CN105897648A - Method for internet of things system information security testing and evaluating tool - Google Patents

Method for internet of things system information security testing and evaluating tool Download PDF

Info

Publication number
CN105897648A
CN105897648A CN201410550117.7A CN201410550117A CN105897648A CN 105897648 A CN105897648 A CN 105897648A CN 201410550117 A CN201410550117 A CN 201410550117A CN 105897648 A CN105897648 A CN 105897648A
Authority
CN
China
Prior art keywords
information
internet
things
allotter
receptor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410550117.7A
Other languages
Chinese (zh)
Inventor
傅涛
傅德胜
经正俊
孙文静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECHNOLOGY Co Ltd
Original Assignee
NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECHNOLOGY Co Ltd filed Critical NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECHNOLOGY Co Ltd
Priority to CN201410550117.7A priority Critical patent/CN105897648A/en
Publication of CN105897648A publication Critical patent/CN105897648A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method for an internet of things system information security testing and evaluating tool, and relates to the technical field of the internet of things. The method specifically comprises the steps that S1, an internet of things platform is established, a plurality of computers are connected to the internet of things, the internet of things is connected with a dedicated host, the host is provided with an injector and a receiver, the host is further provided with a firewall, and information is detected through the firewall; S2, the information is transmitted; S3, the information is detected; and S4, when information transmission in the step S3 is completed, a distributor scans and deletes the information in a buffer area after detection, the information is fed back to the host, and the host carries out statistics on the information. The method disclosed by the invention can realize security testing and evaluating of the information, the information security is ensured, and the transmission speed is high. In addition, the method can carry out real-time detection, and is simple and convenient in operation.

Description

A kind of method of internet of things oriented system information safety evaluation tool
Technical field:
The present invention relates to technology of Internet of things field, be specifically related to a kind of internet of things oriented system information The method of security evaluation instrument.
Background technology:
Internet of Things (Internet of Things, abridge IOT) be one based on the Internet, The information carriers such as conventional telecommunications net, make all General Physics objects that can be independently addressable real The network now interconnected.Internet of Things is generally wireless network, owing to the equipment around everyone can To reach 1 thousand to five thousand, so Internet of Things may comprise 500 million to one gigabit things Body, on Internet of Things, the online of real object can be connect by applying electronic label by everyone, Internet of Things can find out their particular location.Scheming in can being used by Internet of Things Calculate machine-to-machine device, equipment, personnel carry out managing concentratedly, controlling, it is also possible to household equipment, Automobile is remotely controlled, and location searching, the various application such as prevent article stolen.
Internet of Things is on the basis of computer internet, utilizes RFID, RFDC Etc. technology, construct " an Internet of Things " covering all things in the world. In this network, article (commodity) can be carried out " exchange " each other, and without the intervention of people. Its essence is and utilize radio frequency automatic identification (RFID) technology, realize article by computer internet The interconnection of identification and the information automatically of (commodity) is with shared.
Existing Internet of Things information when transmission all it cannot be guaranteed that its safety, and warp when transmitting Often there will be information biography not go out, it is impossible to guarantee information transmission speed, cause efficiency in use Low, it is therefore desirable to a kind of method of internet of things oriented system information safety evaluation tool.
Summary of the invention:
It is an object of the invention to provide a kind of internet of things oriented system information safety evaluation tool Method, it can realize the Security Testing of information, it is ensured that the safety of information, and transmission speed is fast, and Can detect in real time, easy and simple to handle.
In order to solve the problem existing for background technology, the present invention is to adopt the following technical scheme that Specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously Fire wall detects, and receptor passes data to allotter again, and allotter is by data Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
There is advantages that the Security Testing that can realize information, it is ensured that information Safety, transmission speed is fast, and can detect in real time, easy and simple to handle.
Detailed description of the invention:
This detailed description of the invention adopts the following technical scheme that specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously Fire wall detects, and receptor passes data to allotter again, and allotter is by data Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
This detailed description of the invention has the advantages that the Security Testing that can realize information, protects The safety of card information, transmission speed is fast, and can detect in real time, easy and simple to handle.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, Should be included within the scope of the present invention.

Claims (1)

1. the method for an internet of things oriented system information safety evaluation tool, it is characterised in that Specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously Fire wall detects, and receptor passes data to allotter again, and allotter is by data Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
CN201410550117.7A 2014-10-16 2014-10-16 Method for internet of things system information security testing and evaluating tool Pending CN105897648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410550117.7A CN105897648A (en) 2014-10-16 2014-10-16 Method for internet of things system information security testing and evaluating tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410550117.7A CN105897648A (en) 2014-10-16 2014-10-16 Method for internet of things system information security testing and evaluating tool

Publications (1)

Publication Number Publication Date
CN105897648A true CN105897648A (en) 2016-08-24

Family

ID=57001377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410550117.7A Pending CN105897648A (en) 2014-10-16 2014-10-16 Method for internet of things system information security testing and evaluating tool

Country Status (1)

Country Link
CN (1) CN105897648A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453343A (en) * 2016-10-21 2017-02-22 过冬 An IOT safety evaluation method
CN107506436A (en) * 2017-08-23 2017-12-22 福建星瑞格软件有限公司 A kind of method and device for Internet of Things data library storage performance test

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453343A (en) * 2016-10-21 2017-02-22 过冬 An IOT safety evaluation method
CN107506436A (en) * 2017-08-23 2017-12-22 福建星瑞格软件有限公司 A kind of method and device for Internet of Things data library storage performance test
CN107506436B (en) * 2017-08-23 2020-12-25 福建星瑞格软件有限公司 Method and device for testing storage performance of Internet of things database

Similar Documents

Publication Publication Date Title
CN104378344B (en) Log-on message transmission method, barcode scanning method and device, background server
CN104919467B (en) Control the method and network drive system of the access to network drive
EP3407276A3 (en) Asset tag and methods and devices for restocking and asset tracking
WO2012119434A1 (en) Method for dynamic authentication between reader and tag, and device therefor
CN104378649B (en) It is a kind of that real-time encrypted method and system being carried out to video flowing using the close SM1 algorithms of state
US10291814B2 (en) Transmission of encrypted image data
CN103916366A (en) Login method, maintenance terminal, data management service equipment and login system
CN104219626B (en) A kind of identity authentication method and device
CN107766430B (en) File searching method and system
CN202904698U (en) Entrance guard management system
RU2013132937A (en) SYSTEM AND METHOD FOR ISSUING AN ELECTRONIC MEDICAL CARD
CN108170781A (en) A kind of accurate positioning method and system of household storage article
CN205140033U (en) Electron password privilege management system of intelligence lock
CN106462539A (en) Mechanism for file transformation and sharing across devices using camera interface
CN103178953B (en) A kind of secure chip key issuing system and secure chip key issuing method
CN105897648A (en) Method for internet of things system information security testing and evaluating tool
CN101980241A (en) Method, system and device for authenticating radio frequency tag
US9614614B2 (en) Locating a physical connector module
CN106331623B (en) A kind of security monitoring video camera, security protection communication system and method
CN106408020A (en) Product two-dimensional code marking anti-repeated code detection system and method
CN106302416A (en) Corporate intranet access method, Android terminal, transfer processing method, transfer server
CN104113510A (en) Virtual desktop system and message data transmitting method thereof
CN103138919A (en) Front-end secret key filling system and method of secret key filling
CN106230601B (en) A kind of client embeds the exchange of token method and system of webpage
CN105488395A (en) Method and device for performing malicious device detection based on USB communication data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824