CN115955363A - Communication terminal based on desktop fusion - Google Patents
Communication terminal based on desktop fusion Download PDFInfo
- Publication number
- CN115955363A CN115955363A CN202310233428.XA CN202310233428A CN115955363A CN 115955363 A CN115955363 A CN 115955363A CN 202310233428 A CN202310233428 A CN 202310233428A CN 115955363 A CN115955363 A CN 115955363A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- module
- safety
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a communication terminal based on desktop fusion, which relates to the technical field of data processing, and comprises a data acquisition port, a data processing port and a data feedback port, wherein the data acquisition port is used for acquiring data information operated by a user and data information verified by a password, the data processing port is used for calculating the operation safety rate and the password verification success rate of the user and calculating the safety factor of the user, the data feedback port is used for setting the safety level through the safety factor, and setting a blacklist and a white list according to the safety level of the user, so that the operation safety rate, the password verification success rate and the user safety factor of the user can be automatically calculated, the safety of the whole user can be accurately and dynamically evaluated, and the safety of the communication terminal is improved.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a communication terminal based on desktop convergence.
Background
The communication terminal is a direct tool for people to enjoy different information applications, and undertakes various tasks such as providing a good user interface for users, completing required service functions, accessing a communication network and the like.
In the application field, non-counter services such as online banking, online securities, bank low-counter services and the like widely adopt the communication terminal, and the application field of the communication terminal is rapidly expanded to emerging non-financial industries such as telecommunication, electric power, tax, education, government and the like.
With the rapid development of communication technology, a terminal can generate a large amount of data in real time, if the data are concentrated in a cloud center for processing, problems such as delay and privacy disclosure can be caused during communication, the terminal in a wireless environment faces security threats such as identity embezzlement, data stealing and tampering in a data transmission process, and terminal attack by malicious users, terminal data are likely to be leaked under the condition that the user is unaware of the security threats and privacy, and therefore a communication terminal with high security is needed, and the existing terminal has the defects that the security evaluation index is single, the evaluated content is less, the security of the user cannot be accurately evaluated, even if a part of risk users are intercepted, the security of other users cannot be dynamically evaluated, a system for dynamically and safely evaluating the whole users cannot be screened, and the risk users cannot be accurately intercepted;
for example, an authorization notice number is CN111917798B (a method for controlling and secure communication of an internet of things terminal), which includes: numbering the equipment of the Internet of things, generating corresponding keys according to corresponding numbers by a rear-end encryption server according to key generation rules, and sequentially writing the keys into corresponding key fobs; when the Internet of things equipment is installed, the key fob is inserted into the card slot of the Internet of things equipment; the Internet of things equipment sends a request for establishing connection with a corresponding server according to the server address attribute recorded in the key fob, and the connection is established after the authentication of the two parties is passed; when the internet of things equipment is communicated with the server, different service servers are selected for connection access according to different service requirements; during communication, the communication key stored in the key fob is used, the corresponding temporary working key is generated according to the function point to encrypt the transmitted data, the main key is also stored in the server, the corresponding temporary working key is generated and then decrypted, so that the safety problems in the aspects of management and control of the internet of things terminal and safe communication are solved,
for example, the authorization bulletin number is CN110166410B (a method, terminal and multimode communication terminal for securely transmitting data), which includes: the method comprises the steps that a first terminal encrypts data information to be transmitted; establishing a broadband communication link with a second terminal; transmitting the encrypted data information to the second terminal through the broadband communication link; acquiring preset key information related to data information to be transmitted, wherein the preset key information can be used for decrypting encrypted data information; establishing a narrowband communication link with the second terminal; and transmitting the preset key information to the second terminal through the narrow-band communication link, thereby achieving the purposes of improving the data transmission safety performance and reducing the data transmission cost,
the invention provides a communication terminal based on desktop convergence, aiming at solving the problem.
Disclosure of Invention
The invention mainly aims to provide a communication terminal based on desktop convergence, which can effectively solve the problems in the background technology: the security evaluation index is single, the evaluated content is less, the security of the user cannot be accurately evaluated, even if a part of risk users are intercepted, the security of other users cannot be dynamically evaluated, a system for dynamically evaluating the security of all users is lacked, the security users and the risk users cannot be discriminated, and the risk users cannot be accurately intercepted.
In order to realize the purpose, the invention adopts the technical scheme that:
a communication terminal based on desktop fusion comprises a data acquisition port, a data processing port and a data feedback port,
the data acquisition port is used for acquiring data information operated by a user and data information verified by a password,
the data processing port is used for calculating the user operation safety rate and the password verification success rate and calculating the safety factor of the user,
the data feedback port is used for setting a safety level according to the range of the safety factor of the user, determining the user with the safety factor larger than 0.8 as a first-level user, and setting the customer information in a white list, determining the user with the safety factor higher than 0.4 and lower than 0.8 as a second-level user, determining the user with the safety factor lower than 0.4 as a third-level user, and setting the customer information in a black list.
The data acquisition port includes at least one secure operation information acquisitionThe system comprises a module, at least one password verification data acquisition module and a user information acquisition module, wherein the safe operation information acquisition module is used for acquiring information of safe operation of a user and comprises total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetAnd the user information acquisition module is used for recording the IP information of the user.
The invention is further improved in that the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user.
The invention is further improved in that the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user authority granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user authority granting module is used for granting authorities in corresponding ranges to users according to the user security levels.
The invention is further improved in that the user operation safety rate formula is as follows:in whichN 1 In order to perform the total number of operations,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>To use the scaling factor for non-internal network entry,T 1 for each time a non-internal network time is logged in,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for each time of data transmission between the internal network and the internet, a data time is determined>For using the odds factor of a risk web site, </or >>For a duty factor for installing unauthorized software, a device is provided>For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>。
The invention has the further improvement that the success rate formula of the password verification is as follows:in whichN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
The invention has the further improvement that the user safety coefficient calculation formula is as follows:
compared with the prior art, the invention has the beneficial effects that:
1. the password authentication system comprises a security operation information acquisition module, a password authentication data acquisition module, a data acquisition and storage module, a user operation safety rate calculation module, a password authentication success rate calculation module, a data transmission module and a user safety factor calculation module.
2. The safety of user operation is evaluated by eight indexes, namely the number and time of logging in a non-internal network, the number and time of browsing a risk website, the number and time of using unauthorized software, and the number and time of mutually transmitting data by using an internal network and the Internet, so that the safety of a user can be accurately evaluated, and the reliability and the accuracy of the safety rate of the user operation are improved.
3. The reliability and the accuracy of the success rate of the password verification are improved through the total password verification times, the successful password verification times and the time required for verifying the password every time.
Drawings
Fig. 1 is a schematic diagram of a principle framework based on a desktop convergence communication terminal according to the present invention.
Detailed Description
The orientations and positional relationships shown in the drawings are for convenience in describing the invention and simplifying the description, and do not indicate or imply any particular orientations of the devices and elements, and therefore should not be considered limiting of the invention.
Example 1
This embodiment is used for gathering user security operation's information through safe operation information acquisition module, password authentication data acquisition module is used for gathering the user and carries out the information that the password was verified, through data acquisition and storage module, user operation safety rate calculation module, password authentication success rate calculation module, data transmission module and user safety factor calculation module automatic calculation user operation safety rate, password authentication success rate and user safety factor, can evaluate the security of all users dynamically, the security at terminal has been improved, concrete scheme is:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-intranetsNumber of network entriesM 1 Each time logging on the non-internal network timeT 1 And the number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 And mutually transmitting data times with the Internet by using the internal networkM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the user operation safety rate formula is as follows: ,whereinN 1 In order to perform the total number of operations,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>To use the scaling factor for non-internal network entry,T 1 for each login to the non-internal network time,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>For using the odds factor of a risk web site, </or >>For a duty factor for installing unauthorized software, a device is provided>Ratio coefficient for mutually transmitting data with the internet by using an internal network>;
The password verification success rate formula is as follows:whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tthe total operation time is; />
The user safety coefficient calculation formula is as follows:
example 2
The embodiment evaluates the safety of user operation by eight indexes, namely the number and time of logging in a non-internal network, the number and time of browsing a risk website, the number and time of using unauthorized software, and the number and time of using internal network and internet to transmit data mutually, can accurately evaluate the safety of a user, improves the reliability and accuracy of the safety rate of user operation, and has the specific scheme that:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 Using an intranet and interconnectionNumber of times of data transmission between networksM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information of password verification carried out by a user, and the information comprises the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the user operation safety rate formula is as follows:whereinN 1 In order to operate the total number of times,Tin order to have a total length of time for the operation,M 1 for using non-interior partsThe number of times of network login is counted,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>To use the scaling factor for non-internal network entry,T 1 for each login to the non-internal network time,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>For using the odds factor of a risk web site, </or >>For the purpose of setting a duty factor for unauthorized software, a decision is made as to whether the software is present in the system>For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>。
Example 3
This embodiment passes through the password and verifies total number of times, and the number of times and the required time of each time verification password that the password verified the success rate have improved reliability and accuracy of password verification success rate, and the concrete scheme is:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time logging on the non-internal network timeT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the password verification success rate formula is as follows:whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are merely illustrative of the principles of the invention, but that various changes and modifications may be made without departing from the spirit and scope of the invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (7)
1. The utility model provides a communication terminal based on desktop integration which characterized in that: comprises a data acquisition port, a data processing port and a data feedback port,
the data acquisition port is used for acquiring data information operated by a user and data information verified by a password,
the data processing port is used for calculating the user operation safety rate and the password verification success rate and calculating the safety factor of the user,
the data feedback port is used for setting a safety level according to the range of the safety factor of the user, determining the user with the safety factor larger than 0.8 as a first-level user, setting the customer information in a white list, determining the user with the safety factor more than 0.4 and less than 0.8 as a second-level user, determining the user with the safety factor less than 0.4 as a third-level user, and setting the customer information in a black list.
2. The communication terminal based on desktop fusion according to claim 1, wherein: the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information of password verification performed by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetAnd the user information acquisition module is used for recording the IP information of the user.
3. The communication terminal based on desktop convergence according to claim 2, wherein: the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating a user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user.
4. The desktop convergence-based communication terminal according to claim 3, wherein: the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels.
5. The desktop convergence-based communication terminal of claim 4, wherein: the user operation safety rate formula is as follows:whereinN 1 In order to operate the total number of times,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, based on the data times>To use the scaling factor for non-intranet logging,T 1 for each login NOTThe time of the internal network is set,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>For using the odds factor of a risk web site, </or >>For the purpose of setting a duty factor for unauthorized software, a decision is made as to whether the software is present in the system>For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>。
6. The desktop convergence-based communication terminal of claim 5, wherein: the password verification success rate formula is as follows:whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310233428.XA CN115955363B (en) | 2023-03-13 | 2023-03-13 | Communication terminal based on desktop fusion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310233428.XA CN115955363B (en) | 2023-03-13 | 2023-03-13 | Communication terminal based on desktop fusion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115955363A true CN115955363A (en) | 2023-04-11 |
CN115955363B CN115955363B (en) | 2023-06-20 |
Family
ID=85892328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310233428.XA Active CN115955363B (en) | 2023-03-13 | 2023-03-13 | Communication terminal based on desktop fusion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115955363B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150229609A1 (en) * | 2005-09-06 | 2015-08-13 | Daniel Chien | Evaluating a questionable network communication |
CN109800589A (en) * | 2019-01-25 | 2019-05-24 | 深信服科技股份有限公司 | A kind of information security management and control method, system, device and readable storage medium storing program for executing |
CN111683157A (en) * | 2020-08-11 | 2020-09-18 | 杭州优云科技有限公司 | Network security protection method for Internet of things equipment |
CN112187792A (en) * | 2020-09-27 | 2021-01-05 | 安徽斯跑特科技有限公司 | Network information safety protection system based on internet |
CN114785720A (en) * | 2022-04-08 | 2022-07-22 | 北京国信网联科技有限公司 | Internet surfing behavior supervision platform for enterprise local area network |
CN115694980A (en) * | 2022-10-28 | 2023-02-03 | 河南中裕广恒科技股份有限公司 | Method for carrying out network security protection on Internet of things system |
-
2023
- 2023-03-13 CN CN202310233428.XA patent/CN115955363B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150229609A1 (en) * | 2005-09-06 | 2015-08-13 | Daniel Chien | Evaluating a questionable network communication |
CN109800589A (en) * | 2019-01-25 | 2019-05-24 | 深信服科技股份有限公司 | A kind of information security management and control method, system, device and readable storage medium storing program for executing |
CN111683157A (en) * | 2020-08-11 | 2020-09-18 | 杭州优云科技有限公司 | Network security protection method for Internet of things equipment |
CN112187792A (en) * | 2020-09-27 | 2021-01-05 | 安徽斯跑特科技有限公司 | Network information safety protection system based on internet |
CN114785720A (en) * | 2022-04-08 | 2022-07-22 | 北京国信网联科技有限公司 | Internet surfing behavior supervision platform for enterprise local area network |
CN115694980A (en) * | 2022-10-28 | 2023-02-03 | 河南中裕广恒科技股份有限公司 | Method for carrying out network security protection on Internet of things system |
Also Published As
Publication number | Publication date |
---|---|
CN115955363B (en) | 2023-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102055116B1 (en) | Data security service | |
US7197568B2 (en) | Secure cache of web session information using web browser cookies | |
US8359465B2 (en) | Enterprise security system | |
CN106559408B (en) | SDN authentication method based on trust management | |
CN107122674B (en) | Access method of oracle database applied to operation and maintenance auditing system | |
CN109787988A (en) | A kind of identity reinforces certification and method for authenticating and device | |
CN101741860A (en) | Computer remote security control method | |
CN111954211B (en) | Novel authentication key negotiation system of mobile terminal | |
CN106302550A (en) | A kind of information security method for intelligent substation automatization and system | |
KR20060032888A (en) | Apparatus for managing identification information via internet and method of providing service using the same | |
CN115333755A (en) | Multi-attribute identity authentication method based on continuous trust evaluation | |
CN114884680A (en) | Multi-server sustainable trust evaluation method based on context authentication | |
EP2070248B1 (en) | System and method for facilitating secure online transactions | |
CN113918977A (en) | User information transmission device based on Internet of things and big data analysis | |
CN109495500A (en) | A kind of double factor authentication method based on smart phone | |
CN105071993B (en) | Encrypted state detection method and system | |
CN115955363B (en) | Communication terminal based on desktop fusion | |
Yingkai et al. | A kind of identity authentication under cloud computing environment | |
CN117596595B (en) | Working method for carrying out safe login based on photovoltaic power system | |
CN111464317B (en) | Digital certificate-based cryptography operation method | |
Meng et al. | Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif. | |
KR100406292B1 (en) | Password Transmission system and method in Terminal Communications | |
Sun et al. | Formalization and verification of TESAC using CSP | |
Algamdi | Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems | |
CN117951729A (en) | Anti-leakage safety prevention and control system for data management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |