Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of Things data security monitoring method

A technology of data security and the Internet of Things, applied in the fields of digital data protection, electrical digital data processing, computer security devices, etc., can solve the problems affecting data security, affecting data processing speed, etc. The effect of precise data filtering

Inactive Publication Date: 2021-01-29
江上(上海)软件科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the increasing amount of data in the mobile Internet (the arrival of the era of big data), more and more storage devices are required according to the existing system. For data tracking and filtering, it is necessary to save all the data, and then find out the conditions that meet the requirements through filtering. However, there are some garbage data, wrong data and dangerous data in the data uploaded to the cloud data center. Participating these data in data analysis and storage will not only affect the processing speed of the data, but also affect the security of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things data security monitoring method
  • Internet of Things data security monitoring method
  • Internet of Things data security monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] like Figure 1-3 As shown, the IoT data security monitoring method according to the embodiment of the present invention includes the following steps;

[0041] Step S101, monitoring the working state of the Internet of Things itself, and forming data related to the working state of the Internet of Things;

[0042] Step S103, obtaining monitored data objects, filtering each data object, and assigning a unique RULE_ID to each data object;

[0043] Step S105, start monitoring the data object to be monitored according to monitoring rules, so as to obtain preliminary monitoring results;

[0044] Step S107, analyzing each preliminary monitoring result, and separately generating a hash for each rule, and determining the distribution characteristics of the hash;

[0045] Step S109, filter the distribution characteristics of the hash through a bitmap algorithm and a linked list to obtain data field groups, and the preset data field groups include random groups and / or focus grou...

Embodiment 2

[0053] like Figure 1-3As shown, the data object includes at least one or more data fields, and according to the number of field values ​​of each type of data field, determine the ratio of the field value of each field to the total number of field values, and according to the number of field values ​​of the target field The number of types of field values ​​and the ratio of the field values ​​of each field to the total number of field values ​​determine the distribution characteristics of the field values ​​of the target field, and monitor the distribution characteristics, and design the corresponding fingerprint data algorithm according to the data of the distribution characteristics , and the number of types and the number of field values ​​are determined as distribution characteristics of field values ​​of the target field.

Embodiment 3

[0055] like Figure 1-3 As shown, in the Internet of Things data security monitoring method, starting to monitor the data object to be monitored according to the monitoring rules includes the following steps:

[0056] Step S201, obtaining parameters of a preset monitoring workload, where the preset workload parameters include a preset number of global traversals for the data object to be monitored;

[0057] Step S203, the validity of the data fields in the data object to be monitored and whether the data fields conform to the business logic;

[0058] Step S205, judging one or more types of business logic whether the number of global traversals currently performed on the data object to be monitored reaches a preset number of times;

[0059] Step S207, performing spot checks on the data fields of the monitored data to obtain the results of the spot checks on the data fields;

[0060] Step S209, determine whether to terminate the monitoring of the data object to be monitored ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things data security monitoring method. The method comprises the following steps of monitoring the working state of Internet of Things, and forming data relatedto the working state of the Internet of Things; acquiring monitored data objects, filtering each data object, and allocating a unique RULE_ID to each data object; starting to monitor a to-be-monitoreddata object according to a monitoring rule to obtain a preliminary monitoring result; and analyzing each preliminary monitoring result, and independently generating hash for each rule. The inventionhas the beneficial effects that the security of data and commands of the Internet of Things is ensured, environmental index data is filtered by using a cloud processing technology, a deeper and more accurate data filtering function is provided, the security of the data is ensured, a database is effectively monitored, strangers are effectively prevented from illegally entering the database to consult by limiting an IP address. The data security in the database is ensured.

Description

technical field [0001] The invention relates to the technical field of monitoring of the Internet of Things, in particular to a method for monitoring data security of the Internet of Things. Background technique [0002] The Internet of Things is an important part of the new generation of information technology. As the name suggests, the Internet of Things is "the Internet where things are connected. The definition of the Internet of Things is: information sensing devices such as radio frequency identification, infrared sensors, global positioning systems, and laser scanners According to the agreed protocol, any object is connected to the Internet for information exchange and communication, so as to realize a network of intelligent identification, positioning, tracking, monitoring and management of objects. In this network, objects can communicate with each other "communicate" without human intervention. [0003] However, due to the increasing amount of data in the mobile I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 赵宏杨海博徐进时柳吕明智
Owner 江上(上海)软件科技有限公司