Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security defense system for intelligent terminal

A security defense and intelligent terminal technology, applied in transmission systems, electrical components, etc., can solve problems such as security accidents, data leaks, and service crashes, and achieve the effects of protecting security, resisting network attacks, and resisting network penetration

Inactive Publication Date: 2017-05-24
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current mainstream intelligent terminal interaction solutions, cloud-based services are generally used to realize remote control and interaction between humans and machines. Therefore, the security of cloud services has become a shortcoming of the entire technical solution. Once cloud services are attacked, In the slightest, it may cause service crash and data leakage, and in severe cases, the machine may be destroyed, resulting in a major security incident.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security defense system for intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The purpose of the present invention is to propose an Internet of Things security defense system oriented to smart terminals, so as to ensure reliable, safe and controllable operation of smart terminal cloud services. The key points of realization of the Internet of Things security defense system in the present invention include:

[0023] (1) Deploy the IoT security gateway at the front end of the cloud service, and all open cloud services need to be registered and managed in the security gateway.

[0024] (2) The terminal business that accesses the cloud service needs to be registered and managed in the security gateway, and at the same time, specify the cloud service authority scope and terminal certificate that the terminal business can access.

[0025] (3) After the terminal access approval is passed, the terminal is assigned a unique terminal identifier APPKey and a terminal certificate. At the same time, the terminal developer can download the gateway SDK and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the Internet of things security technology, and discloses an Internet of Things security defense system for an intelligent terminal for ensuring reliable operation and controllable security of cloud service of the intelligent terminal. The system comprises an Internet of Things security gateway deployed at a cloud service front end, the Internet of Things security gateway comprises a cloud service management module, an access terminal management module, an identity authentication module and a security policy database; the cloud service management module provides registration and management functions of all open cloud services; the access terminal management module provides registration and management functions of an access terminal; the identity authentication module is used for verifying the validity of the terminal after receiving a request of accessing the cloud service sent by the terminal; and the security policy database provides a corresponding security policy for providing security detection and network flow analysis functions after the request validity of the terminal is verified.

Description

technical field [0001] The invention relates to the security technology of the Internet of Things, in particular to an Internet of Things security defense system for intelligent terminals. Background technique [0002] With the rapid development of mobile Internet technology, mobile Internet terminals, especially smart terminals, have widely entered thousands of households. Smart TVs, smart refrigerators, smart air conditioners, smart gateways, smart homes, Internet cars, robots, etc. have penetrated into all aspects of people's lives. Security issues have gradually become a topic of general concern to society and equipment manufacturers. [0003] In the current mainstream intelligent terminal interaction solutions, cloud-based services are generally used to realize remote control and interaction between humans and machines. Therefore, the security of cloud services has become a shortcoming of the entire technical solution. Once cloud services are attacked, In the slightest...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/0227H04L63/1408H04L63/1441
Inventor 龙长春
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products