CN111949980A - Target client monitoring method and device, storage medium and electronic device - Google Patents

Target client monitoring method and device, storage medium and electronic device Download PDF

Info

Publication number
CN111949980A
CN111949980A CN202010858741.9A CN202010858741A CN111949980A CN 111949980 A CN111949980 A CN 111949980A CN 202010858741 A CN202010858741 A CN 202010858741A CN 111949980 A CN111949980 A CN 111949980A
Authority
CN
China
Prior art keywords
target
target client
client
log
communication connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010858741.9A
Other languages
Chinese (zh)
Inventor
张锦程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Minglue Artificial Intelligence Group Co Ltd
Original Assignee
Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Minglue Artificial Intelligence Group Co Ltd filed Critical Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority to CN202010858741.9A priority Critical patent/CN111949980A/en
Publication of CN111949980A publication Critical patent/CN111949980A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种目标客户端监控方法和装置、存储介质及电子装置。其中,该方法包括:获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击,达到了在边缘技术网络中的目标客户端出现被攻击行为的情况下,向目标客户端发送目标代码,以使目标客户端运行该目标代码抵御外部攻击的目的,从而实现确保目标客户端的安全性,进一步保障边缘技术网络安全的技术效果,进而解决了现有技术中,提高边缘计算网络的数据安全性方式比较单一的技术问题。

Figure 202010858741

The invention discloses a target client monitoring method and device, a storage medium and an electronic device. Wherein, the method includes: acquiring a target log generated during the running of the target client, wherein the target client supports code implantation; and when it is determined according to the target log that there is an external attack on the target client, sending the target code to the target client ;In order to make the target client run the target code to prevent external attacks, in the case of the target client in the edge technology network being attacked, the target code is sent to the target client, so that the target client can run the target code to resist The purpose of external attack is to achieve the technical effect of ensuring the security of the target client and further guaranteeing the security of the edge technology network, thereby solving the technical problem of improving the data security of the edge computing network in the prior art.

Figure 202010858741

Description

目标客户端监控方法和装置、存储介质及电子装置Target client monitoring method and device, storage medium and electronic device

技术领域technical field

本发明涉及计算机领域,具体而言,涉及一种目标客户端监控方法和装置、存储介质及电子装置。The present invention relates to the field of computers, and in particular, to a target client monitoring method and device, a storage medium and an electronic device.

背景技术Background technique

边缘计算的发展减轻了云端计算的负荷,由于更多的网络连接、计算、存储等核心能力被赋予到边缘也带来了新的问题。首先是过程监控,更多的处理过程发生在边缘缺少了统一监管。其次是安全,对于接入识别算法会随着时间安全性逐渐降低,当接入识别算法被破解之后整个网络会被利用,为其它客户端提供虚假数据,进而影响整个边缘计算网络的数据安全。The development of edge computing has reduced the load of cloud computing, and new problems have also been brought about as more core capabilities such as network connections, computing, and storage are assigned to the edge. The first is process monitoring, and more processing occurs at the edge without unified supervision. The second is security. For the access identification algorithm, the security will gradually decrease over time. When the access identification algorithm is cracked, the entire network will be used to provide false data for other clients, thereby affecting the data security of the entire edge computing network.

目前,为了提高边缘计算网络的数据安全性使用现有高复杂度的识别接入算法;如证书,签名验证等,证书与签名的安全性在于其算法的复杂度,假设在将来计算机发展到可以计算出证书内容,签名算法被破解,对于整个现有客户端的安全性可能会产生毁灭性的破坏At present, in order to improve the data security of edge computing networks, existing high-complexity identification and access algorithms are used; such as certificates, signature verification, etc., the security of certificates and signatures lies in the complexity of their algorithms. The content of the certificate is calculated, and the signature algorithm is cracked, which may cause devastating damage to the security of the entire existing client

针对上述的问题,目前尚未提出有效的解决方案。For the above problems, no effective solution has been proposed yet.

发明内容SUMMARY OF THE INVENTION

本发明实施例提供了一种目标客户端监控方法和装置、存储介质及电子装置,以至少解决现有技术中,提高边缘计算网络的数据安全性方式比较单一的技术问题。Embodiments of the present invention provide a target client monitoring method and device, a storage medium, and an electronic device, so as to at least solve the relatively single technical problem in the prior art of improving the data security of an edge computing network.

根据本发明实施例的一个方面,提供了一种目标客户端控制方法,包括:获取目标客户端运行过程中的生成的目标日志,其中,所述目标客户端支持代码植入;根据所述目标日志确定所述目标客户端存在外部攻击的情况下,向所述目标客户端发送目标代码;以使所述目标客户端运行所述目标代码防止外部攻击。According to an aspect of the embodiments of the present invention, a method for controlling a target client is provided, including: acquiring a target log generated during the running of a target client, wherein the target client supports code implantation; according to the target When the log determines that there is an external attack on the target client, send the target code to the target client; so that the target client runs the target code to prevent external attacks.

可选的,所述获取目标客户端运行过程中的生成的目标日志之前,上述方法包括:获取所述目标客户端的接入请求,其中,所述接入请求用于与所述目标客户端建立通讯连接,所述接入请求中携带验证信息;在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接。Optionally, before obtaining the target log generated during the operation of the target client, the above method includes: obtaining an access request of the target client, wherein the access request is used to establish a connection with the target client. A communication connection, wherein the access request carries verification information; in the case that the verification information matches the preset verification information, a communication connection with the target client is established.

可选的,所述在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接之后,上述方法还包括:获取所述目标客户端的目标日志;按照预定周期根据所述目标日志检查所述目标客户端的有效性;在所述目标客户端的不具有有效性的情况下,取消与所述目标客户端的通讯连接。Optionally, after establishing a communication connection with the target client when the verification information matches the preset verification information, the method further includes: acquiring a target log of the target client; The target log checks the validity of the target client; if the target client does not have validity, cancels the communication connection with the target client.

可选的,所述获取所述目标客户端的目标日志之后,上述方法还包括:根据所述目标日志确定所述目标客户端不能正常接入网络的情况下,取消与所述目标客户端的通讯连接。Optionally, after the acquisition of the target log of the target client, the above method further includes: canceling the communication connection with the target client when it is determined according to the target log that the target client cannot access the network normally. .

可选的,所述获取所述目标客户端的目标日志之后,上述方法还包括:根据所述目标日志确定所述目标客户端存在非法接入网络的情况下,取消与所述目标客户端的通讯连接。Optionally, after obtaining the target log of the target client, the above method further includes: canceling the communication connection with the target client when it is determined according to the target log that the target client has illegal access to the network. .

根据本发明实施例的另一方面,还提供了一种目标客户端控制装置,包括:第一获取单元,用于获取目标客户端运行过程中的生成的目标日志,其中,所述目标客户端支持代码植入;发送单元,用于根据所述目标日志确定所述目标客户端存在外部攻击的情况下,向所述目标客户端发送目标代码;以使所述目标客户端运行所述目标代码防止外部攻击。According to another aspect of the embodiments of the present invention, a target client control apparatus is further provided, including: a first obtaining unit, configured to obtain a target log generated during the running of the target client, wherein the target client Supporting code implantation; a sending unit, configured to send the target code to the target client when it is determined according to the target log that the target client has an external attack; so that the target client runs the target code Prevent external attacks.

可选的,上述装置包括:第二获取单元,用于所述获取目标客户端运行过程中的生成的目标日志之前,获取所述目标客户端的接入请求,其中,所述接入请求用于与所述目标客户端建立通讯连接,所述接入请求中携带验证信息;第一建立单元,用于在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接。Optionally, the above-mentioned apparatus includes: a second obtaining unit, configured to obtain an access request of the target client before obtaining the target log generated during the operation of the target client, wherein the access request is used for establishing a communication connection with the target client, and the access request carries verification information; a first establishment unit is configured to establish communication with the target client when the verification information matches the preset verification information connect.

可选的,上述装置还包括:第三获取单元,用于所述在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接之后,获取所述目标客户端的目标日志;检查单元,用于按照预定周期根据所述目标日志检查所述目标客户端的有效性;第一取消建立单元,用于在所述目标客户端的不具有有效性的情况下,取消与所述目标客户端的通讯连接。Optionally, the above device further includes: a third obtaining unit, configured to obtain the information of the target client after establishing a communication connection with the target client when the verification information matches the preset verification information. a target log; a checking unit for checking the validity of the target client according to the target log according to a predetermined period; a first cancel establishment unit for canceling the validity of the target client when the target client does not have validity Describe the communication connection of the target client.

可选的,上述装置还包括:第二取消建立单元,用于根据所述目标日志确定所述目标客户端不能正常接入网络,取消与所述目标客户端的通讯连接。Optionally, the above apparatus further includes: a second cancel establishment unit, configured to determine, according to the target log, that the target client cannot normally access the network, and cancel the communication connection with the target client.

可选的,上述装置还包括:第三取消建立单元,用于根据所述目标日志确定所述目标客户端存在非法接入网络,取消与所述目标客户端的通讯连接。Optionally, the above-mentioned apparatus further includes: a third cancel establishment unit, configured to determine that the target client has illegal access to the network according to the target log, and cancel the communication connection with the target client.

根据本发明实施例的又一方面,还提供了一种计算机可读的存储介质,该计算机可读的存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述目标客户端控制方法。According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute the above-mentioned target client when running Control Method.

根据本发明实施例的又一方面,还提供了一种电子装置,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,上述处理器通过计算机程序执行上述的目标客户端控制方法。According to another aspect of the embodiments of the present invention, an electronic device is also provided, including a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor executes the above-mentioned computer program through the computer program Target client control method.

在本发明实施例中,通过获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击,达到了在边缘技术网络中的目标客户端出现被攻击行为的情况下,向目标客户端发送目标代码,以使目标客户端运行该目标代码抵御外部攻击的目的,从而实现确保目标客户端的安全性,进一步保障边缘技术网络安全的技术效果,进而解决了现有技术中,提高边缘计算网络的数据安全性方式比较单一的技术问题。In the embodiment of the present invention, the target log generated during the running of the target client is obtained, wherein the target client supports code implantation; when it is determined that the target client has an external attack according to the target log, the target client is sent to the target client. Target code; in order to make the target client run the target code to prevent external attacks, and when the target client in the edge technology network is attacked, send the target code to the target client, so that the target client can run the target The purpose of the code to resist external attacks, so as to achieve the technical effect of ensuring the security of the target client and further ensuring the security of the edge technology network, thereby solving the technical problem that the method of improving the data security of the edge computing network is relatively simple in the prior art.

附图说明Description of drawings

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described herein are used to provide a further understanding of the present invention and constitute a part of the present application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the attached image:

图1是根据本发明实施例的一种可选的目标客户端控制方法的应用环境的示意图;1 is a schematic diagram of an application environment of an optional target client control method according to an embodiment of the present invention;

图2是根据本发明实施例的一种可选的目标客户端控制方法的流程图;2 is a flowchart of an optional target client control method according to an embodiment of the present invention;

图3是根据本发明实施例的一种可选的基于边缘计算的可远程动态植入运行代码客户端的控制方法流程图;3 is a flowchart of an optional control method based on edge computing that can be remotely and dynamically implanted in a running code client according to an embodiment of the present invention;

图4是根据本发明实施例的一种可选的客户端与边缘计算网络交互示意图(一);4 is a schematic diagram (1) of an optional interaction between a client and an edge computing network according to an embodiment of the present invention;

图5是根据本发明实施例的一种可选的客户端与边缘计算网络交互示意图(二);5 is a schematic diagram (2) of an optional interaction between a client and an edge computing network according to an embodiment of the present invention;

图6是根据本发明实施例的一种可选的边缘计算网络与云服务器交互示意图(一);6 is a schematic diagram (1) of an optional interaction between an edge computing network and a cloud server according to an embodiment of the present invention;

图7是根据本发明实施例的一种可选的边缘计算网络与云服务器交互示意图(二);7 is a schematic diagram (2) of an optional interaction between an edge computing network and a cloud server according to an embodiment of the present invention;

图8是根据本发明实施例的一种可选的客户端与边缘计算网络交互示意图(三);8 is a schematic diagram (3) of an optional interaction between a client and an edge computing network according to an embodiment of the present invention;

图9是根据本发明实施例的一种可选的边缘计算网络处理示意图;9 is a schematic diagram of an optional edge computing network processing according to an embodiment of the present invention;

图10是根据本发明实施例的一种可选的目标客户端控制装置的结构示意图;10 is a schematic structural diagram of an optional target client control apparatus according to an embodiment of the present invention;

图11是根据本发明实施例的一种可选的电子装置的结构示意图。FIG. 11 is a schematic structural diagram of an optional electronic device according to an embodiment of the present invention.

具体实施方式Detailed ways

为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to make those skilled in the art better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments are part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having" and any variations thereof, are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those expressly listed Rather, those steps or units may include other steps or units not expressly listed or inherent to these processes, methods, products or devices.

根据本发明实施例的一个方面,提供了一种目标客户端控制方法,可选地,作为一种可选的实施方式,上述目标客户端控制方法可以但不限于应用于如图1所示的硬件环境中,其中,可以包括但不限于终端设备102、网络110及服务器112,其中,终端设备102中运行目标客户端。According to an aspect of the embodiments of the present invention, a method for controlling a target client is provided. Optionally, as an optional implementation manner, the foregoing method for controlling a target client may be, but not limited to, the method shown in FIG. 1 . In the hardware environment, the terminal device 102 , the network 110 , and the server 112 may be included but not limited to, wherein the terminal device 102 runs the target client.

具体过程如以下步骤:步骤S102-S106,是服务器112获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击,达到了在边缘技术网络中的目标客户端出现被攻击行为的情况下,向目标客户端发送目标代码,以使目标客户端运行该目标代码抵御外部攻击的目的,从而实现确保目标客户端的安全性,进一步保障边缘技术网络安全的技术效果,进而解决了现有技术中,提高边缘计算网络的数据安全性方式比较单一的技术问题。The specific process is as follows: Steps S102-S106, the server 112 obtains the target log generated during the operation of the target client, wherein the target client supports code implantation; it is determined according to the target log that the target client has external attacks. , send the target code to the target client; so that the target client can run the target code to prevent external attacks, so that when the target client in the edge technology network is attacked, the target code is sent to the target client, so that the target client can be attacked. The target client runs the target code to defend against external attacks, thereby achieving the technical effect of ensuring the security of the target client and further ensuring the security of the edge technology network, thereby solving the problem of comparing the data security methods of the edge computing network in the prior art. A single technical issue.

可选地,在本实施例中,上述目标客户端控制方法可以但不限于应用于服务器112中,用于根据目标客户端的运行目标日志监控目标客户端。其中,上述目标客户端可以但不限于运行在终端设备102中,该终端设备102可以但不限于为手机、平板电脑、笔记本电脑、PC机等支持运行应用客户端的终端设备。上述服务器112和终端设备102可以但不限于通过网络实现数据交互,上述网络可以包括但不限于无线网络或有线网络。其中,该无线网络包括:蓝牙、WIFI及其他实现无线通信的网络。上述有线网络可以包括但不限于:广域网、城域网、局域网。上述仅是一种示例,本实施例中对此不作任何限定。Optionally, in this embodiment, the above target client control method may be, but is not limited to, applied to the server 112 for monitoring the target client according to the running target log of the target client. The above-mentioned target client may but is not limited to run in the terminal device 102, and the terminal device 102 may be, but is not limited to, a terminal device that supports running application clients, such as mobile phones, tablet computers, notebook computers, and PCs. The above-mentioned server 112 and the terminal device 102 may implement data interaction through, but not limited to, a network, and the above-mentioned network may include, but is not limited to, a wireless network or a wired network. Wherein, the wireless network includes: Bluetooth, WIFI and other networks that realize wireless communication. The above wired network may include, but is not limited to, a wide area network, a metropolitan area network, and a local area network. The above is only an example, which is not limited in this embodiment.

可选地,作为一种可选的实施方式,如图2所示,上述目标客户端控制方法包括:Optionally, as an optional implementation manner, as shown in FIG. 2 , the above-mentioned target client control method includes:

步骤S202,获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入。Step S202, acquiring the target log generated during the running process of the target client, wherein the target client supports code implantation.

步骤S204,根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击。Step S204 , when it is determined according to the target log that the target client has an external attack, send the target code to the target client, so that the target client runs the target code to prevent external attacks.

可选的,在本实施例中,上述方案应用场景为:对边缘计算客户端的处理过程进行监控,对于监控到黑客攻击的行为进行屏蔽,造成的边缘计算网络瘫痪的情况进行恢复。Optionally, in this embodiment, the application scenario of the above solution is: monitoring the processing process of the edge computing client, shielding the monitored behavior of hacker attacks, and recovering the paralysis of the edge computing network.

需要说明的是,上述方案可以包括但不限于应用于服务器、终端中。It should be noted that the above solution may include, but is not limited to, applications in servers and terminals.

通过本申请提供的实施例,获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击,达到了在边缘技术网络中的目标客户端出现被攻击行为的情况下,向目标客户端发送目标代码,以使目标客户端运行该目标代码抵御外部攻击的目的,从而实现确保目标客户端的安全性,进一步保障边缘技术网络安全的技术效果,进而解决了现有技术中,提高边缘计算网络的数据安全性方式比较单一的技术问题。Through the embodiments provided in this application, the target log generated during the running process of the target client is obtained, wherein the target client supports code implantation; when it is determined that the target client has an external attack according to the target log, the target client is sent to the target client. Target code; in order to make the target client run the target code to prevent external attacks, and when the target client in the edge technology network is attacked, send the target code to the target client, so that the target client can run the target The purpose of the code to resist external attacks, so as to achieve the technical effect of ensuring the security of the target client and further ensuring the security of the edge technology network, thereby solving the technical problem that the method of improving the data security of the edge computing network is relatively simple in the prior art.

可选的,获取目标客户端运行过程中的生成的目标日志之前,上述方法包括:获取目标客户端的接入请求,其中,接入请求用于与目标客户端建立通讯连接,接入请求中携带验证信息;在验证信息与预设验证信息匹配的情况下,建立与目标客户端通讯连接。Optionally, before obtaining the target log generated during the operation of the target client, the above method includes: obtaining an access request of the target client, wherein the access request is used to establish a communication connection with the target client, and the access request carries Verification information; if the verification information matches the preset verification information, establish a communication connection with the target client.

可选的,在验证信息与预设验证信息匹配的情况下,建立与目标客户端通讯连接之后,上述方法还包括:获取目标客户端的目标日志;按照预定周期根据目标日志检查目标客户端的有效性;在目标客户端的不具有有效性的情况下,取消与目标客户端的通讯连接。Optionally, when the verification information matches the preset verification information, after establishing a communication connection with the target client, the above method further includes: acquiring the target log of the target client; and checking the validity of the target client according to the target log according to a predetermined period. ;Cancel the communication connection with the target client if the target client is not valid.

可选的,获取目标客户端的目标日志之后,上述方法还包括:根据目标日志确定目标客户端不能正常接入网络的情况下,取消与目标客户端的通讯连接。Optionally, after acquiring the target log of the target client, the above method further includes: canceling the communication connection with the target client when it is determined according to the target log that the target client cannot normally access the network.

可选的,获取目标客户端的目标日志之后,上述方法还包括:根据目标日志确定目标客户端存在非法接入网络的情况下,取消与目标客户端的通讯连接。Optionally, after acquiring the target log of the target client, the above method further includes: canceling the communication connection with the target client when it is determined according to the target log that the target client has illegal access to the network.

作为一种可选的实施例,本申请还提供了一种基于边缘计算的可远程动态植入运行代码客户端的控制方法。如图3所示,基于边缘计算的可远程动态植入运行代码客户端的控制方法流程图。As an optional embodiment, the present application also provides a control method based on edge computing that can be remotely and dynamically implanted in a running code client. As shown in Figure 3, the flow chart of the control method based on edge computing that can be remotely and dynamically implanted into the running code client.

使用者可以访问已接入整个网络的边缘计算客户端提供服务。Users can access edge computing clients that have been connected to the entire network to provide services.

其中,当前使用者使用客户端提供服务,首先访问客户端1,当客户端1可处理访问者需要的数据时直接由客户端1处理返回,如果客户端1不能处理当前访问者的请求时由其它客户端处理。Among them, the current user uses the client to provide services, and first accesses client 1. When client 1 can process the data required by the visitor, it is directly processed and returned by client 1. If client 1 cannot process the request of the current visitor, the Other client processing.

如图4所示,客户端与边缘计算网络交互示意图(一)。如图4所示,对于客户端接入网络设备的请求进行校验、认证、收集日志、返回。As shown in Figure 4, a schematic diagram of the interaction between the client and the edge computing network (1). As shown in FIG. 4 , verify, authenticate, collect logs, and return the request from the client to access the network device.

如图5所示,客户端与边缘计算网络交互示意图(二)。如图5所示,对于认证过的客户端可向网络提供服务,网络向客户端发请求提供服务,客户端返回处理结果、记录日志。As shown in Figure 5, a schematic diagram (2) of the interaction between the client and the edge computing network. As shown in Figure 5, the authenticated client can provide services to the network, the network sends a request to the client to provide the service, and the client returns the processing result and records the log.

如图6所示,边缘计算网络与云服务器交互示意图(一)。如图6所示,定期将收集的日志发给云服务器。As shown in Figure 6, a schematic diagram of the interaction between the edge computing network and the cloud server (1). As shown in Figure 6, the collected logs are periodically sent to the cloud server.

如图7所示,边缘计算网络与云服务器交互示意图(二)。如图7所示,云服务器下达指令,植入运行代码,增强客户端服务能力。As shown in Figure 7, a schematic diagram of the interaction between the edge computing network and the cloud server (2). As shown in Figure 7, the cloud server issues instructions, implants running codes, and enhances client service capabilities.

如图8所示,客户端与边缘计算网络交互示意图(三)。如图8所示,定期检查已接入客户端有效性,对于非法的客户端记入日志、踢出。As shown in Figure 8, a schematic diagram of the interaction between the client and the edge computing network (3). As shown in Figure 8, the validity of the connected clients is regularly checked, and illegal clients are logged and kicked out.

如图9所示,边缘计算网络处理示意图。如图9所示,分析网络发回的日志,智能的对网络下达命令,维护网络安全。As shown in Figure 9, a schematic diagram of edge computing network processing. As shown in Figure 9, analyze the logs sent back by the network, and intelligently issue commands to the network to maintain network security.

由上可知,如图4至图9所示,客户端具备接入网络,记录日志,踢出设备,发送日志,提供服务能力的功能,客户端收录日志对于客户端接入网络行为进行监控,分析日志对于频繁不能正常接入网络的客户端进行屏蔽,定期更新检查客户端非法校验逻辑对客户端发起检查,剔除已经接入的非法客户端恢复网络服务正常。As can be seen from the above, as shown in Figure 4 to Figure 9, the client has the functions of accessing the network, recording logs, kicking out the device, sending logs, and providing service capabilities. The analysis log shields the clients that frequently cannot access the network normally, and regularly updates the client illegal verification logic to check the client, and removes the illegal clients that have been connected to restore the normal network service.

通过本申请提供的实施例,将边缘计算的客户端进行有效的监管和维护。避免客户端被攻破产生网络瘫痪的问题。Through the embodiments provided in this application, the client of edge computing is effectively supervised and maintained. Avoid the problem of network paralysis caused by the client being breached.

需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that, for the sake of simple description, the foregoing method embodiments are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described action sequence. As in accordance with the present invention, certain steps may be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.

根据本发明实施例的另一个方面,还提供了一种用于实施上述目标客户端控制方法的目标客户端控制装置。如图10所示,该目标客户端控制装置包括:第一获取单元1001以及发送单元1003。According to another aspect of the embodiments of the present invention, a target client control apparatus for implementing the above target client control method is also provided. As shown in FIG. 10 , the target client control apparatus includes: a first obtaining unit 1001 and a sending unit 1003 .

第一获取单元1001,用于获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入。The first obtaining unit 1001 is configured to obtain the target log generated during the running process of the target client, wherein the target client supports code implantation.

发送单元1003,用于根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击。The sending unit 1003 is configured to send the target code to the target client when it is determined according to the target log that the target client has external attacks; so that the target client runs the target code to prevent external attacks.

通过本申请提供的实施例,第一获取单元1001获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;发送单元1003根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击。According to the embodiments provided in this application, the first obtaining unit 1001 obtains the target log generated during the running of the target client, wherein the target client supports code implantation; the sending unit 1003 determines, according to the target log, that the target client has external attacks. In this case, the target code is sent to the target client; so that the target client runs the target code to prevent external attacks.

可选的,上述装置可以包括:第二获取单元,用于获取目标客户端运行过程中的生成的目标日志之前,获取目标客户端的接入请求,其中,接入请求用于与目标客户端建立通讯连接,接入请求中携带验证信息;第一建立单元,用于在验证信息与预设验证信息匹配的情况下,建立与目标客户端通讯连接。Optionally, the above-mentioned apparatus may include: a second obtaining unit, configured to obtain the access request of the target client before obtaining the target log generated during the running of the target client, wherein the access request is used to establish a connection with the target client. The communication connection, the access request carries the verification information; the first establishment unit is used for establishing a communication connection with the target client when the verification information matches the preset verification information.

可选的,上述装置还可以包括:第三获取单元,用于在验证信息与预设验证信息匹配的情况下,建立与目标客户端通讯连接之后,获取目标客户端的目标日志;检查单元,用于按照预定周期根据目标日志检查目标客户端的有效性;第一取消建立单元,用于在目标客户端的不具有有效性的情况下,取消与目标客户端的通讯连接。Optionally, the above-mentioned device may further include: a third obtaining unit, configured to obtain the target log of the target client after establishing the communication connection with the target client under the condition that the verification information matches the preset verification information; checking the validity of the target client according to the target log according to a predetermined period; the first canceling and establishing unit is used for canceling the communication connection with the target client when the target client does not have validity.

可选的,上述装置还可以包括:第二取消建立单元,用于根据目标日志确定目标客户端不能正常接入网络,取消与目标客户端的通讯连接。Optionally, the above-mentioned apparatus may further include: a second cancel establishment unit, configured to determine, according to the target log, that the target client cannot access the network normally, and cancel the communication connection with the target client.

可选的,上述装置还可以包括:第三取消建立单元,用于根据目标日志确定目标客户端存在非法接入网络,取消与目标客户端的通讯连接。Optionally, the above apparatus may further include: a third canceling and establishing unit, configured to determine according to the target log that the target client has illegal access to the network, and cancel the communication connection with the target client.

根据本发明实施例的又一个方面,还提供了一种用于实施上述目标客户端控制方法的电子装置,如图11所示,该电子装置包括存储器1102和处理器1104,该存储器1102中存储有计算机程序,该处理器1104被设置为通过计算机程序执行上述任一项方法实施例中的步骤。According to another aspect of the embodiments of the present invention, an electronic device for implementing the above target client control method is also provided. As shown in FIG. 11 , the electronic device includes a memory 1102 and a processor 1104 , and the memory 1102 stores There is a computer program, and the processor 1104 is configured to perform the steps in any of the above method embodiments by the computer program.

可选地,在本实施例中,上述电子装置可以位于计算机网络的多个网络设备中的至少一个网络设备。Optionally, in this embodiment, the above-mentioned electronic apparatus may be located in at least one network device among multiple network devices of a computer network.

可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:Optionally, in this embodiment, the above-mentioned processor may be configured to execute the following steps through a computer program:

S1,获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;S1, obtain the target log generated during the running process of the target client, wherein the target client supports code implantation;

S2,根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击。S2, when it is determined according to the target log that the target client has an external attack, send the target code to the target client; so that the target client runs the target code to prevent external attacks.

可选地,本领域普通技术人员可以理解,图11所示的结构仅为示意,电子装置也可以是智能手机(如Android手机、iOS手机等)、平板电脑、掌上电脑以及移动互联网设备(Mobile Internet Devices,MID)、PAD等终端设备。图11其并不对上述电子装置的结构造成限定。例如,电子装置还可包括比图11中所示更多或者更少的组件(如网络接口等),或者具有与图11所示不同的配置。Optionally, those of ordinary skill in the art can understand that the structure shown in FIG. 11 is for illustration only, and the electronic device may also be a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a handheld computer, and a mobile Internet device (Mobile Internet device). Internet Devices, MID), PAD and other terminal equipment. FIG. 11 does not limit the structure of the above electronic device. For example, the electronic device may also include more or fewer components than those shown in FIG. 11 (eg, network interfaces, etc.), or have a different configuration than that shown in FIG. 11 .

其中,存储器1102可用于存储软件程序以及模块,如本发明实施例中的目标客户端控制方法和装置对应的程序指令/模块,处理器1104通过运行存储在存储器1102内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的目标客户端控制方法。存储器1102可包括高速随机存储器,还可以包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器1102可进一步包括相对于处理器1104远程设置的存储器,这些远程存储器可以通过网络连接至终端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。其中,存储器1102具体可以但不限于用于目标客户端的目标日志等信息。作为一种示例,如图11所示,上述存储器1102中可以但不限于包括上述目标客户端控制装置中的第一获取单元1001以及发送单元1003。此外,还可以包括但不限于上述目标客户端控制装置中的其他模块单元,本示例中不再赘述。The memory 1102 may be used to store software programs and modules, such as program instructions/modules corresponding to the target client control method and device in the embodiment of the present invention, and the processor 1104 runs the software programs and modules stored in the memory 1102, thereby Execute various functional applications and data processing, that is, realize the above-mentioned target client control method. Memory 1102 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 1102 may further include memory located remotely from the processor 1104, and these remote memories may be connected to the terminal through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof. Wherein, the memory 1102 may specifically, but not be limited to, be used for information such as the target log of the target client. As an example, as shown in FIG. 11 , the foregoing memory 1102 may include, but is not limited to, the first obtaining unit 1001 and the sending unit 1003 in the foregoing target client control apparatus. In addition, it may also include, but is not limited to, other module units in the above-mentioned target client control apparatus, which will not be repeated in this example.

可选地,上述的传输装置1106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括有线网络及无线网络。在一个实例中,传输装置1106包括一个网络适配器(Network Interface Controller,NIC),其可通过网线与其他网络设备与路由器相连从而可与互联网或局域网进行通讯。在一个实例中,传输装置1106为射频(Radio Frequency,RF)模块,其用于通过无线方式与互联网进行通讯。Optionally, the above-mentioned transmission device 1106 is configured to receive or send data via a network. Specific examples of the above-mentioned networks may include wired networks and wireless networks. In one example, the transmission device 1106 includes a network adapter (Network Interface Controller, NIC), which can be connected to other network devices and routers through a network cable so as to communicate with the Internet or a local area network. In one example, the transmission device 1106 is a radio frequency (RF) module, which is used for wirelessly communicating with the Internet.

根据本发明的实施例的又一方面,还提供了一种计算机可读的存储介质,该计算机可读的存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。According to yet another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute any one of the above when running steps in a method embodiment.

可选地,在本实施例中,上述计算机可读的存储介质可以被设置为存储用于执行以下步骤的计算机程序:Optionally, in this embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the following steps:

S1,获取目标客户端运行过程中的生成的目标日志,其中,目标客户端支持代码植入;S1, obtain the target log generated during the running process of the target client, wherein the target client supports code implantation;

S2,根据目标日志确定目标客户端存在外部攻击的情况下,向目标客户端发送目标代码;以使目标客户端运行目标代码防止外部攻击。S2, when it is determined according to the target log that the target client has an external attack, send the target code to the target client; so that the target client runs the target code to prevent external attacks.

可选地,在本实施例中,本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令终端设备相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:闪存盘、只读存储器(Read-Only Memory,ROM)、随机存取器(Random Access Memory,RAM)、磁盘或光盘等。Optionally, in this embodiment, those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above-mentioned embodiments can be completed by instructing the hardware related to the terminal device through a program, and the program can be stored in a In the computer-readable storage medium, the storage medium may include: a flash disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.

上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages or disadvantages of the embodiments.

上述实施例中的集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在上述计算机可读取的存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在存储介质中,包括若干指令用以使得一台或多台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。If the integrated units in the above-mentioned embodiments are implemented in the form of software functional units and sold or used as independent products, they may be stored in the above-mentioned computer-readable storage medium. Based on this understanding, the technical solution of the present invention is essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, Several instructions are included to cause one or more computer devices (which may be personal computers, servers, or network devices, etc.) to perform all or part of the steps of the methods described in the various embodiments of the present invention.

在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above-mentioned embodiments of the present invention, the description of each embodiment has its own emphasis. For parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的客户端,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed client may be implemented in other manners. The apparatus embodiments described above are only illustrative, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components may be combined or Integration into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of units or modules, and may be in electrical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above are only the preferred embodiments of the present invention. It should be pointed out that for those skilled in the art, without departing from the principles of the present invention, several improvements and modifications can be made. It should be regarded as the protection scope of the present invention.

Claims (12)

1.一种目标客户端控制方法,其特征在于,包括:1. a target client control method, is characterized in that, comprises: 获取目标客户端运行过程中的生成的目标日志,其中,所述目标客户端支持代码植入;Obtain the target log generated during the running process of the target client, wherein the target client supports code implantation; 根据所述目标日志确定所述目标客户端存在外部攻击的情况下,向所述目标客户端发送目标代码;If it is determined according to the target log that the target client has an external attack, send the target code to the target client; 以使所述目标客户端运行所述目标代码防止外部攻击。So that the target client runs the target code to prevent external attacks. 2.根据权利要求1所述的方法,其特征在于,所述获取目标客户端运行过程中的生成的目标日志之前,所述方法包括:2. The method according to claim 1, characterized in that, before obtaining the target log generated during the running process of the target client, the method comprises: 获取所述目标客户端的接入请求,其中,所述接入请求用于与所述目标客户端建立通讯连接,所述接入请求中携带验证信息;acquiring an access request of the target client, wherein the access request is used to establish a communication connection with the target client, and the access request carries verification information; 在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接。In the case that the verification information matches the preset verification information, a communication connection with the target client is established. 3.根据权利要求2所述的方法,其特征在于,所述在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接之后,所述方法还包括:3. The method according to claim 2, characterized in that, after establishing a communication connection with the target client under the condition that the verification information matches preset verification information, the method further comprises: 获取所述目标客户端的目标日志;obtain the target log of the target client; 按照预定周期根据所述目标日志检查所述目标客户端的有效性;Check the validity of the target client according to the target log according to a predetermined period; 在所述目标客户端的不具有有效性的情况下,取消与所述目标客户端的通讯连接。In the case that the target client is not valid, the communication connection with the target client is cancelled. 4.根据权利要求3所述的方法,其特征在于,所述获取所述目标客户端的目标日志之后,所述方法还包括:4. The method according to claim 3, wherein after acquiring the target log of the target client, the method further comprises: 根据所述目标日志确定所述目标客户端不能正常接入网络的情况下,取消与所述目标客户端的通讯连接。If it is determined according to the target log that the target client cannot access the network normally, the communication connection with the target client is canceled. 5.根据权利要求3所述的方法,其特征在于,所述获取所述目标客户端的目标日志之后,所述方法还包括:5. The method according to claim 3, wherein after acquiring the target log of the target client, the method further comprises: 根据所述目标日志确定所述目标客户端存在非法接入网络的情况下,取消与所述目标客户端的通讯连接。If it is determined according to the target log that the target client has access to the network illegally, the communication connection with the target client is cancelled. 6.一种目标客户端控制装置,其特征在于,包括:6. A target client control device, comprising: 第一获取单元,用于获取目标客户端运行过程中的生成的目标日志,其中,所述目标客户端支持代码植入;a first obtaining unit, configured to obtain the target log generated during the running of the target client, wherein the target client supports code implantation; 发送单元,用于根据所述目标日志确定所述目标客户端存在外部攻击的情况下,向所述目标客户端发送目标代码;A sending unit, configured to send a target code to the target client when it is determined according to the target log that the target client has an external attack; 以使所述目标客户端运行所述目标代码防止外部攻击。So that the target client runs the target code to prevent external attacks. 7.根据权利要求6所述的装置,其特征在于,所述装置包括:7. The apparatus of claim 6, wherein the apparatus comprises: 第二获取单元,用于所述获取目标客户端运行过程中的生成的目标日志之前,获取所述目标客户端的接入请求,其中,所述接入请求用于与所述目标客户端建立通讯连接,所述接入请求中携带验证信息;A second acquiring unit, configured to acquire an access request of the target client before acquiring the target log generated during the operation of the target client, wherein the access request is used to establish communication with the target client connection, the access request carries verification information; 第一建立单元,用于在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接。The first establishing unit is configured to establish a communication connection with the target client when the verification information matches the preset verification information. 8.根据权利要求7所述的装置,其特征在于,所述装置还包括:8. The apparatus according to claim 7, wherein the apparatus further comprises: 第三获取单元,用于所述在所述验证信息与预设验证信息匹配的情况下,建立与所述目标客户端通讯连接之后,获取所述目标客户端的目标日志;a third acquiring unit, configured to acquire the target log of the target client after establishing a communication connection with the target client when the verification information matches the preset verification information; 检查单元,用于按照预定周期根据所述目标日志检查所述目标客户端的有效性;A checking unit, configured to check the validity of the target client according to the target log according to a predetermined period; 第一取消建立单元,用于在所述目标客户端的不具有有效性的情况下,取消与所述目标客户端的通讯连接。The first cancel establishment unit is configured to cancel the communication connection with the target client when the target client is not valid. 9.根据权利要求8所述的装置,其特征在于,所述装置还包括:9. The apparatus of claim 8, wherein the apparatus further comprises: 第二取消建立单元,用于根据所述目标日志确定所述目标客户端不能正常接入网络,取消与所述目标客户端的通讯连接。The second cancel establishment unit is configured to determine, according to the target log, that the target client cannot access the network normally, and cancel the communication connection with the target client. 10.根据权利要求8所述的装置,其特征在于,所述装置还包括:10. The apparatus of claim 8, wherein the apparatus further comprises: 第三取消建立单元,用于根据所述目标日志确定所述目标客户端存在非法接入网络,取消与所述目标客户端的通讯连接。A third cancel establishment unit, configured to determine that the target client has illegal access to the network according to the target log, and cancel the communication connection with the target client. 11.一种计算机可读的存储介质,其特征在于,所述计算机可读的存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至5任一项中所述的方法。11. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program executes the method described in any one of the preceding claims 1 to 5 when the program is run . 12.一种电子装置,包括存储器和处理器,其特征在于,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行所述权利要求1至5任一项中所述的方法。12. An electronic device comprising a memory and a processor, wherein a computer program is stored in the memory, and the processor is configured to execute any one of claims 1 to 5 through the computer program the method described.
CN202010858741.9A 2020-08-24 2020-08-24 Target client monitoring method and device, storage medium and electronic device Pending CN111949980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010858741.9A CN111949980A (en) 2020-08-24 2020-08-24 Target client monitoring method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010858741.9A CN111949980A (en) 2020-08-24 2020-08-24 Target client monitoring method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN111949980A true CN111949980A (en) 2020-11-17

Family

ID=73360345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010858741.9A Pending CN111949980A (en) 2020-08-24 2020-08-24 Target client monitoring method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN111949980A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115248809A (en) * 2022-09-22 2022-10-28 山东康健因特智能控制科技有限公司 User communication data management method based on edge calculation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123915A (en) * 2016-11-28 2018-06-05 北京神州泰岳软件股份有限公司 A kind of detection method and device of illegal connection to LAN equipment
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN110381045A (en) * 2019-07-09 2019-10-25 腾讯科技(深圳)有限公司 Treating method and apparatus, storage medium and the electronic device of attack operation
CN111416767A (en) * 2020-03-16 2020-07-14 广东科徕尼智能科技有限公司 Log output method, device and storage medium of edge intelligent gateway

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123915A (en) * 2016-11-28 2018-06-05 北京神州泰岳软件股份有限公司 A kind of detection method and device of illegal connection to LAN equipment
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN110381045A (en) * 2019-07-09 2019-10-25 腾讯科技(深圳)有限公司 Treating method and apparatus, storage medium and the electronic device of attack operation
CN111416767A (en) * 2020-03-16 2020-07-14 广东科徕尼智能科技有限公司 Log output method, device and storage medium of edge intelligent gateway

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115248809A (en) * 2022-09-22 2022-10-28 山东康健因特智能控制科技有限公司 User communication data management method based on edge calculation
CN115248809B (en) * 2022-09-22 2022-12-30 山东康健因特智能控制科技有限公司 User communication data management method based on edge calculation

Similar Documents

Publication Publication Date Title
US12021930B2 (en) Systems and methods for remote management of appliances
CN107211016B (en) Session security partitioning and application profiler
US9654480B2 (en) Systems and methods for profiling client devices
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
CN109167781B (en) Network attack chain identification method and device based on dynamic correlation analysis
JP2017539039A5 (en)
US20250016164A1 (en) Access request capturing method and apparatus, and computer device and storage medium
CN111541649B (en) Password resetting method and device, server and storage medium
US9369438B2 (en) Supervised data transfer
CN113259429A (en) Session keeping control method, device, computer equipment and medium
CN114491582A (en) Authentication method, device and terminal device
AU2012260619A1 (en) Supervised data transfer
CN106507383A (en) Real name auditing method, equipment and system
CN111949980A (en) Target client monitoring method and device, storage medium and electronic device
CN107770150B (en) Terminal protection method and device
CN109076068A (en) It reduces via network access point to the attack possibility of equipment weakness
CN111125728A (en) Method and device for treating database security problems and treatment equipment
CN111259389A (en) Operating system protection method, device and storage medium
WO2021026937A1 (en) Method and apparatus for checking login behavior, and system, storage medium and electronic apparatus
CA3222116A1 (en) Sftp batch processing and credentials api for offline fraud assessment
CN106453388B (en) The method and device of Website login
CN119232503B (en) Login authentication method for mail client and electronic device
KR102750109B1 (en) Method for responding to cyber attack using remote security service and server for performing the same
CN114817868B (en) License verification method, device, equipment and storage medium
CN112104657B (en) Information checking method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117