A security audit method and system for mobile Internet

A mobile Internet and security audit technology, applied in the field of mobile Internet-oriented security audit, can solve the problems of lack of analysis and supervision means, weak data audit links, etc.

Active Publication Date: 2018-02-16
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still major problems in the traffic analysis and business composition of mobile networks. At present, there is still a lack of effective means to finely analyze the traffic composition of mobile networks and users' online behavior, and the data audit link is relatively weak.
There is a lack of effective analysis and monitoring methods for which applications and activities users use through mobile networks, and whether there are illegal, reactionary, pornographic, and violent harmful information disseminated in them.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security audit method and system for mobile Internet
  • A security audit method and system for mobile Internet
  • A security audit method and system for mobile Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the technical problems, technical solutions and technical effects to be solved by a mobile Internet-oriented security audit method and system of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0062] The implementation of the mobile Internet-oriented security audit system includes four aspects:

[0063] First, establish an audit system implementation process suitable for various objects of mobile Internet management and operation units. According to the specific needs of different service providers, design and specify the implementation process of the audit system. Comprehensive consideration is given to the audit function of the mobile Internet system and the requirements of the audit platform, the selection of parameters and modules of the audit system, the real-time collection of data and the use of historical data, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a mobile Internet-oriented security audit method and system, belonging to the technical field of computer network security, including: a network data collection module, a data preprocessing module, a business feature library module, an audit rule module, and an audit module, and also includes: Network management and control module, network management and control rule library module. The mobile terminal accesses the mobile Internet through the mobile network management unit, and the network data acquisition module collects the data transmitted by the mobile terminal through the mobile network and performs classification and preprocessing through the data preprocessing module, and matches and identifies network data through the business feature database type, sent to the audit module for audit, and network management through the network control module. The present invention provides monitoring, analysis, management, optimization and control functions for mobile Internet business, performance, quality and safety, so that mobile Internet management can be managed, controlled and checked, and a green and safe Internet environment can be effectively maintained.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a mobile Internet-oriented security audit method and system. Background technique [0002] At present, many domestic operators have formulated their own wireless city plans and vigorously built mobile networks. For this reason, 2G, 3G, WLAN, and LTE networks have been successively built and optimized, and the coverage of wireless networks is rapidly expanding. [0003] The mobile Internet is a new type of integrated network. In this environment, users can use mobile phones, PDAs or other handheld (vehicle) terminals to access the Internet through the mobile network, and enjoy public Internet services anytime, anywhere. At present, in addition to basic applications such as text browsing and picture ring downloading, applications such as music, mobile TV, video, games, instant messaging, location services, and mobile advertisements provided by the mobile Internet are growin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W24/02
CPCH04W12/12H04W24/02
Inventor 王攀李养群
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products