Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data security method, device and storage medium for wearable devices

A wearable device and network data technology, applied in the field of network information security, can solve problems such as lack of detection actions, wearable device security cannot be guaranteed, etc.

Active Publication Date: 2022-01-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application relates to a network data security method, device, and storage medium for wearable devices, which can solve the problem that the device security of wearable devices cannot be guaranteed due to the lack of detection actions for wearable device-related information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data security method, device and storage medium for wearable devices
  • Network data security method, device and storage medium for wearable devices
  • Network data security method, device and storage medium for wearable devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0040] First, a brief introduction to the nouns involved in the embodiments of this application:

[0041] Wearable device: refers to a portable device that is directly worn on the body, or integrated into the user's clothes, or other wearable accessories. A wearable device is not only a hardware device, but also can realize the function of data transmission through software support, data interaction, and cloud interaction. The mainstream product forms of wearable devices include: Watches supported by the wrist (including watches and wristbands, etc.), Shoes supported by the feet (including shoes, socks and other products worn on the legs), and Glass (including glasses, helmets, and headbands) supported by the head, as well as no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a network data security method, device, and storage medium for wearable devices, and belongs to the technical field of information security. The method includes: acquiring network data related to the wearable device; inputting the network data into a set of similarity models for identification; acquiring at least two weak identification results of at least two similarity models on the network data; according to at least two The risk score of the network data is obtained from a weak identification result; when the risk score reaches the alarm threshold, it is determined that the network data is risk data. This application obtains the network data related to wearable devices through the network monitoring device and uses the similarity model set to identify, distinguishes the network data that reaches the alarm threshold into risk data and performs early warning methods, and completes the wearable device The security monitoring of relevant information achieves the information security protection effect on wearable devices.

Description

technical field [0001] The present application relates to the technical field of network information security, in particular to a network data security method, device and storage medium for wearable devices. Background technique [0002] With the development of technology, wearable devices are widely used. Common wearable devices include: smart bracelets, smart watches, smart wristbands, smart earrings, smart shoes, smart belts, etc. [0003] During the development of wearable devices, more functions are developed. At present, most wearable devices have networking functions. Users can connect wearable devices with other communication modes such as Near Field Communication (NFC), Wi-Fi, Bluetooth, and cellular mobile network The device is connected to realize functions such as website access, data upload and download on the wearable device. Due to the large variety of products, in order to meet the data transmission requirements of different types of products, current wear...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/121G06K9/62H04W12/12H04W12/33
CPCH04L63/1416H04W12/121G06F18/22
Inventor 宋兵董志强
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products