CN110611229A - Network interface, interface device, network cable connector and physical intrusion prevention method - Google Patents

Network interface, interface device, network cable connector and physical intrusion prevention method Download PDF

Info

Publication number
CN110611229A
CN110611229A CN201810613905.4A CN201810613905A CN110611229A CN 110611229 A CN110611229 A CN 110611229A CN 201810613905 A CN201810613905 A CN 201810613905A CN 110611229 A CN110611229 A CN 110611229A
Authority
CN
China
Prior art keywords
interface
radio frequency
network
frequency identification
network cable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810613905.4A
Other languages
Chinese (zh)
Inventor
陈姝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd filed Critical BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority to CN201810613905.4A priority Critical patent/CN110611229A/en
Publication of CN110611229A publication Critical patent/CN110611229A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R13/00Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
    • H01R13/66Structural association with built-in electrical component

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a network interface, an interface device, a network cable joint and a physical invasion preventing method, wherein the network interface comprises an interface body and a radio frequency identification reading device, the radio frequency identification reading device is used for reading a radio frequency identification chip configured in the network cable joint connected with the interface body and sending read radio frequency information to an interface state detection device so that the interface state detection device can detect at least one of the following items: the connection state of the network interface and the network cable connector and the plugging and unplugging times of the network cable connector. According to the invention, the radio frequency identification reading device and the radio frequency identification chip are respectively arranged in the network interface and the network cable joint, so that the interface state detection device can judge the connection state of the network interface and the network cable joint and the plugging and unplugging times of the joint according to the radio frequency information read by the radio frequency identification reading device, thereby realizing the detection of the physical connection state of the network interface and further realizing the safety prevention and control of the physical layer.

Description

Network interface, interface device, network cable connector and physical intrusion prevention method
Technical Field
The present application relates to the field of network device technologies, and in particular, to a network interface, an interface device, a network cable connector, a physical intrusion prevention method, a device, and a storage medium.
Background
The security control of the current network device mainly lies in the software level, for example, how to prevent and control the remote intrusion of hackers, but the security level of the physical network interface generally lacks of control measures, when a hacker inserts a cable connected to the network port into a penetration device through a physical penetration internal system, or tries to insert a spare network port to implement the physical penetration, it is difficult for a network administrator to judge whether the state change of the network port is caused by the down of the end device or the pulling of the network cable. Especially, the network device and the server are hosted in a third-party computer room, or the network system is an industrial control network isolated from the internet, and the physical infiltration behavior cannot be found in a short time.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a network interface, an interface device, a network cable connector, and a physical intrusion prevention method that achieve physical layer security prevention and control by detecting a physical connection state of the network interface.
In a first aspect, the present invention provides a network interface, including an interface body and a plurality of rfid reading devices, where the rfid reading devices are configured to read an rfid chip configured in a network cable connector connected to the interface body, and send read rf information to an interface status detection device, so that the interface status detection device detects at least one of the following: the connection state of the network interface and the network cable connector and the plugging and unplugging times of the network cable connector.
In a second aspect, the present invention provides an interface device, which includes a plurality of network interfaces as described above, and an interface status detection device.
In a third aspect, the present invention provides a network cable connector, including a connector body and a radio frequency identification chip, where the radio frequency identification chip is configured to transmit radio frequency information for being read by a plurality of radio frequency identification reading devices configured on a network interface connected to the connector body, and to send the read radio frequency information to an interface status detection device, so that the interface status detection device detects at least one of the following: the connection state of the network interface and the network cable connector and the plugging and unplugging times of the network cable connector.
In a fourth aspect, the present invention further provides a method for preventing physical intrusion, including:
receiving detection result information sent by an interface state detection device; the detection result information is generated by detecting radio frequency information sent by a plurality of radio frequency identification reading devices by an interface state detection device, and the radio frequency information is obtained by reading radio frequency identification chips configured in network cable joints connected with the network interfaces by the radio frequency identification reading devices;
and executing security control according to the detection result information and the pre-configured security policy.
In a fifth aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a method provided according to embodiments of the present invention.
In a sixth aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the methods provided according to the embodiments of the present invention.
According to the network interface, the interface device, the network cable connector and the physical intrusion prevention method provided by the embodiments of the invention, the radio frequency identification reading device and the radio frequency identification chip are respectively configured in the network interface and the network cable connector, so that the interface state detection device can judge the connection state of the network interface and the network cable connector and the plugging and unplugging times of the connector according to the radio frequency information read by the radio frequency identification reading device, thereby realizing the detection of the physical connection state of the network interface and further realizing the safety prevention and control of a physical layer.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic view of a scenario for detecting a physical connection state of a network interface according to an embodiment of the present invention.
Fig. 2 is a schematic view of a scenario for detecting a physical connection state of a network interface according to another embodiment of the present invention.
Fig. 3 is a flowchart of a method for preventing physical intrusion according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a schematic view of a scenario for detecting a physical connection state of a network interface according to an embodiment of the present invention.
As shown in fig. 1, in the present embodiment, the present invention provides a network interface 10, which includes an interface body 101 and an rfid reader 102; and, an interface device includes a plurality of network interfaces 10 and an interface state detection device 30. The rfid reader 102 is configured to read an rfid chip configured in the network cable connector 20 connected to the interface body 101, and send read rf information to the interface status detector 30, so that the interface status detector 30 detects at least one of the following items: the connection state of the network interface 10 and the network cable connector 20, and the plugging and unplugging times of the network cable connector 20.
In this embodiment, the present invention also provides a network cable connector 20, which includes a connector body 201 and an rfid chip 202. The rfid chip 202 is configured to transmit rf information for the rfid reader 102 configured in the network interface 10 connected to the connector body 201 to read, and send the read rf information to the interface status detection device 30, so that the interface status detection device 30 detects at least one of the following: the connection state of the network interface 10 and the network cable connector 20, and the plugging and unplugging times of the network cable connector 20.
In this embodiment, the interface body 101 is an RJ45 interface, and in more embodiments, the interface body 101 may be configured as a photoelectric conversion GBIC interface or other different network interfaces commonly used in the field according to actual requirements, so as to achieve the same technical effect.
In this embodiment, the reading range of the rfid reading device 102 does not exceed the interface body 101, and when the connector body 201 is inserted into the socket groove of the interface body 101, so that the network interface 10 is connected to the network cable connector 20, the rfid reading device 102 can read the rfid chip 202; when the network cable connector 20 is pulled out, the rfid reader 102 cannot read the rfid chip 202 and cannot collect the rf information.
The rfid reader 102 and the interface status detector 30 may be connected by a physical cable or by wireless communication. The interface status detection device 30 can directly determine whether the network interface 10 is connected to the network cable connector 20 through the radio frequency information sent by the radio frequency identification reading device 102 in real time or in a short time delay, and can count the plugging times of the network cable connector 20 according to the transition times of the connection status, thereby generating detection result information.
Preferably, in this embodiment, the inner wall of the interface body 101 is provided with a hole, and the rfid reading device 102 is fixed in the hole. In other preferred embodiments, the rfid reader 102 may also be housed inside the interface body 101. In further embodiments, the interface body 101 and the rfid reader 102 may be configured in different combinations as understood by those skilled in the art, so long as the reading range of the rfid reader 102 does not exceed the interface body 101, and the same technical effect can be achieved without changing the physical and electrical standards of the existing network interface.
Preferably, the detection result information may further include other auxiliary information such as log information.
In this embodiment, the interface status detection device 30 detects only one network interface 10, and in various embodiments, the interface status detection device 30 can detect a plurality of network interfaces 10 respectively at the same time.
In this embodiment, the interface state detection apparatus 30 is configured on a bus of the host device, and sends detection result information generated by detection to an operating system of the host device through a driver, so that a security application deployed in the operating system executes security control according to the detection result information and a preconfigured security policy. The safety control may specifically include any one or more of the following: and triggering network alarm, interrupting network communication, issuing an access control list to a network port, and limiting specific network access. In further embodiments, different security control approaches may also be configured as will be appreciated by those skilled in the art.
In other embodiments, the interface status detecting device 30 may be configured independently, and send the detection result information to the management system, so that the management system performs security control according to the detection result information and the preconfigured security policy.
In the embodiment, the radio frequency identification reading device and the radio frequency identification chip are respectively configured in the network interface and the network cable joint, so that the interface state detection device can judge the connection state of the network interface and the network cable joint and the plugging and unplugging times of the joint according to the radio frequency information read by the radio frequency identification reading device, thereby realizing the detection of the physical connection state of the network interface and further realizing the safety prevention and control of the physical layer.
Fig. 2 is a schematic view of a scenario for detecting a physical connection state of a network interface according to another embodiment of the present invention.
The embodiment shown in fig. 2 is different from the embodiment shown in fig. 1 in that in the embodiment shown in fig. 2, the network interface 10 includes a plurality of rfid readers 102, each rfid reader 102 may be configured inside or outside the interface body 101, and the collection range at least covers the mesh opening groove of the interface body 101.
When the network interface 10 is connected to the network cable connector 20, each rfid reader 102 reads rf information and sends the rf information to the interface status detector 30; the interface state detection device 30 locates the rfid chip 202 according to the received radio frequency information and the pre-configured rfid positioning algorithm, determines whether the network interface 10 is connected to the network cable connector 20 by determining whether the rfid chip 202 is located in the gateway groove of the interface body 101, and further counts the plugging times of the network cable connector 20.
Fig. 3 is a flowchart of a method for preventing physical intrusion according to an embodiment of the present invention. The method shown in fig. 3 may be applied to the host device or the management system in the embodiment shown in fig. 1 or fig. 2. As shown in fig. 3, in this embodiment, the present invention provides a method for preventing physical intrusion, including:
s20: receiving detection result information sent by an interface state detection device; the detection result information is generated by detecting radio frequency information sent by a plurality of radio frequency identification reading devices by an interface state detection device, and the radio frequency information is obtained by reading radio frequency identification chips configured in network cable joints connected with the network interfaces by the radio frequency identification reading devices;
s40: and executing security control according to the detection result information and the pre-configured security policy.
Specifically, the principle of the method shown in fig. 3 may refer to the embodiment shown in fig. 1 or fig. 2, and is not described herein again.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the physical intrusion prevention method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing an anti-physical intrusion method. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the physical intrusion prevention methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (12)

1. A network interface is characterized by comprising an interface body and a plurality of radio frequency identification reading devices, wherein the radio frequency identification reading devices are used for reading radio frequency identification chips configured in network cable connectors connected with the interface body and sending read radio frequency information to an interface state detection device so that the interface state detection device can detect at least one of the following items: the connection state of the network interface and the network cable connector, and the plugging and unplugging times of the network cable connector.
2. The network interface of claim 1, wherein the inner wall of the interface body is provided with a hole, and the rfid reader is fixed in the hole.
3. An interface device comprising a plurality of network interfaces according to claim 1 or 2, and interface status detection means.
4. The interface device according to claim 3, wherein the reading range of the rfid reading device does not exceed the interface body, and the interface status detection device determines whether the network interface is connected to the network cable connector according to whether the rf information is received.
5. The interface device according to claim 3, wherein the network interface includes a plurality of rfid readers, and the interface status detection device locates the rfid chip according to the rf information and a pre-configured rfid locating algorithm, and determines whether the network interface is connected to the network cable connector according to the locating result.
6. The interface device according to any one of claims 3 to 5, wherein the interface state detection device is configured on a bus of a host device, and is configured to send detection result information generated by detection to an operating system of the host device through a driver, so that a security application deployed in the operating system performs security control according to the detection result information and a preconfigured security policy.
7. The interface device according to any one of claims 3 to 5, wherein the interface state detection device is configured independently, and configured to send detection result information generated by the detection to a management system, so that the management system performs security control according to the detection result information and a preconfigured security policy.
8. The interface apparatus according to any one of claims 3 to 5, wherein the detection result information further includes log information.
9. The network cable connector is characterized by comprising a connector body and a radio frequency identification chip, wherein the radio frequency identification chip is used for transmitting radio frequency information for being read by a plurality of radio frequency identification reading devices configured on a network interface connected with the connector body and sending the read radio frequency information to an interface state detection device for the interface state detection device to detect at least one of the following items: the connection state of the network cable connector and the network interface, and the plugging and unplugging times of the network cable connector.
10. A method for preventing physical intrusion, comprising:
receiving detection result information sent by an interface state detection device; the detection result information is generated by detecting radio frequency information sent by a plurality of radio frequency identification reading devices by the interface state detection device, and the radio frequency information is obtained by reading radio frequency identification chips configured in network cable joints connected with the network interfaces by the radio frequency identification reading devices;
and executing security control according to the detection result information and a pre-configured security policy.
11. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in claim 10.
12. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method of claim 10.
CN201810613905.4A 2018-06-14 2018-06-14 Network interface, interface device, network cable connector and physical intrusion prevention method Pending CN110611229A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810613905.4A CN110611229A (en) 2018-06-14 2018-06-14 Network interface, interface device, network cable connector and physical intrusion prevention method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810613905.4A CN110611229A (en) 2018-06-14 2018-06-14 Network interface, interface device, network cable connector and physical intrusion prevention method

Publications (1)

Publication Number Publication Date
CN110611229A true CN110611229A (en) 2019-12-24

Family

ID=68887621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810613905.4A Pending CN110611229A (en) 2018-06-14 2018-06-14 Network interface, interface device, network cable connector and physical intrusion prevention method

Country Status (1)

Country Link
CN (1) CN110611229A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277471A (en) * 2020-02-24 2020-06-12 大连理工大学 Quick detection device of no central network connection

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825333A (en) * 2004-09-01 2006-08-30 微软公司 Device service provider interface
CN101647293A (en) * 2006-11-29 2010-02-10 北卡罗来纳科姆斯科普公司 Telecommunications patching system that facilitates detection and identification of patch cords
CN102405476A (en) * 2009-04-22 2012-04-04 Adc有限公司 Method and arrangement for identifying at least one object
WO2014009489A2 (en) * 2012-07-11 2014-01-16 Tyco Electronics Uk Ltd. Rfid visual indicator in a physical layer management system
WO2014009464A1 (en) * 2012-07-11 2014-01-16 Tyco Electronics Raychem Bvba Rfid-powered reading of contact-based electronic storage device in a plm system
CN104322075A (en) * 2012-02-01 2015-01-28 康宁股份有限公司 Communications between multiple radio frequency identification (RFID) connected tags and one or more devices, and related systems and methods
CN105186608A (en) * 2015-09-02 2015-12-23 青岛特锐德电气股份有限公司 Identification device for electric automobile charging interfaces and charging device, system and method
CN105279125A (en) * 2014-06-20 2016-01-27 耐瑞唯信有限公司 Physical interface module
CN107534230A (en) * 2014-08-06 2018-01-02 莫列斯有限公司 Patch panel frame for circuit board module

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825333A (en) * 2004-09-01 2006-08-30 微软公司 Device service provider interface
CN101647293A (en) * 2006-11-29 2010-02-10 北卡罗来纳科姆斯科普公司 Telecommunications patching system that facilitates detection and identification of patch cords
CN102405476A (en) * 2009-04-22 2012-04-04 Adc有限公司 Method and arrangement for identifying at least one object
CN104322075A (en) * 2012-02-01 2015-01-28 康宁股份有限公司 Communications between multiple radio frequency identification (RFID) connected tags and one or more devices, and related systems and methods
WO2014009489A2 (en) * 2012-07-11 2014-01-16 Tyco Electronics Uk Ltd. Rfid visual indicator in a physical layer management system
WO2014009464A1 (en) * 2012-07-11 2014-01-16 Tyco Electronics Raychem Bvba Rfid-powered reading of contact-based electronic storage device in a plm system
CN105279125A (en) * 2014-06-20 2016-01-27 耐瑞唯信有限公司 Physical interface module
CN107534230A (en) * 2014-08-06 2018-01-02 莫列斯有限公司 Patch panel frame for circuit board module
CN105186608A (en) * 2015-09-02 2015-12-23 青岛特锐德电气股份有限公司 Identification device for electric automobile charging interfaces and charging device, system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277471A (en) * 2020-02-24 2020-06-12 大连理工大学 Quick detection device of no central network connection
CN111277471B (en) * 2020-02-24 2022-11-18 大连理工大学 Quick detection device of no central network connection

Similar Documents

Publication Publication Date Title
US9646156B2 (en) System and method for detecting OBD-II CAN BUS message attacks
US10356113B2 (en) Apparatus and method for detecting abnormal behavior
CN111274583A (en) Big data computer network safety protection device and control method thereof
CN105718825B (en) Malicious USB device detection method and device
US20180183816A1 (en) Relay apparatus, network monitoring system, and program
EP3547190A1 (en) Attack detection device, attack detection method, and attack detection program
CN103905415A (en) Method and system for preventing remote control type Trojan viruses
CN111556473A (en) Abnormal access behavior detection method and device
US9222964B2 (en) Cable detection in a pin constrained connector
US20170142155A1 (en) Advanced Local-Network Threat Response
US9654491B2 (en) Network filtering apparatus and filtering method
US9444845B2 (en) Network security apparatus and method
EP3116147B1 (en) Hotknot-based proximity detection method and device, and touch screen terminal
US10999738B2 (en) Detection of internet-of-things devices in enterprise networks
CN110611229A (en) Network interface, interface device, network cable connector and physical intrusion prevention method
CN113807228A (en) Parking event prompting method and device, electronic equipment and storage medium
KR101927100B1 (en) Method for analyzing risk element of network packet based on recruuent neural network and apparatus analyzing the same
US10205738B2 (en) Advanced persistent threat mitigation
CN105049273A (en) Method and system for detecting Trojan virus by simulating network activities
CN110610107A (en) Network interface, interface device, physical intrusion prevention method, device and storage medium
CN115174189A (en) Abnormality detection method, abnormality detection device, electronic apparatus, and storage medium
CN113708852B (en) Antenna in-situ detection method and device
KR20180059611A (en) Wire and wireless gateway for detecting malignant action autonomously based on signature and method thereof
US10185452B2 (en) Touch sensitive controlling method, touch sensitive processing system and electronic device
US20100158007A1 (en) Method and apparatus for aggregating single packets in a single session

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191224

WD01 Invention patent application deemed withdrawn after publication