CN207458060U - Anti-intrusion set and anti-intrusion system - Google Patents

Anti-intrusion set and anti-intrusion system Download PDF

Info

Publication number
CN207458060U
CN207458060U CN201721387499.1U CN201721387499U CN207458060U CN 207458060 U CN207458060 U CN 207458060U CN 201721387499 U CN201721387499 U CN 201721387499U CN 207458060 U CN207458060 U CN 207458060U
Authority
CN
China
Prior art keywords
processor
intrusion
intrusion set
data transmission
transmission device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201721387499.1U
Other languages
Chinese (zh)
Inventor
袁慧
郑蕾
徐浩
胡耀东
梁源
邓国如
曾玉荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201721387499.1U priority Critical patent/CN207458060U/en
Application granted granted Critical
Publication of CN207458060U publication Critical patent/CN207458060U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The utility model provides a kind of anti-intrusion set and anti-intrusion system, is related to network communication field.Anti-intrusion set includes modem, switch, processor, invasion detecting device and data transmission device, modem, switch, processor and data transmission device are sequentially connected electrically, invasion detecting device is electrically connected with processor, data message is received from network to be modulated and demodulate, and the data message after modulation and demodulation is transmitted to data transmission device by processor, data transmission device is used to the data message after modulation and demodulation being sent to an intelligent terminal, invasion detecting device is used to detect the Virus Info in data message, and Virus Info is transmitted to processor, processor is used for the control switch after Virus Info is received and disconnects.Anti-intrusion set provided by the utility model and anti-intrusion system have the computer for making hacker that can not invade user by the form of computer virus, the advantages of avoiding the loss to user.

Description

Anti-intrusion set and anti-intrusion system
Technical field
The utility model is related to network communication field, in particular to a kind of anti-intrusion set and anti-intrusion system.
Background technology
Internet is also known as world-wide web, starts from the Arpa net in the U.S. in 1969.It is to be concatenated between network and network Huge network, these networks are connected with one group of general agreement, form single huge international network in logic.Usually Internet refers to internet, and I nternet then refer in particular to internet.This side for being linked together computer network mutually Method can be referred to as " network interconnection ", and the global global internetwork of covering is developed on the basis of this and claims internet, is mutual The network structure being connected together.Internet is not equal to WWW, WWW be build interlinked based on hypertext and Into global system, and be one of service that internet can be provided.
At present, with the development of internet, very more facilities has been brought, but at the same time network security Event takes place frequently, and many hackers by using the mode of computer virus invade and attack the computer of user wantonly, to many users Bring huge loss.
How to solve the above problems, be the emphasis of those skilled in the art's concern.
Utility model content
The purpose of this utility model is to provide a kind of anti-intrusion set, by solve in the prior art hacker in terms of The problem of mode of calculation machine virus invades other people computer.
The another object of the utility model, which also resides in, provides a kind of anti-intrusion system using above-mentioned anti-intrusion set, with solution The problem of certainly hacker invades other people computer by using the mode of computer virus in the prior art.
The utility model is realized in this way:
The utility model embodiment provides a kind of anti-intrusion set, and the anti-intrusion set includes communication module, modulatedemodulate Adjust device, switch, processor, invasion detecting device and data transmission device, the communication module, the modem, institute It states switch, the processor and the data transmission device to be sequentially connected electrically, the invasion detecting device and the processor Electrical connection, the communication module are used for a network connection and by the data information transfer received to the modem, The modem passes through the data message after modulation and demodulation for the data message to be modulated and demodulate The processor is transmitted to the data transmission device, and the data transmission device is used for the data after the modulation and demodulation Information is sent to an intelligent terminal, and the invasion detecting device is used to detecting the Virus Info in the data message, and by institute It states Virus Info and is transmitted to the processor, the processor is disconnected for controlling the switch after the Virus Info is received It opens.
Further, the anti-intrusion set further includes memory and data repair module, the memory and the number It is electrically connected according to repair module with the processor, a variety of Virus Infos is pre-stored in the memory, the processor is also For one kind in judging whether the Virus Info is pre-stored a variety of Virus Infos after receiving the Virus Info, If it is, the repair module is controlled to repair the Virus Info.
Further, the anti-intrusion set further includes shell, the switch, the processor, intrusion detection dress It puts and the data transmission device is placed in the shell.
Further, the anti-intrusion set further includes radiator, and the radiator is installed in the shell, and described Radiator is electrically connected with the processor, and the processor is additionally operable to control the open and close of the radiator.
Further, the anti-intrusion set further includes temperature sensor, and the temperature sensor is installed on the shell It is interior, and the temperature sensor is electrically connected with the processor, the temperature sensor is used to detect the temperature in the shell Information, and the temperature information is transmitted to handled device, the processor is additionally operable to judge whether the temperature information is more than Pre-stored temperature information, if it is, the rotating speed of the radiator is controlled to increase.
Further, the invasion detecting device includes IPS detection devices.
Further, the anti-intrusion set further includes power supply, and the power supply is electrically connected with the processor.
Further, the data transmission device is router.
Further, the switch is relay.
Second aspect, the utility model embodiment additionally provide a kind of anti-intrusion system, and the anti-intrusion system includes intelligence Energy terminal and anti-intrusion set, the anti-intrusion set include communication module, modem, switch, processor, intrusion detection Device and data transmission device, the communication module, the modem, the switch, the processor and described Data transmission device is sequentially connected electrically, and the invasion detecting device is electrically connected with the processor, the communication module be used for One network connection and by the data information transfer received to the modem, the modem is used for the number It is believed that breath is modulated and demodulates, and the data message after modulation and demodulation is transmitted to the data by the processor and is passed Defeated device, the data transmission device are used to the data message after the modulation and demodulation being sent to the intelligent terminal, institute Invasion detecting device is stated for detecting the Virus Info in the data message, and the Virus Info is transmitted to the processing Device, the processor are used to that the switch to be controlled to disconnect after the Virus Info is received.
Compared with the prior art, the utility model has the advantages that:
The utility model provides a kind of anti-intrusion set and anti-intrusion system, which, which includes anti-intrusion set, includes leading to Believe module, modem, switch, processor, invasion detecting device and data transmission device, communication module, modulation /demodulation Device, switch, processor and data transmission device are sequentially connected electrically, and invasion detecting device is electrically connected with processor, so that adjusting Modulator-demodulator is modulated from the data message that network receives with that after demodulation, can be transmitted to data transmission dress by processor It puts, and passes through data transmission device by data information transfer a to intelligent terminal, it is achieved thereby that the transmission of data message.And And since hacker can will be capable of detecting when by invasion detecting device in data message by Virus Hiding in data message Virus Info, after processor receives Virus Info, switch can be controlled to disconnect, so as to be disconnected intelligent terminal and network Connection makes hiding virulent data message that can not be transmitted to intelligent terminal, so that hacker cannot invade the computer of user, keeps away Exempt to the loss of user.
For the above-mentioned purpose of the utility model, feature and advantage is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and Attached drawing appended by cooperation, is described in detail below.
Description of the drawings
It is new below in conjunction with this practicality to make the purpose, technical scheme and advantage of the utility model embodiment clearer Attached drawing in type embodiment, the technical scheme in the utility model embodiment is clearly and completely described, it is clear that is retouched The embodiment stated is the utility model part of the embodiment, instead of all the embodiments.Usually here described in attached drawing and The component of the utility model embodiment shown can configure to arrange and design with a variety of.Therefore, below to attached The detailed description of the embodiment of the utility model provided in figure is not intended to limit claimed the scope of the utility model, But it is merely representative of the selected embodiment of the utility model.Based on the embodiment in the utility model, ordinary skill people Member's all other embodiments obtained without creative efforts belong to the model of the utility model protection It encloses.
Fig. 1 shows the circuit connection block diagram for the anti-intrusion set that the utility model first embodiment is provided.
Fig. 2 shows the structure diagram for the shell that the utility model first embodiment is provided.
Fig. 3 shows a kind of interactive schematic diagram for the anti-intrusion system that the utility model second embodiment is provided.
Fig. 4 shows the another kind interaction schematic diagram for the anti-intrusion system that the utility model second embodiment is provided.
Icon:100- anti-intrusion sets;110- processors;111- modems;112- is switched;113- data transmissions Device;114- invasion detecting devices;115- memories;116- data repair modules;117- power supplys;118- radiators;119- temperature Spend sensor;120- shells;121- first interfaces;122- second interfaces;123- communication modules;200- anti-intrusion systems;201- Intelligent terminal;202- networks.
Specific embodiment
Below in conjunction with attached drawing in the utility model embodiment, the technical scheme in the embodiment of the utility model is carried out clear Chu is fully described by, it is clear that the described embodiments are only a part of the embodiments of the utility model rather than whole realities Apply example.The component of the utility model embodiment being usually described and illustrated herein in the accompanying drawings can be come with a variety of configurations Arrangement and design.Therefore, the detailed description of the embodiment of the utility model provided in the accompanying drawings is not intended to limit below Claimed the scope of the utility model, but it is merely representative of the selected embodiment of the utility model.Based on the utility model Embodiment, those skilled in the art's all other embodiments obtained on the premise of creative work is not made, all Belong to the scope of the utility model protection.
In the description of the utility model, it is also necessary to which explanation, unless otherwise clearly defined and limited, term " are set Put ", " installation ", " connected ", " connection " should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, Or it is integrally connected;Can be mechanical connection or electrical connection;It can be directly connected, intermediary can also be passed through It is indirectly connected, can be the connection inside two elements.For the ordinary skill in the art, can be managed with concrete condition Solve concrete meaning of the above-mentioned term in the utility model.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
Below in conjunction with the accompanying drawings, elaborate to some embodiments of the utility model.In the case where there is no conflict, under Feature in the embodiment and embodiment stated can be mutually combined.
First embodiment
Referring to Fig. 1, the utility model embodiment provides a kind of anti-intrusion set 100, which includes Communication module 123, modem 111, switch 112, processor 110, invasion detecting device 114 and data transmission device 113, communication module 123, modem 111, switch 112, processor 110 and data transmission device 113 are sequentially connected electrically, Invasion detecting device 114 is electrically connected with processor 110.
Specifically, in the present embodiment, in order to realize the interaction of data, 123 and one network connection of communication module, and will be from The data information transfer received in network to modem 111, modem 111 data message is modulated with Demodulation, and the data message after modulation and demodulation is transmitted to data transmission device 113 by processor 110.Also, output dress Putting can communicate to connect with intelligent terminal so that data transmission device 113 can send the data message after modulation and demodulation To the intelligent terminal, it is achieved thereby that the interaction of data.
Since in practical applications, computer virus can be hidden in the data message of transmission by hacker, in order to identify Virus Info, anti-intrusion device provided in this embodiment include invasion detecting device 114.Invasion detecting device 114 can be examined Virus Info is measured, and Virus Info is transmitted to processor 110, after processor 110 receives Virus Info, can control and hold It closes 112 to disconnect, so that the communication connection between intelligent terminal and network disconnects, makes intelligent terminal that can not receive and be concealed with The data message of virus, ensure that the safety of intelligent terminal, makes hacker that can not be invaded by computer virus, effective anti- The loss of user is stopped.
It should be noted that in the present embodiment, invasion detecting device 114 is IPS detection devices, i.e. the intrusion detection fills It puts 114 and includes IPS (intrusion prevention system), of course, in some other embodiments, invasion detecting device 114 also may be used Think other devices, the present embodiment does not do this any restriction.
It should also be noted that, in the present embodiment, in order to reach controller switch 112 can be controlled to open and be closed Effect, switch 112 select relays, relay be a kind of switch 112 available for automation control, of course, other Some embodiments in, switch 112 also selects other devices, and the present embodiment does not do this any restriction.
Further, in the present embodiment, data transmission device 113 is router, can be real by data transmission device 113 Existing anti-intrusion set 100 provided in this embodiment passes through wired or wirelessly establish and communicate to connect with intelligent terminal.
Moreover, since in practical applications, computer virus used in hacker is some common computeritis Poison, repair mode is relatively conventional, and in view of this, for this kind of situation, anti-intrusion set 100 provided in this embodiment further includes Memory 115 and data repair module 116, memory 115 are electrically connected with data repair module 116 with processor 110.It deposits There are many Virus Infos, after Virus Info is transmitted to processor 110 by invasion detecting device 114, processing for storage in reservoir 115 Device 110 can interpolate that out whether the Virus Info is one kind in pre-stored a variety of Virus Infos, if it is, control is repaired Module repairs Virus Info, so that repair data message in the case of without disconnection, and will not shadow The normal use of user is rung, improves the operating experience of user.
It should be noted that it is repaiied since anti-intrusion set 100 provided in this embodiment includes memory 115 with data Multiple module 116, and existing Virus Info is stored in memory 115 so that it can judge that intrusion detection is filled by processor 110 Whether the Virus Info for putting 114 transmission is the one of which Virus Info stored in memory 115, if it is, representing this kind Virus Info is existing Virus Info, and processor 110 can control data repair module 116 to repair it;If it is not, It then represents that this kind of Virus Info for new virus information, can not repair device by data repair module 116 at this time, handles Device 110 can directly disconnect switch 112, so as to ensure that network security of the user when using intelligent terminal.
Of course, in order to power for entire anti-intrusion set 100, anti-intrusion set 100 further includes power supply 117, power supply 117 It is electrically connected with processor 110.
Referring to Fig. 2, in order to make whole more beautiful, the anti-intrusion set 100 total in the present embodiment of anti-intrusion set 100 Further include shell 120, modem 111, switch 112, processor 110, invasion detecting device 114, data transmission device 113rd, switch 112, memory 115, data repair module 116 and power supply 117 are placed in shell 120.Also, in shell First interface 121 and second interface 122 are provided on 120, first interface 121 makes modem 111 be connected with network communication, Second interface 122 makes data transmission device 113 be communicated to connect with intelligent terminal.
Since under working environment, processor 110 has temperature certain requirement, so in the present embodiment, anti-intrusion Equipment 100 further includes radiator 118, and radiator 118 is installed in shell 120, and radiator 118 is electrically connected with processor 110, Processor 110 is additionally operable to the open and close of control radiator 118.
It should be noted that radiator 118 provided in this embodiment includes but not limited to fan.
Moreover, energy saving in order to achieve the effect that, radiator 118 is run with low speed, ensures air circulation, but has When be likely to occur the appearance of the situation that temperature is excessively high in shell 120.In view of this, in the present embodiment, anti-intrusion set 100 is gone back Including temperature sensor 119, temperature sensor 119 is installed in shell 120, and temperature sensor 119 and 110 electricity of processor Connection, temperature sensor 119 can detect the temperature information in shell 120, and temperature information is transmitted to handled device 110, Processor 110 can also judge whether temperature information is more than pre-stored temperature information, if it is, control radiator 118 Rotating speed increases, and so as to the speed enhancing to ventilate, achievees the effect that effectively to radiate.
It should be noted that pass through set temperature sensor 119 so that radiator 118 can be with low speed in normal work Operating, when temperature is higher, processor 110 can control the rotating speed of radiator 118 to increase by way of controlling output power, Make anti-intrusion set 100 provided in this embodiment not only energy saving, and be in normal operating condition always.
Second embodiment
Fig. 3 is a kind of interaction schematic diagram of anti-intrusion system 200 provided in this embodiment, and Fig. 4 is provided in this embodiment The interaction schematic diagram of another anti-intrusion system 200, refers to Fig. 3 and Fig. 4, the utility model embodiment provide one kind prevent into System 200 is invaded, which includes intelligent terminal 201 and anti-intrusion set 100, anti-intrusion set 100 and intelligent intelligence Energy terminal 201 communicates to connect, and anti-intrusion set 100 is used to the data message after modulation and demodulation being sent to the intelligent terminal 201.It should be noted that due to anti-intrusion set 100 provided in this embodiment and the anti-intrusion set of first embodiment offer 100 structure and function all same, so no longer repeating in the present embodiment anti-intrusion set 100.
As a kind of realization method of the present embodiment, anti-intrusion set 100 is whole with intelligence by data transmission device 113 Wire communication connection is realized at end 201, specifically, can be realized by a cable between anti-intrusion set 100 and intelligent terminal 201 Communication connection.
As another realization method of the present embodiment, anti-intrusion set 100 is real by network 202 and intelligent terminal 201 Existing wireless communication connection.
In conclusion the utility model provides a kind of anti-intrusion set and anti-intrusion system, which includes anti-intrusion Equipment include modem, switch, processor, invasion detecting device and data transmission device, modem, switch, Processor and data transmission device are sequentially connected electrically, and invasion detecting device is electrically connected with processor, so that modem The data message received from network is modulated with that after demodulation, data transmission device can be transmitted to by processor, and is passed through Data transmission device is by data information transfer a to intelligent terminal, it is achieved thereby that the transmission of data message.Also, due to hacker Can will be by Virus Hiding in data message, the Virus Info that is capable of detecting when by invasion detecting device in data message, After processor receives Virus Info, switch can be controlled to disconnect, so as to be disconnected the connection of intelligent terminal and network, make to hide Virulent data message can not be transmitted to intelligent terminal, so that hacker cannot invade the computer of user, avoid to user Loss.
, it is necessary to which explanation, term " first ", " second " etc. are only used for distinguishing description in the description of the utility model, And it is not intended that instruction or hint relative importance.The above is only the preferred embodiment of the utility model only, not For limiting the utility model, for those skilled in the art, the present invention may have various modifications and changes.It is all Within the spirit and principles of the present invention, any modification, equivalent substitution, improvement and etc. done, should be included in this practicality Within new protection domain.

Claims (10)

1. a kind of anti-intrusion set, which is characterized in that the anti-intrusion set includes communication module, modem, switch, place Manage device, invasion detecting device and data transmission device, the communication module, the modem, the switch, the place Reason device and the data transmission device are sequentially connected electrically, and the invasion detecting device is electrically connected with the processor, described logical Believe that module is used for a network connection and by the data information transfer received to the modem, the modem For the data message to be modulated and demodulate, and the data message after modulation and demodulation is transmitted by the processor To the data transmission device, the data transmission device is used to the data message after the modulation and demodulation being sent to an intelligence Energy terminal, the invasion detecting device is used to detect the Virus Info in the data message, and the Virus Info is transmitted To the processor, the processor is used to that the switch to be controlled to disconnect after the Virus Info is received.
2. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes memory and data Repair module, the memory are electrically connected with the data repair module with the processor, are pre-stored in the memory There are many Virus Info, the processor is additionally operable to judge whether the Virus Info is pre- after the Virus Info is received One kind in a variety of Virus Infos of storage, if it is, the repair module is controlled to repair the Virus Info.
3. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes shell, described to open Pass, the processor, the invasion detecting device and the data transmission device are placed in the shell.
4. anti-intrusion set as claimed in claim 3, which is characterized in that the anti-intrusion set further includes radiator, described Radiator is installed in the shell, and the radiator is electrically connected with the processor, and the processor is additionally operable to control institute State the open and close of radiator.
5. anti-intrusion set as claimed in claim 4, which is characterized in that the anti-intrusion set further includes temperature sensor, The temperature sensor is installed in the shell, and the temperature sensor is electrically connected with the processor, and the temperature passes Sensor is used to detect the temperature information in the shell, and the temperature information is transmitted to handled device, and the processor is also For judging whether the temperature information is more than pre-stored temperature information, if it is, the rotating speed of the radiator is controlled to increase Greatly.
6. anti-intrusion set as described in claim 1, which is characterized in that the invasion detecting device includes IPS detection devices.
7. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes power supply, the electricity Source is electrically connected with the processor.
8. anti-intrusion set as described in claim 1, which is characterized in that the data transmission device is router.
9. anti-intrusion set as described in claim 1, which is characterized in that the switch is relay.
10. a kind of anti-intrusion system, which is characterized in that the anti-intrusion system includes intelligent terminal and such as claim 1 to 9 times Anti-intrusion set described in meaning one, the anti-intrusion set is communicated to connect with the intelligent terminal, and the anti-intrusion set For the data message after the modulation and demodulation to be sent to the intelligent terminal.
CN201721387499.1U 2017-10-25 2017-10-25 Anti-intrusion set and anti-intrusion system Active CN207458060U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201721387499.1U CN207458060U (en) 2017-10-25 2017-10-25 Anti-intrusion set and anti-intrusion system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201721387499.1U CN207458060U (en) 2017-10-25 2017-10-25 Anti-intrusion set and anti-intrusion system

Publications (1)

Publication Number Publication Date
CN207458060U true CN207458060U (en) 2018-06-05

Family

ID=62281456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201721387499.1U Active CN207458060U (en) 2017-10-25 2017-10-25 Anti-intrusion set and anti-intrusion system

Country Status (1)

Country Link
CN (1) CN207458060U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020030450A (en) * 2018-08-20 2020-02-27 三菱電機株式会社 Information security device and information security system
CN110995451A (en) * 2019-12-12 2020-04-10 余娜娜 Internet equipment convenient to carry
CN111666568A (en) * 2020-07-13 2020-09-15 四川锦城佳禾生态环保科技有限公司 Self-breaking data security transmission method for preventing virus invasion

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020030450A (en) * 2018-08-20 2020-02-27 三菱電機株式会社 Information security device and information security system
JP7045958B2 (en) 2018-08-20 2022-04-01 三菱電機株式会社 Information security system
CN110995451A (en) * 2019-12-12 2020-04-10 余娜娜 Internet equipment convenient to carry
CN111666568A (en) * 2020-07-13 2020-09-15 四川锦城佳禾生态环保科技有限公司 Self-breaking data security transmission method for preventing virus invasion

Similar Documents

Publication Publication Date Title
CN207458060U (en) Anti-intrusion set and anti-intrusion system
CN106101147B (en) A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption
CN103916475B (en) A kind of network remote control method
CN104243210A (en) Method and system for remotely having access to administrative web pages of routers
CN104301303A (en) Intelligent home Internet of Things safety protection method and system
CN107277878B (en) Method for switching network, device and mobile terminal
CN105704157A (en) Remote control method and system, intelligent terminal and service terminal application to remote control method and system
CN108092969A (en) The system and method for Intelligent Mobile Robot acquisition image access electric power Intranet
CN104270250A (en) WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption
CN208489695U (en) Power distribution terminal
Deng The embedded modules solution of household Internet of Things System and the future development
CN107070893A (en) A kind of power distribution network terminal IEC101 protocol massages certification method of discrimination
CN105282735A (en) Privacy protection method and protection system used based on mobile terminal networking
CN109218098A (en) A kind of connection and configuration method of home gateway
Tong et al. An information flow security model for home area network of smart grid
CN107483514A (en) Attack monitoring device and smart machine
JP6031377B2 (en) Equipment monitoring system, monitoring device and electrical equipment
CN208572122U (en) A kind of guard system for KNX bus apparatus safety communication
CN207266061U (en) Network security device and network safety system
JP2004236215A (en) Remote control system for domestic equipment
CN106656480B (en) Key agreement method and device for client of household appliance
CN206922786U (en) A kind of high Intelligent Fusion gateway of security performance
CN107231673A (en) Electronic equipment and its communication means
CN205594636U (en) Computer network security controller
CN107846401A (en) Anonymous equipment for surfing the net and system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant