN111429680A publication Critical patent/CN111429680A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1654Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Quality & Reliability (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a financial indoor safety early warning system which comprises an information acquisition module, an information fusion module, a data encryption backup module and an early warning module, wherein the information fusion module comprehensively judges and analyzes the invasion possibility and the invasion type according to the information acquired by the information acquisition module and controls the data encryption backup module to carry out encryption and backup operations. The invention can realize the operations of data security encryption backup and the like before being subjected to security infringement or in the infringement implementation process by improving the intelligent early warning capability, thereby improving the security level of a financial room.

Description

Indoor safety early warning system of financial affairs
Technical Field
The invention relates to the technical field of safety early warning, in particular to a financial indoor safety early warning system.
Background
The finance room is the most important place for the company, and has various most important data, and some data can not be recovered once being damaged. At present, the safety of a financial room is protected mostly by means of science and technology, the situation in the financial room is recorded by a camera all the time, and once a problem is found, the problem can be detected by calling a video record. As shown in fig. 1, the prior art discloses an indoor safety emergency early warning system as application No. 201621356257.1, which includes: including wireless transmission module, a collection module for real-time supervision building condition, terminal equipment and alarm system module, be connected through wireless transmission module signal transmission between collection module and the terminal equipment, the alarm system module is connected with terminal equipment, this collection module includes sensor acquisition module and camera acquisition module, camera acquisition module embeds there is the first WIFI transmission module who is used for carrying out network transmission with terminal equipment, camera acquisition module including the camera that is used for gathering analog video signal that connects gradually, will analog video signal turns into digital signal's AD chip, will the CPU of digital signal code compression IP data is used for transmitting IP data to terminal equipment's first WIFI module.
As shown in fig. 2, the prior art discloses an intelligent security monitoring system for a financial room as application No. 201621312230.2, which includes video monitoring groups, a ZigBee coordinator and a monitoring center, which are respectively disposed at each monitoring position in the financial room, each video monitoring group includes two cameras, a control unit and a ZigBee module, one of the cameras is controlled by a clock circuit connected to the control unit to control the working time period of the camera, the other camera is controlled by a sensing unit connected to the control unit to realize intelligent control of the working of the camera, each video monitoring group further includes a storage unit, and the storage unit is used for storing monitoring information of each video monitoring group; each video monitoring group is connected with a ZigBee coordinator through a ZigBee module, and the ZigBee coordinator is connected with a monitoring center.
However, the prior art only monitors the situation of the financial room, the obtained information is single, the early warning degree and the security level are low when the financial room is illegally invaded, and the increasingly complex security management requirements of the financial data cannot be met.
Disclosure of Invention
The invention provides an unattended financial indoor safety early warning system, which can realize operations such as data safety encryption backup and the like before being subjected to safety infringement or in an infringement implementation process by improving the intelligent early warning capacity, reduce recoverable loss and improve the safety level of a financial room.
In order to realize the functions, the invention adopts a technical scheme that:
a financial indoor safety early warning system comprises an information acquisition module, an information fusion module, a data encryption backup module and an early warning module; wherein the content of the first and second substances,
the information collected by the information collecting module includes but is not limited to the following information: staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information.
The information fusion module comprehensively judges and analyzes the intrusion possibility and the intrusion type according to the information acquired by the information acquisition module, and controls the data encryption backup module to carry out encryption and backup operations, wherein the encryption operation sets a corresponding encryption level according to the intrusion possibility.
The data encryption backup module can encrypt the financial data, wherein the encryption can be implemented as soft encryption or hard encryption, and can also implement backup operation on the financial data, wherein the backup comprises cloud backup, distributed encryption backup and other modes.
The early warning module is connected with the information fusion module and used for judging whether to send out early warning and what kind of early warning to send out according to the analysis result of the information fusion module.
Preferably, the information acquisition module comprises a central processing module, an access control module, a video acquisition module, a face posture recognition module, a perimeter detection module, an alarm module, a communication module and a local storage module; the central processing module is in communication connection with the access control module, the video acquisition module, the face gesture recognition module, the perimeter detection module, the alarm module, the communication module and the local storage module respectively.
Preferably, the entrance guard control module is connected with the central processing module, the entrance guard control module is used for reading and verifying ID identity to control entrance guard opening or closing, and simultaneously transmitting the read ID identity information to the central processing module in real time, the entrance guard control module comprises but is not limited to license plate recognition entrance guard, elevator entrance guard and entrance guard entering workplaces, wherein the ID information comprises license plate information, employee identity information and authorized identity information, and the authorized identity information comprises security information such as passwords and passwords; the entrance guard control module can adopt a mode of accessing a license plate recognition parking system and collecting license plate recognition information in real time, and also can adopt a mode of wireless sensor network communication to concentrate all entrance guard information to the relay node, and then the relay node transmits data to the entrance guard control module. The method comprises the steps that a wireless communication node is additionally integrated in a license plate recognition camera module, when a license plate is recognized, the wireless communication node is triggered to read license plate information, and the license plate information is transmitted to an entrance guard control module through a wireless sensor network; the access control module can also access a gate access control system or an access control management system to read the identity information of the employee card, and similarly, the access control module can also adopt a wireless sensor network mode to acquire the swiping card information of the employee card of the access control department.
The video acquisition module is arranged at each part of an office building, a monitoring module in a video monitoring machine room can be adopted, video information in the monitoring module is transmitted to the face gesture recognition module in real time, the face gesture recognition module recognizes face information, if the face information is unauthorized people, the face information is directly transmitted to the central processing module to control the alarm module to carry out alarm processing, and if the face information is authorized people, the face gesture recognition module continues to recognize and analyze gestures and route information of authorized people and transmits the information to the central processing module.
Wherein, the perimeter alarm information includes but is not limited to the following information: electronic fence information, video monitoring abnormal information, door lock damage information and the like; the perimeter alarm module can adopt an optical fiber vibration protection system capable of identifying illegal abnormal invasion and transmits alarm information detected by the alarm host to the central processing module.
The communication module is connected with the information fusion module in a wired or wireless mode, and the communication mode between the information acquisition module and the information fusion module can adopt the communication mode which can realize communication between a lower computer and an upper computer, such as RS232 interface, WIFI communication, RJ45 network port communication mode and the like.
The local storage module is used for temporarily storing the acquired entrance guard ID information, the useful video segments acquired by the video acquisition module, the face posture recognition result, the perimeter detection alarm information, the ID information sent by the information fusion module and the like;
the central processing module packages the employee license plate information, the video head portrait posture information, the employee license plate information, the route information, the perimeter alarm information or default packages of the information acquired and analyzed by the access control module, the face posture recognition module and the perimeter detection module, and transmits the packaged data to the information fusion module in real time through the communication module;
the information fusion module is connected with the central processing module through the communication module, receives the packed data sent by the central processing module, decompresses the packed data and analyzes and processes the decompressed packed data, and the information fusion module, the data encryption backup module and the early warning module are all arranged in the financial room.
The data encryption backup module is used for carrying out corresponding encryption and backup operations on data needing to be ensured to be safe, such as financial data, business secrets and the like according to the judgment result of the information fusion module.
The invention also provides a financial indoor safety early warning method, which comprises the following steps:
firstly, collecting intrusion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, and comprehensively packaging and sending the information to an information fusion module;
secondly, performing information fusion judgment, decompressing the packed information by an information fusion module, and comprehensively analyzing the intrusion possibility and the intrusion type according to the decompressed information;
and thirdly, encrypting backup operation, namely starting data encryption backup or early warning operation according to the intrusion possibility and the intrusion type.
Preferably, the information fusion judgment in the step two is specifically as follows: the information fusion module runs an information fusion algorithm, the information fusion algorithm integrates information such as staff license plate information, video head portrait attitude information, staff license plate information, route information, perimeter alarm information and the like, firstly, whether unauthorized destructive intrusion exists is judged, namely whether perimeter alarm destructive entry exists is judged, and whether unauthorized staff exists is judged by combining the video head portrait attitude information; secondly, judging whether the staff is in unauthorized invasion, namely judging the identity of the staff according to license plate information, video head portrait posture information and staff license plate information, and judging whether unauthorized behaviors (such as abnormal routes or illegal invasion to non-permission places such as financial rooms) exist by combining route information; and finally, judging whether the authorized staff has complete authorized data, namely the authorized staff can realize the operation by an authorized operation party needing different persons at a higher level or the same level when carrying out non-authorized operation.
Preferably, the data encryption in step three is data encryption operation performed dynamically in real time according to the possibility of intrusion and the type of intrusion, for example, the data encryption operation is performed in a manner of reconstructing data in an encryption manner or a hard encryption manner preset by an authorized person.
Preferably, the data encryption further includes distributing authorized decryption information, the authorized decryption information includes a short message verification code, an application software generated decryption code and the like, after the data encryption operation, the authorized decryption information required for decrypting the data is distributed to each authority person, and the information can be decrypted after the authorized decryption information of each authority person is integrated.
Preferably, the data encryption backup operation in step three is specifically as follows: when the result output by the information fusion module is unauthorized destructive intrusion, starting backup data to a safe cloud end, and starting a data self-destruction step; if the unauthorized invasion of the employee is detected, data encryption is performed firstly, information such as a verification code and the like required by decryption information is distributed to authority personnel, if the authority personnel authorize the unauthorized invasion of the employee, only the encrypted data is backed up to a safety cloud, an early warning module is controlled to record the unauthorized invasion behavior of the employee and distribute the unauthorized invasion behavior to all authority personnel for knowing, and if the authorization of the corresponding authority personnel is not obtained, a data self-destruction step is started; if the authority is the authority, the authority data of the authority is not encrypted or backed up, if the authority accesses the non-authority data, the non-authority data is backed up at a safety cloud and a verification code is distributed to the corresponding authority, the authority can normally access the non-authority data after obtaining the authorization of the non-authority data, and otherwise, a data self-destruction step is started.
Preferably, the data self-destruction step includes: data encryption, namely encrypting the security data; data backup, namely backing up the encrypted data to a safe cloud; data self-destruction, which initiates a data self-destruction procedure upon detecting that a destructive intrusion has arrived at the financial room.
According to the invention, various information of the personnel entering and exiting are collected by the information collection module and sent to the information fusion module for information fusion judgment, and then corresponding encryption backup operation is executed, so that the safety of a financial room can be evaluated in real time, and the method can adapt to complex external safety threats; meanwhile, the data is encrypted and backed up or even self-destructed according to the judgment result output by the information fusion module to realize the real-time safety control of the data; not only is the timely early warning of a financial room realized, but also the real-time encryption and backup of data safety are realized, and compared with a fixed encryption backup mode in the prior art, the data encryption backup method is not easy to crack and invade, and the safety level of the data is improved.
Drawings
Fig. 1 is a system diagram of an indoor safety emergency early warning system in the prior art.
Fig. 2 is a system diagram of an indoor security system of the prior art.
Fig. 3 is a system block diagram of an unattended financial indoor security early warning system.
Fig. 4 is a block diagram of a specific implementation of the information acquisition module 1.
Fig. 5 is a flow chart of an unattended financial indoor security early warning method.
FIG. 6 is a flow chart of data self-destruction.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 3-4, a financial indoor security early warning system includes an information acquisition module 1, an information fusion module 2, a data encryption backup module 3, and an early warning module 4; wherein the content of the first and second substances,
the information collected by the information collecting module 1 includes but is not limited to the following information: staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information.
The information fusion module 2 comprehensively judges and analyzes the intrusion possibility and the intrusion type according to the information acquired by the information acquisition module 1, and controls the data encryption backup module 3 to implement encryption and backup operations, wherein the encryption operation sets a corresponding encryption level according to the intrusion possibility.
The data encryption backup module 3 may encrypt the financial data, where the encryption may be implemented as soft encryption or hard encryption, and may also implement backup operation on the financial data, where the backup includes cloud backup and distributed encryption backup.
The early warning module 4 is connected with the information fusion module 2, and judges whether to send out early warning and what kind of early warning to send out according to the result analyzed by the information fusion module 2.
The information acquisition module 1 comprises a central processing module 1-1, an entrance guard control module 1-2, a video acquisition module 1-3, a face posture recognition module 1-4, a perimeter detection module 1-5, an alarm module 1-6, a communication module 1-7 and a local storage module 1-8; the central processing module 1-1 is respectively in communication connection with the access control module 1-2, the video acquisition module 1-3, the face posture recognition module 1-4, the perimeter detection module 1-5, the alarm module 1-6, the communication module 1-7 and the local storage module 1-8;
the entrance guard control module 1-2 is connected with the central processing module 1-1, the entrance guard control module 1-2 is used for reading and verifying ID identity to control entrance guard opening or closing, and simultaneously transmitting the read ID identity information to the central processing module 1-1 in real time, the entrance guard control module 1-2 comprises but is not limited to license plate recognition entrance guard, elevator entrance guard and entrance guard entering a workplace, wherein the ID information comprises license plate information, employee identity information and authorized identity information, and the authorized identity information comprises security information such as passwords and passwords; the access control module 1-2 can adopt a mode of accessing a license plate recognition parking system and collecting license plate recognition information in real time, and can also adopt a mode of wireless sensor network communication to centralize each piece of access information to a relay node, and then the relay node transmits data to the access control module 1-2. The method comprises the steps that a wireless communication node is additionally integrated in a license plate recognition camera module, when a license plate is recognized, the wireless communication node is triggered to read license plate information, and the license plate information is transmitted to an entrance guard control module 1-2 through a wireless sensor network; the entrance guard control module 1-2 can also access a gate entrance guard system or an entrance guard management system to read the identity information of the employee card, and similarly, can also adopt a wireless sensor network mode to acquire the swiping card information of the employee card at the entrance guard;
the video acquisition 1-3 module is arranged at each part of an office building, a monitoring module in a video monitoring machine room can be adopted, video information in the monitoring module is transmitted to the face gesture recognition module 1-4 in real time, the face gesture recognition module 1-4 recognizes face information, if the face gesture recognition module is an unauthorized person, the face information is directly transmitted to the central processing 1-1 module to control the alarm module 1-6 to carry out alarm processing, and if the face gesture recognition module is an authorized person, the face gesture recognition module 1-4 continues to recognize and analyze gesture and route information of the authorized person and transmits the information to the central processing 1-1 module.
Wherein, the perimeter alarm information includes but is not limited to the following information: electronic fence information, video monitoring abnormal information, door lock damage information and the like; the perimeter alarm module 1-6 can adopt an optical fiber vibration protection system capable of identifying illegal abnormal invasion and transmits alarm information detected by an alarm host to the central processing module 1-1.
The communication modules 1-7 are connected with the information fusion module 2 in a wired or wireless mode, and the communication mode between the information acquisition module 1 and the information fusion module 2 can adopt a communication mode capable of realizing communication between a lower computer and an upper computer, such as RS232 interface, WIFI communication, RJ45 network port communication mode and the like;
the local storage module 1-8 is used for temporarily storing the collected entrance guard ID information, the useful video segments collected by the video collection 1-3 module, the face gesture recognition result, the perimeter detection alarm information, the ID information sent by the information fusion module 2 and the like.
The central processing module 1-1 packages the employee license plate information, video head portrait posture information, employee license plate information, route information, perimeter alarm information or default package of the information acquired and analyzed by the access control module 1-2, the human face posture recognition module 1-4 and the perimeter detection module 1-5, and transmits the package data to the information fusion module 2 in real time through the communication module 1-7;
the information fusion module 2 is connected with the central processing module 1-1 through the communication module 1-7, receives the packed data sent by the central processing module 1-1, decompresses the packed data and analyzes and processes the decompressed data, and the information fusion module 2, the data encryption backup module 3 and the early warning module 4 are all arranged in a financial room.
The data encryption backup module 3 is used for performing corresponding encryption and backup operations on data which needs to be secured, such as financial data, business secrets and the like, according to the judgment result of the information fusion module 2.
Example 2
As shown in fig. 5, a financial indoor security early warning method adopts the above system, and includes the following steps:
step one, collecting intrusion information, acquiring information such as staff license plate information, video head portrait posture information, staff license plate information, route information and perimeter alarm information, comprehensively packaging the information and sending the information to the information fusion module 2.
And step two, performing information fusion judgment, decompressing the packed information by the information fusion module 2, and comprehensively analyzing the intrusion possibility and the intrusion type according to the decompressed information.
And step three, encrypting backup operation, namely starting data encryption backup or early warning operation according to the invasion possibility and the invasion type.
Example 3
As shown in fig. 6, the present embodiment is otherwise the same as embodiment 2, except that: the information fusion judgment in the step two is specifically as follows: the information fusion module 2 runs an information fusion algorithm, the information fusion algorithm integrates information such as staff license plate information, video head portrait posture information, staff license plate information, route information, perimeter alarm information and the like, firstly, whether unauthorized destructive intrusion is judged, namely whether perimeter alarm destructive entry is judged, and whether unauthorized staff is judged by combining the video head portrait posture information; secondly, judging whether the staff is in unauthorized invasion, namely judging the identity of the staff according to license plate information, video head portrait posture information and staff license plate information, and judging whether unauthorized behaviors (such as abnormal routes or illegal invasion to non-permission places such as financial rooms) exist by combining route information; and finally, judging whether the authorized staff has complete authorized data, namely the authorized staff can realize the operation by an authorized operation party needing different persons at a higher level or the same level when carrying out non-authorized operation.
Example 4
In this embodiment, the others are the same as those in embodiment 2, except that: the data encryption in step three is data encryption operation performed dynamically in real time according to the intrusion possibility and the intrusion type, for example, encryption is performed in a way of reconstructing data by adopting an encryption mode preset by an authorized person or a hard encryption mode.
The data encryption also comprises distributing authorization decryption information, the authorization decryption information comprises a short message verification code, an application software generation decryption code and the like, after the data encryption operation, the authorization decryption information required by the decryption data is distributed to each authority personnel, and the information can be decrypted after the authorization decryption information of each authority personnel is integrated.
Example 5
In this embodiment, the others are the same as those in embodiment 2, except that: the data encryption backup operation in step three is specifically as follows: when the result output by the information fusion module 2 is unauthorized destructive intrusion, starting backup data to a safe cloud end, and starting a data self-destruction step; if the unauthorized invasion of the employee is detected, data encryption is performed firstly, information such as a verification code and the like required by decryption information is distributed to authority personnel, if the authority personnel authorize the unauthorized invasion of the employee, only the encrypted data is backed up to a safety cloud, the early warning module 4 is controlled to record the unauthorized invasion of the employee and distribute the unauthorized invasion to all authority personnel for knowing, and if the authorization of the corresponding authority personnel is not obtained, a data self-destruction step is started; if the authority is the authority, the authority data of the authority is not encrypted or backed up, if the authority accesses the non-authority data, the non-authority data is backed up at a safety cloud and a verification code is distributed to the corresponding authority, the authority can normally access the non-authority data after obtaining the authorization of the non-authority data, and otherwise, a data self-destruction step is started.
The data self-destruction step comprises the following steps: data encryption, namely encrypting the security data; data backup, namely backing up the encrypted data to a safe cloud; data self-destruction, which initiates a data self-destruction procedure upon detecting that a destructive intrusion has arrived at the financial room.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. The indoor financial security early warning system is characterized by comprising an information acquisition module (1), an information fusion module (2), a data encryption backup module (3) and an early warning module (4); the information fusion module comprehensively judges and analyzes the intrusion possibility and the intrusion type according to the information acquired by the information acquisition module, and controls the data encryption backup module to carry out encryption and backup operations; the early warning module is connected with the information fusion module and used for judging whether to send out early warning and what kind of early warning to send out according to the analysis result of the information fusion module.
2. A financial indoor security early warning system as claimed in claim 1, wherein the information collected by the information collecting module (1) includes but is not limited to the following information: staff license plate information, video head portrait posture information, staff license plate information, route information or perimeter alarm information.
3. A financial indoor safety early warning system according to claim 1 or 2, the information acquisition module (1) comprises a central processing module (1-1), an access control module (1-2), a video acquisition module (1-3), a face posture recognition module (1-4), a perimeter detection module (1-5), an alarm module (1-6), a communication module (1-7) and a local storage module (1-8), wherein the central processing module (1-1) is in communication connection with the access control module (1-2), the video acquisition module (1-3), the face posture recognition module (1-4), the perimeter detection module (1-5), the alarm module (1-6), the communication module (1-7) and the local storage module (1-8) respectively.
4. A financial indoor security precaution system according to any one of claims 1 to 3, wherein the encryption operation sets the corresponding encryption level according to the possibility of intrusion.
5. A financial indoor security early warning system as claimed in claim 4, wherein the encryption operation is implemented as hard encryption.
6. A financial indoor security early warning system according to claim 1, wherein the communication modules (1-7) are connected with the information fusion module (2) in a wired or wireless manner, and the communication manner between the information collection module (1) and the information fusion module (2) includes but is not limited to RS232, WIFI communication or RJ45 network port communication.
7. A financial indoor security early warning system as claimed in claim 4, wherein the encryption operation is implemented as soft encryption.
CN202010297430.XA 2020-04-16 2020-04-16 Indoor safety early warning system of financial affairs Pending CN111429680A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010297430.XA CN111429680A (en) 2020-04-16 2020-04-16 Indoor safety early warning system of financial affairs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010297430.XA CN111429680A (en) 2020-04-16 2020-04-16 Indoor safety early warning system of financial affairs

Publications (1)

Publication Number Publication Date
CN111429680A true CN111429680A (en) 2020-07-17

Family

ID=71556428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010297430.XA Pending CN111429680A (en) 2020-04-16 2020-04-16 Indoor safety early warning system of financial affairs

Country Status (1)

Country Link
CN (1) CN111429680A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120146791A1 (en) * 2002-02-01 2012-06-14 @Security Broadband Corp. Lifestyle Multimedia Security System
CN103370717A (en) * 2011-12-22 2013-10-23 英特尔公司 Always-available embedded theft reaction subsystem
CN104809833A (en) * 2015-04-15 2015-07-29 中山弘博企业管理咨询有限公司 Security alarming system based on Internet of things
CN206505426U (en) * 2016-12-13 2017-09-19 南京风帆网络科技有限公司 A kind of electronics and IT products intelligent management system based on Internet of Things
CN206892875U (en) * 2017-06-02 2018-01-16 西安文理学院 A kind of computer network security isolating device
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120146791A1 (en) * 2002-02-01 2012-06-14 @Security Broadband Corp. Lifestyle Multimedia Security System
CN103370717A (en) * 2011-12-22 2013-10-23 英特尔公司 Always-available embedded theft reaction subsystem
CN104809833A (en) * 2015-04-15 2015-07-29 中山弘博企业管理咨询有限公司 Security alarming system based on Internet of things
CN206505426U (en) * 2016-12-13 2017-09-19 南京风帆网络科技有限公司 A kind of electronics and IT products intelligent management system based on Internet of Things
CN206892875U (en) * 2017-06-02 2018-01-16 西安文理学院 A kind of computer network security isolating device
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Similar Documents

Publication Publication Date Title
US11682278B2 (en) Data-secure sensor system
CN107888609A (en) A kind of information security of computer network system
CA2713320C (en) Method and apparatus for detecting behavior in a monitoring system
CN112182519A (en) Computer storage system security access method and access system
CN111311863A (en) Unattended financial indoor safety early warning method
CN110543761A (en) big data analysis method applied to information security field
CN107196932A (en) Managing and control system in a kind of document sets based on virtualization
CN115499844B (en) Mobile terminal information safety protection system and method
CN112291222A (en) Electric power edge calculation safety protection system and method
CN111046405B (en) Data processing method, device, equipment and storage medium
CN112905965A (en) Financial big data processing system based on block chain
JP2005502944A (en) Apparatus and method for recognizing at least one individual, apparatus and system for monitoring access, and corresponding use
CN1567346A (en) Flush bonding fingerprint gate inhibition system with infrared videotaping and wireless function
CN212229720U (en) Intelligent access control system based on block chain
KR102365571B1 (en) Method and apparatus for managing password including one-time password issuance function for integrally managing closed-circuit television
CN108521431A (en) A kind of information security of computer network system
CN107315974A (en) A kind of image-forming media protection device based on Internet of Things
CN111429680A (en) Indoor safety early warning system of financial affairs
CN107277320A (en) A kind of safe picture pick-up device encryption method and safe picture pick-up device
CN111159674A (en) Novel safe and confidential intelligent information acquisition device and method
CN111583493A (en) Intelligent access control system based on block chain
JP5353147B2 (en) Face matching system
CN106162083B (en) A kind of HD video superposition processing system and its method for carrying out safety certification
CN112995220A (en) Security data security system for computer network
CN115952477A (en) User data protection system of safety computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination