CN110912900A - Boundary intelligent security monitoring method, device and equipment based on Internet of things - Google Patents

Boundary intelligent security monitoring method, device and equipment based on Internet of things Download PDF

Info

Publication number
CN110912900A
CN110912900A CN201911180016.4A CN201911180016A CN110912900A CN 110912900 A CN110912900 A CN 110912900A CN 201911180016 A CN201911180016 A CN 201911180016A CN 110912900 A CN110912900 A CN 110912900A
Authority
CN
China
Prior art keywords
internet
mac address
determining
communication
things device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911180016.4A
Other languages
Chinese (zh)
Other versions
CN110912900B (en
Inventor
张齐全
李明欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zheng Longhai
Original Assignee
张齐全
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 张齐全 filed Critical 张齐全
Priority to CN201911180016.4A priority Critical patent/CN110912900B/en
Publication of CN110912900A publication Critical patent/CN110912900A/en
Application granted granted Critical
Publication of CN110912900B publication Critical patent/CN110912900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention relates to the technical field of Internet of things, in particular to a boundary intelligent security monitoring method, a device and equipment based on the Internet of things, the method can associate the uniform security positioning MAC address of equipment to be accessed into the equipment of the Internet of things with the information URL address of communication information, store the address, obtain a first judgment result based on whether the uniform security positioning MAC address of the equipment associated with the same information URL address in a security monitoring database is more than one, further obtain a second judgment result based on the first judgment result, determine the communication information corresponding to the same information URL address as abnormal information based on the second judgment result and filter the abnormal information, so that even if the abnormal information is associated with the uniform security positioning MAC address of the equipment in the security monitoring database, the abnormal information can be determined from the communication information through double judgment, and abnormal information is filtered, so that the abnormal information is prevented from entering the environment of the Internet of things, and the detection efficiency of security monitoring is improved.

Description

Boundary intelligent security monitoring method, device and equipment based on Internet of things
Technical Field
The invention relates to the technical field of Internet of things, in particular to a boundary intelligent security monitoring method, a boundary intelligent security monitoring device and boundary intelligent security monitoring equipment based on the Internet of things.
Background
With the coming of the 5G era, the development of the Internet of things is more and more mature. Nowadays, the car networking and smart home are gradually applied to the production and life of people. Under the large environment of the internet of things with a large number of interconnected terminal devices and intelligent devices, in order to avoid information leakage of the terminal devices and the intelligent devices, security monitoring of the internet of things is particularly important, but the detection efficiency of the existing security monitoring method is poor.
Disclosure of Invention
In order to overcome at least the above disadvantages in the prior art, an object of the present invention is to provide a method, an apparatus and a device for monitoring boundary intelligent security based on the internet of things.
The embodiment of the invention provides a boundary intelligent security monitoring method based on the Internet of things, which comprises the following steps:
associating a device unified security positioning MAC address to be accessed into the Internet of things device with an information URL address of communication information generated by the device to be accessed into the Internet of things device, and storing the address in a security monitoring database, wherein the security monitoring database is used for storing a mapping relation between the device unified security positioning MAC address and the information URL address;
judging whether the number of equipment unified security positioning MAC addresses associated with the same information URL address in the security monitoring database is more than one, and obtaining a first judgment result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
Optionally, the determining, that the device unified security and protection positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and whether a relationship between each device unified security and protection positioning MAC address associated with the same information URL is a preset relationship includes:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
and if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the determining, that the device unified security and protection positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and whether a relationship between each device unified security and protection positioning MAC address associated with the same information URL is a preset relationship includes:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the filtering the abnormal information includes:
presetting a shared channel in a first filtering process, and setting the shared channel as a main channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel.
Optionally, the method further comprises:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
The embodiment of the invention provides a boundary intelligent security monitoring device based on the Internet of things, which comprises:
the address association and storage module is used for associating the equipment uniform security positioning MAC address to be accessed into the Internet of things equipment with the information URL address of the communication information generated by the equipment to be accessed into the Internet of things equipment and storing the information URL address in a security monitoring database, and the security monitoring database is used for storing the mapping relation between the equipment uniform security positioning MAC address and the information URL address;
the judging module is used for judging whether the number of equipment unified security protection positioning MAC addresses associated with the same information URL address in the security protection monitoring database is more than one or not, and obtaining a first judging result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
Optionally, the device unified security positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address,
the judging module is used for:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship;
the judging module is further configured to:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the method is configured to preset a shared channel in a first filtering process, and set the shared channel as a primary channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel;
the apparatus also includes a state determination module to:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state. The embodiment of the invention provides equipment, which comprises a processor, a memory and a bus, wherein the memory and the bus are connected with the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is used for calling the program instructions in the memory so as to execute the boundary intelligent security monitoring method based on the Internet of things.
The embodiment of the invention provides a storage medium, wherein a program is stored on the storage medium, and when the program is executed by a processor, the boundary intelligent security monitoring method based on the Internet of things is realized.
The invention provides a boundary intelligent security monitoring method, a device and equipment based on the Internet of things, which can associate a uniform security positioning MAC address of equipment to be accessed into the Internet of things equipment with an information URL address of communication information generated by the equipment to be accessed into the Internet of things equipment, store the address in a security monitoring database, obtain a first judgment result based on whether more than one uniform security positioning MAC address of the equipment associated with the same information URL address in the security monitoring database is available, further obtain a second judgment result based on the first judgment result, determine the communication information corresponding to the same information URL address as abnormal information based on the second judgment result, and filter the abnormal information, so that even if the abnormal information is associated with the uniform security positioning MAC address of the equipment in the security monitoring database, the abnormal information can be determined from the communication information through double judgment, and abnormal information is filtered, so that the abnormal information is prevented from entering the environment of the Internet of things, and the detection efficiency of security monitoring is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a boundary intelligent security monitoring method based on the internet of things according to an embodiment of the present invention.
Fig. 2 is a functional unit block diagram of a boundary intelligent security monitoring device based on the internet of things according to an embodiment of the present invention.
Fig. 3 is a block diagram of an apparatus according to an embodiment of the present invention.
Icon:
20-a border intelligent security monitoring device based on the internet of things; 21-address association and storage module; 22-a judgment module; 23-a state determination module;
70-equipment; 701-a processor; 702-a memory; 703-bus.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a boundary intelligent security monitoring method, a boundary intelligent security monitoring device and boundary intelligent security monitoring equipment based on the Internet of things, which are used for solving the technical problem that the existing security monitoring method is poor in detection efficiency.
In order to solve the technical problems, the embodiment of the invention provides a boundary intelligent security monitoring method, a boundary intelligent security monitoring device and boundary intelligent security monitoring equipment based on the Internet of things, and the general idea is as follows:
associating the equipment uniform security positioning MAC address to be accessed into the Internet of things equipment with the information URL address of the communication information generated by the equipment to be accessed into the Internet of things equipment, and storing the information URL address in a security monitoring database, wherein the security monitoring database is used for storing the mapping relation between the equipment uniform security positioning MAC address and the information URL address; judging whether the number of equipment unified security positioning MAC addresses associated with the same information URL address in a security monitoring database is more than one, and obtaining a first judgment result; if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between the equipment unified security positioning MAC addresses associated with the same information URL address is a preset relation or not, and obtaining a second judgment result; if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not a preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information. Therefore, even if the abnormal information is associated with the MAC address of the equipment in the security monitoring database in a unified security positioning mode, the abnormal information can be determined from the communication information through double judgment, the abnormal information is filtered, the abnormal information is prevented from entering the environment of the Internet of things, and the detection efficiency of security monitoring is improved.
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
The embodiment of the invention provides a boundary intelligent security monitoring method based on the Internet of things. Fig. 1 is a flowchart of a method for monitoring intelligent security based on internet of things according to an embodiment of the present invention, where the method may include the following steps:
and S21, associating the uniform security positioning MAC address of the equipment to be accessed into the Internet of things equipment with the information URL address of the communication information generated by the equipment to be accessed into the Internet of things equipment, and storing the address in a security monitoring database.
S22, judging whether the number of the equipment unified security protection positioning MAC addresses related to the same information URL address in the security protection monitoring database is more than one, and obtaining a first judgment result.
S23, if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address exist, judging whether the relation between the equipment unified security positioning MAC addresses associated with the same information URL address is a preset relation or not, and obtaining a second judgment result.
S24, if the second judgment result indicates that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not a preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
Under the environment of interconnection of everything, communication information corresponding to the same information URL address may be associated with equipment unified security positioning MAC addresses of multiple Internet of things devices, but in general, only the equipment unified security positioning MAC addresses of the Internet of things devices with preset relations (colleagues, family members and friends) can share the same information URL address, so that through S21-S22, even if abnormal information is associated with the equipment unified security positioning MAC addresses in the security monitoring database, the abnormal information can be determined from the communication information through double judgment, and is filtered, the abnormal information is prevented from entering the environment of the Internet of things, and the detection efficiency of security monitoring is improved.
In S21, the security monitoring database is used to store a mapping relationship between the device uniform security positioning MAC address and the information URL address.
In specific implementation, in order to accurately determine whether the relationship between the internet of things devices corresponding to the device uniform security positioning MAC addresses associated with the same information URL address is a preset relationship, in S23, it is determined whether the relationship between each device uniform security positioning MAC address associated with the same information URL is a preset relationship, which specifically includes the following contents:
in this embodiment, two device uniform security positioning MAC addresses associated with the same information URL are described, where the device uniform security positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address.
S231, after the first Internet of things device corresponding to the first MAC address receives the communication request of the second Internet of things device corresponding to the second MAC address, the first communication parameter and the second communication parameter generated by the first Internet of things device are obtained.
S232, when the first Internet of things device sends the first feedback information carrying the first communication parameter and the second communication parameter to the second Internet of things device to trigger the second Internet of things device to add the generated communication hidden domain into the communication record list, the numerical value of the communication hidden domain is obtained.
S233, it is verified whether the value matches the first communication parameter.
S234, if the first MAC address and the second MAC address are matched, determining that the relationship between the first MAC address and the second MAC address is a preset relationship;
s235, if not, determining that the relationship between the first MAC address and the second MAC address is not a preset relationship.
In S232, the communication hidden field is generated by the second internet-of-things device with the first communication parameter as a name, and the numerical value is obtained by the first internet-of-things device according to the preset relationship verification character determined by the second communication parameter.
In S231-S235, since the communication hidden field is generated by the second internet-of-things device with the first communication parameter as the name, and the numerical value is obtained by the first internet-of-things device according to the preset relationship verification character determined by the second communication parameter, it can be accurately determined whether the relationship between the first MAC address and the second MAC address is the preset relationship based on the numerical value and the first communication parameter through S231-S235, so as to accurately determine whether the communication information corresponding to the same information URL associated with the multiple device uniform security positioning MAC addresses is abnormal information, thereby improving the accuracy of determining and detecting the abnormal information.
Optionally, in S23, determining whether a relationship between the uniform security positioning MAC addresses of each device associated with the same information URL is a preset relationship, which may specifically include the following:
s2361, determining the call completing rate of the first Internet of things device corresponding to the first MAC address which is connected after the first Internet of things device initiates a communication request to the second Internet of things device corresponding to the second MAC address; and/or
And determining a first sum value of the first request times and the second request times corresponding to the first Internet of things equipment.
S2362, a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first summation value are determined.
S2363, the product of the first statistical value and the first weight value and the product of the second statistical value and the second weight value are added in whole or in part to obtain a second added value.
S2364, whether the second summation value is larger than a preset threshold value is judged.
S2365, if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship.
S2366, if the second sum is less than or equal to the predetermined threshold, determining that the relationship between the first MAC address and the second MAC address is not the predetermined relationship.
In S2361, the first request times are times that the first internet of things device initiates the communication request to the second internet of things device on average each day within a preset time period, and the second request times are times that the first internet of things device accepts the communication request of the first internet of things device on average each day within the preset time period.
Compared with S231-S235, through S2361-S2366, the preset relationship can be determined through the communication interaction records between the first Internet of things device and the second Internet of things device, so that the preset relationship can be determined more conveniently, and the convenience of determining the abnormal information is improved.
In specific implementation, one of the methods from S231-S235 and S2361-S2366 can be selected to determine the preset relationship according to the actual application scenario, so that the flexibility of determining the preset relationship is improved.
In a specific implementation, filtering the abnormal information may cause channel congestion, resulting in delay or omission of filtering, and for this purpose, in S24, the filtering the abnormal information includes the following specific contents:
s2411, presetting a shared channel in the first filtering process, and setting the shared channel as a primary channel for activation.
S2412, when the second filtering process needs to read the active main channel, presetting a channel query in the first filtering process, and acquiring the time of the preset channel query as the first time.
S2413, after activating the shared channel, presetting the channel query as a complete state.
S2414, determining whether the channel query is in a ready state.
And S2415, if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel.
Through S2411-S2415, under the condition that a communication channel is blocked, a default channel can be avoided, whether the main channel is successfully read or not can be determined based on the preset shared channel in the first filtering process and the preset channel query in the second filtering process, so that abnormal information is filtered according to the main channel, the abnormal information can be successfully filtered, omission during filtering of the abnormal information is avoided, and further the avoided abnormal information is accessed into an internet of things system to cause potential safety hazards.
On the basis, in order to avoid the reduction of the filtering efficiency and reliability of the abnormal information caused by the long time consumption caused by the congestion of the main channel, after the abnormal information is filtered according to the main channel, the following contents are included:
s2421, the time when the main channel is successfully read is obtained as the second time.
And S2422, determining the difference value between the first time and the second time as the consumed time for filtering the abnormal information.
And S2423, judging whether the consumed time of filtering the abnormal information exceeds the set time length.
And S2424, outputting prompt information when the filtering time of the abnormal information exceeds the set time length.
And S2425, when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
Through S2421-S2425, whether the abnormal information filtering function is in a normal state or not can be accurately determined, the filtering time consumption caused by congestion of a main channel is avoided to be too long, and the efficiency and the reliability of abnormal information filtering are improved.
The embodiment of the invention provides a boundary intelligent security monitoring device 20 based on the Internet of things. Fig. 2 is a functional unit block diagram of a boundary intelligent security monitoring device 20 based on the internet of things according to an embodiment of the present invention, where the boundary intelligent security monitoring device 20 based on the internet of things includes:
the address associating and storing module 21 is configured to associate a device uniform security positioning MAC address of the device to be connected to the internet of things with an information URL address of communication information generated by the device to be connected to the internet of things, and store the association in a security monitoring database, where the security monitoring database is configured to store a mapping relationship between the device uniform security positioning MAC address and the information URL address.
The judging module 22 is configured to judge whether there is more than one device uniform security positioning MAC address associated with the same information URL address in the security monitoring database, and obtain a first judgment result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
Optionally, the device unified security positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address,
the determining module 22 is configured to:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship;
optionally, the determining module 22 is further configured to:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the determining module 22 is configured to:
presetting a shared channel in a first filtering process, and setting the shared channel as a main channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel;
optionally, the apparatus further comprises a state determining module 23 configured to:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
The border intelligent security monitoring device 20 based on the internet of things comprises a processor and a memory, wherein the address association and storage module 21, the judgment module 22, the state determination module 23 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the detection efficiency of security monitoring is improved by adjusting kernel parameters.
The embodiment of the invention provides a storage medium, wherein a program is stored on the storage medium, and when the program is executed by a processor, the boundary intelligent security monitoring method based on the Internet of things is realized.
The embodiment of the invention provides a processor, which is used for running a program, wherein the boundary intelligent security monitoring method based on the Internet of things is executed when the program runs.
An embodiment of the present invention provides an apparatus, as shown in fig. 3, an apparatus 70 includes at least one processor 701, and at least one memory 702 and a bus connected to the processor 701; the processor 701 and the memory 702 complete mutual communication through a bus 703; the processor 701 is configured to call the program instructions in the memory 702 to execute the above-mentioned boundary intelligent security monitoring method based on the internet of things. The device 70 herein may be a server, a PC, a PAD, a cell phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
associating a device unified security positioning MAC address to be accessed into the Internet of things device with an information URL address of communication information generated by the device to be accessed into the Internet of things device, and storing the address in a security monitoring database, wherein the security monitoring database is used for storing a mapping relation between the device unified security positioning MAC address and the information URL address;
judging whether the number of equipment unified security positioning MAC addresses associated with the same information URL address in the security monitoring database is more than one, and obtaining a first judgment result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
Optionally, the determining, that the device unified security and protection positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and whether a relationship between each device unified security and protection positioning MAC address associated with the same information URL is a preset relationship includes:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
and if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the determining, that the device unified security and protection positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and whether a relationship between each device unified security and protection positioning MAC address associated with the same information URL is a preset relationship includes:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
Optionally, the filtering the abnormal information includes:
presetting a shared channel in a first filtering process, and setting the shared channel as a main channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel.
Optionally, the method further comprises:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A boundary intelligent security monitoring method based on the Internet of things is characterized by comprising the following steps:
associating a device unified security positioning MAC address to be accessed into the Internet of things device with an information URL address of communication information generated by the device to be accessed into the Internet of things device, and storing the address in a security monitoring database, wherein the security monitoring database is used for storing a mapping relation between the device unified security positioning MAC address and the information URL address;
judging whether the number of equipment unified security positioning MAC addresses associated with the same information URL address in the security monitoring database is more than one, and obtaining a first judgment result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
2. The method according to claim 1, wherein the device unified security positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and the determining whether a relationship between each device unified security positioning MAC address associated with the same information URL is a preset relationship includes:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
and if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
3. The method according to claim 1, wherein the device unified security positioning MAC address associated with the same information URL includes a first MAC address and a second MAC address, and the determining whether a relationship between each device unified security positioning MAC address associated with the same information URL is a preset relationship includes:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
4. The method of claim 1, wherein the filtering the anomaly information comprises:
presetting a shared channel in a first filtering process, and setting the shared channel as a main channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel.
5. The method of claim 4, further comprising:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
6. The utility model provides a border intelligent security monitoring device based on thing networking which characterized in that, the device includes:
the address association and storage module is used for associating the equipment uniform security positioning MAC address to be accessed into the Internet of things equipment with the information URL address of the communication information generated by the equipment to be accessed into the Internet of things equipment and storing the information URL address in a security monitoring database, and the security monitoring database is used for storing the mapping relation between the equipment uniform security positioning MAC address and the information URL address;
the judging module is used for judging whether the number of equipment unified security protection positioning MAC addresses associated with the same information URL address in the security protection monitoring database is more than one or not, and obtaining a first judging result;
if the first judgment result represents that more than one equipment unified security positioning MAC addresses associated with the same information URL address are available, judging whether the relation between each equipment unified security positioning MAC address associated with the same information URL address is a preset relation or not, and obtaining a second judgment result;
if the second judgment result represents that the relationship between the uniform security positioning MAC addresses of each device associated with the same information URL address is not the preset relationship, determining the communication information corresponding to the same information URL address as abnormal information, and filtering the abnormal information.
7. The apparatus of claim 6, wherein the device unified security positioning MAC address associated with the same information URL comprises a first MAC address and a second MAC address,
the judging module is used for:
after a first internet of things device corresponding to the first MAC address receives a communication request of a second internet of things device corresponding to the second MAC address, acquiring a first communication parameter and a second communication parameter generated by the first internet of things device;
when the first internet of things device sends first feedback information carrying the first communication parameter and the second communication parameter to the second internet of things device to trigger the second internet of things device to add the generated communication hidden domain into a communication record list, acquiring a numerical value of the communication hidden domain; wherein the communication hidden domain is generated by the second networking equipment by taking the first communication parameter as a name; the numerical value is obtained by the first internet of things device according to a preset relation verification character determined by the second communication parameter;
verifying whether the value matches the first communication parameter;
if the first MAC address and the second MAC address are matched, determining that the relation between the first MAC address and the second MAC address is the preset relation;
if not, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship;
the judging module is further configured to:
determining the connection rate of the first internet of things device corresponding to the first MAC address which is connected after the first internet of things device initiates a communication request to the second internet of things device corresponding to the second MAC address; and/or
Determining a first sum value of a first request frequency and a second request frequency corresponding to the first internet of things device, wherein the first request frequency is the frequency of initiating a communication request to the second internet of things device by the first internet of things device every day in a preset time period, and the second request frequency is the frequency of receiving the communication request of the first internet of things device every day by the first internet of things device in the preset time period;
determining a first statistical value corresponding to the call completing rate and a second statistical value corresponding to the first addition value;
adding the product of the first statistical value and a first weight value and the product of the second statistical value and a second weight value completely or partially to obtain a second added value;
judging whether the second sum value is larger than a preset threshold value or not;
if the second sum is greater than the preset threshold, determining that the relationship between the first MAC address and the second MAC address is the preset relationship;
and if the second sum value is less than or equal to the preset threshold value, determining that the relationship between the first MAC address and the second MAC address is not the preset relationship.
8. The apparatus of claim 6, wherein the determining module is configured to:
presetting a shared channel in a first filtering process, and setting the shared channel as a main channel for activation;
when a second filtering process needs to read an activated main channel, presetting channel query in a first filtering process, and acquiring the time of presetting the channel query as a first time;
presetting the channel query to a completion state after activating the shared channel;
judging whether the channel query is in a ready state;
if yes, determining that the reading of the main channel is successful, and filtering the abnormal information according to the main channel;
the apparatus also includes a state determination module to:
acquiring the time when the main channel is successfully read as a second time;
determining the difference between the first time and the second time as the consumed time for filtering the abnormal information;
judging whether the filtering time consumption of the abnormal information exceeds a set time length or not;
when the filtering time of the abnormal information exceeds the set time length, outputting prompt information;
and when the consumed time of the abnormal information filtering does not exceed the set time length, determining that the abnormal information filtering function is in a normal state.
9. A device comprising a processor and a memory and bus connected to the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is used for calling program instructions in the memory to execute the method for monitoring intelligent security based on internet of things of any one of the claims 1-5.
10. A storage medium having a program stored thereon, wherein the program, when executed by a processor, implements the method for edge smart security monitoring based on internet of things of any one of claims 1 to 5.
CN201911180016.4A 2019-11-27 2019-11-27 Boundary intelligent security monitoring method, device and equipment based on Internet of things Active CN110912900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911180016.4A CN110912900B (en) 2019-11-27 2019-11-27 Boundary intelligent security monitoring method, device and equipment based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911180016.4A CN110912900B (en) 2019-11-27 2019-11-27 Boundary intelligent security monitoring method, device and equipment based on Internet of things

Publications (2)

Publication Number Publication Date
CN110912900A true CN110912900A (en) 2020-03-24
CN110912900B CN110912900B (en) 2021-08-31

Family

ID=69820004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911180016.4A Active CN110912900B (en) 2019-11-27 2019-11-27 Boundary intelligent security monitoring method, device and equipment based on Internet of things

Country Status (1)

Country Link
CN (1) CN110912900B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021126A (en) * 2013-02-28 2014-09-03 深圳市世纪光速信息技术有限公司 Filtering method for webpage contents and server
US20150081835A1 (en) * 2012-05-21 2015-03-19 Tencent Technology (Shenzhen) Company Limited Method and apparatus for speeding up web page access
CN105528352A (en) * 2014-09-29 2016-04-27 国际商业机器公司 Method for establishing corresponding relation of mobile communication user and network account information thereof
CN106657546A (en) * 2015-10-30 2017-05-10 北京搜狗科技发展有限公司 Method for processing unfamiliar communication identification, and electronic equipment
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150081835A1 (en) * 2012-05-21 2015-03-19 Tencent Technology (Shenzhen) Company Limited Method and apparatus for speeding up web page access
CN104021126A (en) * 2013-02-28 2014-09-03 深圳市世纪光速信息技术有限公司 Filtering method for webpage contents and server
CN105528352A (en) * 2014-09-29 2016-04-27 国际商业机器公司 Method for establishing corresponding relation of mobile communication user and network account information thereof
CN106657546A (en) * 2015-10-30 2017-05-10 北京搜狗科技发展有限公司 Method for processing unfamiliar communication identification, and electronic equipment
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈广友: ""基于物联网的智能楼宇安防监控系统设计"", 《信息技术与信息化》 *

Also Published As

Publication number Publication date
CN110912900B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN113840012B (en) Block chain-based screen recording evidence obtaining method and system and electronic equipment
CN110032880B (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
CN106878368B (en) Method and device for realizing information push
CN110971571A (en) Website domain name verification method and related device
CN111104664B (en) Risk identification method of electronic equipment and server
CN107846321B (en) Interface monitoring method and device and electronic equipment
CN110798490B (en) Method and device for accessing third-party system based on data center and data center
CN110958161B (en) Block chain link point monitoring method and device and storage medium
CN111147313B (en) Message abnormity monitoring method and device, storage medium and electronic equipment
CN107577527B (en) Task generation and scheduling method and device
CN111222592A (en) Method and device for acquiring two-dimensional code of equipment
CN110912900B (en) Boundary intelligent security monitoring method, device and equipment based on Internet of things
CN112231192A (en) Log data analysis method and device
CN112540798A (en) Awakening method, device and system for vehicle operating system
CN112866265B (en) CSRF attack protection method and device
CN114416442A (en) Hardware change detection method and device, electronic equipment and readable storage medium
CN110851822B (en) Network download security processing method and device
CN111240750B (en) Awakening method and device for target application program
CN111049671A (en) System integration method and device
CN111275348A (en) Electronic order information processing method, server and electronic order information processing system
CN112579189A (en) Configuration file updating method and device
CN111327499A (en) Method and device for sending message and automobile
CN114629942B (en) Fraud early warning task generation method, device, equipment and medium
CN112583779B (en) Network resource access method and device
CN114356438B (en) Intelligent scene starting method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210812

Address after: 272600 No. 052, Zhenglou village, Hangang Town, Liangshan County, Jining City, Shandong Province

Applicant after: Zheng Longhai

Address before: 321001 Room 201, building 1, No. 90, Jiefang West Road, Wucheng District, Jinhua City, Zhejiang Province

Applicant before: Zhang Qiquan

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant