An Internet of Things security access terminal based on enterprise data collection

A technology for secure access and enterprise data, applied in the field of secure access terminals of the Internet of Things, can solve problems such as reducing enterprise efficiency and botnet attacks, achieve protocol isolation, high-efficiency and secure data exchange, and prevent inter-network transmission and leakage The effect of the event

Active Publication Date: 2021-07-09
ANHUI HEXIN TECH DEV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Expansion of attacks: Unlike user terminals, most IoT devices need to be permanently online and connected in real time, which makes them easier targets for attacks
[0006] 3. Botnets: IoT devices that are not effectively protected may invite botnet attacks, greatly reducing the efficiency of enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Internet of Things security access terminal based on enterprise data collection
  • An Internet of Things security access terminal based on enterprise data collection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] see Figure 1-2 , the present invention provides a technical solution: an Internet of Things security access terminal based on enterprise data collection, including an internal and external network processing unit 1, a secure data exchange unit 2, a data collection unit 3, a data display unit 4, and a network communication unit 5 And the interface communication unit 6, the network communication unit 5 is intercommunicated with the internal and external ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things security access terminal based on enterprise data collection, which includes an internal and external network processing unit, a security data exchange unit, a data collection unit, a data display unit, a network communication unit and an interface communication unit in one, and the Internet of Things The secure access terminal provides a wealth of software and hardware interfaces, which can have the capabilities of secure access, security management, and threat awareness for various sensor terminal devices and industrial control systems at the front end of the enterprise, and realize internal and external network exchange, while achieving physical isolation It also achieves protocol isolation, which truly eliminates the occurrence of security risk transmission between networks and leaks.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an Internet of Things security access terminal based on enterprise data collection. Background technique [0002] Since the development of the Internet of Things, Internet of Things systems, devices, and gateways have continuously exposed security vulnerabilities, and malicious attacks have been increasing year by year. More and more users and equipment manufacturers have shown great security awareness and demand for Internet of Things devices to access data exchange. focus on. [0003] IoT security threats are mainly manifested in the following aspects: [0004] 1. Data protection: The data of many devices is sensitive data. No matter from the perspective of business or control, the transmission, storage and processing of data should be carried out under safe conditions. [0005] 2. Expansion of attacks: Unlike user terminals, most IoT devices need to be permane...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0823H04L63/0876H04L67/12
Inventor 杨余曹竹冬
Owner ANHUI HEXIN TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products