Supercharge Your Innovation With Domain-Expert AI Agents!

Equipment security control method, device and system

A technology of security control and equipment, applied in the field of Internet of Things, can solve the problem of low security of Internet of Things equipment, achieve the effect of preventing attacks and improving security

Active Publication Date: 2020-03-13
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a device security control method, device and system to solve the defects of low security of Internet of Things devices in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment security control method, device and system
  • Equipment security control method, device and system
  • Equipment security control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] This embodiment provides a device security control method for security control of IoT devices. The execution subject of this embodiment is the device security control device, and the device security control device may be set in the gateway. For the convenience of distinction, this embodiment is called the second gateway, and the second gateway may be a server or other terminal equipment. Herein No limit.

[0061] Such as figure 2 As shown, it is a schematic flow chart of the method provided in this embodiment, the method includes:

[0062] Step 101, receiving service access request information sent by a first terminal device through a first gateway.

[0063] Wherein, the service access request information is information requesting access to the second service platform or the second terminal device connected to the second gateway.

[0064] Step 102: According to the service access request information, it is judged whether it is an attack behavior of the first termina...

Embodiment 2

[0071] This embodiment provides a device security control method for security control of IoT devices. The execution subject of this embodiment is the device security control device, and the device security control device may be set in a server. For the convenience of distinction, this embodiment is called a relay server.

[0072] Such as image 3 As shown in , it is a schematic flowchart of the device security control method provided in this embodiment. The method includes:

[0073] Step 201, receiving the device identification and attack event information of the first terminal device sent by the second gateway.

[0074] Step 202: Generate digital information according to the device identification and attack event information of the first terminal device.

[0075] Step 203, record the digital information together with the time stamp into a block of the blockchain.

[0076] Step 204, broadcast the digital information in the blockchain network.

[0077] Specifically, after ...

Embodiment 3

[0081] This embodiment provides a device security control method for security control of IoT devices. The executive body of this embodiment is the equipment security control device, which can be set in the gateway. For the convenience of distinction, this embodiment is called the first gateway, and the first gateway can be a server or any other implementable terminal equipment, the present invention is not limited.

[0082] Such as Figure 4 As shown in , it is a schematic flowchart of the device security control method provided in this embodiment. The method includes:

[0083] Step 301, acquire the digital information broadcast by the relay server in the blockchain network.

[0084] Step 302: Determine the first terminal device corresponding to the device identifier included in the digital information according to the digital information.

[0085] Step 303, control the first terminal device to disconnect from the blockchain network.

[0086] Specifically, when the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an equipment security control method, device and system. The method comprises the steps of: receiving service access request information sent by first terminal equipment througha first gateway; according to the service access request information, judging whether the service access request information is an attack behavior of the first terminal equipment; and if a judgment result is yes, sending an equipment identifier of the first terminal equipment and attack event information to a relay server so as to enable the relay server to generate digital information, recordingthe digital information into a block of a blockchain together with a timestamp, and simultaneously, carrying out broadcasting on the digital information in a blockchain network. The attack behavior can be timely discovered, attacks to other service platforms or terminal equipment are prevented, and security of IoT (Internet of Things) equipment is improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, in particular to a device security control method, device and system. Background technique [0002] The Internet of Everything is the development trend of the future society. With the rapid development of science and technology, the application of Internet of Things technology has also achieved remarkable results. There are already billions of sensors and smart controllers in use around the world, and even more rapid growth is expected in the future. [0003] With the rapid development of the Internet of Things technology, more and more smart devices in the Internet of Things can be interconnected. For example, in the field of the Home Internet of Things, various home smart devices can be connected to a local area network through a gateway. [0004] However, due to the limited security capabilities of IoT devices, they are easily attacked maliciously. When a smart device i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 袁晓静翟京卿
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More