Unlock instant, AI-driven research and patent intelligence for your innovation.

Security monitoring strategy generation method and device

A technology of security monitoring and strategy, applied in the field of Internet of Things, can solve problems such as socket power failure, monitoring blind area, and impracticability

Pending Publication Date: 2021-01-01
杭州蓦然认知科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are many deficiencies in the above-mentioned method, and complex settings are required before the safety protection of children. For example, the association between the identification of the smart device carried by the child and the security policy needs to be established in advance. When the device is updated, it needs to be reset, which is not flexible enough, especially in In public places, this approach is almost impossible to achieve
[0005] In addition, for smart sockets, for example, there is a defect of frequent power-off of the socket, and the intelligent control strategy cannot be adaptively adjusted according to the cognitive level of children; for the camera monitoring method, there is a defect of monitoring blind spots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring strategy generation method and device
  • Security monitoring strategy generation method and device
  • Security monitoring strategy generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0151] In this embodiment, the format of the beacon frame is format 1 or format 2. The specific process is as figure 2 shown.

[0152] Step 100, the AP judges whether the network has the ability to identify the user of the terminal that accesses the network as a user that needs to be monitored by security, and if so, sets the value of the Security Flag field in the beacon frame to indicate that the network has this ability; otherwise, sets The value of the Security Flag field in the beacon frame indicates that the network does not have this capability, or the Security Flag field is not carried in the beacon frame.

[0153] In this step, the setting method of the value of the Security Flag field is the same as that described above.

[0154] Step 101, the terminal performs active scanning, monitors the beacon frames sent by the surrounding APs, receives and parses the beacon frames sent by the APs, and judges whether the beacon frames carry the Security Flag field, if the bea...

Embodiment approach 2

[0160] In this embodiment, the beacon frame format is format 3.

[0161] Step 200, the AP sends a beacon frame;

[0162] Step 201, the terminal performs active scanning, monitors the beacon frames sent by the surrounding APs, and judges whether the user of the terminal needs to be monitored for security. If the user needs to be monitored for security, send a detection request frame carrying the Security Flag field to the AP; Probe request frame carrying the Security Flag field.

[0163] Preferably, when the terminal receives beacon frames sent by multiple APs, if the user of the terminal does not need to be monitored safely, then according to the prior art, such as selecting the AP with the strongest signal strength or selecting the desired signal according to other selected selection strategies. Connected AP; if the user of the terminal needs to be monitored safely, first select a candidate AP according to the set strategy, which is the same as the existing technology, such ...

Embodiment approach 3

[0168] For the active scanning of the terminal to join the network, it mainly includes the following steps:

[0169] Step 300, judging whether the user of the terminal needs to be monitored by security, if so, sending a probe request frame carrying the Security Flag field, if not, sending a probe request frame not carrying the Security Flag field;

[0170] Step 301, the AP receives the detection request frame, and if the network has the ability to identify the user of the terminal accessing the network as a user who needs to be monitored for security, judge whether the detection request frame carries the Security Flag field, and if so, sends the detection request frame carrying the Security Flag field Probe response message to prompt the user to be monitored. If the network does not have this capability, the field will not be parsed, and a Probe Response frame that does not carry the Security Flag field will be sent.

[0171] Through the above method, regardless of whether th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security monitoring strategy generation method, and the method comprises: triggering an AP to send a security monitoring list to a terminal when the terminal is judged to be successfully accessed to the AP, wherein the security monitoring list is a preset list for the security monitoring of a user; displaying the security monitoring list on the terminalin a user interface mode to serve as a safety monitoring interface; the interface comprises: an area 1, which is provided with a search area and used for searching entries of a security monitoring strategy; and an area 2, which is used for displaying entries of the security monitoring strategy. Through the method, the security monitoring strategy can be flexibly set.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of the Internet of Things, and in particular to a method and device for protecting children's safety. Background technique [0002] With the continuous development of modern communication technology, with the help of the Internet and the Internet of Things, tens of thousands of devices of various types and uses, such as smart home appliances, wearable devices, and smart monitoring devices, are connected to the network. Information interaction between devices can be carried out at any time to provide convenience for users. [0003] The Internet of Things plays an important role in protecting children's safety, and it is inseparable from the Internet of Things in various application scenarios such as the Internet of Vehicles and smart homes. For example, in smart homes, there are more and more electrical appliances in modern families, and the probability of children touching electric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04W12/08
CPCH04L67/12H04L63/10H04W12/08H04L63/083H04L63/20
Inventor 李国华戴帅湘
Owner 杭州蓦然认知科技有限公司