Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security defense method and device

A technology for security defense and Internet of Things equipment, applied in the field of security defense methods and devices, can solve the problem that the security of Internet of Things equipment cannot be effectively guaranteed, and achieve the effect of realizing security defense, ensuring security, and improving security.

Pending Publication Date: 2020-05-08
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a security defense method and device, which solves the problem that the security of IoT devices cannot be effectively guaranteed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense method and device
  • Security defense method and device
  • Security defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The security defense method and device provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0023] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations.

[0024] The terms "first" and "second" in the specification and drawings of the present application are used to distinguish different objects, or to distinguish different processes for the same object, rather than to describe a specific sequence of objects.

[0025] In addition, the terms "including" and "having" mentioned in the description of the present application and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security defense method and device, relates to the technical field of Internet of Things, and aims to timely and effectively realize security defense of Internet of Things equipment and improve the security of the Internet of Things equipment. The method comprises the following steps: acquiring the position (i.e., a first position) of Internet of Things equipment at the current moment, the position (i.e., a second position) of the Internet of Things equipment at the previous preset moment of the current moment, the information transceiving frequency at the current moment and the information transmission rate at the current moment; determining a position change rate of movement from the second position to the first position; according to at least one of the positionchange rate, the information transceiving frequency and the information transmission rate, determining whether the operation state of the Internet of Things equipment is abnormal or not; and when itis determined that the operation state of the Internet of Things equipment is abnormal, cutting off the network connection between the Internet of Things equipment and the Internet of Things system.

Description

technical field [0001] The present application relates to the technical field of the Internet of Things, and in particular to a security defense method and device. Background technique [0002] The Internet of Things is a network that carries various information such as the Internet and traditional telecommunication networks, and enables all ordinary objects that can perform independent functions to realize interconnection. Usually, users can realize remote control and centralized management of automobiles, household equipment and other equipment through the Internet of Things, and can also collect and analyze data from IoT devices to achieve big data analysis for disaster prediction, crime prevention, and epidemic control Wait. [0003] At present, IoT devices are usually connected to the Internet by default, and their codes are generally open source. In this way, any user can obtain the code of the IoT device, which reduces the security of the IoT device. However, most ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/12H04L29/06H04W12/121
CPCH04L63/107H04L63/1425H04W12/67H04W12/63H04W12/122
Inventor 王茜硕杨鸿宾
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products