Internet of Things card abnormal state monitoring and early warning method
An abnormal state, monitoring and early warning technology, applied in the field of IoT cards, can solve the problems that affect the network collapse of the IoT card, cannot save the economic loss of the IoT card users, or the privacy is violated, paralyzed, etc. Conducive to long-term maintenance and avoiding the effect of abnormal IoT cards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] A method for monitoring and early warning of an abnormal state of an Internet of Things card in this embodiment, such as figure 1 shown, including the following steps:
[0046] Stp1: The operator receives the IoT card data request or Volte connection, and obtains the connection target information at the same time;
[0047] Stp2: Analyze the identity information of the connection target, and complete the verification of the connection target with reference to the specified security comparison items;
[0048] Stp3: Use the comparison item as a reference basis to form comparison data and analysis results with the content of the connection target identity information;
[0049] Stp4: Judgment is made according to the comparison data and analysis results obtained in step Stp3. If the judgment result meets the comparison item, the request is rejected, the source of the connection target is traced, and the connection request channel of the connection target is interrupted at t...
Embodiment 2
[0063] Such as figure 2 As shown, the method for judging and processing the abnormal state of the Internet of Things card includes the following steps:
[0064] S1: Determine whether the status of the IoT card is abnormal and whether the status of the IoT card request is abnormal according to the IoT card data request received by the operator or the Volte connection;
[0065] S2: Obtain the judgment result in step S1, and determine the corresponding traceability authority;
[0066] S3: Obtain the abnormal target, analyze the abnormal level of the target, and trace the source of the abnormal target IoT card user;
[0067] S4: Record the abnormal target mask, prohibit the abnormal target from connecting to the request channel, obtain the mask source to connect to the channel target and block the channel;
[0068] S5: Obtain the associated blocking target data and make a judgment, incorporate the acquired abnormal target mask into the sub-comparison target item in the comparis...
Embodiment 3
[0079] Such as image 3 shown, refer to Figure three , the Internet of Things card is represented as a trapezoidal square in the figure, and the request target is represented as a computer icon in the figure. During the use of the Internet of Things card, an abnormal connection request is triggered to block the connection request channel;
[0080] Among them, after the IoT card is docked with the request target, when the IoT card has a jump request, the operator’s control terminal will still use the IoT card data channel to detect the status of the IoT card. open.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



