CN105897648A - Method for internet of things system information security testing and evaluating tool - Google Patents
Method for internet of things system information security testing and evaluating tool Download PDFInfo
- Publication number
- CN105897648A CN105897648A CN201410550117.7A CN201410550117A CN105897648A CN 105897648 A CN105897648 A CN 105897648A CN 201410550117 A CN201410550117 A CN 201410550117A CN 105897648 A CN105897648 A CN 105897648A
- Authority
- CN
- China
- Prior art keywords
- information
- internet
- things
- allotter
- receptor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a method for an internet of things system information security testing and evaluating tool, and relates to the technical field of the internet of things. The method specifically comprises the steps that S1, an internet of things platform is established, a plurality of computers are connected to the internet of things, the internet of things is connected with a dedicated host, the host is provided with an injector and a receiver, the host is further provided with a firewall, and information is detected through the firewall; S2, the information is transmitted; S3, the information is detected; and S4, when information transmission in the step S3 is completed, a distributor scans and deletes the information in a buffer area after detection, the information is fed back to the host, and the host carries out statistics on the information. The method disclosed by the invention can realize security testing and evaluating of the information, the information security is ensured, and the transmission speed is high. In addition, the method can carry out real-time detection, and is simple and convenient in operation.
Description
Technical field:
The present invention relates to technology of Internet of things field, be specifically related to a kind of internet of things oriented system information
The method of security evaluation instrument.
Background technology:
Internet of Things (Internet of Things, abridge IOT) be one based on the Internet,
The information carriers such as conventional telecommunications net, make all General Physics objects that can be independently addressable real
The network now interconnected.Internet of Things is generally wireless network, owing to the equipment around everyone can
To reach 1 thousand to five thousand, so Internet of Things may comprise 500 million to one gigabit things
Body, on Internet of Things, the online of real object can be connect by applying electronic label by everyone,
Internet of Things can find out their particular location.Scheming in can being used by Internet of Things
Calculate machine-to-machine device, equipment, personnel carry out managing concentratedly, controlling, it is also possible to household equipment,
Automobile is remotely controlled, and location searching, the various application such as prevent article stolen.
Internet of Things is on the basis of computer internet, utilizes RFID, RFDC
Etc. technology, construct " an Internet of Things " covering all things in the world.
In this network, article (commodity) can be carried out " exchange " each other, and without the intervention of people.
Its essence is and utilize radio frequency automatic identification (RFID) technology, realize article by computer internet
The interconnection of identification and the information automatically of (commodity) is with shared.
Existing Internet of Things information when transmission all it cannot be guaranteed that its safety, and warp when transmitting
Often there will be information biography not go out, it is impossible to guarantee information transmission speed, cause efficiency in use
Low, it is therefore desirable to a kind of method of internet of things oriented system information safety evaluation tool.
Summary of the invention:
It is an object of the invention to provide a kind of internet of things oriented system information safety evaluation tool
Method, it can realize the Security Testing of information, it is ensured that the safety of information, and transmission speed is fast, and
Can detect in real time, easy and simple to handle.
In order to solve the problem existing for background technology, the present invention is to adopt the following technical scheme that
Specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things
Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame
Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor
In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously
Fire wall detects, and receptor passes data to allotter again, and allotter is by data
Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data
Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write
Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn
It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection
Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
There is advantages that the Security Testing that can realize information, it is ensured that information
Safety, transmission speed is fast, and can detect in real time, easy and simple to handle.
Detailed description of the invention:
This detailed description of the invention adopts the following technical scheme that specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things
Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame
Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor
In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously
Fire wall detects, and receptor passes data to allotter again, and allotter is by data
Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data
Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write
Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn
It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection
Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
This detailed description of the invention has the advantages that the Security Testing that can realize information, protects
The safety of card information, transmission speed is fast, and can detect in real time, easy and simple to handle.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention,
All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made,
Should be included within the scope of the present invention.
Claims (1)
1. the method for an internet of things oriented system information safety evaluation tool, it is characterised in that
Specifically comprising the following steps that of it
Step one: set up platform of internet of things: be connected with Internet of Things by several computers, and Internet of Things
Net and a private host connect, and be provided with infusion appliance and receptor, and leading on main frame
Fire wall is installed on machine, detects information by fire wall;
Step 2: transmission information: during computer transmission information, first transfer data to receptor
In, information is passed to main frame by receptor, and main frame is encrypted by encryption software, simultaneously
Fire wall detects, and receptor passes data to allotter again, and allotter is by data
Content analysis also judges the scene of emulation, thus interior when selecting to carry out the transmission of next step data
Portion's form;
Step 3: infomation detection: receptor will receive information and be stored in data buffer zone and write
Mark, allotter check buffer data write mark, allotter subsequently by analysis information and turn
It is dealt into tossim sending module to send;
Step 4: after step 3 kind information is sent completely, by relief area after allotter detection
Information is scanned and deletes, and by information feeds back to main frame, information is added up by main frame.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550117.7A CN105897648A (en) | 2014-10-16 | 2014-10-16 | Method for internet of things system information security testing and evaluating tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550117.7A CN105897648A (en) | 2014-10-16 | 2014-10-16 | Method for internet of things system information security testing and evaluating tool |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105897648A true CN105897648A (en) | 2016-08-24 |
Family
ID=57001377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410550117.7A Pending CN105897648A (en) | 2014-10-16 | 2014-10-16 | Method for internet of things system information security testing and evaluating tool |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105897648A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453343A (en) * | 2016-10-21 | 2017-02-22 | 过冬 | An IOT safety evaluation method |
CN107506436A (en) * | 2017-08-23 | 2017-12-22 | 福建星瑞格软件有限公司 | A kind of method and device for Internet of Things data library storage performance test |
-
2014
- 2014-10-16 CN CN201410550117.7A patent/CN105897648A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453343A (en) * | 2016-10-21 | 2017-02-22 | 过冬 | An IOT safety evaluation method |
CN107506436A (en) * | 2017-08-23 | 2017-12-22 | 福建星瑞格软件有限公司 | A kind of method and device for Internet of Things data library storage performance test |
CN107506436B (en) * | 2017-08-23 | 2020-12-25 | 福建星瑞格软件有限公司 | Method and device for testing storage performance of Internet of things database |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104378344B (en) | Log-on message transmission method, barcode scanning method and device, background server | |
CN104919467B (en) | Control the method and network drive system of the access to network drive | |
EP3407276A3 (en) | Asset tag and methods and devices for restocking and asset tracking | |
WO2012119434A1 (en) | Method for dynamic authentication between reader and tag, and device therefor | |
CN104378649B (en) | It is a kind of that real-time encrypted method and system being carried out to video flowing using the close SM1 algorithms of state | |
US10291814B2 (en) | Transmission of encrypted image data | |
CN103916366A (en) | Login method, maintenance terminal, data management service equipment and login system | |
CN104219626B (en) | A kind of identity authentication method and device | |
CN107766430B (en) | File searching method and system | |
CN202904698U (en) | Entrance guard management system | |
RU2013132937A (en) | SYSTEM AND METHOD FOR ISSUING AN ELECTRONIC MEDICAL CARD | |
CN108170781A (en) | A kind of accurate positioning method and system of household storage article | |
CN205140033U (en) | Electron password privilege management system of intelligence lock | |
CN106462539A (en) | Mechanism for file transformation and sharing across devices using camera interface | |
CN103178953B (en) | A kind of secure chip key issuing system and secure chip key issuing method | |
CN105897648A (en) | Method for internet of things system information security testing and evaluating tool | |
CN101980241A (en) | Method, system and device for authenticating radio frequency tag | |
US9614614B2 (en) | Locating a physical connector module | |
CN106331623B (en) | A kind of security monitoring video camera, security protection communication system and method | |
CN106408020A (en) | Product two-dimensional code marking anti-repeated code detection system and method | |
CN106302416A (en) | Corporate intranet access method, Android terminal, transfer processing method, transfer server | |
CN104113510A (en) | Virtual desktop system and message data transmitting method thereof | |
CN103138919A (en) | Front-end secret key filling system and method of secret key filling | |
CN106230601B (en) | A kind of client embeds the exchange of token method and system of webpage | |
CN105488395A (en) | Method and device for performing malicious device detection based on USB communication data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160824 |