Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Improvement method and system suitable for MQTT service security guarantee

A security guarantee and server-side technology, applied in the transmission system, electrical components, etc., can solve problems such as inflexibility, unbalanced load, and consumption of server-side performance, and achieve the effect of improving security protection capabilities, low performance loss, and increasing attack costs

Pending Publication Date: 2021-06-18
SHANGHAI MININGLAMP ARTIFICIAL INTELLIGENCE GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1: Rely on the server master node in normal operation to intercept and process malicious request clients, which seriously consumes the performance of the server in normal operation and reduces the business processing capability of the server
[0006] 2: It relies heavily on the front-end server cluster, which is not flexible enough. The load of each server node in the front-end server cluster is unbalanced, which may cause an avalanche effect (servers cannot bear the excessive load pressure one by one and collapse, and then transfer the load pressure to the next server), the pressure on server operation and maintenance is very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improvement method and system suitable for MQTT service security guarantee
  • Improvement method and system suitable for MQTT service security guarantee
  • Improvement method and system suitable for MQTT service security guarantee

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] The present invention binds to the most common MQTT safety protection schemes commonly used in many industries, such as the front-end gateway records the parameters, request frequency, IP, time regularity, etc. to the backend policy computing server, the backend policy computing server calculates a security policy After the configuration, sync to the gateway, accept the request by the gateway, and actively turn off the request. The difference between the program is that the backend policy computing server is computed into the security policy configuration. After the server is synchronized to the front-end server, when the server passes the current request for malicious requests through the policy configuration, it will forward the malicious request to the malicious request. The Socket long connection connected to a server cluster is connected to a malicious request acceptance server to process, which is a message forwarding in the computer principle. It does not affect serv...

Embodiment 2

[0070] Please refer to Figure 4 , Figure 4 It is a schematic structural diagram of an improvement system suitable for MQTT service security. Such as Figure 4 The present invention also includes an improvement system suitable for MQTT service security, including:

[0071] The server, receives the request sent by the client, and record the request information of the request;

[0072] Safety Policy Technical Server, the server synchronizes the request asynchronously to the security policy technology calculation server, the security policy computing server, dynamically calculates the generated protection policy configuration according to the request and the request information, and the service The protection policy configuration is saved, and the security policy adaptation process is performed when the request is sent next time.

[0073] Among them, the improvement system also includes:

[0074] The malicious request processing unit determines and outputs a result of each of the reque...

Embodiment 3

[0082] Combine Figure 5 As shown, this embodiment discloses a specific embodiment of a computer device. The computer device can include a processor 81 and a memory 82 stored with a computer program instruction.

[0083] Specifically, the processor 81 may include a central processor (CPU), or a particular integrated circuit (Application Specific Integrated Circuit, an ASIC), or can be configured to implement one or more integrated circuits of the present application embodiment.

[0084] The memory 82 can include a large capacity memory for data or instructions. For example, not limitation, memory 82 can include hard disk drives, simply referred to as HDDs, floppy drives, solid state drives, SSDs, flash, CD, magnetic disc, tape or universal serial bus (Universal Serialbus, referred to as a USB) Driver or two or more combinations of these. In appropriate, memory 82 can include a medium that is removably or not removable (or fixed). In a suitable case, the memory 82 can be inside or o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an improvement method and system suitable for MQTT service security guarantee. The improvement method comprises the following steps: a request step: a client sends a request to a server; a preprocessing step: the server records request information of the request, and asynchronously synchronizes the request to a security policy technology computing server; a protection strategy configuration generation step: the security strategy calculation server dynamically calculates and generates protection strategy configuration according to the request and the request information; a security policy adaptation processing step: the server stores the protection policy configuration, and carries out security policy adaptation processing when the client sends a request next time. The invention aims at the protection of malicious attacks, wherein response actions and information processing which are lower in performance loss and random and regular are designed on the premise of updating a protection strategy channel which is universal in the industry, and the rule of server security protection by a malicious client is disturbed.

Description

Technical field [0001] The present invention belongs to the field of improvement applicable to MQTT service security, and specific to an improvement method and system for MQTT service security. Background technique [0002] In the current MQTT protocol design, the communication scene has been very high, but the malicious attacks of the server, especially the big merchant attacks are already routine topics in the network security field. The purpose is to solve malicious attacks, especially It is a big concurrent attack. [0003] Such as patent a security method and system for MQTT, combined with the parameters of the malicious request of the backend server record some attackers, the request frequency and other laws form the rules to synchronize the node to the server, there is a normal operation of the service node Be a protection process for malicious requests. [0004] Disadvantages of prior art [0005] 1: Depending on the normal operation of the server main node to intercept t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/20
Inventor 吴光需梁志婷
Owner SHANGHAI MININGLAMP ARTIFICIAL INTELLIGENCE GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products