Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk identification method and device and electronic equipment

A risk identification and risk technology, applied in the field of Internet of Things, can solve the problems of low accuracy of risk identification and high hidden dangers of Internet of Things business security

Active Publication Date: 2021-01-12
CHINA MOBILE M2M +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a risk identification method, device, and electronic equipment to solve the problems of high security risks and low accuracy of risk identification in the existing Internet of Things business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and device and electronic equipment
  • Risk identification method and device and electronic equipment
  • Risk identification method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] see figure 1 , figure 1 is one of the flowcharts of the risk identification method provided by the embodiment of the present invention, such as figure 1 As shown, this embodiment provides a risk identification method, including the following steps:

[0024] Step 101, acquiring feature information of the IoT card.

[0025] The feature information can be used to represent one or more of the physical form, function activation, and usage behavior...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a risk identification method and device and electronic equipment, and the method comprises the steps: obtaining the feature information of an IOT card; judging whether the Internet of Things card is a secure user or not according to the feature information; and determining the risk level of the Internet of Things card according to the feature information under the conditionof judging that the Internet of Things card is not a secure user. According to the method provided by the invention, whether the Internet of Things card is a secure user or not can be determined according to the feature information of the Internet of Things card, and when the Internet of Things card is an unsecure user, the risk level of the Internet of Things card is further determined, and riskidentification is carried out on the Internet of Things card more comprehensively, so that the risk identification accuracy is improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, in particular to a risk identification method, device and electronic equipment. Background technique [0002] Mobile communication has moved from the connection between people to people and things, or the connection between things and things. The era of Internet of Everything has come. However, due to the lagging security standards in the Internet of Things industry, smart device manufacturers lack security awareness and investment. The security risks of the Internet of Things industry are relatively serious. Therefore, it is particularly important to improve the risk prevention and control capabilities of the Internet of Things and ensure the sustainable and healthy development of the Internet of Things business. As the core of the Internet of Things, IoT cards have become the focus of supervision. By monitoring the IoT card, it can effectively prevent and control the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L67/12H04L63/205
Inventor 林奎学刘春阳石明洋李晓磊刘炀姜海燕李柏昆
Owner CHINA MOBILE M2M
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products