Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Edge network security access defense system and method thereof

An edge network and defense system technology, applied in the field of network security, can solve the problems of inability to cope with data services, high energy consumption of equipment, increased delay, etc., to avoid non-uniqueness, improve simulation difficulty, and avoid information leakage.

Active Publication Date: 2018-08-31
杭州万为科技有限责任公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing traditional firewalls and gatekeepers are all deployed in the central computer room or local office, and a large amount of data is collected and processed centrally. At present, this bottleneck is difficult to solve, and it increases the delay
[0006] Existing security access devices generally only deal with the protocol of the access device, which is easy to be illegally simulated
[0007] Existing security equipment generally adopts centralized processing, which cannot cope with the current data business, and distributed can better deal with it
[0008] Existing security equipment generally adopts virus database comparison to identify and process the legality and illegality of data, and the equipment consumes too much energy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge network security access defense system and method thereof
  • Edge network security access defense system and method thereof
  • Edge network security access defense system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Embodiment 1, the edge network security access defense system of the present invention (hereinafter referred to as the system for short), such as Figure 1-3 As shown, it includes device 4 and edge intelligent software and hardware platform 1 located at the edge access end, and uplink service platform 3 and risk control platform deployment center 2 located in the central computer room, where device 4 and uplink service platform 3 are existing devices, such as this In the embodiment, the device 4 includes a camera, DVR, NVR, DVS or NVS, etc., and the uplink service platform 3 is an existing integrated service platform. The device 4, the uplink service platform 3, and the deployment center 2 of the risk control platform are connected to the edge intelligent software and hardware platform 1 with signals.

[0064] The edge intelligent software and hardware platform 1 is used to obtain the characteristic value and behavior characteristic value of the connected device, and ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an edge network security access defense system, comprising a piece of equipment, an edge intelligent software and hardware platform, an uplink service platform and a risk control platform deployment center, wherein the equipment, the uplink service platform and the risk control platform deployment center are connected to the edge intelligent software and hardware platform in signals; the edge intelligent software and hardware platform acquires the accessed equipment feature value and behavior feature value to establish a feature data pool, generates a unique identification code according to the feature data pool, and allows / denies access of the equipment according to the unique identification code. The invention also discloses an edge network security access defensemethod by using the system. By using the specific security algorithm, the machine automatically generates a unique identification code for effectively identifying the legality of the access equipment, thereby improving the efficiency of security defense with low requirements for hardware performance. The invention is applicable to edge distributed security defense cost requirements, and to network edge security defenses in various industries at the same time.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an edge network security access defense system and a method thereof. Background technique [0002] Artificial intelligence (AI), Xueliang project (access to public security from the social side), Internet of Things, etc. all rely on the necessary conditions for a smooth network, and the security of information services and equipment needs to be solved equally urgently; the traditional solution is to put the data in first and then This solution is difficult to cope with the current data explosion. [0003] If the public accesses the public security (public network or private network), the security threshold of the public security network entrance is lowered invisibly, and timely identification of the legality of the access device is the biggest challenge; in the existing technology, the data is first put into the door and then centralized Process screening, not suitable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/0414H04L63/0876
Inventor 何圣斌刘昱
Owner 杭州万为科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products