Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security risk assessment system and method based on big data and edge computing

An edge computing and information security technology, applied in the field of risk assessment, can solve problems such as unreceived, paralyzed, and impact on equipment to be managed, and achieve accurate security, get rid of dependence, obtain and execute in a timely manner

Active Publication Date: 2021-10-01
广州赛度检测服务有限公司
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current situation, people simply manage multiple devices through one host or server, but due to factors such as device reasons or the distance between the management device and the device with management, etc., the device to be managed may not be able to The command sent by the management device is not received in time or cannot be received, which will affect or even paralyze the device to be managed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security risk assessment system and method based on big data and edge computing
  • Information security risk assessment system and method based on big data and edge computing
  • Information security risk assessment system and method based on big data and edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] see Figure 1-Figure 4 , the present invention provides a technical solution: an information security risk assessment method based on big data and edge computing, characterized in that the method includes the following steps:

[0057] S1. The client device counts the number of attacks per unit time, the time of each attack, and the recent website records visited by the user on the device through the network defense system;

[0058] S2. The client devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security risk assessment method based on big data and edge computing, and the method is characterized in that the method comprises the following steps: S1, a client device carries out the statistics of the number of attacks per unit time, the time of attacking each time, and the records of websites recently visited by a user on the device through a defense system of a network; according to the system and method, technologies such as big data and edge computing are applied, so that the system is more accurate in information security risk assessment feedback, and when the to-be-managed equipment does not receive a control instruction sent by the management equipment for a long time, the edge computing technology is applied to analyze data on the equipment under the condition that the operation of the current equipment is not influenced, and the self equipment is controlled according to an analysis result, so that the time of alternating current feedback between the equipment is saved, and equipment paralysis caused by an emergency situation is also avoided.

Description

technical field [0001] The invention relates to the technical field of risk assessment, in particular to an information security risk assessment system and method based on big data and edge computing. Background technique [0002] With the rapid development of Internet technology, people use the Internet more and more widely. While enjoying the convenience brought by the Internet, people pay more and more attention to the management of information security risks. In the current situation, people simply manage multiple devices through one host or server, but due to factors such as device reasons or the distance between the management device and the device with management, etc., the device to be managed may not be able to The command sent by the management device is not received in time or cannot be received, which will affect or even paralyze the device to be managed. [0003] In view of the above situation, we need an information security risk assessment system and method b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B19/042
CPCG05B19/0423G05B2219/25257
Inventor 荆哲谭祥明叶婷曾幸钦孙培高曾灶烟曾炽强李树湖
Owner 广州赛度检测服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products