Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial internet intrusion detection and defense method and device

An industrial Internet and intrusion detection technology, which is applied in the field of industrial Internet intrusion detection and defense methods and devices, can solve problems such as cumbersome operations, and achieve the effects of ensuring normal operation, reducing the probability of network attacks, and reducing the intensity

Pending Publication Date: 2021-09-03
泉州和西利科技有限公司
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides an industrial Internet intrusion detection and defense method and its device, which solves the problems of cumbersome operation and certain deficiencies in the actual use process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet intrusion detection and defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as figure 1 An embodiment of the present invention provides an industrial Internet intrusion detection and defense method, including the following steps:

[0023] When the client sends a service request, it first goes through the router detection. When the detection fails, the service request will be rejected directly. When the detection passes, the camera permission of the client is requested to identify and verify the identity of the operator's face on the client. When the verification fails When the verification is passed, the service request will also be rejected. When the verification passes and enters the next step of verification, it will accept the detection of the number of verification times. When too many verification times are detected, the service request will also be rejected, and the next step will be to request the iris of the client. The authority of the camera will further verify the identity of the operator. If the verification fails, the service...

Embodiment 2

[0028] The difference between this embodiment and Embodiment 1 is: when only verifying the number of operations to verify the IP address, then the number of times the operator can perform repeated operations on face authentication and iris authentication, although to a certain extent, it can be convenient The operator performs the operation, but repeating the two steps of the operator many times will also cause a certain impact on the network operation, increase the possibility of the network being attacked, and further reduce the operation security of the network.

Embodiment 3

[0030] An embodiment of the present invention provides an industrial Internet intrusion detection and defense device, including a face verification module, an iris verification module, an IP address verification module, and an operation count detection module;

[0031] The face verification module will determine whether the camera picture belongs to special processing through operations such as blinking, nodding, and shaking the head, so as to avoid whether the account is stolen;

[0032] The iris verification module is to further verify the identity information of the operator by detecting and comparing the iris information of the operator;

[0033] The verification of the number of operations is to avoid the risk of man-made multiple operations that may attack the network, and directly cut off the source of the attack.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an industrial internet intrusion detection and defense method and device, and relates to the technical field of network security detection and defense. The industrial internet intrusion detection and defense method comprises the following steps: after a client sends a service request, the service request is detected through a router, the service request is directly rejected when the detection is not passed, and when the detection is passed, a camera authority of the client is requested to identify the face of an operator of the client to verify the identity; and when the verification is not passed, the service request is rejected. By increasing operation frequency verification, the frequency of face verification, iris authentication and IP address can be effectively reduced, the operation frequency of an operator can be well limited, the operator is prevented from carrying out operation without limitation, impact on a network can be relieved to a certain degree, the probability that the network is attacked can be reduced, the intensity that the network is attacked can be relieved, normal operation of the network is further ensured, and meanwhile the defects in the prior art can be overcome.

Description

technical field [0001] The invention relates to the technical field of network security detection and defense, in particular to an industrial Internet intrusion detection and defense method and device thereof. Background technique [0002] Cyber ​​attacks (Cyber ​​Attacks, also known as cyber attacks) refer to any type of offensive actions against computer information systems, infrastructure, computer networks or personal computer equipment. For computers and computer networks, they destroy, expose, modify, Disabling software or services, stealing or accessing any computer data without authorization will be regarded as attacks on computers and computer networks. Network attacks are exploiting loopholes and security flaws in network information systems Attacks on systems and resources, threats to network information systems come from many aspects, and will change with time. From a macro perspective, these threats can be divided into man-made threats and natural threats. Natur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/44
CPCG06F21/32G06F21/44
Inventor 何泽亮
Owner 泉州和西利科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products