Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial internet terminal encrypted traffic data security detection method, device and equipment

An industrial Internet and traffic data technology, applied in the field of industrial Internet terminal encrypted traffic data security detection, can solve problems such as how to find sensitive information leakage, data security problems, sensitive information leakage, etc., to solve data security problems, reduce leakage, The effect of ensuring data security

Active Publication Date: 2022-05-10
HANGZHOU HIKVISION DIGITAL TECH
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the rapid development of the industrial Internet has also brought about security issues
For example, industrial Internet terminals will collect and store a large amount of sensitive information. When such sensitive information is leaked to a third party, it will cause the leakage of sensitive information and cause data security issues. Therefore, timely detection of data security issues on industrial Internet terminals, especially The leakage of sensitive information is very important, but in related technologies, there is no effective way to discover the leakage of sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet terminal encrypted traffic data security detection method, device and equipment
  • Industrial internet terminal encrypted traffic data security detection method, device and equipment
  • Industrial internet terminal encrypted traffic data security detection method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, rather than limiting the present application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0024] It should be understood that although the embodiments of the present application may use terms such as first, second, and third to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an industrial internet terminal encrypted traffic data security detection method, device and equipment, and the method comprises the steps: carrying out the mirroring storage of traffic data interacted between an industrial internet terminal and target equipment if a proxy service request sent by a traffic proxy relay client is received; based on the traffic data stored in the mirroring manner, if the traffic feature corresponding to the traffic data is matched with the traffic feature in a configured traffic feature library, determining the traffic data as the traffic data of potential sensitive operation; for the traffic data of the potential sensitive operation, inputting the traffic data to a first classifier to obtain a first classification result; and determining that the traffic data has sensitive information based on the first classification result, or determining that the traffic data does not have sensitive information based on the first classification result. Through the technical scheme of the application, the traffic data with the sensitive information can be found in time, so that the leakage of the sensitive information is avoided or reduced, and the data security problem is solved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method, device and equipment for security detection of industrial Internet terminal encrypted traffic data. Background technique [0002] The Industrial Internet is a new type of infrastructure, application model and industrial ecology that is deeply integrated with the new generation of information and communication technology and the industrial economy. Through the comprehensive connection of people, machines, things and systems, a new manufacturing and The service system provides a way to realize the digital, networked and intelligent development of the industry and even the industry. The industrial Internet is an important cornerstone of the fourth industrial revolution. [0003] Industrial Internet terminals are devices that access the Industrial Internet through wired or wireless methods, and have the characteristics of various types, functions, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/12G06K9/62
CPCH04L63/1416H04L67/12G06F18/24G06F18/214
Inventor 王滨周少鹏张峰万里毕志城殷丽华李超
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products