Camera abnormal access identification and alarm method based on improved quartile difference method

A camera and quartile technology, applied in the field of network information security, can solve problems such as technical difficulties, and achieve the effects of easy popularization, high cost performance and appropriate accuracy

Active Publication Date: 2021-12-28
E-SURFING DIGITAL LIFE TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The third solution is more suitable for complex scenarios, so a large number of data analysis features are required, and the technical difficulty is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Camera abnormal access identification and alarm method based on improved quartile difference method
  • Camera abnormal access identification and alarm method based on improved quartile difference method
  • Camera abnormal access identification and alarm method based on improved quartile difference method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The detailed description set forth below in connection with the accompanying drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details to provide a thorough understanding of various concepts. It will be apparent, however, to one skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known components are shown in block diagram form in order to avoid obscuring such concepts.

[0032] It is to be understood that other embodiments will be apparent based on the present disclosure and that system, structural, procedural or mechanical changes may be made without departing from the scope of the present disclosure.

[0033] The specific implementation of the method for identifying and alerting abnormal camera access behaviors according to the present app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a camera abnormal access behavior identification and alarm method. The method comprises the following steps: receiving traffic data input; determining whether the stored traffic data exceeds a calculation threshold; if yes, determining whether the length of the stored traffic data exceeds the deletion length or not; if not, determining whether a cache traffic reference value exists; if yes, determining whether the traffic data is greater than a cache traffic reference value; if yes, determining whether an alarm period is met; and if the alarm period is met, storing the flow data and outputting an alarm result.

Description

technical field [0001] The present application relates to a field of network information security, and more specifically, relates to network information security protection of smart home. Background technique [0002] At present, network information security has become a national strategy and a powerful driving force for innovation and development. Smart home has brought unlimited imagination to people's future life, and its development potential must not be underestimated. However, in the Internet age, the more data users transmit, the greater the possibility of information exposure and the higher the probability of security risks. The family contains a large amount of personal privacy information, so the network security of the smart home needs to be paid special attention. The security performance of smart home network information is an inevitable trend in the development of the industry. [0003] Many families now choose smart home devices and choose to install smart ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
CPCH04L63/1416H04L63/1425H04L63/10H04L43/16H04L41/0631
Inventor 袁海宋文慧
Owner E-SURFING DIGITAL LIFE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products