Security protection method for identification analysis system architecture and related equipment

A system architecture and security protection technology, applied in the computer field, can solve problems such as low security protection level and different security protection capabilities, and achieve the effect of improving the overall security protection level and reducing costs

Pending Publication Date: 2022-07-08
CHINA TELECOM CORP LTD
View PDF15 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present disclosure provide a security protection method for an identity resolution architecture, a security node, an industrial Internet identity resolution architecture, electronic equipment, and a computer-readable storage medium to solve problems caused by different security protection capabilities of each node and each application. The problem of low overall security protection level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method for identification analysis system architecture and related equipment
  • Security protection method for identification analysis system architecture and related equipment
  • Security protection method for identification analysis system architecture and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make those skilled in the art better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.

[0037] It should be noted that the terms "first", "second" and the like in the description and claims of the present disclosure and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances so that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security protection method for an identifier analysis system architecture and related equipment. The method executed by the security node comprises the following steps: acquiring operation data reported by one or more identification nodes; analyzing the operation data reported by the one or more identification nodes to obtain abnormal data, and generating early warning information of the abnormal data; and the early warning information of the abnormal data is broadcasted to one or more identification nodes, so that the one or more identification nodes perform interception according to a target interception rule, and the target interception rule is generated according to the early warning information of the abnormal data. According to the method, the abnormal data early warning information is broadcasted to each identification node in the architecture through the newly added security node in the industrial internet identification analysis system architecture, so that each identification node intercepts the abnormal data according to the target interception rule, and the overall security protection level of the industrial internet identification analysis system is improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular, to a security protection method for an identification resolution architecture, a secure node, an industrial Internet identification resolution architecture, an electronic device, and a computer-readable storage medium. Background technique [0002] The industrial Internet identification resolution system architecture includes national top-level nodes, second-level nodes in various industries, enterprise nodes and industrial Internet applications. The industrial Internet identification analysis system assigns unique identification codes to physical and virtual objects through identification codes (barcodes, two-dimensional codes, radio frequency identification tags, etc.). The identification code is the carrier and hub of data connection. Safety and national supervision put forward strict requirements on its safety work. In the related art, each node and each applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0631
CPCH04L63/308H04L63/1416H04L63/1425H04L63/1441H04L41/0631
Inventor 刘伟李凯那中丽
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products