CN207458060U - Anti-intrusion set and anti-intrusion system - Google Patents
Anti-intrusion set and anti-intrusion system Download PDFInfo
- Publication number
- CN207458060U CN207458060U CN201721387499.1U CN201721387499U CN207458060U CN 207458060 U CN207458060 U CN 207458060U CN 201721387499 U CN201721387499 U CN 201721387499U CN 207458060 U CN207458060 U CN 207458060U
- Authority
- CN
- China
- Prior art keywords
- processor
- intrusion
- intrusion set
- data transmission
- transmission device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 241000700605 Viruses Species 0.000 claims abstract description 52
- 230000005540 biological transmission Effects 0.000 claims abstract description 41
- 230000009545 invasion Effects 0.000 claims abstract description 29
- 238000004891 communication Methods 0.000 claims abstract description 20
- 230000008439 repair process Effects 0.000 claims description 19
- 230000015654 memory Effects 0.000 claims description 13
- 238000001514 detection method Methods 0.000 claims description 7
- 238000012546 transfer Methods 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims description 2
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000002574 poison Substances 0.000 description 1
- 231100000614 poison Toxicity 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Small-Scale Networks (AREA)
Abstract
The utility model provides a kind of anti-intrusion set and anti-intrusion system, is related to network communication field.Anti-intrusion set includes modem, switch, processor, invasion detecting device and data transmission device, modem, switch, processor and data transmission device are sequentially connected electrically, invasion detecting device is electrically connected with processor, data message is received from network to be modulated and demodulate, and the data message after modulation and demodulation is transmitted to data transmission device by processor, data transmission device is used to the data message after modulation and demodulation being sent to an intelligent terminal, invasion detecting device is used to detect the Virus Info in data message, and Virus Info is transmitted to processor, processor is used for the control switch after Virus Info is received and disconnects.Anti-intrusion set provided by the utility model and anti-intrusion system have the computer for making hacker that can not invade user by the form of computer virus, the advantages of avoiding the loss to user.
Description
Technical field
The utility model is related to network communication field, in particular to a kind of anti-intrusion set and anti-intrusion system.
Background technology
Internet is also known as world-wide web, starts from the Arpa net in the U.S. in 1969.It is to be concatenated between network and network
Huge network, these networks are connected with one group of general agreement, form single huge international network in logic.Usually
Internet refers to internet, and I nternet then refer in particular to internet.This side for being linked together computer network mutually
Method can be referred to as " network interconnection ", and the global global internetwork of covering is developed on the basis of this and claims internet, is mutual
The network structure being connected together.Internet is not equal to WWW, WWW be build interlinked based on hypertext and
Into global system, and be one of service that internet can be provided.
At present, with the development of internet, very more facilities has been brought, but at the same time network security
Event takes place frequently, and many hackers by using the mode of computer virus invade and attack the computer of user wantonly, to many users
Bring huge loss.
How to solve the above problems, be the emphasis of those skilled in the art's concern.
Utility model content
The purpose of this utility model is to provide a kind of anti-intrusion set, by solve in the prior art hacker in terms of
The problem of mode of calculation machine virus invades other people computer.
The another object of the utility model, which also resides in, provides a kind of anti-intrusion system using above-mentioned anti-intrusion set, with solution
The problem of certainly hacker invades other people computer by using the mode of computer virus in the prior art.
The utility model is realized in this way:
The utility model embodiment provides a kind of anti-intrusion set, and the anti-intrusion set includes communication module, modulatedemodulate
Adjust device, switch, processor, invasion detecting device and data transmission device, the communication module, the modem, institute
It states switch, the processor and the data transmission device to be sequentially connected electrically, the invasion detecting device and the processor
Electrical connection, the communication module are used for a network connection and by the data information transfer received to the modem,
The modem passes through the data message after modulation and demodulation for the data message to be modulated and demodulate
The processor is transmitted to the data transmission device, and the data transmission device is used for the data after the modulation and demodulation
Information is sent to an intelligent terminal, and the invasion detecting device is used to detecting the Virus Info in the data message, and by institute
It states Virus Info and is transmitted to the processor, the processor is disconnected for controlling the switch after the Virus Info is received
It opens.
Further, the anti-intrusion set further includes memory and data repair module, the memory and the number
It is electrically connected according to repair module with the processor, a variety of Virus Infos is pre-stored in the memory, the processor is also
For one kind in judging whether the Virus Info is pre-stored a variety of Virus Infos after receiving the Virus Info,
If it is, the repair module is controlled to repair the Virus Info.
Further, the anti-intrusion set further includes shell, the switch, the processor, intrusion detection dress
It puts and the data transmission device is placed in the shell.
Further, the anti-intrusion set further includes radiator, and the radiator is installed in the shell, and described
Radiator is electrically connected with the processor, and the processor is additionally operable to control the open and close of the radiator.
Further, the anti-intrusion set further includes temperature sensor, and the temperature sensor is installed on the shell
It is interior, and the temperature sensor is electrically connected with the processor, the temperature sensor is used to detect the temperature in the shell
Information, and the temperature information is transmitted to handled device, the processor is additionally operable to judge whether the temperature information is more than
Pre-stored temperature information, if it is, the rotating speed of the radiator is controlled to increase.
Further, the invasion detecting device includes IPS detection devices.
Further, the anti-intrusion set further includes power supply, and the power supply is electrically connected with the processor.
Further, the data transmission device is router.
Further, the switch is relay.
Second aspect, the utility model embodiment additionally provide a kind of anti-intrusion system, and the anti-intrusion system includes intelligence
Energy terminal and anti-intrusion set, the anti-intrusion set include communication module, modem, switch, processor, intrusion detection
Device and data transmission device, the communication module, the modem, the switch, the processor and described
Data transmission device is sequentially connected electrically, and the invasion detecting device is electrically connected with the processor, the communication module be used for
One network connection and by the data information transfer received to the modem, the modem is used for the number
It is believed that breath is modulated and demodulates, and the data message after modulation and demodulation is transmitted to the data by the processor and is passed
Defeated device, the data transmission device are used to the data message after the modulation and demodulation being sent to the intelligent terminal, institute
Invasion detecting device is stated for detecting the Virus Info in the data message, and the Virus Info is transmitted to the processing
Device, the processor are used to that the switch to be controlled to disconnect after the Virus Info is received.
Compared with the prior art, the utility model has the advantages that:
The utility model provides a kind of anti-intrusion set and anti-intrusion system, which, which includes anti-intrusion set, includes leading to
Believe module, modem, switch, processor, invasion detecting device and data transmission device, communication module, modulation /demodulation
Device, switch, processor and data transmission device are sequentially connected electrically, and invasion detecting device is electrically connected with processor, so that adjusting
Modulator-demodulator is modulated from the data message that network receives with that after demodulation, can be transmitted to data transmission dress by processor
It puts, and passes through data transmission device by data information transfer a to intelligent terminal, it is achieved thereby that the transmission of data message.And
And since hacker can will be capable of detecting when by invasion detecting device in data message by Virus Hiding in data message
Virus Info, after processor receives Virus Info, switch can be controlled to disconnect, so as to be disconnected intelligent terminal and network
Connection makes hiding virulent data message that can not be transmitted to intelligent terminal, so that hacker cannot invade the computer of user, keeps away
Exempt to the loss of user.
For the above-mentioned purpose of the utility model, feature and advantage is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and
Attached drawing appended by cooperation, is described in detail below.
Description of the drawings
It is new below in conjunction with this practicality to make the purpose, technical scheme and advantage of the utility model embodiment clearer
Attached drawing in type embodiment, the technical scheme in the utility model embodiment is clearly and completely described, it is clear that is retouched
The embodiment stated is the utility model part of the embodiment, instead of all the embodiments.Usually here described in attached drawing and
The component of the utility model embodiment shown can configure to arrange and design with a variety of.Therefore, below to attached
The detailed description of the embodiment of the utility model provided in figure is not intended to limit claimed the scope of the utility model,
But it is merely representative of the selected embodiment of the utility model.Based on the embodiment in the utility model, ordinary skill people
Member's all other embodiments obtained without creative efforts belong to the model of the utility model protection
It encloses.
Fig. 1 shows the circuit connection block diagram for the anti-intrusion set that the utility model first embodiment is provided.
Fig. 2 shows the structure diagram for the shell that the utility model first embodiment is provided.
Fig. 3 shows a kind of interactive schematic diagram for the anti-intrusion system that the utility model second embodiment is provided.
Fig. 4 shows the another kind interaction schematic diagram for the anti-intrusion system that the utility model second embodiment is provided.
Icon:100- anti-intrusion sets;110- processors;111- modems;112- is switched;113- data transmissions
Device;114- invasion detecting devices;115- memories;116- data repair modules;117- power supplys;118- radiators;119- temperature
Spend sensor;120- shells;121- first interfaces;122- second interfaces;123- communication modules;200- anti-intrusion systems;201-
Intelligent terminal;202- networks.
Specific embodiment
Below in conjunction with attached drawing in the utility model embodiment, the technical scheme in the embodiment of the utility model is carried out clear
Chu is fully described by, it is clear that the described embodiments are only a part of the embodiments of the utility model rather than whole realities
Apply example.The component of the utility model embodiment being usually described and illustrated herein in the accompanying drawings can be come with a variety of configurations
Arrangement and design.Therefore, the detailed description of the embodiment of the utility model provided in the accompanying drawings is not intended to limit below
Claimed the scope of the utility model, but it is merely representative of the selected embodiment of the utility model.Based on the utility model
Embodiment, those skilled in the art's all other embodiments obtained on the premise of creative work is not made, all
Belong to the scope of the utility model protection.
In the description of the utility model, it is also necessary to which explanation, unless otherwise clearly defined and limited, term " are set
Put ", " installation ", " connected ", " connection " should be interpreted broadly, for example, it may be fixedly connected or be detachably connected,
Or it is integrally connected;Can be mechanical connection or electrical connection;It can be directly connected, intermediary can also be passed through
It is indirectly connected, can be the connection inside two elements.For the ordinary skill in the art, can be managed with concrete condition
Solve concrete meaning of the above-mentioned term in the utility model.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
Below in conjunction with the accompanying drawings, elaborate to some embodiments of the utility model.In the case where there is no conflict, under
Feature in the embodiment and embodiment stated can be mutually combined.
First embodiment
Referring to Fig. 1, the utility model embodiment provides a kind of anti-intrusion set 100, which includes
Communication module 123, modem 111, switch 112, processor 110, invasion detecting device 114 and data transmission device
113, communication module 123, modem 111, switch 112, processor 110 and data transmission device 113 are sequentially connected electrically,
Invasion detecting device 114 is electrically connected with processor 110.
Specifically, in the present embodiment, in order to realize the interaction of data, 123 and one network connection of communication module, and will be from
The data information transfer received in network to modem 111, modem 111 data message is modulated with
Demodulation, and the data message after modulation and demodulation is transmitted to data transmission device 113 by processor 110.Also, output dress
Putting can communicate to connect with intelligent terminal so that data transmission device 113 can send the data message after modulation and demodulation
To the intelligent terminal, it is achieved thereby that the interaction of data.
Since in practical applications, computer virus can be hidden in the data message of transmission by hacker, in order to identify
Virus Info, anti-intrusion device provided in this embodiment include invasion detecting device 114.Invasion detecting device 114 can be examined
Virus Info is measured, and Virus Info is transmitted to processor 110, after processor 110 receives Virus Info, can control and hold
It closes 112 to disconnect, so that the communication connection between intelligent terminal and network disconnects, makes intelligent terminal that can not receive and be concealed with
The data message of virus, ensure that the safety of intelligent terminal, makes hacker that can not be invaded by computer virus, effective anti-
The loss of user is stopped.
It should be noted that in the present embodiment, invasion detecting device 114 is IPS detection devices, i.e. the intrusion detection fills
It puts 114 and includes IPS (intrusion prevention system), of course, in some other embodiments, invasion detecting device 114 also may be used
Think other devices, the present embodiment does not do this any restriction.
It should also be noted that, in the present embodiment, in order to reach controller switch 112 can be controlled to open and be closed
Effect, switch 112 select relays, relay be a kind of switch 112 available for automation control, of course, other
Some embodiments in, switch 112 also selects other devices, and the present embodiment does not do this any restriction.
Further, in the present embodiment, data transmission device 113 is router, can be real by data transmission device 113
Existing anti-intrusion set 100 provided in this embodiment passes through wired or wirelessly establish and communicate to connect with intelligent terminal.
Moreover, since in practical applications, computer virus used in hacker is some common computeritis
Poison, repair mode is relatively conventional, and in view of this, for this kind of situation, anti-intrusion set 100 provided in this embodiment further includes
Memory 115 and data repair module 116, memory 115 are electrically connected with data repair module 116 with processor 110.It deposits
There are many Virus Infos, after Virus Info is transmitted to processor 110 by invasion detecting device 114, processing for storage in reservoir 115
Device 110 can interpolate that out whether the Virus Info is one kind in pre-stored a variety of Virus Infos, if it is, control is repaired
Module repairs Virus Info, so that repair data message in the case of without disconnection, and will not shadow
The normal use of user is rung, improves the operating experience of user.
It should be noted that it is repaiied since anti-intrusion set 100 provided in this embodiment includes memory 115 with data
Multiple module 116, and existing Virus Info is stored in memory 115 so that it can judge that intrusion detection is filled by processor 110
Whether the Virus Info for putting 114 transmission is the one of which Virus Info stored in memory 115, if it is, representing this kind
Virus Info is existing Virus Info, and processor 110 can control data repair module 116 to repair it;If it is not,
It then represents that this kind of Virus Info for new virus information, can not repair device by data repair module 116 at this time, handles
Device 110 can directly disconnect switch 112, so as to ensure that network security of the user when using intelligent terminal.
Of course, in order to power for entire anti-intrusion set 100, anti-intrusion set 100 further includes power supply 117, power supply 117
It is electrically connected with processor 110.
Referring to Fig. 2, in order to make whole more beautiful, the anti-intrusion set 100 total in the present embodiment of anti-intrusion set 100
Further include shell 120, modem 111, switch 112, processor 110, invasion detecting device 114, data transmission device
113rd, switch 112, memory 115, data repair module 116 and power supply 117 are placed in shell 120.Also, in shell
First interface 121 and second interface 122 are provided on 120, first interface 121 makes modem 111 be connected with network communication,
Second interface 122 makes data transmission device 113 be communicated to connect with intelligent terminal.
Since under working environment, processor 110 has temperature certain requirement, so in the present embodiment, anti-intrusion
Equipment 100 further includes radiator 118, and radiator 118 is installed in shell 120, and radiator 118 is electrically connected with processor 110,
Processor 110 is additionally operable to the open and close of control radiator 118.
It should be noted that radiator 118 provided in this embodiment includes but not limited to fan.
Moreover, energy saving in order to achieve the effect that, radiator 118 is run with low speed, ensures air circulation, but has
When be likely to occur the appearance of the situation that temperature is excessively high in shell 120.In view of this, in the present embodiment, anti-intrusion set 100 is gone back
Including temperature sensor 119, temperature sensor 119 is installed in shell 120, and temperature sensor 119 and 110 electricity of processor
Connection, temperature sensor 119 can detect the temperature information in shell 120, and temperature information is transmitted to handled device 110,
Processor 110 can also judge whether temperature information is more than pre-stored temperature information, if it is, control radiator 118
Rotating speed increases, and so as to the speed enhancing to ventilate, achievees the effect that effectively to radiate.
It should be noted that pass through set temperature sensor 119 so that radiator 118 can be with low speed in normal work
Operating, when temperature is higher, processor 110 can control the rotating speed of radiator 118 to increase by way of controlling output power,
Make anti-intrusion set 100 provided in this embodiment not only energy saving, and be in normal operating condition always.
Second embodiment
Fig. 3 is a kind of interaction schematic diagram of anti-intrusion system 200 provided in this embodiment, and Fig. 4 is provided in this embodiment
The interaction schematic diagram of another anti-intrusion system 200, refers to Fig. 3 and Fig. 4, the utility model embodiment provide one kind prevent into
System 200 is invaded, which includes intelligent terminal 201 and anti-intrusion set 100, anti-intrusion set 100 and intelligent intelligence
Energy terminal 201 communicates to connect, and anti-intrusion set 100 is used to the data message after modulation and demodulation being sent to the intelligent terminal
201.It should be noted that due to anti-intrusion set 100 provided in this embodiment and the anti-intrusion set of first embodiment offer
100 structure and function all same, so no longer repeating in the present embodiment anti-intrusion set 100.
As a kind of realization method of the present embodiment, anti-intrusion set 100 is whole with intelligence by data transmission device 113
Wire communication connection is realized at end 201, specifically, can be realized by a cable between anti-intrusion set 100 and intelligent terminal 201
Communication connection.
As another realization method of the present embodiment, anti-intrusion set 100 is real by network 202 and intelligent terminal 201
Existing wireless communication connection.
In conclusion the utility model provides a kind of anti-intrusion set and anti-intrusion system, which includes anti-intrusion
Equipment include modem, switch, processor, invasion detecting device and data transmission device, modem, switch,
Processor and data transmission device are sequentially connected electrically, and invasion detecting device is electrically connected with processor, so that modem
The data message received from network is modulated with that after demodulation, data transmission device can be transmitted to by processor, and is passed through
Data transmission device is by data information transfer a to intelligent terminal, it is achieved thereby that the transmission of data message.Also, due to hacker
Can will be by Virus Hiding in data message, the Virus Info that is capable of detecting when by invasion detecting device in data message,
After processor receives Virus Info, switch can be controlled to disconnect, so as to be disconnected the connection of intelligent terminal and network, make to hide
Virulent data message can not be transmitted to intelligent terminal, so that hacker cannot invade the computer of user, avoid to user
Loss.
, it is necessary to which explanation, term " first ", " second " etc. are only used for distinguishing description in the description of the utility model,
And it is not intended that instruction or hint relative importance.The above is only the preferred embodiment of the utility model only, not
For limiting the utility model, for those skilled in the art, the present invention may have various modifications and changes.It is all
Within the spirit and principles of the present invention, any modification, equivalent substitution, improvement and etc. done, should be included in this practicality
Within new protection domain.
Claims (10)
1. a kind of anti-intrusion set, which is characterized in that the anti-intrusion set includes communication module, modem, switch, place
Manage device, invasion detecting device and data transmission device, the communication module, the modem, the switch, the place
Reason device and the data transmission device are sequentially connected electrically, and the invasion detecting device is electrically connected with the processor, described logical
Believe that module is used for a network connection and by the data information transfer received to the modem, the modem
For the data message to be modulated and demodulate, and the data message after modulation and demodulation is transmitted by the processor
To the data transmission device, the data transmission device is used to the data message after the modulation and demodulation being sent to an intelligence
Energy terminal, the invasion detecting device is used to detect the Virus Info in the data message, and the Virus Info is transmitted
To the processor, the processor is used to that the switch to be controlled to disconnect after the Virus Info is received.
2. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes memory and data
Repair module, the memory are electrically connected with the data repair module with the processor, are pre-stored in the memory
There are many Virus Info, the processor is additionally operable to judge whether the Virus Info is pre- after the Virus Info is received
One kind in a variety of Virus Infos of storage, if it is, the repair module is controlled to repair the Virus Info.
3. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes shell, described to open
Pass, the processor, the invasion detecting device and the data transmission device are placed in the shell.
4. anti-intrusion set as claimed in claim 3, which is characterized in that the anti-intrusion set further includes radiator, described
Radiator is installed in the shell, and the radiator is electrically connected with the processor, and the processor is additionally operable to control institute
State the open and close of radiator.
5. anti-intrusion set as claimed in claim 4, which is characterized in that the anti-intrusion set further includes temperature sensor,
The temperature sensor is installed in the shell, and the temperature sensor is electrically connected with the processor, and the temperature passes
Sensor is used to detect the temperature information in the shell, and the temperature information is transmitted to handled device, and the processor is also
For judging whether the temperature information is more than pre-stored temperature information, if it is, the rotating speed of the radiator is controlled to increase
Greatly.
6. anti-intrusion set as described in claim 1, which is characterized in that the invasion detecting device includes IPS detection devices.
7. anti-intrusion set as described in claim 1, which is characterized in that the anti-intrusion set further includes power supply, the electricity
Source is electrically connected with the processor.
8. anti-intrusion set as described in claim 1, which is characterized in that the data transmission device is router.
9. anti-intrusion set as described in claim 1, which is characterized in that the switch is relay.
10. a kind of anti-intrusion system, which is characterized in that the anti-intrusion system includes intelligent terminal and such as claim 1 to 9 times
Anti-intrusion set described in meaning one, the anti-intrusion set is communicated to connect with the intelligent terminal, and the anti-intrusion set
For the data message after the modulation and demodulation to be sent to the intelligent terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721387499.1U CN207458060U (en) | 2017-10-25 | 2017-10-25 | Anti-intrusion set and anti-intrusion system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721387499.1U CN207458060U (en) | 2017-10-25 | 2017-10-25 | Anti-intrusion set and anti-intrusion system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN207458060U true CN207458060U (en) | 2018-06-05 |
Family
ID=62281456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201721387499.1U Active CN207458060U (en) | 2017-10-25 | 2017-10-25 | Anti-intrusion set and anti-intrusion system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN207458060U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020030450A (en) * | 2018-08-20 | 2020-02-27 | 三菱電機株式会社 | Information security device and information security system |
CN110995451A (en) * | 2019-12-12 | 2020-04-10 | 余娜娜 | Internet equipment convenient to carry |
CN111666568A (en) * | 2020-07-13 | 2020-09-15 | 四川锦城佳禾生态环保科技有限公司 | Self-breaking data security transmission method for preventing virus invasion |
-
2017
- 2017-10-25 CN CN201721387499.1U patent/CN207458060U/en active Active
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020030450A (en) * | 2018-08-20 | 2020-02-27 | 三菱電機株式会社 | Information security device and information security system |
JP7045958B2 (en) | 2018-08-20 | 2022-04-01 | 三菱電機株式会社 | Information security system |
CN110995451A (en) * | 2019-12-12 | 2020-04-10 | 余娜娜 | Internet equipment convenient to carry |
CN111666568A (en) * | 2020-07-13 | 2020-09-15 | 四川锦城佳禾生态环保科技有限公司 | Self-breaking data security transmission method for preventing virus invasion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN207458060U (en) | Anti-intrusion set and anti-intrusion system | |
CN106101147B (en) | A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption | |
CN103916475B (en) | A kind of network remote control method | |
CN104243210A (en) | Method and system for remotely having access to administrative web pages of routers | |
CN104301303A (en) | Intelligent home Internet of Things safety protection method and system | |
CN107277878B (en) | Method for switching network, device and mobile terminal | |
CN105704157A (en) | Remote control method and system, intelligent terminal and service terminal application to remote control method and system | |
CN108092969A (en) | The system and method for Intelligent Mobile Robot acquisition image access electric power Intranet | |
CN104270250A (en) | WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption | |
CN208489695U (en) | Power distribution terminal | |
Deng | The embedded modules solution of household Internet of Things System and the future development | |
CN107070893A (en) | A kind of power distribution network terminal IEC101 protocol massages certification method of discrimination | |
CN105282735A (en) | Privacy protection method and protection system used based on mobile terminal networking | |
CN109218098A (en) | A kind of connection and configuration method of home gateway | |
Tong et al. | An information flow security model for home area network of smart grid | |
CN107483514A (en) | Attack monitoring device and smart machine | |
JP6031377B2 (en) | Equipment monitoring system, monitoring device and electrical equipment | |
CN208572122U (en) | A kind of guard system for KNX bus apparatus safety communication | |
CN207266061U (en) | Network security device and network safety system | |
JP2004236215A (en) | Remote control system for domestic equipment | |
CN106656480B (en) | Key agreement method and device for client of household appliance | |
CN206922786U (en) | A kind of high Intelligent Fusion gateway of security performance | |
CN107231673A (en) | Electronic equipment and its communication means | |
CN205594636U (en) | Computer network security controller | |
CN107846401A (en) | Anonymous equipment for surfing the net and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |