US 12,224,989 B2
Information leakage monitoring method and system, and electronic device
Bin Wang, Zhejiang (CN); Shaopeng Zhou, Zhejiang (CN); Xu Wang, Zhejiang (CN); Feng Zhang, Zhejiang (CN); Zhicheng Bi, Zhejiang (CN); Li Wan, Zhejiang (CN); Jun Li, Zhejiang (CN); Chonghua Wang, Zhejiang (CN); and Haitao Zhao, Zhejiang (CN)
Assigned to Hangzhou Hikvision Digital Technology Co., Ltd., Hangzhou (CN)
Appl. No. 18/720,544
Filed by Hangzhou Hikvision Digital Technology Co., Ltd., Zhejiang (CN)
PCT Filed Dec. 1, 2022, PCT No. PCT/CN2022/135997
§ 371(c)(1), (2) Date Sep. 11, 2024,
PCT Pub. No. WO2023/109524, PCT Pub. Date Jun. 22, 2023.
Claims priority of application No. 202111553049.6 (CN), filed on Dec. 17, 2021.
Prior Publication US 2024/0430239 A1, Dec. 26, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 67/56 (2022.01); H04L 69/18 (2022.01)
CPC H04L 63/0281 (2013.01) [H04L 67/56 (2022.05); H04L 69/18 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A method for monitoring key information leakage of an Internet of Things (IoT) terminal based on a traffic proxy, comprising:
receiving a proxy request sent by the IoT terminal, wherein the proxy request comprises protocol-related information of the IoT terminal, and the protocol-related information comprises part or all of device model information, service type information and data packet information;
determining a target protocol corresponding to the IoT terminal according to the protocol-related information of the IoT terminal;
allocating a target proxy service to the IoT terminal according to the target protocol and a usage state and an online state of one or more proxy services in a full traffic proxy pool, sending relevant information of the target proxy service to the IoT terminal, so that the IoT terminal accesses the target proxy service; and
forwarding traffic of the IoT terminal and performing key information monitoring on the traffic of the IoT terminal through the target proxy service;
wherein the full traffic proxy pool comprises a plurality of proxy services corresponding to different protocols, and the target proxy service is a proxy service corresponding to the target protocol and having a usage state of being idle and an online state of being online in the plurality of proxy services;
wherein the proxy request further comprises device identification information of the IoT terminal,
after allocating the target proxy service to the IoT terminal, the method further comprises:
generating a uniqueness verification identifier according to the device identification information of the IoT terminal and identification information of the target proxy service, so that the target proxy service performs service-bound uniqueness verification according to the device identification information of the IoT terminal, the identification information of the target proxy service and the uniqueness verification identifier in response to receiving the traffic sent by the IoT terminal, and performs key information monitoring on the traffic in response to a successful verification.