Communication management method for internet of things security system

A security system and Internet of Things technology, applied in transmission systems, electrical components, etc., can solve problems such as low compatibility of safety standards, network congestion, and low security level, so as to avoid waste of bandwidth resources, reduce bandwidth occupancy, and improve safety effect

Active Publication Date: 2018-12-21
URUMQI ECONOMIC & TECHCAL DEV ZONE CABLE TELEVISION NETWORK TRANSMISSION CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing IoT devices generally have problems of low security level and low compatibility of security standards, making them a security risk for the entire IoT security system.
For example, most of the existing IoT devices adopt weak access mechanisms, so these IoT devices have security flaws and loopholes, thus affecting the security of the entire security system
Furthermore, IoT devices are usually not deployed in the context of IoT security control centers, so traditional security services that protect security control centers cannot protect IoT devices
[0006] 2. Due to the refined and intelligent management requirements of the security system for fire services, access control services, and video surveillance services, the number of security-related IoT devices and the amount of data to be processed are increasing rapidly. If these data are directly Upload to the cloud or the management server of the security control center, which requires a large amount of storage space and is prone to network congestion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication management method for internet of things security system
  • Communication management method for internet of things security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0022] Such as figure 1 As shown, the communication management method for the Internet of Things security system of the present invention includes: analyzing and processing the data collected by the security-related Internet of Things devices through the edge computing device, and the edge computing device includes a communication module, a controller and a policy execution unit .

[0023] The authentication server assi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a communication management method for an Internet of Things security system, which analyzes and processes data collected by an Internet of Things device related to security through an edge computing device, wherein the edge computing device comprises a communication module, a controller and a policy execution unit. The authentication server assigns dimension labels to theInternet of Things devices in a manner associated with a category through its label unit so that each dimension label corresponds to a class of Internet of Things devices. The dimension label has a public key certificate and is associated with a class of Internet of Things devices and Internet of Things security services. Internet of Things security services include fire services, access control services and video surveillance services. The authentication server receives the authentication key from the TLS endpoint of the Internet of Things device through the controller storing and distributing the security rules. The policy execution unit manages the communication of the IOT device according to the security rules. The invention improves the security of the security system by classifying the communication management of the internet of things equipment.

Description

technical field [0001] The invention relates to the field of Internet of Things and security technologies, in particular to a communication management method for a security system of the Internet of Things. Background technique [0002] The Internet of Things uses information sensing devices such as radio frequency identification, infrared sensors, and global positioning systems (GPS) to exchange and communicate detected information in accordance with agreed protocols to achieve intelligent identification, monitoring, positioning, and management functions. . [0003] The existing IoT security technology solution is: the IoT device set at the target location transmits the detected data to the server in the security control center in real time or periodically, and the manager views and analyzes the relevant data through the management client or through the security system. The relevant reminder function set by the software realizes functions such as fire service and video sur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/0823H04L63/0876H04L67/12
Inventor 罗孝琼
Owner URUMQI ECONOMIC & TECHCAL DEV ZONE CABLE TELEVISION NETWORK TRANSMISSION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products