Centralized safety control method and device

A security control, centralized technology, applied in the field of communication, can solve the problems of waste of resources, complex operation, low security, etc., to achieve the effect of reducing performance requirements, reducing complexity, and enhancing security

Active Publication Date: 2015-10-28
QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] The present invention provides a centralized safety control method and device to solve the problems of complicated operation, waste of resources and / or low safety in the safety control method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized safety control method and device
  • Centralized safety control method and device
  • Centralized safety control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] An embodiment of the present invention provides a centralized security control method, such as figure 1 As shown, the method includes:

[0064] Step S101, after the central node detects that the smart device enters the local network, it mutually checks the identity with the smart device, and when the verification is passed, stores the digital security certificate and public key of the smart device, and adds the smart device to the security device list;

[0065] In this step, the central node and the smart device verify each other's identity by verifying the digital security certificate of the other party; wherein, when the smart device does not have a digital security certificate, the central node generates a digital security certificate for the smart device.

[0066] Step S102, the central node generates a session key for the smart device and sends it to the smart device;

[0067] Preferably, in this step, after receiving the request sent by the smart device to join ...

Embodiment 2

[0073] An embodiment of the present invention provides a centralized security control method, such as figure 2 shown, including the following steps:

[0074] Step S201, after the smart device joins the network to which the central node belongs, it mutually checks the identity with the central node, and stores the digital security certificate and public key of the central node after the verification is passed;

[0075] Step S202, the smart device receives the session key sent by the central node, and uses the session key to initiate a query request for the security device list to the central node, and selects the target of the session in the security device list fed back by the central node equipment;

[0076] Step S203, the smart device conducts a session with the target device through the central node.

[0077] It can be known from the description of Embodiments 1 and 2 that the centralized security control method provided by the embodiment of the present invention has a c...

Embodiment 3

[0080] The embodiment of the present invention elaborates the centralized security control method provided by the present invention in more detail by combining specific application scenarios. In this embodiment, the central node is defaulted as an intelligent gateway. Of course, in the present invention, the central node is not limited to being an intelligent Gateway, as long as a certain device satisfies that it is the control center of the entire system, it establishes a session, and other smart devices will join this session. Security Manager runs on this device and maintains a list of security devices, then this device can be used as The central node described in the present invention.

[0081] like image 3 As shown, the centralized security control method described in this embodiment includes the following steps:

[0082] (1) After the smart home appliance enters the Internet of the local device, it sends a Claim broadcast.

[0083] (2) After the Security Manager on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a centralized safety control method and a centralized safety control device. The method comprises the steps as follows: a central node checks identity with the intelligent device after monitoring that some intelligent device accesses a local network, and stores a digital security certificate and a public key of the intelligent device after the check is passed, and adds the intelligent device in a safety equipment list; the central node generates a conversation key for the intelligent device and transmits the conversation key to the intelligent device; the central node transmits the safety equipment list, which has been encrypted by using the conversation key to the intelligent device based on an inquiring request of the intelligent device so that the intelligent device could select target equipment for conversation; the central node transfers the conversation information interacted by the intelligent device and the target equipment while the intelligent device initiates a conversation with the selected target equipment. The method and the device of the invention change a point-to-point security policy into centralized safety control, thereby reducing the performance requirement, operation complexity and cost of the intelligent device.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a centralized security control method and device. Background technique [0002] Alljoyn is a point-to-point communication framework between devices based on C / S architecture. Alljoyn consists of Bus Daemon (bus process) and terminal nodes. Bus Daemon is responsible for message routing between terminal nodes, service discovery and other functions. The terminal node refers to the application based on Alljoyn, which needs to be connected to the Bus Daemon after startup. If the terminal node provides services, it will register a service name with the Bus Daemon, and the Bus Daemon will broadcast it. As a client, you can find the service through the service name, and complete the specified function through remote calls or signals. [0003] Alljoyn Security 2.0 is a security protocol for point-to-point control. It requires end users to configure the security policy of each d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 薛国栋李永华郑琨
Owner QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products