Security assessment method and device based on equipment network, electronic equipment and medium
The invention relates to the technical field of computers, and provides a security assessment method and device based on an equipment network, electronic equipment and a medium. The method comprises the following steps: acquiring target data of target equipment; determining redundant data in the tar...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HAN DAOQI CHEN YUQIANG LU YUEMING SHI WEIDONG FAN MINGRUI QIN FENG WANG ZHANFENG WU HAO GAO JIAQI |
description | The invention relates to the technical field of computers, and provides a security assessment method and device based on an equipment network, electronic equipment and a medium. The method comprises the following steps: acquiring target data of target equipment; determining redundant data in the target data, and obtaining target feature data based on the redundant data; performing characterization learning processing based on the target feature data to obtain a processing result; and determining whether abnormity exists based on the processing result. According to the embodiment, the target data of the target equipment can be obtained, the target feature data are extracted based on the target data, the representation learning processing is performed based on the target feature data, the processing result is obtained, and whether the abnormity exists or not is determined based on the processing result, and feature data extraction is performed on the target data, so that the influence of redundant data is remov |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116319427A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116319427A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116319427A3</originalsourceid><addsrcrecordid>eNqNjDsPAUEYRadRCP7Dp6cYK0QpG6LS0G_GzN2Y2HmYb4b49x5RKFWnuOeevlAH6JJsfpBiBrODz-SQz8GQ8oYMblaDTophKHjCtdj4kTzyPaTLhNBB5xS81T_r--tgbHFD0WtVxxh9ORDj7eZY76aIoQFHpfFKNfVeykUlV_PZcl394zwBUZ4-LA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Security assessment method and device based on equipment network, electronic equipment and medium</title><source>esp@cenet</source><creator>HAN DAOQI ; CHEN YUQIANG ; LU YUEMING ; SHI WEIDONG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; WU HAO ; GAO JIAQI</creator><creatorcontrib>HAN DAOQI ; CHEN YUQIANG ; LU YUEMING ; SHI WEIDONG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; WU HAO ; GAO JIAQI</creatorcontrib><description>The invention relates to the technical field of computers, and provides a security assessment method and device based on an equipment network, electronic equipment and a medium. The method comprises the following steps: acquiring target data of target equipment; determining redundant data in the target data, and obtaining target feature data based on the redundant data; performing characterization learning processing based on the target feature data to obtain a processing result; and determining whether abnormity exists based on the processing result. According to the embodiment, the target data of the target equipment can be obtained, the target feature data are extracted based on the target data, the representation learning processing is performed based on the target feature data, the processing result is obtained, and whether the abnormity exists or not is determined based on the processing result, and feature data extraction is performed on the target data, so that the influence of redundant data is remov</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230623&DB=EPODOC&CC=CN&NR=116319427A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230623&DB=EPODOC&CC=CN&NR=116319427A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>SHI WEIDONG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><title>Security assessment method and device based on equipment network, electronic equipment and medium</title><description>The invention relates to the technical field of computers, and provides a security assessment method and device based on an equipment network, electronic equipment and a medium. The method comprises the following steps: acquiring target data of target equipment; determining redundant data in the target data, and obtaining target feature data based on the redundant data; performing characterization learning processing based on the target feature data to obtain a processing result; and determining whether abnormity exists based on the processing result. According to the embodiment, the target data of the target equipment can be obtained, the target feature data are extracted based on the target data, the representation learning processing is performed based on the target feature data, the processing result is obtained, and whether the abnormity exists or not is determined based on the processing result, and feature data extraction is performed on the target data, so that the influence of redundant data is remov</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDsPAUEYRadRCP7Dp6cYK0QpG6LS0G_GzN2Y2HmYb4b49x5RKFWnuOeevlAH6JJsfpBiBrODz-SQz8GQ8oYMblaDTophKHjCtdj4kTzyPaTLhNBB5xS81T_r--tgbHFD0WtVxxh9ORDj7eZY76aIoQFHpfFKNfVeykUlV_PZcl394zwBUZ4-LA</recordid><startdate>20230623</startdate><enddate>20230623</enddate><creator>HAN DAOQI</creator><creator>CHEN YUQIANG</creator><creator>LU YUEMING</creator><creator>SHI WEIDONG</creator><creator>FAN MINGRUI</creator><creator>QIN FENG</creator><creator>WANG ZHANFENG</creator><creator>WU HAO</creator><creator>GAO JIAQI</creator><scope>EVB</scope></search><sort><creationdate>20230623</creationdate><title>Security assessment method and device based on equipment network, electronic equipment and medium</title><author>HAN DAOQI ; CHEN YUQIANG ; LU YUEMING ; SHI WEIDONG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; WU HAO ; GAO JIAQI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116319427A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>SHI WEIDONG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HAN DAOQI</au><au>CHEN YUQIANG</au><au>LU YUEMING</au><au>SHI WEIDONG</au><au>FAN MINGRUI</au><au>QIN FENG</au><au>WANG ZHANFENG</au><au>WU HAO</au><au>GAO JIAQI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Security assessment method and device based on equipment network, electronic equipment and medium</title><date>2023-06-23</date><risdate>2023</risdate><abstract>The invention relates to the technical field of computers, and provides a security assessment method and device based on an equipment network, electronic equipment and a medium. The method comprises the following steps: acquiring target data of target equipment; determining redundant data in the target data, and obtaining target feature data based on the redundant data; performing characterization learning processing based on the target feature data to obtain a processing result; and determining whether abnormity exists based on the processing result. According to the embodiment, the target data of the target equipment can be obtained, the target feature data are extracted based on the target data, the representation learning processing is performed based on the target feature data, the processing result is obtained, and whether the abnormity exists or not is determined based on the processing result, and feature data extraction is performed on the target data, so that the influence of redundant data is remov</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116319427A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Security assessment method and device based on equipment network, electronic equipment and medium |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T09%3A33%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HAN%20DAOQI&rft.date=2023-06-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116319427A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |