CN112532645A - Internet of things equipment operation data monitoring method and system and electronic equipment - Google Patents

Internet of things equipment operation data monitoring method and system and electronic equipment Download PDF

Info

Publication number
CN112532645A
CN112532645A CN202011429926.4A CN202011429926A CN112532645A CN 112532645 A CN112532645 A CN 112532645A CN 202011429926 A CN202011429926 A CN 202011429926A CN 112532645 A CN112532645 A CN 112532645A
Authority
CN
China
Prior art keywords
data
list
information
verification
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011429926.4A
Other languages
Chinese (zh)
Inventor
阳涉
周婵贞
李振刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011429926.4A priority Critical patent/CN112532645A/en
Publication of CN112532645A publication Critical patent/CN112532645A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a method and a system for monitoring operation data of Internet of things equipment and electronic equipment, wherein information verification is carried out on real-time monitoring data according to a verification code in the real-time monitoring data to obtain a verification information list; mapping data information in a verification information list to a prestored information verification list, and if a mapping point exists, obtaining legal data to be accessed corresponding to the information verification list; the method comprises the steps of dividing security levels of legal data to be accessed to obtain a security list to be processed; performing data priority division on pre-stored data to obtain a data priority list; performing difference value calculation on the security list to be processed and the data priority list to obtain a difference value distribution queue; and identifying the first information without the difference, verifying the first information without the difference to obtain a target verification result, and if the first information is similar to the target verification result, normally operating the Internet of things equipment. Therefore, the safety of real-time monitoring data can be reliably guaranteed, and the data can not be leaked in the transmission process.

Description

Internet of things equipment operation data monitoring method and system and electronic equipment
Technical Field
The disclosure relates to the technical field of data monitoring, and in particular relates to a method and a system for monitoring operation data of internet of things equipment and electronic equipment.
Background
With the continuous development of science and technology, the information of the internet rapidly enters the life of people, and the living standard of people is continuously improved.
The Internet of things mainly solves the problem of interconnection between articles and between people and articles. However, unlike the conventional internet, H2T (http header) refers to a connection between a person and an item using a general-purpose device, thereby making the connection of the item more simplified, and H2H (Head to Head) refers to an interconnection between persons that is made without depending on a pc (personal computer). Because the internet does not take into account the problem of connecting to any item, i use the internet of things to solve this problem in the traditional sense.
But the problem that comes with is that the data information in the thing networking is easily stolen, thereby leads to the leakage of data information. Therefore, the security of the internet of things is a huge problem faced at present.
Disclosure of Invention
In order to solve the technical problems existing in the background technology in the related art, the invention provides a method and a system for monitoring operation data of equipment of the internet of things and electronic equipment.
An Internet of things equipment operation data monitoring method comprises the following steps:
the electronic equipment acquires real-time monitoring data sent by the data acquisition equipment; the electronic equipment carries out information verification on the real-time monitoring data according to the verification codes in the real-time monitoring data to obtain a verification information list;
the electronic equipment maps the data information in the verification information list to a prestored information verification list, judges whether the prestored information verification list has a mapping point corresponding to the data information in the verification information list, and if the prestored information verification list has the mapping point, obtains legal data to be accessed corresponding to the information verification list;
the electronic equipment divides the security level of the legal data to be accessed to obtain a corresponding security list to be processed of the legal data to be accessed; the electronic equipment performs data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
the electronic equipment carries out difference value calculation on the to-be-processed safety list and the data priority list to obtain a difference value distribution queue corresponding to the to-be-processed safety list and the data priority list;
the electronic equipment identifies the first information without the difference value in the difference value distribution queue, and deletes the second information with the difference value;
the electronic equipment checks the first information without the difference to obtain a target check result, the electronic equipment judges the similarity of a pre-stored check result and the target check result, and if the pre-stored check result is similar to the target check result, the electronic equipment judges that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
Optionally, the electronic device performs information verification on the real-time monitoring data according to the verification code in the real-time monitoring data to obtain a verification information list, and the specific steps of:
the electronic equipment acquires a preset serial number in a preset database, and the electronic equipment sorts the preset serial number to obtain a serial number queue corresponding to the preset serial number;
the electronic equipment acquires a first range interval of a target sequence point in the sequence number queue;
the electronic equipment forms a sequence matrix according to the first range interval and the target sequence points, and maps the real-time monitoring data into the sequence matrix to obtain data sequence points corresponding to the real-time monitoring data;
the electronic equipment marks the specific position of the data sequence point to obtain a second range interval corresponding to the target sequence point;
the electronic equipment projects the second range interval onto the first range interval to obtain a projection range interval;
the electronic equipment performs feature extraction on the projection range interval to obtain verification information corresponding to the projection range interval;
and the electronic equipment integrates the verification information to obtain a verification information list corresponding to the verification information.
Optionally, the specific step of determining whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list includes:
the electronic equipment extracts pre-stored verification data in a preset database, and performs feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; the electronic equipment performs matrix affine on the pre-stored characteristic vector to obtain a pre-stored information verification list corresponding to the pre-stored characteristic vector;
the electronic equipment carries out weight calculation on the verification information list to obtain the data weight corresponding to the verification information list;
the electronic equipment maps the data weight corresponding to the verification information list into a prestored information verification list, judges whether the prestored information verification list has the mapping point corresponding to the data information in the verification information list, and if the prestored information verification list has the mapping point corresponding to the data information in the verification information list, obtains legal data to be accessed corresponding to the information verification list according to the mapping point;
if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
Optionally, the specific step of the electronic device performing security level classification on the legal data to be accessed to obtain a to-be-processed security list corresponding to the legal data to be accessed includes:
the electronic equipment extracts a security level distribution map in a preset database, and identifies the legal data to be accessed by the electronic equipment to obtain a security identification code corresponding to the legal data to be accessed;
the electronic equipment maps the safety identification code to the safety level distribution map to obtain corresponding position information of the safety identification code in the safety level distribution map;
the electronic equipment calculates the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value;
and the electronic equipment performs security level arrangement based on the security threshold value to obtain a to-be-processed security list corresponding to the security threshold value.
Optionally, the electronic device performs data priority division on pre-stored data in parallel, and the specific step of obtaining a data priority list corresponding to the pre-stored data includes:
the electronic equipment extracts a plurality of identifiable data codes and identifiable areas of each data code from obtained pre-stored data;
screening a plurality of code bytes similar to a data contract from the plurality of identifiable data codes and obtaining a plurality of weighting coefficients, the data contract being a transmission protocol in a first access channel of a plurality of network protocols, the network protocols including: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols;
performing data priority division on identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation;
and performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
Optionally, the specific step of the electronic device performing difference calculation on the to-be-processed security list and the data priority list to obtain a difference distribution queue corresponding to the to-be-processed security list and the data priority list includes:
the method comprises the steps that an electronic device obtains a first serial number code in a safety list to be processed, when the first serial number code is obtained, the electronic device conducts feature extraction on original data in parallel to obtain first feature vector information corresponding to the original data, and the electronic device conducts binarization processing on the basis of the first serial number code and the first feature vector information to obtain a corresponding binarization dividing point to be processed;
the electronic equipment acquires a second serial number code in a data priority list, and performs interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code; the electronic equipment divides the binaryzation division point to be processed and the safety interval range in the same range to obtain the binaryzation division point to be processed and the identification interval range corresponding to the safety interval range, and the electronic equipment calculates the difference value of the identification interval range to obtain a corresponding difference value distribution queue.
Optionally, the specific step of the electronic device identifying the first information in which the difference does not exist in the difference distribution queue includes:
the electronic equipment obtains corresponding data output quantity according to the interference weight extracted based on the total amount of the historical data and the single data quantity in the difference value distribution queue;
and the electronic equipment identifies the data output quantity to obtain first information after identification corresponding to the data output quantity.
An internet of things equipment operation data monitoring system, the system comprising: data acquisition equipment and electronic equipment, electronic equipment with data acquisition equipment intercommunication, electronic equipment specifically is used for:
acquiring real-time monitoring data sent by data acquisition equipment; performing information verification on the real-time monitoring data according to a verification code in the real-time monitoring data to obtain a verification information list;
mapping the data information in the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list, and if the mapping point exists in the pre-stored information verification list, obtaining legal data to be accessed corresponding to the information verification list;
the security level of the legal data to be accessed is divided to obtain a corresponding security list to be processed of the legal data to be accessed; carrying out data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
performing difference value calculation on the to-be-processed safety list and the data priority list to obtain a difference value distribution queue corresponding to the to-be-processed safety list and the data priority list;
identifying the first information without the difference in the difference distribution queue, and deleting the second information with the difference;
checking the first information without the difference to obtain a target checking result, judging the similarity of a pre-stored checking result and the target checking result, and if the pre-stored checking result is similar to the target checking result, judging that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
Optionally, the electronic device is specifically configured to:
acquiring a preset serial number in a preset database, and sequencing the preset serial number to obtain a serial number queue corresponding to the preset serial number;
acquiring a first range interval of a target sequence point in the sequence number queue;
forming a sequence matrix according to the first range interval and the target sequence points, and mapping the real-time monitoring data into the sequence matrix to obtain data sequence points corresponding to the real-time monitoring data;
marking the specific position of the data sequence point to obtain a second range interval corresponding to the target sequence point;
projecting the second range interval onto the first range interval to obtain a projection range interval;
extracting features of the projection range interval to obtain verification information corresponding to the projection range interval;
and integrating the verification information to obtain a verification information list corresponding to the verification information.
Optionally, the electronic device is specifically configured to:
extracting pre-stored verification data in a preset database, and performing feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; performing matrix affine on the pre-stored eigenvector to obtain a pre-stored information verification list corresponding to the pre-stored eigenvector;
carrying out weight calculation on the verification information list to obtain the data weight corresponding to the verification information list;
mapping the data weight corresponding to the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, and if the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, obtaining legal data to be accessed corresponding to the information verification list according to the mapping point;
if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
Optionally, the electronic device is specifically configured to:
extracting a security level distribution map in a preset database, and identifying the legal data to be accessed to obtain a security identification code corresponding to the legal data to be accessed;
mapping the safety identification code to the safety level distribution map to obtain corresponding position information of the safety identification code in the safety level distribution map;
calculating the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value;
and performing security level arrangement based on the security threshold to obtain a to-be-processed security list corresponding to the security threshold.
Optionally, the electronic device is specifically configured to:
extracting a plurality of identifiable data codes and an identifiable region of each data code from the obtained pre-stored data;
screening a plurality of code bytes similar to a data contract from the plurality of identifiable data codes and obtaining a plurality of weighting coefficients, the data contract being a transmission protocol in a first access channel of a plurality of network protocols, the network protocols including: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols;
performing data priority division on identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation;
and performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
Optionally, the electronic device is specifically configured to:
acquiring a first serial number code in a safety list to be processed, extracting features of original data in parallel when the first serial number code is acquired to acquire first feature vector information corresponding to the original data, and performing binarization processing based on the first serial number code and the first feature vector information to acquire a corresponding binarization dividing point to be processed;
acquiring a second serial number code in a data priority list, and performing interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code;
and carrying out division in the same range on the binary division point to be processed and the safety interval range to obtain an identification interval range corresponding to the binary division point to be processed and the safety interval range, and carrying out difference value calculation on the identification interval range to obtain a corresponding difference value distribution queue.
Optionally, the electronic device is specifically configured to:
obtaining corresponding data output quantity according to the total quantity of the historical data in the difference distribution queue and the interference weight extracted by the single data quantity;
and identifying the data output quantity to obtain identified first information corresponding to the data output quantity.
An electronic device comprising a processor and a memory connected to each other by a communication bus, said processor implementing the above method by running a computer program retrieved from said memory.
A computer-readable storage medium, on which a computer program is stored which, when executed, implements the above-described method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects.
A method, a system and an electronic device for monitoring operation data of Internet of things equipment are disclosed, wherein information verification is carried out on real-time monitoring data according to verification codes in the real-time monitoring data to obtain a verification information list; mapping data information in a verification information list to a prestored information verification list, and if a mapping point exists, obtaining legal data to be accessed corresponding to the information verification list; the method comprises the steps of dividing security levels of legal data to be accessed to obtain a security list to be processed; performing data priority division on pre-stored data to obtain a data priority list; performing difference value calculation on the security list to be processed and the data priority list to obtain a difference value distribution queue; and identifying the first information without the difference, verifying the first information without the difference to obtain a target verification result, and if the first information is similar to the target verification result, judging that the equipment of the Internet of things normally operates. Therefore, the safety of real-time monitoring data can be reliably guaranteed, and the data can not be leaked in the transmission process.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic structural diagram of an internet of things device operation data monitoring system according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for monitoring operation data of an internet of things device according to an embodiment of the present invention;
fig. 3 is a functional block diagram of an internet of things device operation data monitoring device according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
In order to solve the above problems in the prior art, embodiments of the present invention provide a method and a system for monitoring operation data of an internet of things device, and an electronic device, which can accurately and reliably detect real-time monitoring data, so that the internet of things device corresponding to the real-time monitoring data operates normally without data leakage, and the security of data transmission is ensured.
In order to describe the method, the apparatus, and the electronic device for monitoring the operation data of the internet of things device, please refer to fig. 1, which is a schematic view of a communication architecture of an internet of things device operation data monitoring system 100 disclosed in the embodiment of the present invention. The internet of things device operation data monitoring system 100 may include an electronic device 300 and a data acquisition device 200, where the electronic device 300 is in communication connection with the data acquisition device 200.
In a specific embodiment, the electronic device 300 may be a desktop computer, a tablet computer, a notebook computer, a mobile phone, or other electronic devices capable of implementing data processing and data communication, which is not limited herein.
On the basis, please refer to fig. 2 in combination, which is a schematic flow chart of the method for monitoring the operation data of the internet of things device according to the embodiment of the present invention, the method for monitoring the operation data of the internet of things device may be applied to the electronic device 300 in fig. 1, and further the method for monitoring the operation data of the internet of things device may specifically include the contents described in the following steps S21 to S26.
Step S21, the electronic equipment obtains real-time monitoring data sent by the data acquisition equipment; and the electronic equipment carries out information verification on the real-time monitoring data according to the verification code in the real-time monitoring data to obtain a verification information list.
In this embodiment, the electronic device verifies the real-time monitoring data, so that the real-time monitoring data is more reliable.
Step S22, the electronic device maps the data information in the verification information list to a pre-stored information verification list, determines whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list, and if the pre-stored information verification list has the mapping point, obtains the legal data to be accessed corresponding to the information verification list.
In this embodiment, the data to be legally accessed is used for representing a security indicator in the data to electronic equipment.
Step S23, the electronic device divides the security level of the legal data to be accessed to obtain a corresponding security list to be processed of the legal data to be accessed; the electronic equipment performs data priority division on the pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data.
In this embodiment, the to-be-processed safety list is used to represent the safety list of the real-time monitoring data, and the data priority list is used to represent a data safety level ranking in a pre-stored database.
Step S24, the electronic device performs difference calculation on the to-be-processed security list and the data priority list to obtain a difference distribution queue corresponding to the to-be-processed security list and the data priority list.
In this embodiment, the difference distribution queue is used to represent the index value of the security level of the real-time monitoring data.
Step S25, the electronic device identifies the first information in the difference distribution queue where there is no difference, and the electronic device deletes the second information where there is a difference.
Step S26, the electronic device checks the first information without the difference to obtain a target check result, the electronic device judges the similarity of a pre-stored check result and the target check result, and if the pre-stored check result is similar to the target check result, the normal operation of the Internet of things device corresponding to the real-time monitoring data is judged; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
In this embodiment, the target verification result is used to represent whether the internet of things device corresponding to the real-time monitoring data can safely operate.
When the contents described in the above steps S21-S26 are executed, the following advantageous technical effects can be achieved: the method for monitoring the running data of the equipment of the Internet of things comprises the steps of carrying out information verification on real-time monitoring data according to verification codes in the real-time monitoring data to obtain a verification information list; mapping data information in a verification information list to a prestored information verification list, and if a mapping point exists, obtaining legal data to be accessed corresponding to the information verification list; the method comprises the steps of dividing security levels of legal data to be accessed to obtain a security list to be processed; performing data priority division on pre-stored data to obtain a data priority list; performing difference value calculation on the security list to be processed and the data priority list to obtain a difference value distribution queue; and identifying the first information without the difference, verifying the first information without the difference to obtain a target verification result, and if the first information is similar to the target verification result, judging that the equipment of the Internet of things normally operates. Therefore, the safety of real-time monitoring data can be reliably guaranteed, and the data can not be leaked in the transmission process.
In a specific embodiment, when the electronic device receives the real-time monitoring data, there may be a problem that the reliability of the real-time monitoring data is not high enough, and the step of the electronic device performing information verification on the real-time monitoring data according to the verification code in the real-time monitoring data to obtain the verification information list described in step S21 may specifically include the following steps S211 to S215.
Step S211, the electronic equipment obtains a preset serial number in a preset database, and the electronic equipment sorts the preset serial number to obtain a serial number queue corresponding to the preset serial number.
In step S212, the electronic device obtains a first range interval of the target sequence point in the sequence number queue.
Step S213, the electronic device forms a sequence matrix according to the first range interval and the target sequence point, and maps the real-time monitoring data to the sequence matrix to obtain a data sequence point corresponding to the real-time monitoring data.
And step S214, the electronic equipment marks the specific positions of the data sequence points to obtain second range intervals corresponding to the target sequence points.
Step S215, the electronic device performs feature extraction on the projection range interval to obtain verification information corresponding to the projection range interval.
It can be understood that, through the steps S211 to S215, the reliability of the real-time monitoring data received by the electronic device is higher.
In a specific implementation process, when determining whether the mapping point corresponding to the data information in the verification information list exists in the pre-stored information verification list, there may be a problem that the verification information list is inaccurate and the corresponding mapping point is difficult to obtain, and the step of determining whether the mapping point corresponding to the data information in the verification information list exists in the pre-stored information verification list described in step S22 may specifically include the contents described in step 221 to step 224.
Step 221, the electronic equipment extracts pre-stored verification data in a preset database, and performs feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; and the electronic equipment performs matrix affine on the pre-stored characteristic vector to obtain a pre-stored information verification list corresponding to the pre-stored characteristic vector.
Step 222, the electronic device performs weight calculation on the verification information list to obtain a data weight corresponding to the verification information list.
Step 223, the electronic device maps the data weight corresponding to the verification information list to the pre-stored information verification list, determines whether the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, and if the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, obtains the legal data to be accessed corresponding to the information verification list according to the mapping point.
Step 224, if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
It can be understood that, through the above steps 221 to 224, when determining whether the mapping point corresponding to the data information in the verification information list exists in the pre-stored information verification list, the verification information list is more accurate, and the accuracy of the corresponding mapping point is ensured.
In a specific implementation process, when the electronic device divides the security level of the legal data to be accessed, the legal data to be accessed may not be accurate enough, so that the problem that the security level cannot be accurately divided is solved, in step S23, the step of dividing the security level of the legal data to be accessed based on the electronic device to obtain a corresponding to-be-processed security list of the legal data to be accessed may specifically include the contents described in steps 231 to 234.
And 231, the electronic equipment extracts the security level distribution map in the preset database, and the electronic equipment identifies the legal data to be accessed to obtain the security identification code corresponding to the legal data to be accessed.
Step 232, the electronic device maps the security identification code to the security level distribution map to obtain corresponding position information of the security identification code in the security level distribution map.
And 233, the electronic equipment calculates the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value.
And 234, the electronic equipment performs security level arrangement based on the security threshold to obtain a to-be-processed security list corresponding to the security threshold.
It can be understood that through the steps 231 to 234, when the electronic device performs the security level classification on the legal data to be accessed, the legal data to be accessed can be more accurate, so that the security level classification is performed to obtain more accurate legal data to be accessed into the corresponding to-be-processed security list.
In a specific implementation process, when the data processing terminal performs data priority division on the pre-stored data in parallel, the step S23 may be to obtain the data priority list corresponding to the pre-stored data based on a problem that it is difficult to obtain the data priority list corresponding to the pre-stored data due to insufficient accuracy of data in the pre-stored data when the data processing terminal performs data priority division on the pre-stored data in parallel, and may specifically include the contents described in steps a to d.
Step a, the electronic equipment extracts a plurality of identifiable data codes and identifiable areas of each data code from the obtained pre-stored data.
B, screening a plurality of code bytes similar to a data convention from the plurality of identifiable data codes, and obtaining a plurality of weighting coefficients, wherein the data convention is a transmission protocol in a first access channel in a plurality of network protocols, and the network protocols comprise: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols.
And c, carrying out data priority division on the identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation.
And d, performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
It can be understood that, through the above steps a to d, when the data processing terminal performs data priority division on the pre-stored data in parallel, the data processing terminal identifies the pre-stored data more accurately, so as to obtain a more accurate data priority list corresponding to the pre-stored data.
In a specific implementation process, when the electronic device performs difference calculation on the to-be-processed security list and the data priority list, there may be an error between the to-be-processed security list and the data priority list, so as to cause a problem that a difference distribution queue corresponding to the to-be-processed security list and the data priority list is inaccurate, in step S24, the step of performing difference calculation on the to-be-processed security list and the data priority list based on the electronic device to obtain a difference distribution queue corresponding to the to-be-processed security list and the data priority list may specifically include the contents described in step 241 to step 243.
241, the electronic device obtains a first serial number code in a to-be-processed security list, when the first serial number code is obtained, the electronic device performs feature extraction on original data in parallel to obtain first feature vector information corresponding to the original data, and the electronic device performs binarization processing based on the first serial number code and the first feature vector information to obtain a corresponding to-be-processed binarization division point.
And 242, the electronic device acquires a second serial number code in the data priority list, and performs interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code.
And 243, the electronic device divides the to-be-processed binarization partition point and the safety interval range in the same range to obtain an identification interval range corresponding to the to-be-processed binarization partition point and the safety interval range, and the electronic device calculates a difference value of the identification interval range to obtain a corresponding difference value distribution queue.
It can be understood that through the above steps 241 to 243, when the electronic device performs difference calculation on the to-be-processed security list and the data priority list, the to-be-processed security list and the data priority list can be accurately obtained, so that the difference distribution queue corresponding to the to-be-processed security list and the data priority list is more accurate.
In a specific implementation process, when the electronic device identifies the first information without the difference in the difference distribution queue, it is determined that there is an identification error, so that the identified first information is not high in reliability, and the step S25 is a step of identifying, based on the electronic device, the first information without the difference in the difference distribution queue, which may specifically include the contents described in the step 251 and the step 252.
And 251, obtaining corresponding data output quantity by the electronic equipment according to the interference weight extracted based on the total historical data quantity and the single data quantity in the difference distribution queue.
Step 252, the electronic device identifies the data output quantity to obtain identified first information corresponding to the data output quantity.
It can be understood that, through the above steps 251 and 252, when the electronic device identifies the first information in the difference distribution queue, the first information that has no difference can be identified more accurately, so as to increase reliability of the identified first information.
In an alternative method, the inventor finds that in step S26, when the electronic device verifies the first information without the difference, a problem may occur that the verification is not accurate, so that an accurate target verification result is difficult to obtain, and the method using the verification may specifically include the following contents described in step S261 to step S264.
The electronic equipment checks the first information without the difference to obtain a target check result, the electronic equipment judges the similarity of a pre-stored check result and the target check result, and if the pre-stored check result is similar to the target check result, the electronic equipment judges that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
Step S261, the electronic device extracts an information distribution track in the first information without the difference, and the electronic device performs feature extraction on the information distribution track to obtain a track feature set corresponding to the information distribution track;
step S262, the electronic equipment acquires a target track set prestored in a preset database, and the electronic equipment performs feature extraction on the target track distribution to obtain a target track set corresponding to the target track distribution;
step S263, the electronic device extracts at least one to-be-processed position in the trajectory feature set, and the electronic device extracts at least one target position in the target trajectory set;
step S264, the electronic device determines whether there is a common location between the at least one to-be-processed location and the at least one target location, and if there is a common location, obtains a target verification result corresponding to the at least one to-be-processed location and the at least one target location.
It can be understood that through the steps S261 to S264, when the electronic device verifies the first information without the difference, the verification is prevented from being inaccurate, so that an accurate target verification result can be obtained.
Based on the same inventive concept, the invention also provides an internet of things equipment operation data monitoring system, which comprises: electronic equipment and data acquisition equipment, electronic equipment with data acquisition equipment communication connection, electronic equipment specifically is used for:
acquiring real-time monitoring data sent by data acquisition equipment; performing information verification on the real-time monitoring data according to a verification code in the real-time monitoring data to obtain a verification information list;
mapping the data information in the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list, and if the mapping point exists in the pre-stored information verification list, obtaining legal data to be accessed corresponding to the information verification list;
the security level of the legal data to be accessed is divided to obtain a corresponding security list to be processed of the legal data to be accessed; carrying out data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
performing difference value calculation on the to-be-processed safety list and the data priority list to obtain a difference value distribution queue corresponding to the to-be-processed safety list and the data priority list;
identifying the first information without the difference in the difference distribution queue, and deleting the second information with the difference;
checking the first information without the difference to obtain a target checking result, judging the similarity of a pre-stored checking result and the target checking result, and if the pre-stored checking result is similar to the target checking result, judging that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
Further, the electronic device is specifically configured to:
acquiring a preset serial number in a preset database, and sequencing the preset serial number to obtain a serial number queue corresponding to the preset serial number;
acquiring a first range interval of a target sequence point in the sequence number queue;
forming a sequence matrix according to the first range interval and the target sequence points, and mapping the real-time monitoring data into the sequence matrix to obtain data sequence points corresponding to the real-time monitoring data;
marking the specific position of the data sequence point to obtain a second range interval corresponding to the target sequence point;
projecting the second range interval onto the first range interval to obtain a projection range interval;
extracting features of the projection range interval to obtain verification information corresponding to the projection range interval;
and integrating the verification information to obtain a verification information list corresponding to the verification information.
Further, the electronic device is specifically configured to:
extracting pre-stored verification data in a preset database, and performing feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; performing matrix affine on the pre-stored eigenvector to obtain a pre-stored information verification list corresponding to the pre-stored eigenvector;
carrying out weight calculation on the verification information list to obtain the data weight corresponding to the verification information list;
mapping the data weight corresponding to the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, and if the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, obtaining legal data to be accessed corresponding to the information verification list according to the mapping point;
if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
Further, the electronic device is specifically configured to:
extracting a security level distribution map in a preset database, and identifying the legal data to be accessed to obtain a security identification code corresponding to the legal data to be accessed;
mapping the safety identification code to the safety level distribution map to obtain corresponding position information of the safety identification code in the safety level distribution map;
calculating the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value;
and performing security level arrangement based on the security threshold to obtain a to-be-processed security list corresponding to the security threshold.
Further, the electronic device is specifically configured to:
extracting a plurality of identifiable data codes and an identifiable region of each data code from the obtained pre-stored data;
screening a plurality of code bytes similar to a data contract from the plurality of identifiable data codes and obtaining a plurality of weighting coefficients, the data contract being a transmission protocol in a first access channel of a plurality of network protocols, the network protocols including: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols;
performing data priority division on identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation;
and performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
Further, the electronic device is specifically configured to:
acquiring a first serial number code in a safety list to be processed, extracting features of original data in parallel when the first serial number code is acquired to acquire first feature vector information corresponding to the original data, and performing binarization processing based on the first serial number code and the first feature vector information to acquire a corresponding binarization dividing point to be processed;
acquiring a second serial number code in a data priority list, and performing interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code;
and carrying out division in the same range on the binary division point to be processed and the safety interval range to obtain an identification interval range corresponding to the binary division point to be processed and the safety interval range, and carrying out difference value calculation on the identification interval range to obtain a corresponding difference value distribution queue.
Further, the electronic device is specifically configured to:
obtaining corresponding data output quantity according to the total quantity of the historical data in the difference distribution queue and the interference weight extracted by the single data quantity;
and identifying the data output quantity to obtain identified first information corresponding to the data output quantity.
Based on the same inventive concept, please refer to fig. 3, which also provides a functional block diagram of the device 500 for monitoring the operation data of the internet of things, and the detailed description of the device 500 for monitoring the operation data of the internet of things is as follows.
An internet of things equipment operation data monitoring device 500 is applied to electronic equipment, the device 500 includes:
the data acquisition module 510, the electronic device obtains real-time monitoring data sent by the data acquisition device; the electronic equipment carries out information verification on the real-time monitoring data according to the verification codes in the real-time monitoring data to obtain a verification information list;
the information verification determining module 520, the electronic device maps the data information in the verification information list to a pre-stored information verification list, determines whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list, and if the mapping point exists in the pre-stored information verification list, obtains the legal data to be accessed corresponding to the information verification list;
the ranking module 530, which is used for the electronic device to perform security ranking on the legal data to be accessed to obtain a security list to be processed corresponding to the legal data to be accessed; the electronic equipment performs data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
a difference value calculation module 540, configured to perform difference value calculation on the to-be-processed security list and the data priority list by the electronic device, so as to obtain a difference value distribution queue corresponding to the to-be-processed security list and the data priority list;
the data identification module 550 identifies, by the electronic device, the first information in the difference distribution queue where the difference does not exist, and deletes, by the electronic device, the second information where the difference exists;
the checking and judging module 560 is used for checking the first information without the difference value by the electronic device to obtain a target checking result, judging the similarity between a pre-stored checking result and the target checking result by the electronic device, and judging that the internet of things device corresponding to the real-time monitoring data operates normally if the pre-stored checking result is similar to the target checking result; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
On the basis of the above, please refer to fig. 4, which shows an electronic device 300, comprising a processor 310 and a memory 320 connected to each other via a communication bus 330, wherein the processor 310 executes a computer program retrieved from the memory 320 to implement the above method.
Further, a computer-readable storage medium is provided, on which a computer program is stored, which computer program realizes the above-mentioned method when executed.
In summary, according to the method, the system and the electronic device for monitoring the operation data of the internet of things device provided by the embodiment of the invention, the information of the real-time monitoring data is verified according to the verification code in the real-time monitoring data, so that a verification information list is obtained; mapping data information in a verification information list to a prestored information verification list, and if a mapping point exists, obtaining legal data to be accessed corresponding to the information verification list; the method comprises the steps of dividing security levels of legal data to be accessed to obtain a security list to be processed; performing data priority division on pre-stored data to obtain a data priority list; performing difference value calculation on the security list to be processed and the data priority list to obtain a difference value distribution queue; and identifying the first information without the difference, verifying the first information without the difference to obtain a target verification result, and if the first information is similar to the target verification result, judging that the equipment of the Internet of things normally operates. Therefore, the safety of real-time monitoring data can be reliably guaranteed, and the data can not be leaked in the transmission process.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. An Internet of things equipment operation data monitoring method is characterized by comprising the following steps:
the electronic equipment acquires real-time monitoring data sent by the data acquisition equipment; the electronic equipment carries out information verification on the real-time monitoring data according to the verification codes in the real-time monitoring data to obtain a verification information list;
the electronic equipment maps the data information in the verification information list to a prestored information verification list, judges whether the prestored information verification list has a mapping point corresponding to the data information in the verification information list, and if the prestored information verification list has the mapping point, obtains legal data to be accessed corresponding to the information verification list;
the electronic equipment divides the security level of the legal data to be accessed to obtain a corresponding security list to be processed of the legal data to be accessed; the electronic equipment performs data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
the electronic equipment carries out difference value calculation on the to-be-processed safety list and the data priority list to obtain a difference value distribution queue corresponding to the to-be-processed safety list and the data priority list;
the electronic equipment identifies the first information without the difference value in the difference value distribution queue, and deletes the second information with the difference value;
the electronic equipment checks the first information without the difference to obtain a target check result, the electronic equipment judges the similarity of a pre-stored check result and the target check result, and if the pre-stored check result is similar to the target check result, the electronic equipment judges that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
2. The method for monitoring the operation data of the equipment of the Internet of things according to claim 1,
the electronic equipment carries out information verification on the real-time monitoring data according to the verification code in the real-time monitoring data to obtain a verification information list, and the specific steps comprise:
the electronic equipment acquires a preset serial number in a preset database, and the electronic equipment sorts the preset serial number to obtain a serial number queue corresponding to the preset serial number;
the electronic equipment acquires a first range interval of a target sequence point in the sequence number queue;
the electronic equipment forms a sequence matrix according to the first range interval and the target sequence points, and maps the real-time monitoring data into the sequence matrix to obtain data sequence points corresponding to the real-time monitoring data;
the electronic equipment marks the specific position of the data sequence point to obtain a second range interval corresponding to the target sequence point;
the electronic equipment projects the second range interval onto the first range interval to obtain a projection range interval;
the electronic equipment performs feature extraction on the projection range interval to obtain verification information corresponding to the projection range interval;
the electronic equipment integrates the verification information to obtain a verification information list corresponding to the verification information;
the specific step of judging whether the pre-stored information verification list has mapping points corresponding to the data information in the verification information list comprises the following steps:
the electronic equipment extracts pre-stored verification data in a preset database, and performs feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; the electronic equipment performs matrix affine on the pre-stored characteristic vector to obtain a pre-stored information verification list corresponding to the pre-stored characteristic vector;
the electronic equipment carries out weight calculation on the verification information list to obtain the data weight corresponding to the verification information list;
the electronic equipment maps the data weight corresponding to the verification information list into a prestored information verification list, judges whether the prestored information verification list has the mapping point corresponding to the data information in the verification information list, and if the prestored information verification list has the mapping point corresponding to the data information in the verification information list, obtains legal data to be accessed corresponding to the information verification list according to the mapping point;
if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
3. The method for monitoring the operation data of the internet of things equipment according to claim 1, wherein the specific steps of the electronic equipment for classifying the security level of the legal data to be accessed and obtaining the corresponding security list to be processed of the legal data to be accessed comprise:
the electronic equipment extracts a security level distribution map in a preset database, and identifies the legal data to be accessed by the electronic equipment to obtain a security identification code corresponding to the legal data to be accessed;
the electronic equipment maps the safety identification code to the safety level distribution map to obtain corresponding position information of the safety identification code in the safety level distribution map;
the electronic equipment calculates the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value;
the electronic equipment performs security level arrangement based on the security threshold value to obtain a to-be-processed security list corresponding to the security threshold value;
the method comprises the following specific steps that the electronic equipment performs data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data, and comprises the following steps:
the electronic equipment extracts a plurality of identifiable data codes and identifiable areas of each data code from obtained pre-stored data;
screening a plurality of code bytes similar to a data contract from the plurality of identifiable data codes and obtaining a plurality of weighting coefficients, the data contract being a transmission protocol in a first access channel of a plurality of network protocols, the network protocols including: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols;
performing data priority division on identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation;
and performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
4. The method for monitoring the running data of the internet of things equipment according to claim 1, wherein the specific step of calculating the difference value between the to-be-processed safety list and the data priority list by the electronic equipment to obtain the difference value distribution queue corresponding to the to-be-processed safety list and the data priority list comprises the following steps:
the method comprises the steps that an electronic device obtains a first serial number code in a safety list to be processed, when the first serial number code is obtained, the electronic device conducts feature extraction on original data in parallel to obtain first feature vector information corresponding to the original data, and the electronic device conducts binarization processing on the basis of the first serial number code and the first feature vector information to obtain a corresponding binarization dividing point to be processed;
the electronic equipment acquires a second serial number code in a data priority list, and performs interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code; the electronic equipment divides the binaryzation division point to be processed and the safety interval range in the same range to obtain an identification interval range corresponding to the binaryzation division point to be processed and the safety interval range, and the electronic equipment calculates the difference value of the identification interval range to obtain a corresponding difference value distribution queue;
the specific step of the electronic device identifying the first information without the difference in the difference distribution queue includes:
the electronic equipment obtains corresponding data output quantity according to the interference weight extracted based on the total amount of the historical data and the single data quantity in the difference value distribution queue;
and the electronic equipment identifies the data output quantity to obtain first information after identification corresponding to the data output quantity.
5. An internet of things equipment operation data monitoring system, the system comprising: data acquisition equipment and electronic equipment, electronic equipment with data acquisition equipment intercommunication, electronic equipment specifically is used for:
acquiring real-time monitoring data sent by data acquisition equipment; performing information verification on the real-time monitoring data according to a verification code in the real-time monitoring data to obtain a verification information list;
mapping the data information in the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has a mapping point corresponding to the data information in the verification information list, and if the mapping point exists in the pre-stored information verification list, obtaining legal data to be accessed corresponding to the information verification list;
the security level of the legal data to be accessed is divided to obtain a corresponding security list to be processed of the legal data to be accessed; carrying out data priority division on pre-stored data in parallel to obtain a data priority list corresponding to the pre-stored data;
performing difference value calculation on the to-be-processed safety list and the data priority list to obtain a difference value distribution queue corresponding to the to-be-processed safety list and the data priority list;
identifying the first information without the difference in the difference distribution queue, and deleting the second information with the difference;
checking the first information without the difference to obtain a target checking result, judging the similarity of a pre-stored checking result and the target checking result, and if the pre-stored checking result is similar to the target checking result, judging that the Internet of things equipment corresponding to the real-time monitoring data normally operates; and if the pre-stored verification result is not similar to the target verification result, judging that the Internet of things equipment corresponding to the real-time monitoring data is abnormally operated.
6. The system of claim 5, wherein the electronic device is specifically configured to:
taking a preset serial number in a preset database, and sequencing the preset serial number to obtain a serial number queue corresponding to the preset serial number;
taking a first range interval of a target sequence point in the sequence number queue;
forming a sequence matrix according to the first range interval and the target sequence points, and mapping the real-time monitoring data into the sequence matrix to obtain data sequence points corresponding to the real-time monitoring data;
marking the specific position of the data sequence point to obtain a second range interval corresponding to the target sequence point;
projecting the second range interval onto the first range interval to obtain a projection range interval;
extracting features of the projection range interval to obtain verification information corresponding to the projection range interval;
integrating the verification information to obtain a verification information list corresponding to the verification information;
the electronic device is specifically configured to:
extracting pre-stored verification data in a preset database, and performing feature extraction on the pre-stored verification data to obtain a pre-stored feature vector; performing matrix affine on the pre-stored eigenvector to obtain a pre-stored information verification list corresponding to the pre-stored eigenvector;
carrying out weight calculation on the verification information list to obtain the data weight corresponding to the verification information list;
mapping the data weight corresponding to the verification information list to a pre-stored information verification list, judging whether the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, and if the pre-stored information verification list has the mapping point corresponding to the data information in the verification information list, obtaining legal data to be accessed corresponding to the information verification list according to the mapping point;
if the pre-stored information verification list does not have a mapping point corresponding to the data information in the verification information list; and refusing the legal access of the Internet of things equipment corresponding to the real-time monitoring data.
7. The system of claim 5, wherein the electronic device is specifically configured to:
extracting a security level distribution map in a preset database, and identifying the legal data to be accessed to obtain a security identification code corresponding to the legal data to be accessed;
mapping the safety identification code to the safety level distribution map to obtain corresponding position information of the safety identification code in the safety level distribution map;
calculating the safety value of the corresponding position information of the safety identification code in the safety level distribution map to obtain a corresponding safety threshold value;
performing security level arrangement based on the security threshold to obtain a to-be-processed security list corresponding to the security threshold;
the electronic device is specifically configured to:
extracting a plurality of identifiable data codes and an identifiable region of each data code from the obtained pre-stored data;
screening a plurality of code bytes similar to a data contract from the plurality of identifiable data codes and obtaining a plurality of weighting coefficients, the data contract being a transmission protocol in a first access channel of a plurality of network protocols, the network protocols including: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are historical protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols;
performing data priority division on identifiable weighted data in the weighting coefficients and the virtual channels to obtain a threshold value for safe operation;
and performing running data score processing based on the pre-stored data and the safe running threshold value to obtain a data priority list.
8. The system of claim 5, wherein the electronic device is specifically configured to:
taking a first serial number code in a safety list to be processed, extracting features of original data in parallel when the first serial number code is obtained, obtaining first feature vector information corresponding to the original data, and performing binarization processing based on the first serial number code and the first feature vector information to obtain a corresponding binarization division point to be processed;
acquiring a second serial number code in a data priority list, and performing interval range division on the second serial number code to obtain a safety interval range corresponding to the second serial number code;
dividing the binaryzation division point to be processed and the safety interval range in the same range to obtain an identification interval range corresponding to the binaryzation division point to be processed and the safety interval range, and performing difference value calculation on the identification interval range to obtain a corresponding difference value distribution queue;
the electronic device is specifically configured to:
obtaining corresponding data output quantity according to the total quantity of the historical data in the difference distribution queue and the interference weight extracted by the single data quantity;
and identifying the data output quantity to obtain identified first information corresponding to the data output quantity.
9. An electronic device, comprising a processor and a memory connected to each other by a communication bus, the processor implementing the method of any one of claims 1-4 by running a computer program retrieved from the memory.
10. A computer-readable storage medium, on which a computer program is stored which, when executed, implements the method of any of claims 1-4.
CN202011429926.4A 2020-12-09 2020-12-09 Internet of things equipment operation data monitoring method and system and electronic equipment Withdrawn CN112532645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011429926.4A CN112532645A (en) 2020-12-09 2020-12-09 Internet of things equipment operation data monitoring method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011429926.4A CN112532645A (en) 2020-12-09 2020-12-09 Internet of things equipment operation data monitoring method and system and electronic equipment

Publications (1)

Publication Number Publication Date
CN112532645A true CN112532645A (en) 2021-03-19

Family

ID=74998609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011429926.4A Withdrawn CN112532645A (en) 2020-12-09 2020-12-09 Internet of things equipment operation data monitoring method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN112532645A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115842686A (en) * 2023-02-21 2023-03-24 深圳桥通物联科技有限公司 Method and system for processing and verifying remote dynamic data
CN115877115A (en) * 2023-02-27 2023-03-31 山东欧通信息科技有限公司 Safety detection system for weak current equipment installation based on big data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115842686A (en) * 2023-02-21 2023-03-24 深圳桥通物联科技有限公司 Method and system for processing and verifying remote dynamic data
CN115842686B (en) * 2023-02-21 2023-05-12 深圳桥通物联科技有限公司 Processing and verifying method and system for remote dynamic data
CN115877115A (en) * 2023-02-27 2023-03-31 山东欧通信息科技有限公司 Safety detection system for weak current equipment installation based on big data
CN115877115B (en) * 2023-02-27 2023-06-06 山东欧通信息科技有限公司 Safety detection system for installation of weak current equipment based on big data

Similar Documents

Publication Publication Date Title
CN112417439B (en) Account detection method, device, server and storage medium
CN110019074B (en) Access path analysis method, device, equipment and medium
CN104866763A (en) Permission-based Android malicious software hybrid detection method
CN112733146B (en) Penetration testing method, device and equipment based on machine learning and storage medium
CN113312417B (en) Data processing method applied to big data and cloud computing and big data service platform
CN112532645A (en) Internet of things equipment operation data monitoring method and system and electronic equipment
CN111191201A (en) User identification method, device and equipment based on data buried points and storage medium
CN112492605A (en) Network security protection method and system for mobile base station of Internet of things
CN112839014A (en) Method, system, device and medium for establishing model for identifying abnormal visitor
WO2017054307A1 (en) Recognition method and apparatus for user information
CN114297735A (en) Data processing method and related device
CN116821777B (en) Novel basic mapping data integration method and system
CN113239333A (en) Browser user identity authentication method and system based on cross-domain resource access
CN112434651A (en) Information analysis method and device based on image recognition and computer equipment
EP4254241A1 (en) Method and device for image-based malware detection, and artificial intelligence-based endpoint detection and response system using same
CN114363082B (en) Network attack detection method, device, equipment and computer readable storage medium
CN115484044A (en) Data state monitoring method and system
CN115205747A (en) Automatic road detection system based on image recognition
CN111209567B (en) Method and device for judging perceptibility of improving robustness of detection model
CN112434656A (en) Image identification method and device of Internet of things equipment and computer equipment
CN112559589A (en) Remote surveying and mapping data processing method and system
CN112613871A (en) Payment mode recommendation method based on big data and block chain and cloud computing server
CN115809466B (en) Security requirement generation method and device based on STRIDE model, electronic equipment and medium
CN117395080B (en) Encryption system scanner detection method, device, electronic equipment and storage medium
CN113239236B (en) Video processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210319