Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for detecting fake device and wireless device care apparatus

A wireless device and device detection technology, applied in the transmission system, wireless communication, platform integrity maintenance, etc., can solve the problem of consuming computing resources and time for analyzing vulnerabilities, and achieve the effect of reducing computing resources and time

Inactive Publication Date: 2021-11-30
NOMA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to analyze the vulnerabilities of IoT devices without knowing the type (i.e., type) of IoT devices, it is necessary to sequentially use all types of vulnerability analysis data, which consumes a lot of computing resources and time required for analyzing vulnerabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting fake device and wireless device care apparatus
  • Method for detecting fake device and wireless device care apparatus
  • Method for detecting fake device and wireless device care apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The above objects, other objects, features and advantages of the present invention will be easily understood through the following preferred embodiments with reference to the accompanying drawings. However, the present invention is not limited to the embodiments described here, but may be embodied in other forms. The embodiments described below are exemplary embodiments provided to fully convey the idea of ​​the present invention to those skilled in the art.

[0027] Definition of terms

[0028] In the description of the present invention, the term "software" refers to the technology of running hardware in a computer, and the term "hardware" refers to the tangible devices or devices (CPU, internal memory, input device, output device, peripheral device, etc.) that constitute the computer. ), the term "step" refers to a series of processes or operations connected in time sequence in order to achieve a predetermined purpose, the term "program" refers to a collection of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a fake device detection method and a wireless device care apparatus, and according to an embodiment, the fake device detection method includes: a step of attacking a vulnerable point of a target wireless device which is a target for determining a fake device; and a step of determining whether the target wireless device is a fake device, according to whether the attack on the vulnerable point of the target wireless device succeeds.

Description

technical field [0001] The invention relates to a counterfeit device detection method and a wireless device maintenance system. Background technique [0002] The Internet of Things (IoT) (hereinafter referred to as "IoT"), which is one of the wireless Internets, refers to a technology for connecting various things through wireless communication. Additionally, the Internet of Things is at risk of being compromised by a Linux worm when the Linux operating system that underlies most IoT devices does not have ideal security in the device or is not properly updated (Dick O'Brien, 20January 2014, “ The Internet of Things: New Threats Emerge in a Connected World", Symantec). In real life, there are also examples of maliciously exploiting security vulnerabilities in the IoT environment to infringe on private life. US company TRENDnet, which manufactures and sells the baby monitoring camera SecurView, circulated it without creating the correct security system for its product. Ulti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/122H04W12/126G06F21/57
CPCH04L63/1433G06F21/577G06F21/55H04W12/122H04L63/1466H04L43/18
Inventor 郑贤哲宋昌宁
Owner NOMA