Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method combining big data and Internet of Things and cloud computing server center

A cloud computing server and data processing technology, which is applied in the field of big data processing, can solve the problems of increasing the time-consuming of vulnerability repair, unfavorable normal operation of the Internet of Things system, and reducing the effectiveness of vulnerability repair, so as to ensure the safety and reliability of operation Effect

Inactive Publication Date: 2021-03-02
石高建
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most related technologies use patch repairs to repair system vulnerabilities, which will not only reduce the effectiveness of vulnerability repairs, but also increase the time-consuming of vulnerability repairs, which is not conducive to the normal operation of the IoT system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method combining big data and Internet of Things and cloud computing server center
  • Data processing method combining big data and Internet of Things and cloud computing server center
  • Data processing method combining big data and Internet of Things and cloud computing server center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0021] After researching and analyzing common IoT systems (such as intelligent medical systems, autonomous driving systems, and unmanned chemical plant systems), the inventors found that these systems are highly dependent on the timeliness of bug fixes. , usually needs to be executed after a fault caused by a system vulnerability occurs, which will seriously reduce the operational safety...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method combining big data and Internet of Things and a cloud computing server center, and the method comprises the steps: firstly obtaining directory information corresponding to a plaintext code in a control script according to log updating information and communication configuration parameters of Internet of Things equipment; secondly, extracting text information in the control script through static directory information in the directory information to generate state description information, and converting the state description information into firstresult information; and then comparing each group of first equipment attribute parameters in the first result information with each group of second equipment attribute parameters in the second resultinformation one by one so as to determine different types of system vulnerabilities appearing when the Internet of Things equipment runs based on the control script. And finally, actively repairing different types of system vulnerabilities by adopting a corresponding repairing mode. Therefore, the software vulnerability of the Internet of Things equipment can be automatically detected and activelyrepaired, so that the operation safety and reliability of the Internet of Things equipment are ensured.

Description

technical field [0001] This application relates to the technical field of big data processing, in particular to a data processing method and a cloud computing server center combining big data and the Internet of Things. Background technique [0002] At present, everything from portable smart terminals to automation equipment required for the operation of the Industrial Internet of Things has become an important part of daily life. Thanks to the rapid development of big data, the Internet of Things system has penetrated into all aspects of social production and life, improving people's quality of life and production efficiency. Therefore, ensuring the safe and reliable operation of the Internet of Things system is a research direction that is currently paid more attention to. Among them, repairing the system vulnerabilities that appear in the IoT system is one of the important ways to ensure the safe and reliable operation of the IoT system. However, most related technologi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F16/25G16Y10/75G16Y40/10G16Y40/20G16Y40/35
CPCG06F21/577G06F16/254G16Y10/75G16Y40/10G16Y40/20G16Y40/35
Inventor 石高建
Owner 石高建