Dynamic security protection method and system for industrial Internet
An industrial Internet and dynamic security technology, applied in the Internet field, can solve problems such as waste of human resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0030] figure 1 A schematic structural diagram of an electronic device provided in the embodiment of this application, which can be passed in this application figure 1 The schematic diagram shown is used to describe an electronic device 100 for implementing an example of the dynamic security protection method and system for the industrial Internet according to the embodiment of the present application.
[0031] Such as figure 1 Shown is a schematic structural diagram of an electronic device, the electronic device 100 includes one or more processors 102, one or more storage devices 104, and an input device 106, and these components are connected through a bus system and / or other forms (not shown shown) interconnection. It should be noted that figure 1 The components and structure of the electronic device 100 shown are only exemplary, not limiting, and the electronic device may have figure 1 Some components shown may also have figure 1 Other components and structures not sh...
no. 2 example
[0036] refer to figure 2 A flow chart of a dynamic security protection method for the industrial Internet is shown, the method specifically includes the following steps:
[0037] Step S201, dynamically monitor intrusion requests in real time.
[0038] Wherein, the intrusion event includes all access requests that the server cannot identify, that is, illegal access.
[0039] As an implementation manner, it may be dynamic real-time monitoring of intrusion requests accessed through an interactive interface. Or dynamic real-time monitoring of intrusion requests that use the external network to intrude.
[0040] Step S202, determining whether a solution for protecting the intrusion request is stored.
[0041] Wherein, multiple solutions to deal with multiple types of intrusion requests are pre-stored in the server, and the solution is one of the multiple solutions; that is to say, the server will pre-store the Types of intrusions that have occurred, and at least one solution f...
no. 3 example
[0065] see image 3 A dynamic security protection system for the industrial Internet is shown, the system 500 includes:
[0066] A monitoring module 510, configured to dynamically monitor intrusion requests in real time, and the intrusion events include all access requests that cannot be identified by the server;
[0067] The processing module 520 is configured to determine whether a solution for protecting the intrusion request is stored, the server pre-stores multiple solutions for dealing with multiple types of the intrusion request, and the solution is the multiple solutions one of the;
[0068] A generating module 530, configured to, if not, generate interference information, where the interference information includes an empty IP address;
[0069] An alarm module 540, configured to send the interference information to the intrusion information, and send alarm information.
[0070] It should be noted that, for the specific implementation manner of the system 500, pleas...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com