Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information security risk assessment system and method based on big data and edge computing

An edge computing and information security technology, applied in the field of risk assessment, can solve the problems of unreceived, paralyzed, and the impact of equipment to be managed, and achieve accurate security, get rid of dependence, obtain and execute in a timely manner.

Active Publication Date: 2022-04-26
广州赛度检测服务有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current situation, people simply manage multiple devices through one host or server, but due to factors such as device reasons or the distance between the management device and the device with management, etc., the device to be managed may not be able to The command sent by the management device is not received in time or cannot be received, which will affect or even paralyze the device to be managed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security risk assessment system and method based on big data and edge computing
  • An information security risk assessment system and method based on big data and edge computing
  • An information security risk assessment system and method based on big data and edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] see Figure 1-Figure 4 , the present invention provides a technical solution: an information security risk assessment method based on big data and edge computing, characterized in that the method includes the following steps:

[0057] S1. The client device counts the number of attacks per unit time, the time of each attack, and the recent website records visited by the user on the device through the network defense system;

[0058] S2. The client devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an information security risk assessment method based on big data and edge computing. The time of the attack and the website records of the user's recent visits on the device. The present invention uses technologies such as big data and edge computing to make the system more accurate in the feedback of information security risk assessment, and when the equipment to be managed has not received the control instruction issued by the management equipment for a long time, it will not affect the operation of the current equipment. Under such circumstances, edge computing technology is used to analyze the data on the device, and the device is controlled according to the analysis results, which not only saves the time for communication and feedback between devices, but also avoids the paralysis of devices caused by emergencies.

Description

technical field [0001] The invention relates to the technical field of risk assessment, in particular to an information security risk assessment system and method based on big data and edge computing. Background technique [0002] With the rapid development of Internet technology, people use the Internet more and more widely. While enjoying the convenience brought by the Internet, people pay more and more attention to the management of information security risks. In the current situation, people simply manage multiple devices through one host or server, but due to factors such as device reasons or the distance between the management device and the device with management, etc., the device to be managed may not be able to The command sent by the management device is not received in time or cannot be received, which will affect or even paralyze the device to be managed. [0003] In view of the above situation, we need an information security risk assessment system and method b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCG05B19/0423G05B2219/25257
Inventor 荆哲谭祥明叶婷曾幸钦孙培高曾灶烟曾炽强李树湖
Owner 广州赛度检测服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products