Unlock instant, AI-driven research and patent intelligence for your innovation.

Command security defense method and command security defense system

A technology of security defense and command, applied in the field of Internet of Things, can solve problems such as hijacking of business applications, security risks and losses of remote commands, and achieve the effect of ensuring security

Active Publication Date: 2021-08-17
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the application layer, most services are deployed on the cloud, and business applications may be hijacked, resulting in security risks in remote commands sent from the business system to terminals at the perception layer; terminal devices at the perception layer, in addition to data collection and transmission, also need to identify and Respond to the remote instructions sent by the business system. If the instructions are wrong, it may cause irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Command security defense method and command security defense system
  • Command security defense method and command security defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to enable those skilled in the art to better understand the technical solution of the present invention, a command security defense method and a command security defense system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0052] The present invention provides an instruction security defense method and an instruction security defense system, which are used to provide an instruction-oriented security defense mechanism for an Internet of Things device (referred to as an "object device" in the present invention) in an Internet of Things system.

[0053] Among them, the command security defense system is connected to the corresponding Internet of Things system (referred to as "intranet" in the present invention), and can obtain the command information and response action information received by the target device, and can control the target device through the corresponding algorithm. The response acti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a command security defense method and command security defense system, comprising: step S1, acquiring response action information after a target object device executes the received target command; step S2, judging whether the response action information satisfies the target command The corresponding security response rule or the threat detection rule corresponding to the target instruction; if it is determined that the response action information satisfies the security response rule, step S3 is performed; if it is determined that the response action information satisfies the threat detection rule, step S4 is performed; The target object device sends reminder information to remind the target object device that the received target instruction and its own response are safe; step S4, send reminder information to the target object device, so that the target object device can respond to the target instruction and its own action. isolate. The technical scheme of the present invention can provide a security defense mechanism for instructions for the Internet of Things device, and effectively guarantee the security of the Internet of Things device in the process of executing the instructions.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an instruction security defense method and an instruction security defense system. Background technique [0002] The Internet of Things is divided into three layers: the application layer, the perception layer, and the transport layer. Each layer of the Internet of Things will face different security risks. At the application layer, most services are deployed on the cloud, and business applications may be hijacked, resulting in security risks in remote commands sent from the business system to terminals at the perception layer; terminal devices at the perception layer, in addition to data collection and transmission, also need to identify and In response to remote instructions sent by the business system, if the instructions are wrong, it may cause irreparable losses. Therefore, to prevent hijacking, illegal takeover and control of business applications, it is nec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1441H04L63/20
Inventor 李文杰周桂英
Owner CHINA UNITED NETWORK COMM GRP CO LTD