CN206272753U - A kind of computer network watch-dog - Google Patents
A kind of computer network watch-dog Download PDFInfo
- Publication number
- CN206272753U CN206272753U CN201621245541.1U CN201621245541U CN206272753U CN 206272753 U CN206272753 U CN 206272753U CN 201621245541 U CN201621245541 U CN 201621245541U CN 206272753 U CN206272753 U CN 206272753U
- Authority
- CN
- China
- Prior art keywords
- network
- module
- computer
- plc
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The utility model discloses a kind of computer network watch-dog, including network computer, GSM network and mobile device, the network computer is electrically connected with camera, picture monitoring module and identification module are provided with the network computer, network connection between the picture monitoring module and Dropbox, the PLC is electrically connected with warning light, alarm module and radio receiving transmitting module are provided with the PLC, the radio receiving transmitting module passes through wireless network between GSM network and mobile device and connects.The computer network watch-dog is provided with identification module, when Password Input mistake, PLC is opened camera and invader is monitored, and picture is transferred on mobile device by GSM network, people can be by mobile device monitor in real time picture, instant screen shot can be preserved and is uploaded in Dropbox by picture monitoring module, and camera supervised picture is also uploaded in Dropbox, and work and the strong data of evidence of crime offer are chased to later.
Description
Technical field
The utility model is related to computer network monitoring technology field, specially a kind of computer network watch-dog.
Background technology
In the growing modern society of computer network, the network security for LAN is increasingly taken seriously.Mesh
The security boundary (being primarily referred to as preventing the unsafe factor for coming from wide area network) of preceding LAN is general all to use each LAN
The special safety means of middle setting, can provide the functions such as fire wall, internet behavior analysis, network log-in management, be directed to
Computer in LAN monitored and controlled, Emulex for the Internet activity on internal computer (online monitoring) and
Process management (Intranet monitoring) internets such as the related internal act of non-online and assets are developed rapidly, and the use of internet is got over
Come more universal, network and the internet not only communication bridge as enterprises, are also enterprise and to carry out all kinds of business past for outside
The critical piping for coming.Expanding economy promotes people constantly to improve security protection consciousness, when traditional local simulation monitoring mode
Can not gradually meet some industries on a large scale, the demand of remote monitor, such as bank's trans-regional network monitor when, by network will
The Centralized Monitoring mode that image carries out remote transmission is arisen at the historic moment.With the popularization on a large scale of internet, remote monitoring has been oozed
Thoroughly to multiple fields such as education, government, public place of entertainment, hospital, hotel, sports buildings, urban public securities.
Existing computer network monitoring is in vital document during invader steals computer, it is impossible to which effractor is manipulated
Interface is monitored, it is impossible to provide strong data when evidence of crime is provided.
Utility model content
The purpose of this utility model is to provide a kind of computer network watch-dog, to solve to be proposed in above-mentioned background technology
When invader steals vital document in computer, it is impossible to effractor manipulate interface be monitored, it is impossible in the criminal of offer
The criminal evidence according to when the problem of strong data is provided.
To achieve the above object, the utility model provides following technical scheme:A kind of computer network watch-dog, including net
Network computer, identification module, picture monitoring module, Dropbox, camera, warning light, PLC, alarm module, wireless receiving and dispatching
Module, GSM network and mobile device, the network computer are electrically connected with camera, are provided with the network computer
Picture monitoring module and identification module, network connection between the picture monitoring module and Dropbox, the PLC and alarm
Lamp is electrically connected with, and alarm module and radio receiving transmitting module are provided with the PLC, and the radio receiving transmitting module passes through
Wireless network connection between GSM network and mobile device.
Preferably, it is electric connection between the network computer and PLC.
Preferably, the identification module is designed for password identification.
Preferably, it is electric connection between the PLC and alarm module.
Preferably, the camera is infrared camera.
Compared with prior art, the beneficial effects of the utility model are:The computer network watch-dog is provided with identification module,
And identification module is designed for password identification, when Password Input mistake, PLC is opened camera and invader is monitored,
And picture is transferred on mobile device by GSM network, people can be controlled by mobile device monitor in real time picture, and PLC
Device opens warning light and invader is deterred, it is to avoid invader steals a large amount of capsule information, and PLC passes through alarm module
Alarmed, after invader's Brute Force password, the picture monitoring module in network computer starts, and people can be by movement
Device real-time monitoring, but sometimes in null zones, signal is not received, picture monitoring module can protect instant screen shot
Deposit and be uploaded in Dropbox, camera supervised picture is also uploaded in Dropbox, by that behind null zones, can be looked into by Dropbox
Instant picture and historical picture are seen, and work and the strong data of evidence of crime offer are chased to later.
Brief description of the drawings
Fig. 1 is the utility model system flow schematic diagram.
In figure:1st, network computer, 2, identification module, 3, picture monitoring module, 4, Dropbox, 5, camera, 6, warning light,
7th, PLC, 8, alarm module, 9, radio receiving transmitting module, 10, GSM network, 11, mobile device.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole
Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made
The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of computer network watch-dog, including network meter
It is calculation machine 1, identification module 2, picture monitoring module 3, Dropbox 4, camera 5, warning light 6, PLC 7, alarm module 8, wireless
Transceiver module 9, GSM network 10 and mobile device 11, network computer 1 are electrically connected with camera 5, and camera 5 is taken the photograph for infrared
As head, infrared camera is powered low, strengthens nighttime image capturing ability, using newest optical design method, special optics
Glass material and the special focal plane shift for crossing the advanced technologies such as film and material, eliminating visible ray and infrared light, special optical
Glass material solves the problems, such as the infrared correspondence blur-free imaging of infrared camera, so that light of the visible region to infrared light district
Can be imaged in same position of focal plane, realize clearly image;The special membrane technology that crosses then allows infrared light saturating as far as possible
Past;Multicoating can also to greatest extent suppress the generation of ghost and flash of light under backlighting condition, even if bad in backlight etc.
Under the conditions of can also obtain the high-quality picture of relative high-contrast, also can clearly monitor invader at night, and recorded a video
With sectional drawing of taking pictures, and by backstage upload to Dropbox 4, the evidence of crime for chasing work and invader to the later police is provided
Strong data, to be electrically connected between network computer 1 and PLC 7, be between PLC 7 and alarm module 8
It is electrically connected with, the control alarm module 8 of PLC 7 is alarmed, it is to avoid cause more capsule information to reveal, when network meter
After the Password Input mistake of identification module 2 in calculation machine 1, the picture that the picture and picture monitoring module 3 that camera 5 is monitored are monitored
Face all needs to receive data by PLC 7, and is transferred on mobile device 11 by GSM network by radio receiving transmitting module 9,
For people's door monitor in real time picture, picture monitoring module 3 and identification module 2 are provided with network computer 1, identification module 2 is close
Code identification design, is provided with corresponding password, and after Password Input mistake, PLC 7 is opened warning light 6 and invader is entered
Row deterrence, it is to avoid invader steals a large amount of capsule information, and PLC 7 is alarmed by alarm module 8, picture monitoring mould
Network connection between block 3 and Dropbox 4, PLC 7 is electrically connected with warning light 6, and alarm module is provided with PLC 7
8 and radio receiving transmitting module 9, radio receiving transmitting module 9 passes through wireless network between GSM network 10 and mobile device 11 and connects.
Operation principle:When using the computer network watch-dog, need have one to whole computer network watch-dog first
Understanding in individual structure, important file in order to prevent from losing or reveal, can typically be stored in the computer of personal family with
It is anti-lost, but in manager nobody when, lawless person still has opportunity, after network computer 1 is opened, camera
5 are actuated for monitoring, and identification module 2 starts the prompting correct recognition code of input, after Password Input mistake, PLC 7
Control warning light 6 is lighted, and deterrent effect is played to effractor, makes its retreatment avoid causing the leakage of vital document, and PLC from controlling
Device 7 is alarmed by alarm module 8, and the picture of the monitoring of camera 5 is transferred to by radio receiving transmitting module 9 by GSM network 10
Mobile device 11, people can carry out monitor in real time by mobile device 11, after invader's Brute Force password, picture monitoring mould
Block 3 starts, and the interface that invader manipulates is monitored, and is transferred to mobile setting by GSM network 10 by radio receiving transmitting module 9
Standby 11, picture monitoring module 3 also by interface monitor in real time sectional drawing, and by the way that in backstage upload to Dropbox 4, camera 5 is monitored
Picture also transmit to Dropbox 4, people can carry out checking all historical pictures by Dropbox 4, and chase work to the police
Strong data are provided with effractor's evidence of crime.
In sum, although being described in detail to the utility model with reference to the foregoing embodiments, for this area
For technical staff, it can still modify to the technical scheme described in foregoing embodiments, or to which part
Technical characteristic carries out equivalent, all any modifications within spirit of the present utility model and principle, made, equivalent,
Improve etc., should be included within protection domain of the present utility model.
Claims (5)
1. a kind of computer network watch-dog, including network computer (1), identification module (2), picture monitoring module (3), Dropbox
(4), camera (5), warning light (6), PLC (7), alarm module (8), radio receiving transmitting module (9), GSM network (10)
With mobile device (11), it is characterised in that:The network computer (1) is electrically connected with camera (5), the network computer
(1) picture monitoring module (3) and identification module (2), network between the picture monitoring module (3) and Dropbox (4) are provided with
Connection, the PLC (7) is electrically connected with warning light (6), and alarm module (8) is provided with the PLC (7)
With radio receiving transmitting module (9), the radio receiving transmitting module (9) is by wireless network between GSM network (10) and mobile device (11)
Network is connected.
2. a kind of computer network watch-dog according to claim 1, it is characterised in that:The network computer (1) with
It is electric connection between PLC (7).
3. a kind of computer network watch-dog according to claim 1, it is characterised in that:The identification module (2) is close
Code identification design.
4. a kind of computer network watch-dog according to claim 1, it is characterised in that:The PLC (7) and report
It is electric connection between alert module (8).
5. a kind of computer network watch-dog according to claim 1, it is characterised in that:The camera (5) is infrared
Camera.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621245541.1U CN206272753U (en) | 2016-11-16 | 2016-11-16 | A kind of computer network watch-dog |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621245541.1U CN206272753U (en) | 2016-11-16 | 2016-11-16 | A kind of computer network watch-dog |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206272753U true CN206272753U (en) | 2017-06-20 |
Family
ID=59040261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621245541.1U Expired - Fee Related CN206272753U (en) | 2016-11-16 | 2016-11-16 | A kind of computer network watch-dog |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206272753U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795773A (en) * | 2019-09-03 | 2020-02-14 | 淮阴师范学院 | Notebook computer one-key start-stop system with high security |
CN113947863A (en) * | 2021-10-13 | 2022-01-18 | 上海翼枭航空科技有限公司 | Remote control method and system for unmanned aerial vehicle |
-
2016
- 2016-11-16 CN CN201621245541.1U patent/CN206272753U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795773A (en) * | 2019-09-03 | 2020-02-14 | 淮阴师范学院 | Notebook computer one-key start-stop system with high security |
CN113947863A (en) * | 2021-10-13 | 2022-01-18 | 上海翼枭航空科技有限公司 | Remote control method and system for unmanned aerial vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103578240B (en) | A kind of security protection service network based on Internet of Things | |
CN107730681A (en) | A kind of Campus Security ensures intelligent supervision early warning system | |
CN105678666B (en) | Experimental building security and emergency plan issuing system based on Internet of things | |
CN106886970A (en) | A kind of floating population's management system and its application method with warning function | |
CN106713481A (en) | Community intelligent security system based on Internet of Things | |
CN103268680A (en) | Intelligent monitoring and anti-theft system for family | |
Norman | Integrated security systems design: A complete reference for building enterprise-wide digital security systems | |
CN105979232A (en) | Video monitoring system for closed school | |
CN205809947U (en) | A kind of prison access control management system | |
CN110535895A (en) | A kind of machine room monitoring system based on technology of Internet of things | |
CN106303382A (en) | A kind of emergency command comprehensive management platform based on Internet of Things | |
CN109068105A (en) | A kind of prison video monitoring method based on deep learning | |
CN206272753U (en) | A kind of computer network watch-dog | |
CN108683890A (en) | A kind of law-enforcing recorder data transmission system and its method using 5G networks | |
CN109767594A (en) | A kind of household monitor video intelligent linkage early warning system | |
CN209657318U (en) | A kind of intelligent safety defense monitoring system based on recognition of face | |
CN206672171U (en) | A kind of floating population's management system with warning function | |
CN201796450U (en) | Intelligent monitoring system with border-crossing identification function | |
CN111400774B (en) | Block chain system of secondary water supply anti-terrorism anti-poison safety system | |
CN107808238A (en) | A kind of management method and system for equipping assets | |
CN206533398U (en) | A kind of community intelligent safety-protection system based on Internet of Things | |
CN109658316A (en) | A kind of safe emergency advance warning management method in garden and device | |
CN108537931A (en) | A kind of artificial intelligence face recognition door control system | |
CN206672172U (en) | A kind of police service early warning system based on gate inhibition's data | |
CN213070108U (en) | Campus one-key type networking alarm system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170620 Termination date: 20171116 |
|
CF01 | Termination of patent right due to non-payment of annual fee |