Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A centralized security control method and device

A security control and centralized technology, applied in the field of communication, can solve problems such as complicated operation, waste of resources, and low security

Active Publication Date: 2021-07-06
QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] The present invention provides a centralized safety control method and device to solve the problems of complicated operation, waste of resources and / or low safety in the safety control method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A centralized security control method and device
  • A centralized security control method and device
  • A centralized security control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] An embodiment of the present invention provides a centralized security control method, such as figure 1 As shown, the method includes:

[0064] Step S101, after the central node detects that the smart device enters the local network, it mutually checks the identity with the smart device, and when the verification is passed, stores the digital security certificate and public key of the smart device, and adds the smart device to the security device list;

[0065] In this step, the central node and the smart device verify each other's identity by verifying the digital security certificate of the other party; wherein, when the smart device does not have a digital security certificate, the central node generates a digital security certificate for the smart device.

[0066] Step S102, the central node generates a session key for the smart device and sends it to the smart device;

[0067] Preferably, in this step, after receiving the request sent by the smart device to join ...

Embodiment 2

[0073] An embodiment of the present invention provides a centralized security control method, such as figure 2 shown, including the following steps:

[0074] Step S201, after the smart device joins the network to which the central node belongs, it mutually checks the identity with the central node, and stores the digital security certificate and public key of the central node after the verification is passed;

[0075] Step S202, the smart device receives the session key sent by the central node, and uses the session key to initiate a query request for the security device list to the central node, and selects the target of the session in the security device list fed back by the central node equipment;

[0076] Step S203, the smart device conducts a session with the target device through the central node.

[0077] It can be known from the description of Embodiments 1 and 2 that the centralized security control method provided by the embodiment of the present invention has a c...

Embodiment 3

[0080] The embodiment of the present invention elaborates the centralized security control method provided by the present invention in more detail by combining specific application scenarios. In this embodiment, the central node is defaulted as an intelligent gateway. Of course, in the present invention, the central node is not limited to being an intelligent Gateway, as long as a certain device satisfies that it is the control center of the entire system, it establishes a session, and other smart devices will join this session. Security Manager runs on this device and maintains a list of security devices, then this device can be used as The central node described in the present invention.

[0081] like image 3 As shown, the centralized security control method described in this embodiment includes the following steps:

[0082] (1) After the smart home appliance enters the Internet of the local device, it sends a Claim broadcast.

[0083] (2) After the Security Manager on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a centralized security control method and device. The method includes: after a central node detects that a certain smart device has entered the local network, it mutually checks the identity with the smart device, and stores the smart device when the verification is passed. digital security certificate and public key, and add the smart device to the security device list; the central node generates a session key for the smart device and sends it to the smart device; based on the query request of the smart device, the central node, Encrypt the security device list with the session key and send it to the smart device, so that the smart device can select a target device for the session; when the smart device initiates a session to the selected target device, the central node , relaying session information interacted between the smart device and the target device. The invention changes the point-to-point security policy into centralized security control, reduces the performance requirement of the intelligent equipment, reduces the operation complexity, and reduces the cost.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a centralized security control method and device. Background technique [0002] Alljoyn is a point-to-point communication framework between devices based on C / S architecture. Alljoyn consists of Bus Daemon (bus process) and terminal nodes. Bus Daemon is responsible for message routing between terminal nodes, service discovery and other functions. The terminal node refers to the application based on Alljoyn, which needs to be connected to the Bus Daemon after startup. If the terminal node provides services, it will register a service name with the Bus Daemon, and the Bus Daemon will broadcast it. As a client, you can find the service through the service name, and complete the specified function through remote calls or signals. [0003] Alljoyn Security 2.0 is a security protocol for point-to-point control. It requires end users to configure the security policy of each d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 薛国栋李永华郑琨
Owner QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products