Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

safety protection system for terminal equipment of Internet of Things

A technology of IoT terminals and IoT devices, which is applied in the field of security protection systems of IoT terminal devices, can solve problems such as increasing channels for virus, Trojan horse or malicious code intrusion, difficulty in grasping device conditions, physical attacks, tampering and counterfeiting, etc. To achieve the effect of ensuring trusted interconnection and safe interaction, avoiding identity counterfeiting access, and reliable design principles

Pending Publication Date: 2021-05-07
SHANDONG LUNENG SOFTWARE TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) There are many terminal devices in the Internet of Things, it is difficult to grasp the status of the devices, there is a risk of illegal access, and there is a lack of operation and maintenance methods, event monitoring and notification, and emergency response mechanisms;
[0005] (2) The terminal equipment of the Internet of Things is scattered and installed outdoors, and it is easy to be damaged by criminals due to improper management, resulting in physical attacks, tampering and counterfeiting;
[0006] (3) Internet of Things terminal devices generally have security risks such as weak passwords, loopholes, and a large number of open ports, and are easily infected by malicious codes to form zombie hosts, which in turn constitute botnets;
[0007] (4) The network protocols of IoT terminal equipment are diverse and have a large number of loopholes, which increases the channels for terminal infection of viruses, Trojan horses or malicious code intrusion, and increases the security risk of the network layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • safety protection system for terminal equipment of Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0033] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0034] In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "installation", "connection" and "connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety protection system for the terminal equipment of an Internet of Things, which comprises an equipment discovery unit. The equipment discovery unit comprises a fingerprint code generation module, an equipment counterfeit monitoring module and an equipment recognition module; the network topology unit comprises a session tracking module, a flow analysis module, a topology management module and a switch drawing module; the service behavior management and control unit comprises a behavior modeling module, a credible range establishing module, a credible blocking module, an abnormal terminal isolation module and a service behavior checking module; and a safety protection unit. According to the method, network terminal discovery, safety access based on terminal fingerprints and terminal behavior safety protection are realized in a specific application environment, so that the defects of safety protection of massive Internet of Things terminals and safety early warning of network attacks in the specific environment can be overcome.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a safety protection system for Internet of Things terminal equipment. Background technique [0002] With the rapid development of the Internet of Things and the IP-based infrastructure communication system, the interconnection of massive devices through the network will become a trend, and today's society has gradually entered the era of the Internet of Things. Compared with the traditional Internet, the number of Internet of Things terminals is huge and the scope of physical deployment is wider. How to ensure the real-time visibility of the status of the Internet of Things and the controllability of the entire interconnection is a key issue in terms of security. In addition, a large number of front-end devices of the Internet of Things are scattered and unattended, and confidential data is easy to be stolen. Therefore, the establishment of visual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L29/08
CPCH04L47/10H04L67/14H04L67/10
Inventor 尹朋张云鹏刘波牛爱梅张俊岭邓昊卢立生武传奇宋天航
Owner SHANDONG LUNENG SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products