Secure access terminal to internet of things based on enterprise data acquisition

A technology for secure access and enterprise data, applied in the field of IoT secure access terminals, it can solve problems such as reducing enterprise efficiency and botnet attacks, achieving protocol isolation, high-efficiency and secure data exchange, and preventing inter-network transmission and leakage. the effect of the event

Active Publication Date: 2019-03-26
ANHUI HEXIN TECH DEV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Expansion of attacks: Unlike user terminals, most IoT devices need to be permanently online and connected in real time, which makes them easier targets for attacks
[0006] 3. Botnets: IoT devices that are not effectively protected may invite botnet attacks, greatly reducing the efficiency of enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access terminal to internet of things based on enterprise data acquisition
  • Secure access terminal to internet of things based on enterprise data acquisition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] see Figure 1-2 , the present invention provides a technical solution: an Internet of Things security access terminal based on enterprise data collection, including an internal and external network processing unit 1, a secure data exchange unit 2, a data collection unit 3, a data display unit 4, and a network communication unit 5 And the interface communication unit 6, the network communication unit 5 is intercommunicated with the internal and external ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure access terminal to an internet of things based on enterprise data acquisition, which comprises an internal and external network processing unit, a secure data exchangeunit, a data acquisition unit, a data display unit, a network communication unit and an interface communication unit. The secure access terminal to the internet of things provides rich software and hardware interfaces. The secure access terminal to the internet of things can have the capabilities of secure access, safe management and threat perception of various sensor terminal devices and industrial control systems of an enterprise front end, realizes the exchange between an internal network and an external network and the physical isolation, and also realizes the protocol isolation, therebyavoiding the occurrence of an inter-network transmission event and a compromise event with security risk in a real sense.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an Internet of Things security access terminal based on enterprise data collection. Background technique [0002] Since the development of the Internet of Things, Internet of Things systems, devices, and gateways have continuously exposed security vulnerabilities, and malicious attacks have been increasing year by year. More and more users and equipment manufacturers have shown great security awareness and demand for Internet of Things devices to access data exchange. focus on. [0003] IoT security threats are mainly manifested in the following aspects: [0004] 1. Data protection: The data of many devices is sensitive data. No matter from the perspective of business or control, the transmission, storage and processing of data should be carried out under safe conditions. [0005] 2. Expansion of attacks: Unlike user terminals, most IoT devices need to be permane...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0823H04L63/0876H04L67/12
Inventor 杨余曹竹冬
Owner ANHUI HEXIN TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products