CN206272753U - A kind of computer network watch-dog - Google Patents

A kind of computer network watch-dog Download PDF

Info

Publication number
CN206272753U
CN206272753U CN201621245541.1U CN201621245541U CN206272753U CN 206272753 U CN206272753 U CN 206272753U CN 201621245541 U CN201621245541 U CN 201621245541U CN 206272753 U CN206272753 U CN 206272753U
Authority
CN
China
Prior art keywords
network
module
computer
plc
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201621245541.1U
Other languages
Chinese (zh)
Inventor
李庆生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengde Petroleum College
Original Assignee
Chengde Petroleum College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengde Petroleum College filed Critical Chengde Petroleum College
Priority to CN201621245541.1U priority Critical patent/CN206272753U/en
Application granted granted Critical
Publication of CN206272753U publication Critical patent/CN206272753U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The utility model discloses a kind of computer network watch-dog, including network computer, GSM network and mobile device, the network computer is electrically connected with camera, picture monitoring module and identification module are provided with the network computer, network connection between the picture monitoring module and Dropbox, the PLC is electrically connected with warning light, alarm module and radio receiving transmitting module are provided with the PLC, the radio receiving transmitting module passes through wireless network between GSM network and mobile device and connects.The computer network watch-dog is provided with identification module, when Password Input mistake, PLC is opened camera and invader is monitored, and picture is transferred on mobile device by GSM network, people can be by mobile device monitor in real time picture, instant screen shot can be preserved and is uploaded in Dropbox by picture monitoring module, and camera supervised picture is also uploaded in Dropbox, and work and the strong data of evidence of crime offer are chased to later.

Description

A kind of computer network watch-dog
Technical field
The utility model is related to computer network monitoring technology field, specially a kind of computer network watch-dog.
Background technology
In the growing modern society of computer network, the network security for LAN is increasingly taken seriously.Mesh The security boundary (being primarily referred to as preventing the unsafe factor for coming from wide area network) of preceding LAN is general all to use each LAN The special safety means of middle setting, can provide the functions such as fire wall, internet behavior analysis, network log-in management, be directed to Computer in LAN monitored and controlled, Emulex for the Internet activity on internal computer (online monitoring) and Process management (Intranet monitoring) internets such as the related internal act of non-online and assets are developed rapidly, and the use of internet is got over Come more universal, network and the internet not only communication bridge as enterprises, are also enterprise and to carry out all kinds of business past for outside The critical piping for coming.Expanding economy promotes people constantly to improve security protection consciousness, when traditional local simulation monitoring mode Can not gradually meet some industries on a large scale, the demand of remote monitor, such as bank's trans-regional network monitor when, by network will The Centralized Monitoring mode that image carries out remote transmission is arisen at the historic moment.With the popularization on a large scale of internet, remote monitoring has been oozed Thoroughly to multiple fields such as education, government, public place of entertainment, hospital, hotel, sports buildings, urban public securities.
Existing computer network monitoring is in vital document during invader steals computer, it is impossible to which effractor is manipulated Interface is monitored, it is impossible to provide strong data when evidence of crime is provided.
Utility model content
The purpose of this utility model is to provide a kind of computer network watch-dog, to solve to be proposed in above-mentioned background technology When invader steals vital document in computer, it is impossible to effractor manipulate interface be monitored, it is impossible in the criminal of offer The criminal evidence according to when the problem of strong data is provided.
To achieve the above object, the utility model provides following technical scheme:A kind of computer network watch-dog, including net Network computer, identification module, picture monitoring module, Dropbox, camera, warning light, PLC, alarm module, wireless receiving and dispatching Module, GSM network and mobile device, the network computer are electrically connected with camera, are provided with the network computer Picture monitoring module and identification module, network connection between the picture monitoring module and Dropbox, the PLC and alarm Lamp is electrically connected with, and alarm module and radio receiving transmitting module are provided with the PLC, and the radio receiving transmitting module passes through Wireless network connection between GSM network and mobile device.
Preferably, it is electric connection between the network computer and PLC.
Preferably, the identification module is designed for password identification.
Preferably, it is electric connection between the PLC and alarm module.
Preferably, the camera is infrared camera.
Compared with prior art, the beneficial effects of the utility model are:The computer network watch-dog is provided with identification module, And identification module is designed for password identification, when Password Input mistake, PLC is opened camera and invader is monitored, And picture is transferred on mobile device by GSM network, people can be controlled by mobile device monitor in real time picture, and PLC Device opens warning light and invader is deterred, it is to avoid invader steals a large amount of capsule information, and PLC passes through alarm module Alarmed, after invader's Brute Force password, the picture monitoring module in network computer starts, and people can be by movement Device real-time monitoring, but sometimes in null zones, signal is not received, picture monitoring module can protect instant screen shot Deposit and be uploaded in Dropbox, camera supervised picture is also uploaded in Dropbox, by that behind null zones, can be looked into by Dropbox Instant picture and historical picture are seen, and work and the strong data of evidence of crime offer are chased to later.
Brief description of the drawings
Fig. 1 is the utility model system flow schematic diagram.
In figure:1st, network computer, 2, identification module, 3, picture monitoring module, 4, Dropbox, 5, camera, 6, warning light, 7th, PLC, 8, alarm module, 9, radio receiving transmitting module, 10, GSM network, 11, mobile device.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of computer network watch-dog, including network meter It is calculation machine 1, identification module 2, picture monitoring module 3, Dropbox 4, camera 5, warning light 6, PLC 7, alarm module 8, wireless Transceiver module 9, GSM network 10 and mobile device 11, network computer 1 are electrically connected with camera 5, and camera 5 is taken the photograph for infrared As head, infrared camera is powered low, strengthens nighttime image capturing ability, using newest optical design method, special optics Glass material and the special focal plane shift for crossing the advanced technologies such as film and material, eliminating visible ray and infrared light, special optical Glass material solves the problems, such as the infrared correspondence blur-free imaging of infrared camera, so that light of the visible region to infrared light district Can be imaged in same position of focal plane, realize clearly image;The special membrane technology that crosses then allows infrared light saturating as far as possible Past;Multicoating can also to greatest extent suppress the generation of ghost and flash of light under backlighting condition, even if bad in backlight etc. Under the conditions of can also obtain the high-quality picture of relative high-contrast, also can clearly monitor invader at night, and recorded a video With sectional drawing of taking pictures, and by backstage upload to Dropbox 4, the evidence of crime for chasing work and invader to the later police is provided Strong data, to be electrically connected between network computer 1 and PLC 7, be between PLC 7 and alarm module 8 It is electrically connected with, the control alarm module 8 of PLC 7 is alarmed, it is to avoid cause more capsule information to reveal, when network meter After the Password Input mistake of identification module 2 in calculation machine 1, the picture that the picture and picture monitoring module 3 that camera 5 is monitored are monitored Face all needs to receive data by PLC 7, and is transferred on mobile device 11 by GSM network by radio receiving transmitting module 9, For people's door monitor in real time picture, picture monitoring module 3 and identification module 2 are provided with network computer 1, identification module 2 is close Code identification design, is provided with corresponding password, and after Password Input mistake, PLC 7 is opened warning light 6 and invader is entered Row deterrence, it is to avoid invader steals a large amount of capsule information, and PLC 7 is alarmed by alarm module 8, picture monitoring mould Network connection between block 3 and Dropbox 4, PLC 7 is electrically connected with warning light 6, and alarm module is provided with PLC 7 8 and radio receiving transmitting module 9, radio receiving transmitting module 9 passes through wireless network between GSM network 10 and mobile device 11 and connects.
Operation principle:When using the computer network watch-dog, need have one to whole computer network watch-dog first Understanding in individual structure, important file in order to prevent from losing or reveal, can typically be stored in the computer of personal family with It is anti-lost, but in manager nobody when, lawless person still has opportunity, after network computer 1 is opened, camera 5 are actuated for monitoring, and identification module 2 starts the prompting correct recognition code of input, after Password Input mistake, PLC 7 Control warning light 6 is lighted, and deterrent effect is played to effractor, makes its retreatment avoid causing the leakage of vital document, and PLC from controlling Device 7 is alarmed by alarm module 8, and the picture of the monitoring of camera 5 is transferred to by radio receiving transmitting module 9 by GSM network 10 Mobile device 11, people can carry out monitor in real time by mobile device 11, after invader's Brute Force password, picture monitoring mould Block 3 starts, and the interface that invader manipulates is monitored, and is transferred to mobile setting by GSM network 10 by radio receiving transmitting module 9 Standby 11, picture monitoring module 3 also by interface monitor in real time sectional drawing, and by the way that in backstage upload to Dropbox 4, camera 5 is monitored Picture also transmit to Dropbox 4, people can carry out checking all historical pictures by Dropbox 4, and chase work to the police Strong data are provided with effractor's evidence of crime.
In sum, although being described in detail to the utility model with reference to the foregoing embodiments, for this area For technical staff, it can still modify to the technical scheme described in foregoing embodiments, or to which part Technical characteristic carries out equivalent, all any modifications within spirit of the present utility model and principle, made, equivalent, Improve etc., should be included within protection domain of the present utility model.

Claims (5)

1. a kind of computer network watch-dog, including network computer (1), identification module (2), picture monitoring module (3), Dropbox (4), camera (5), warning light (6), PLC (7), alarm module (8), radio receiving transmitting module (9), GSM network (10) With mobile device (11), it is characterised in that:The network computer (1) is electrically connected with camera (5), the network computer (1) picture monitoring module (3) and identification module (2), network between the picture monitoring module (3) and Dropbox (4) are provided with Connection, the PLC (7) is electrically connected with warning light (6), and alarm module (8) is provided with the PLC (7) With radio receiving transmitting module (9), the radio receiving transmitting module (9) is by wireless network between GSM network (10) and mobile device (11) Network is connected.
2. a kind of computer network watch-dog according to claim 1, it is characterised in that:The network computer (1) with It is electric connection between PLC (7).
3. a kind of computer network watch-dog according to claim 1, it is characterised in that:The identification module (2) is close Code identification design.
4. a kind of computer network watch-dog according to claim 1, it is characterised in that:The PLC (7) and report It is electric connection between alert module (8).
5. a kind of computer network watch-dog according to claim 1, it is characterised in that:The camera (5) is infrared Camera.
CN201621245541.1U 2016-11-16 2016-11-16 A kind of computer network watch-dog Expired - Fee Related CN206272753U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621245541.1U CN206272753U (en) 2016-11-16 2016-11-16 A kind of computer network watch-dog

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621245541.1U CN206272753U (en) 2016-11-16 2016-11-16 A kind of computer network watch-dog

Publications (1)

Publication Number Publication Date
CN206272753U true CN206272753U (en) 2017-06-20

Family

ID=59040261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621245541.1U Expired - Fee Related CN206272753U (en) 2016-11-16 2016-11-16 A kind of computer network watch-dog

Country Status (1)

Country Link
CN (1) CN206272753U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795773A (en) * 2019-09-03 2020-02-14 淮阴师范学院 Notebook computer one-key start-stop system with high security
CN113947863A (en) * 2021-10-13 2022-01-18 上海翼枭航空科技有限公司 Remote control method and system for unmanned aerial vehicle

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795773A (en) * 2019-09-03 2020-02-14 淮阴师范学院 Notebook computer one-key start-stop system with high security
CN113947863A (en) * 2021-10-13 2022-01-18 上海翼枭航空科技有限公司 Remote control method and system for unmanned aerial vehicle

Similar Documents

Publication Publication Date Title
CN103578240B (en) A kind of security protection service network based on Internet of Things
CN107730681A (en) A kind of Campus Security ensures intelligent supervision early warning system
CN105678666B (en) Experimental building security and emergency plan issuing system based on Internet of things
CN106886970A (en) A kind of floating population's management system and its application method with warning function
CN106713481A (en) Community intelligent security system based on Internet of Things
CN103268680A (en) Intelligent monitoring and anti-theft system for family
Norman Integrated security systems design: A complete reference for building enterprise-wide digital security systems
CN105979232A (en) Video monitoring system for closed school
CN205809947U (en) A kind of prison access control management system
CN110535895A (en) A kind of machine room monitoring system based on technology of Internet of things
CN106303382A (en) A kind of emergency command comprehensive management platform based on Internet of Things
CN109068105A (en) A kind of prison video monitoring method based on deep learning
CN206272753U (en) A kind of computer network watch-dog
CN108683890A (en) A kind of law-enforcing recorder data transmission system and its method using 5G networks
CN109767594A (en) A kind of household monitor video intelligent linkage early warning system
CN209657318U (en) A kind of intelligent safety defense monitoring system based on recognition of face
CN206672171U (en) A kind of floating population's management system with warning function
CN201796450U (en) Intelligent monitoring system with border-crossing identification function
CN111400774B (en) Block chain system of secondary water supply anti-terrorism anti-poison safety system
CN107808238A (en) A kind of management method and system for equipping assets
CN206533398U (en) A kind of community intelligent safety-protection system based on Internet of Things
CN109658316A (en) A kind of safe emergency advance warning management method in garden and device
CN108537931A (en) A kind of artificial intelligence face recognition door control system
CN206672172U (en) A kind of police service early warning system based on gate inhibition's data
CN213070108U (en) Campus one-key type networking alarm system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170620

Termination date: 20171116

CF01 Termination of patent right due to non-payment of annual fee