CN116821938A - Information safety protection platform based on Internet of things - Google Patents

Information safety protection platform based on Internet of things Download PDF

Info

Publication number
CN116821938A
CN116821938A CN202310888933.8A CN202310888933A CN116821938A CN 116821938 A CN116821938 A CN 116821938A CN 202310888933 A CN202310888933 A CN 202310888933A CN 116821938 A CN116821938 A CN 116821938A
Authority
CN
China
Prior art keywords
waveform
protection
confirming
information
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310888933.8A
Other languages
Chinese (zh)
Inventor
杨辉
张盼盼
吴远方
刘梦云
闫洋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinjiang Hongzhuo Small And Medium Enterprise Service Center Co ltd
Original Assignee
Xinjiang Hongzhuo Small And Medium Enterprise Service Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinjiang Hongzhuo Small And Medium Enterprise Service Center Co ltd filed Critical Xinjiang Hongzhuo Small And Medium Enterprise Service Center Co ltd
Priority to CN202310888933.8A priority Critical patent/CN116821938A/en
Publication of CN116821938A publication Critical patent/CN116821938A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/40Information sensed or collected by the things relating to personal data, e.g. biometric data, records or preferences
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an information safety protection platform based on the Internet of things, which relates to the technical field of information protection and solves the problems that a regular mode is not adopted to determine a safety key corresponding to stored information, and after the safety key is confirmed, the safety key is deleted.

Description

Information safety protection platform based on Internet of things
Technical Field
The application relates to the technical field of information protection, in particular to an information security protection platform based on the Internet of things.
Background
Information security, ISO is defined as: technology, administrative security, established and employed for data processing systems in order to protect computer hardware, software, data from being destroyed, altered, and compromised by accidental and malicious causes;
the application with the patent publication number of CN116305181A relates to the technical field of project management, in particular to an information security protection method and device of a project management platform, project management information is acquired from the project management platform, the acquired project management information is partitioned through a clustering algorithm to obtain a plurality of areas, the areas are encrypted, risk nodes which still exist after the nodes are acquired and are defined as risk nodes, secondary encryption is completed on the risk nodes, access rights of the encrypted nodes are limited, the project management information is partitioned and stored, and risk judgment is carried out on the project management information, project management information data stored in the risk nodes are secondarily encrypted, so that safer encrypted information can be acquired in the risk nodes through modified data in project management, and the risk that the data in the project management are tampered is also prevented through limitation of the access rights.
When information safety protection is carried out, although the protection performance of the corresponding protection platform is better, the risk of theft still exists, the internal secret key is lost, after the secret key is lost, the information existing in the protection platform is stolen, the hidden danger still exists in the information safety, the corresponding system does not adopt a regular mode to determine the safety secret key corresponding to the stored information, and after the safety secret key is confirmed, the safety secret key is deleted, so that the risk of theft of the safety secret key is avoided.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides an information security protection platform based on the Internet of things, which solves the problems that a regular mode is not adopted, a security key corresponding to stored information is determined, and after the security key is confirmed, the security key is deleted.
In order to achieve the above purpose, the application is realized by the following technical scheme: information security protection platform based on thing networking includes:
the information input end is used for inputting the internet information to be stored and directly transmitting the internet information to the encryption storage end;
the waveform recording unit is used for analyzing and confirming the storage rate of the input internet information, constructing a storage rate waveform diagram corresponding to the internet information according to the time trend, transmitting the constructed storage rate waveform diagram into the waveform analysis unit, and simultaneously transmitting the internet information and the storage rate waveform diagram into the storage unit for storage;
the waveform analysis unit is used for analyzing the constructed storage rate waveform diagram and confirming a plurality of waveform points in the diagram, and the specific mode is as follows:
according to the specific trend of the stored rate waveform schematic diagram, taking an initial point as a first group of waveform points, and directly marking the point as a waveform point when the trend of waveforms at two ends of the point is opposite when the subsequent waveform points are confirmed;
marking the corresponding rate values of different waveform points as SL according to the confirmed waveform points and the original ordering mode i Wherein i represents different waveform points, and i=1, 2, … …, n, i is 1, namely the first set of waveform points, and i is n, namely the last set of waveform points, namely the ending point of the waveform diagram;
by JC k =SL i-1 -SL i Obtaining the extremely poor JC between a plurality of adjacent waveform points k Wherein i.gtoreq.2, k=n-1, from a plurality of arranged range JCs k Sequentially extracting first digits in the corresponding extreme difference values, constructing an extreme difference first word sequence, and transmitting the extreme difference first word sequence into an extreme difference set classification unit;
the extremely bad set classification unit is used for preferentially confirming the specific number of digits in the extremely bad first word sequence, dividing the extremely bad first word sequence into four equal parts directly, and selecting a key set value from the equally divided four equal part digit sequence to divide the extremely bad first word sequence equally in the following specific modes:
specific numbers of digits in the sequence of the confirmed very poor first words are marked as GS t Wherein t represents different extreme first word sequences, GS t ÷4=JF t Obtaining a mean value, and analyzing and confirming the mean value JF t Whether or not it is an integer:
if average value JF t Is an integer, then directly according to JF t Equally dividing the extremely bad first word sequence from the first group of numbers to JF t Ending the digits, confirming the first group of digit sequences, and then from JF t +1 number starts to 2JF t Ending the number, confirming a second group of number sequences, and so on, and sequentially confirming a third group of subsequent number sequences and a fourth group of number sequences;
if average value JF t If the number is not an integer, directly removing the decimal point and then carrying out rounding processing on the number to obtain a rounding value Q t Starting from the first group of digits to Q t Ending the digits, confirming the first set of digit sequences, and then reading from Q t +1 number starts to 2Q t Ending the number, confirming the second group of number sequences, and then from 2Q t +1 number starts to 3Q t After the number is finished, confirming a third group of number sequences, and then directly classifying the rest numbers into a fourth group of number sequences;
after four groups of digital sequences are classified in sequence, the numbers in each group of digital sequences are summed to obtain a combined value, the first digit of the combined value is directly extracted to be used as a key value of the digital sequences, the key values are ordered according to the ordering of the digital sequences to obtain a group of four-word keys, the four-word keys are transmitted to an external storage terminal, an operator records the four-word keys, and the four-word keys are directly deleted in the system after the transmission is completed.
Preferably, the system further comprises a login end for logging in by an external person, inputting appointed login information, confirming by the protection end, inputting appointed four-word keys after confirming no errors, extracting the appointed information stored in the storage unit, directly transmitting the waveform chart stored by corresponding information into the waveform analysis unit when the storage unit receives an extraction instruction, gradually passing through the extremely poor set classification unit and the key generation unit, confirming the four-word keys of the information, comparing the two groups of four-word keys, if the comparison is no errors, extracting the information, and if the comparison is no errors, terminating the information extraction operation.
Preferably, the system further comprises a protection end, wherein a plurality of different protection nodes are arranged in the protection end and used for protecting information security, the system further comprises a test end, the plurality of protection nodes in the protection end are tested and test parameters are determined, the test end comprises a node batch test unit and a protection data analysis unit, the node batch test unit internally stores attack data of different nodes, the attack data is drawn in advance by an operator and updated periodically, and the update period is one week; testing the designated protection nodes by the attack data, recording test results and processing rate parameters of the corresponding protection nodes, and transmitting the test results and the processing rate parameters of the corresponding protection nodes to the protection data analysis unit;
the protection data analysis unit analyzes and judges whether the designated node has performance problems or not; the specific method is as follows:
firstly judging whether a test result is accurate, if so, analyzing a processing rate parameter, if not, directly generating an error signal, transmitting the error signal to an external display end for an operator to check, and timely maintaining a designated node;
drawing a processing rate waveform diagram according to the time trend and the corresponding processing rate parameter, and combining the processing rate waveform diagram with a two-dimensional coordinate system;
extracting protection threshold Yg of a designated node, wherein g represents different protection nodes, confirming the designated position of the protection threshold Yg in a vertical coordinate axis of a two-dimensional coordinate system, and drawing a dividing line parallel to a transverse coordinate axis, wherein the dividing line divides a processing rate waveform chart;
analyzing whether the dividing line divides the processing rate waveform diagram, if yes, performing the next processing, and if no, not performing any processing;
confirming a waveform line segment positioned at the upper end of the dividing line in the processing rate waveform diagram, confirming the length value CDg of the waveform line segment, confirming the total length ZDg of the processing rate waveform diagram, and confirming the occupation ratio ZBg of the length value of the waveform line segment by adopting ZBg =CDg/ZDg;
comparing the occupancy ratio ZBg with a preset value Y1, when ZBg is larger than Y1, generating a signal with too slow processing rate, and transmitting the signal to an external display end, otherwise, not performing any processing.
Advantageous effects
The application provides an information security protection platform based on the Internet of things. Compared with the prior art, the method has the following beneficial effects:
the method confirms the corresponding waveform diagram through the specific stored rate waveform, then confirms the internal waveform point according to the confirmed waveform diagram, confirms the corresponding rate parameter at the same time, then performs the range processing on the adjacent rate parameter, then confirms the range sequence, confirms the four-word key according to the equal division effect of the range sequence, then deletes the confirmed four-word key, firstly confirms the four-word key belonging to the stored information in a regular calculation mode, directly transmits the four-word key to an external terminal, does not record in the system, then an external illegal person cannot directly steal the key stored in the system, does not have the key, cannot extract the stored information, improves the security of the information storage, and avoids the stored information from being stolen by external persons;
the protection end is in the use, the test end tests the protection end to simultaneously record test parameters, follow-up according to test parameters, record corresponding processing rate waveform, and analyze processing rate waveform, confirm whether the processing performance of corresponding node is up to standard, adopt this kind of test mode to test the protection end, not only can reach abundant test effect, can also ensure the safe operation of protection end, and can reach the effect of high performance operation in real time, guarantee the best performance of safety protection constantly, if there is the problem, in time maintain, avoid protection end protection performance to reduce.
Drawings
Fig. 1 is a schematic diagram of a principle frame of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Example 1
Referring to fig. 1, the application provides an information security protection platform based on the internet of things, which comprises an information input end, a security protection center and a login end, wherein the information input end is electrically connected with the security protection center input end, and the login end is electrically connected with the security protection center input end;
the safety protection center comprises an encryption storage end, a protection end and a test end, wherein the protection end is respectively and electrically connected with the encryption storage end and the test end input interface;
the encryption storage end comprises a waveform recording unit, a waveform analysis unit, a range set classification unit, a key generation unit and a storage unit, wherein the waveform recording unit is respectively and electrically connected with the input ends of the waveform analysis unit and the storage unit, and the waveform analysis unit, the range set classification unit and the key generation unit are electrically connected step by step;
the test end comprises a node batch test unit and a protection data analysis unit, wherein the node batch test unit is electrically connected with the input end of the protection data analysis unit;
the information input end is used for inputting the internet information to be stored and directly transmitting the internet information into the encryption storage end, and particularly, the operation is that an operator with certain authority can perform the operation, and not any person can perform data storage;
the waveform recording unit in the encryption storage end analyzes and confirms the storage rate of the input internet information, constructs a storage rate waveform diagram corresponding to the internet information according to the time trend, transmits the constructed storage rate waveform diagram to the waveform analysis unit, and simultaneously transmits the internet information and the storage rate waveform diagram to the storage unit for storage, and specifically, the storage rate waveform diagram is what storage rate is stored at what time point, and a corresponding waveform diagram is constructed in a two-dimensional coordinate system according to the specific trend of the storage rate, so that the prior art is not repeated;
the waveform analysis unit analyzes the constructed storage rate waveform diagram, confirms a plurality of waveform points in the diagram, records the rate parameters of the waveform points, and then performs range processing according to the corresponding rate parameters, so as to select a first group of range numbers, construct a range first word sequence, and transmit the range first word sequence into a range set classification unit, wherein the specific mode of performing range processing is as follows:
when confirming the subsequent waveform points, when the trend of the waveforms at the two ends of the point is opposite, the point is marked as the waveform point, specifically, the front waveform line of the corresponding point is the rising trend, the rear waveform line is the falling trend, the point is the waveform point, or the front waveform line is the falling trend, the rear waveform line is the rising trend, and the point is the corresponding waveform point;
marking the corresponding rate values of different waveform points as SL according to the confirmed waveform points and the original ordering mode i Wherein i represents different waveform points, and i=1, 2, … …, n, i is 1, namely the first set of waveform points, and i is n, namely the last set of waveform points, namely the ending point of the waveform diagram;
by JC k =SL i-1 -SL i Obtaining a plurality of adjacent waveform pointsExtremely poor JC between k Wherein i.gtoreq.2, k=n-1, from a plurality of arranged range JCs k And sequentially extracting the first digits in the corresponding extreme difference values, constructing an extreme difference first word sequence, and transmitting the extreme difference first word sequence into an extreme difference set classification unit.
The extremely bad set classifying unit is used for preferentially confirming the specific number of digits in the extremely bad first word sequence, dividing the extremely bad first word sequence into four equal parts directly, and selecting a key set value from the equally divided four equal part digit sequence, wherein the specific mode for equally dividing is as follows:
specific numbers of digits in the sequence of the confirmed very poor first words are marked as GS t Wherein t represents different extreme first word sequences, GS t ÷4=JF t Obtaining a mean value, and analyzing and confirming the mean value JF t Whether or not it is an integer:
if average value JF t Is an integer, then directly according to JF t Equally dividing the extremely bad first word sequence from the first group of numbers to JF t Ending the digits, confirming the first group of digit sequences, and then from JF t +1 number starts to 2JF t Ending the number, confirming a second group of number sequences, and so on, and sequentially confirming a third group of subsequent number sequences and a fourth group of number sequences;
if average value JF t If the number is not an integer, directly removing the decimal point and then carrying out rounding processing on the number to obtain a rounding value Q t Starting from the first group of digits to Q t Ending the digits, confirming the first set of digit sequences, and then reading from Q t +1 number starts to 2Q t Ending the number, confirming the second group of number sequences, and then from 2Q t +1 number starts to 3Q t After the number is finished, confirming a third group of number sequences, and then directly classifying the rest numbers into a fourth group of number sequences;
after four groups of digital sequences are classified in sequence, the numbers in each group of digital sequences are summed to obtain a combined value, the first digit of the combined value is directly extracted to be used as a key value of the digital sequences, the key values are ordered according to the ordering of the digital sequences to obtain a group of four-word keys, the four-word keys are transmitted to an external storage terminal and are memorized by an operator, and after the transmission is finished, the four-word keys are directly deleted in the system.
Specifically, firstly, a regular calculation mode is adopted to confirm the four-word secret key belonging to the stored information, the four-word secret key is directly transmitted to an external terminal, the inside of the system is not recorded, then an external illegal person cannot directly steal the secret key stored in the system, the stored information cannot be extracted without the secret key, the safety of the information storage is improved, and the problem that the stored information is stolen by an external person, so that the hidden danger of the information safety is large is avoided.
Example two
Based on the first embodiment, in the implementation process of this embodiment, compared to the first embodiment, the specific difference is that:
the login terminal is used for logging by external personnel, inputting appointed login information, confirming by the protection terminal, inputting appointed four-word keys after confirming, extracting the appointed information stored in the storage unit, directly transmitting a waveform chart stored by corresponding information into the waveform analysis unit when the storage unit receives an extraction instruction, then gradually passing through the extremely poor set classification unit and the key generation unit, confirming the four-word keys of the information, comparing the two groups of four-word keys, if the comparison is correct, extracting the information, and if the comparison is incorrect, terminating the information extraction operation;
the protection end is internally provided with a plurality of different protection nodes for protecting information security, so that the information security is prevented from being problematic;
the test terminal tests a plurality of protection nodes in the protection terminal and determines test parameters, wherein the nodes are provided with test units in batches, attack data of different nodes are stored in the test terminal, the attack data are planned in advance by operators and updated at the same time, and the update period is one week; the attack data are tested on the designated protection nodes, test results and processing rate parameters of the corresponding protection nodes are recorded and transmitted to the protection data analysis unit, the protection data analysis unit analyzes the attack data to determine whether the designated nodes have performance problems, and the specific mode of testing is as follows:
firstly judging whether a test result is accurate, if so, analyzing a processing rate parameter, if not, directly generating an error signal, transmitting the error signal to an external display end for an operator to check, and timely maintaining a designated node;
drawing a processing rate waveform diagram according to the time trend and the corresponding processing rate parameter, and combining the processing rate waveform diagram with a two-dimensional coordinate system;
extracting protection threshold Yg of a designated node, wherein g represents different protection nodes, confirming the designated position of the protection threshold Yg in a vertical coordinate axis of a two-dimensional coordinate system, and drawing a dividing line parallel to a transverse coordinate axis, wherein the dividing line divides a processing rate waveform chart;
analyzing whether the dividing line divides the processing rate waveform diagram, if yes, performing the next processing, and if no, not performing any processing;
confirming a waveform line segment positioned at the upper end of the dividing line in the processing rate waveform diagram, confirming the length value CDg of the waveform line segment, confirming the total length ZDg of the processing rate waveform diagram, and confirming the occupation ratio ZBg of the length value of the waveform line segment by adopting ZBg =CDg/ZDg;
comparing the occupancy ratio ZBg with a preset value Y1, wherein the specific value of Y1 is empirically determined by an operator, and the value of Y1 is generally 0.8, when ZBg is larger than Y1, a signal with too slow processing rate is generated and transmitted to an external display end, otherwise, no processing is performed.
In a specific operation process, if the corresponding node is in the processing process, when the processing rate is too slow, the data can be leaked or the node is directly paralyzed due to the fact that part of attack data is leaked when the attack data is too much and the uninterrupted attack is carried out, so that the whole protection end loses the protection function and information is lost.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.

Claims (7)

1. Information security protection platform based on thing networking, its characterized in that includes:
the information input end is used for inputting the internet information to be stored and directly transmitting the internet information to the encryption storage end;
the waveform recording unit is used for analyzing and confirming the storage rate of the input internet information, constructing a storage rate waveform diagram corresponding to the internet information according to the time trend, transmitting the constructed storage rate waveform diagram into the waveform analysis unit, and simultaneously transmitting the internet information and the storage rate waveform diagram into the storage unit for storage;
the waveform analysis unit is used for analyzing the constructed storage rate waveform schematic diagram, confirming a plurality of waveform points in the schematic diagram, recording rate parameters of the waveform points, carrying out range processing according to the corresponding rate parameters, selecting a first range of range numbers, constructing a range first word sequence, and transmitting the range first word sequence into the range set classification unit;
the range set classifying unit is used for preferentially confirming the specific number of the numbers in the range first word sequence, dividing the range first word sequence into four equal parts directly, and selecting a key set value from the divided four equal part number sequences.
2. The information security protection platform based on the internet of things according to claim 1, wherein the waveform analysis unit performs the specific way of performing the range processing:
according to the specific trend of the stored rate waveform schematic diagram, taking an initial point as a first group of waveform points, and directly marking the point as a waveform point when the trend of waveforms at two ends of the point is opposite when the subsequent waveform points are confirmed;
marking the corresponding rate values of different waveform points as SL according to the confirmed waveform points and the original ordering mode i Wherein i represents different waveform points, and i=1, 2, … …, n, i is 1, namely the first set of waveform points, and i is n, namely the last set of waveform points, namely the ending point of the waveform diagram;
by JC k =SL i-1 -SL i Obtaining the extremely poor JC between a plurality of adjacent waveform points k Wherein i.gtoreq.2, k=n-1, from a plurality of arranged range JCs k And sequentially extracting the first digits in the corresponding extreme difference values, constructing an extreme difference first word sequence, and transmitting the extreme difference first word sequence into an extreme difference set classification unit.
3. The information security protection platform based on the internet of things according to claim 2, wherein the extremely bad set classification unit performs equipartition in the following specific manner:
specific numbers of digits in the sequence of the confirmed very poor first words are marked as GS t Wherein t represents different extreme first word sequences, GS t ÷4=JF t Obtaining a mean value, and analyzing and confirming the mean value JF t Whether or not it is an integer:
if average value JF t Is an integer, then directly according to JF t Equally dividing the extremely bad first word sequence from the first group of numbers to JF t Ending the digits, confirming the first group of digit sequences, and then from JF t +1 number starts to 2JF t Digital knotA bundle, a second group of digital sequences are confirmed, and the following third group of digital sequences and fourth group of digital sequences are confirmed in sequence;
if average value JF t If the number is not an integer, directly removing the decimal point and then carrying out rounding processing on the number to obtain a rounding value Q t Starting from the first group of digits to Q t Ending the digits, confirming the first set of digit sequences, and then reading from Q t +1 number starts to 2Q t Ending the number, confirming the second group of number sequences, and then from 2Q t +1 number starts to 3Q t After the number is finished, confirming a third group of number sequences, and then directly classifying the rest numbers into a fourth group of number sequences;
after four groups of digital sequences are classified in sequence, the numbers in each group of digital sequences are summed to obtain a combined value, the first digit of the combined value is directly extracted to be used as a key value of the digital sequences, the key values are ordered according to the ordering of the digital sequences to obtain a group of four-word keys, the four-word keys are transmitted to an external storage terminal, an operator records the four-word keys, and the four-word keys are directly deleted in the system after the transmission is completed.
4. The internet of things-based information security protection platform according to claim 3, further comprising a login terminal for an external person to log in, inputting specified login information, confirming by the protection terminal, inputting specified four-word keys after confirming that there is no error, extracting the specified information stored in the storage unit, directly transmitting a waveform chart stored simultaneously corresponding to the information into the waveform analysis unit when the storage unit receives an extraction instruction, then gradually passing through the extremely bad set classification unit and the key generation unit, confirming the four-word keys of the information, comparing the two groups of four-word keys, if the comparison is no error, extracting the information, and if the comparison is wrong, terminating the information extraction operation.
5. The information security protection platform based on the internet of things according to claim 1, further comprising a protection end, wherein a plurality of different protection nodes are arranged inside the protection end and used for protecting information security.
6. The information security protection platform based on the internet of things according to claim 5, further comprising a testing end, wherein the testing end tests a plurality of protection nodes existing in the protection end and determines testing parameters, and comprises a node batch testing unit and a protection data analysis unit, wherein the node batch testing unit internally stores attack data of different nodes, wherein the attack data is formulated in advance by an operator and is updated periodically at the same time, and the updating period is one week; and testing the designated protection node by the attack data, recording the test result and the processing rate parameter of the corresponding protection node, and transmitting the test result and the processing rate parameter of the corresponding protection node to the protection data analysis unit, wherein the protection data analysis unit analyzes the test result and the processing rate parameter of the corresponding protection node to determine whether the designated node has a performance problem.
7. The information security protection platform based on the internet of things according to claim 6, wherein the specific manner in which the protection data analysis unit analyzes whether the designated node has the performance problem is as follows:
firstly judging whether a test result is accurate, if so, analyzing a processing rate parameter, if not, directly generating an error signal, transmitting the error signal to an external display end for an operator to check, and timely maintaining a designated node;
drawing a processing rate waveform diagram according to the time trend and the corresponding processing rate parameter, and combining the processing rate waveform diagram with a two-dimensional coordinate system;
extracting protection threshold Yg of a designated node, wherein g represents different protection nodes, confirming the designated position of the protection threshold Yg in a vertical coordinate axis of a two-dimensional coordinate system, and drawing a dividing line parallel to a transverse coordinate axis, wherein the dividing line divides a processing rate waveform chart;
analyzing whether the dividing line divides the processing rate waveform diagram, if yes, performing the next processing, and if no, not performing any processing;
confirming a waveform line segment positioned at the upper end of the dividing line in the processing rate waveform diagram, confirming the length value CDg of the waveform line segment, confirming the total length ZDg of the processing rate waveform diagram, and confirming the occupation ratio ZBg of the length value of the waveform line segment by adopting ZBg =CDg/ZDg;
comparing the occupancy ratio ZBg with a preset value Y1, when ZBg is larger than Y1, generating a signal with too slow processing rate, and transmitting the signal to an external display end, otherwise, not performing any processing.
CN202310888933.8A 2023-07-18 2023-07-18 Information safety protection platform based on Internet of things Withdrawn CN116821938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310888933.8A CN116821938A (en) 2023-07-18 2023-07-18 Information safety protection platform based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310888933.8A CN116821938A (en) 2023-07-18 2023-07-18 Information safety protection platform based on Internet of things

Publications (1)

Publication Number Publication Date
CN116821938A true CN116821938A (en) 2023-09-29

Family

ID=88139324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310888933.8A Withdrawn CN116821938A (en) 2023-07-18 2023-07-18 Information safety protection platform based on Internet of things

Country Status (1)

Country Link
CN (1) CN116821938A (en)

Similar Documents

Publication Publication Date Title
CN107423632B (en) Customizable sensitive data desensitization method and system
US20190311121A1 (en) Method for predicting and characterizing cyber attacks
CN108616545B (en) Method and system for detecting network internal threat and electronic equipment
US20200311250A1 (en) Graphic Pattern-Based Authentication with Adjustable Challenge Level
CN111404692B (en) Block chain identity information confirmation system and confirmation method based on big data
CN116542637B (en) Government platform safety control method based on computer
CN115643035A (en) Network security situation assessment method based on multi-source log
CN110071917A (en) User password detection method, unit and storage medium
CN116614251A (en) Data security monitoring system
CN109831294B (en) Method and device for evaluating fault attack resistance of SPN type block cipher
CN117371048B (en) Remote access data processing method, device, equipment and storage medium
CN213276647U (en) Safety simulation analysis device for preventing time attack
CN116821938A (en) Information safety protection platform based on Internet of things
CN112115657A (en) Chip security simulation analysis method and device for preventing single time attack
CN113259122B (en) Full-scene network security intelligent decision handling method based on artificial intelligence
CN114386077A (en) Electronic bidding document multilayer encryption and decryption system for electronic bidding
CN113132354B (en) Working method for carrying out file processing optimization configuration by remotely logging in government affair data network
CN112181998A (en) Railway monitoring data transmission system
KR102266065B1 (en) Electronic terminal apparatus providing authority for secure document through user authentication based on matching rate of face image and operating method thereof
CN112114248A (en) Chip security simulation analysis method and device for preventing differential time attack
CN118551408B (en) Medical data safety and privacy protection system based on blockchain
CN118171315B (en) Anti-collision library method and system based on privacy calculation
CN118523903B (en) Access control data encryption method and system
CN118051891A (en) Computer software encryption protection method
CN117648704B (en) Block chain-based data security interaction method, medium and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230929