Improvement method and system suitable for MQTT service security guarantee
A security guarantee and server-side technology, applied in the transmission system, electrical components, etc., can solve problems such as inflexibility, unbalanced load, and consumption of server-side performance, and achieve the effect of improving security protection capabilities, low performance loss, and increasing attack costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] The present invention binds to the most common MQTT safety protection schemes commonly used in many industries, such as the front-end gateway records the parameters, request frequency, IP, time regularity, etc. to the backend policy computing server, the backend policy computing server calculates a security policy After the configuration, sync to the gateway, accept the request by the gateway, and actively turn off the request. The difference between the program is that the backend policy computing server is computed into the security policy configuration. After the server is synchronized to the front-end server, when the server passes the current request for malicious requests through the policy configuration, it will forward the malicious request to the malicious request. The Socket long connection connected to a server cluster is connected to a malicious request acceptance server to process, which is a message forwarding in the computer principle. It does not affect serv...
Embodiment 2
[0070] Please refer to Figure 4 , Figure 4 It is a schematic structural diagram of an improvement system suitable for MQTT service security. Such as Figure 4 The present invention also includes an improvement system suitable for MQTT service security, including:
[0071] The server, receives the request sent by the client, and record the request information of the request;
[0072] Safety Policy Technical Server, the server synchronizes the request asynchronously to the security policy technology calculation server, the security policy computing server, dynamically calculates the generated protection policy configuration according to the request and the request information, and the service The protection policy configuration is saved, and the security policy adaptation process is performed when the request is sent next time.
[0073] Among them, the improvement system also includes:
[0074] The malicious request processing unit determines and outputs a result of each of the reque...
Embodiment 3
[0082] Combine Figure 5 As shown, this embodiment discloses a specific embodiment of a computer device. The computer device can include a processor 81 and a memory 82 stored with a computer program instruction.
[0083] Specifically, the processor 81 may include a central processor (CPU), or a particular integrated circuit (Application Specific Integrated Circuit, an ASIC), or can be configured to implement one or more integrated circuits of the present application embodiment.
[0084] The memory 82 can include a large capacity memory for data or instructions. For example, not limitation, memory 82 can include hard disk drives, simply referred to as HDDs, floppy drives, solid state drives, SSDs, flash, CD, magnetic disc, tape or universal serial bus (Universal Serialbus, referred to as a USB) Driver or two or more combinations of these. In appropriate, memory 82 can include a medium that is removably or not removable (or fixed). In a suitable case, the memory 82 can be inside or o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com