Unlock instant, AI-driven research and patent intelligence for your innovation.

Simulation monitoring method and system used for wearable intelligent equipment

A smart device and monitoring system technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as inapplicability of information security technology, theft, information security threats of wearable smart devices, etc.

Inactive Publication Date: 2016-04-13
HARBIN ANTIY TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition to files or network data, wearable smart devices also include other methods such as sensor information acquisition, which makes traditional information security technologies unsuitable for wearable smart devices.
[0004] However, there are few researches on the information security of wearable smart devices, which makes the security problems of wearable smart devices increasingly prominent.
In this case, obtaining information such as user behavior, vital signs, and habits through wearable smart devices, and stealing and exploiting usernames and passwords will pose a potential threat to the information security of wearable smart devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulation monitoring method and system used for wearable intelligent equipment
  • Simulation monitoring method and system used for wearable intelligent equipment
  • Simulation monitoring method and system used for wearable intelligent equipment

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0046] This embodiment is an embodiment of an analog monitoring method for a wearable smart device.

[0047] The analog monitoring method for wearable smart devices of this embodiment, the flow chart is as follows figure 1 shown. The method includes the following steps:

[0048] S01. Comparing the event with the black and white list library, if:

[0049] Match with the whitelist library, release;

[0050] Match with the blacklist library and intercept;

[0051] If the matching fails, go to step S02;

[0052] The blacklist and blacklist inventory has a single event series, wherein the whitelist inventory contains behavioral data that is determined to be safe, such as upgrades with official designated links, file operations with official signatures, and data communications with official cloud servers; blacklist inventory Unsafe behavioral data such as wireless transmission of unofficially designated or authorized server data, file operations without signature or version inf...

specific Embodiment 2

[0077] This embodiment is an embodiment of an analog monitoring system for wearable smart devices.

[0078] The analog monitoring system for wearable smart devices of this embodiment, the schematic diagram is as follows figure 2 shown. The system includes:

[0079] Black and white list library comparison module 1: compare the event with the black and white list library, if:

[0080] Match with the whitelist library, release;

[0081] Match with the blacklist library and intercept;

[0082] If the matching fails, enter the event correlation comparison module 2;

[0083] Event correlation comparison module 2: Combine the event itself with each possible result of the event, and compare the obtained combined results with the event sequence threshold library, if:

[0084] Match the sequence in the event sequence threshold library or exceed the threshold of the event sequence threshold library, alarm or intercept, and write to the blacklist library part of the blacklist and wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of the information security of the wearable intelligent equipment, and particularly relates to a simulation monitoring method and system used for wearable intelligent equipment. The method comprises the following steps: firstly, comparing an event with a blacklist and whitelist library; then, independently combining the event and each result which is possibly generated by the event, independently comparing an obtained combination result with an event sequence threshold value library, simulating a true execution environment, executing the event according to an instruction set way to generate a simulation result, and comparing the simulation result with the event sequence threshold value library; and finally, under the true execution environment, executing the event to obtain a true result, and comparing the true result with the event sequence threshold value library to finish the interception or release work of the event. The system comprises a blacklist and whitelist library comparison module, an event association comparison module, a simulation execution comparison module and a true execution comparison module, wherein all the above modules are used for realizing the above method. Malicious events can be effectively intercepted.

Description

technical field [0001] The invention belongs to the field of information security of wearable smart devices, and in particular relates to an analog monitoring method and system for wearable smart devices. Background technique [0002] With the development of Internet of Things technology, wearable smart devices are an important development direction of the information industry in the 21st century. The world's top IT companies have participated in the research and development of wearable smart devices, such as: Google's Googleglass, Apple's AppleWatch, Samsung's GalaxyGear, in addition, Intel, TI, Maxim and other semiconductor manufacturers have also participated in wearable smart devices. research and development of smart devices. [0003] Information security is an important part of the research and development of wearable smart devices. Although the traditional information security technology has formed a system, the traditional information security technology is aimed a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
Inventor 宋兵曾娴影李柏松
Owner HARBIN ANTIY TECH