Simulation monitoring method and system used for wearable intelligent equipment
A smart device and monitoring system technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as inapplicability of information security technology, theft, information security threats of wearable smart devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0046] This embodiment is an embodiment of an analog monitoring method for a wearable smart device.
[0047] The analog monitoring method for wearable smart devices of this embodiment, the flow chart is as follows figure 1 shown. The method includes the following steps:
[0048] S01. Comparing the event with the black and white list library, if:
[0049] Match with the whitelist library, release;
[0050] Match with the blacklist library and intercept;
[0051] If the matching fails, go to step S02;
[0052] The blacklist and blacklist inventory has a single event series, wherein the whitelist inventory contains behavioral data that is determined to be safe, such as upgrades with official designated links, file operations with official signatures, and data communications with official cloud servers; blacklist inventory Unsafe behavioral data such as wireless transmission of unofficially designated or authorized server data, file operations without signature or version inf...
specific Embodiment 2
[0077] This embodiment is an embodiment of an analog monitoring system for wearable smart devices.
[0078] The analog monitoring system for wearable smart devices of this embodiment, the schematic diagram is as follows figure 2 shown. The system includes:
[0079] Black and white list library comparison module 1: compare the event with the black and white list library, if:
[0080] Match with the whitelist library, release;
[0081] Match with the blacklist library and intercept;
[0082] If the matching fails, enter the event correlation comparison module 2;
[0083] Event correlation comparison module 2: Combine the event itself with each possible result of the event, and compare the obtained combined results with the event sequence threshold library, if:
[0084] Match the sequence in the event sequence threshold library or exceed the threshold of the event sequence threshold library, alarm or intercept, and write to the blacklist library part of the blacklist and wh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 