Smart city information security guarantee system

A technology for urban information and security assurance, applied in the field of information security, can solve problems such as complex security issues, privacy information theft, lack of post-supervision of cloud services, etc., to achieve the effect of enhancing security and ensuring information security

Inactive Publication Date: 2019-02-15
广东粤迪厚创科技发展有限公司 +1
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1) At the smart city perception layer, a large number of smart sensing devices, sensors, and smart home appliances are connected to the smart network. The resulting complex access environment and diversified access methods have brought more complex security issues. The security protection capabilities of intelligent sensing devices are generally weak, and the protection technologies such as anti-theft, authentication, encryption, authentication, and auditing are not mature
[0008] 2) At the network layer of Huicheng City, the comprehensive application of traditional Internet, mobile communication network, radio and television network, various private networks, sensor networks and new-generation network communication technologies has realized the access of any time, any place and any device capabilities, but diverse access methods bring a variety of network attacks
[0009] 3) In the data layer of smart cities, the application of cloud computing has brought many unsafe factors, and the centralized storage of massive data in the cloud has made the consequences of traditional security threats such as data destruction, data loss, and data leakage in cloud computing more serious.
Service interruptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart city information security guarantee system
  • Smart city information security guarantee system
  • Smart city information security guarantee system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Please refer to Figure 2 to Figure 6 As shown, it shows the specific structure, method, process and working principle of the preferred embodiment of the present invention, which will be described in detail in conjunction with the accompanying drawings.

[0041] figure 2It is a schematic diagram of the smart city security system. Cloud computing data centers face a variety of security threats, including hacking, denial of service attacks, eavesdropping, viruses, Trojan horses, worms, etc., as well as hybrid attacks and APT attacks that combine the above threats. Therefore, security hardening needs to be done on the network infrastructure first. Using Security Gateway 5 Unified Threat Management (UTM) security appliance provides unparalleled functionality and detection capabilities through dynamic threat defense technology, advanced heuristic anomaly scanning engine. It integrates a variety of security functions, covering the network layer, data layer and application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart city information security guarantee system. The system comprises a plurality of groups of virtual machines/physical servers which are deployed at a cloud computing datacenter, database security equipment, a Web application firewall, DDos defense equipment, security gateways and a plurality of core switches. The security gateways are hanged beside the core switchesof the cloud computing data center through adoption of single arms. Two security gateways form a group and are connected with different core switches, and a hot standby HA cluster is formed. The DDosdefense equipment is connected between the boundary of the cloud computing data center and the core switches serially in an online mode. The Web application firewall is connected between a security Web service area and the core switches serially in a transparent mode. Important database server virtual machines are migrated to a security data service area through vMotion. The database security equipment is deployed on bypasses of an access layer switch of the security data service area. According to the system, cloud computing security is greatly improved, and smart city information security isguaranteed.

Description

technical field [0001] The invention relates to the technology in the field of information security, in particular to a smart city information security guarantee system. Background technique [0002] Since the concept of "Smart Earth" was put forward, the concept of wisdom has quietly emerged around the world, and the most widely recognized and carried out is the construction of smart cities. Smart city is a new concept and new model that uses the new generation of information technology such as the Internet of Things, cloud computing, big data, and spatial geographic information integration to promote urban planning, construction, management, and service intelligence. It is the development direction that will lead the future world cities. [0003] In recent years, my country's smart city construction has entered a peak period, and many cities have launched "smart city" strategies, but there are generally problems such as lack of top-level design and overall planning, hidden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24G06F21/62
CPCG06F21/6218H04L41/0663H04L63/02H04L63/1441H04L63/1458H04L63/20H04L67/10
Inventor 王勇
Owner 广东粤迪厚创科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products