Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security detection method, device and system based on block chain, and medium

An IoT device and security detection technology, applied in transmission systems, instruments, electrical components, etc., can solve the problems of neglecting security issues in system design, unable to meet the needs of IoT security, large threats and losses, etc., to achieve automatic Evaluate and forecast, improve security protection capabilities, and ensure the effect of network security

Active Publication Date: 2021-06-18
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP +1
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]In recent years, with the emergence and development of the Internet of Things, more and more IoT devices have appeared on the market. However, most of the existing IoT energy devices focus on Functional implementation, security issues are generally ignored in system design
[0003] With the application of the Internet of Things becoming more and more extensive and the scale becoming larger and larger, multi-level network security threats and security risks are also increasing. Network viruses, Dos / Threats and losses posed by DDos attacks are increasing, and network attacks are developing toward distribution, scale, and complexity. Existing network security protection technologies are no longer able to meet the security needs of the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security detection method, device and system based on block chain, and medium
  • Internet of Things security detection method, device and system based on block chain, and medium
  • Internet of Things security detection method, device and system based on block chain, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0036] figure 1 It is a schematic flow diagram of an implementation of a block chain-based Internet of Things security detection method according to an embodiment of the present invention, figure 1 The method in can be executed by the monitoring device connected to the Internet of Things as the execution subject, such as figure 1 As shown, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an Internet of Things security detection method, device and system based on a block chain and a medium, and the method comprises the steps: carrying out the abnormality monitoring of the Internet of Things according to the monitoring information of each Internet of Things device in the Internet of Things, and obtaining the corresponding abnormality information if the abnormality of the Internet of Things is determined according to the abnormality monitoring result; generating detection information according to the abnormal information, and determining a detection block in the blockchain according to the detection information, wherein the detection block comprises at least one block in the blockchain; storing the detection information, and broadcasting storage address information in the block chain; receiving a detection result of the detection block, wherein the detection block obtains corresponding detection information according to the storage address information, and detects the detection information based on the smart contract in the block chain to obtain a detection result. According to the embodiment of the invention, decentralized security detection is realized by using the block chain, and the network security of the Internet of Things can be ensured.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things security, in particular to a block chain-based Internet of Things security detection method, monitoring equipment, a block chain-based Internet of Things security detection system, and a computer-readable storage medium. Background technique [0002] In recent years, with the emergence and development of the Internet of Things, more and more IoT devices have appeared on the market. However, most of the existing IoT energy devices focus on function realization, and security issues are generally ignored in system design. [0003] As the application of the Internet of Things becomes more and more extensive and the scale becomes larger and larger, multi-level network security threats and security risks are also increasing. The threats and losses posed by network viruses and Dos / DDos attacks are increasing. Network attacks Behaviors are developing towards distributed, large-scale, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G16Y30/10
CPCH04L63/1425H04L67/12
Inventor 宋灿
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products