Unlock instant, AI-driven research and patent intelligence for your innovation.

Device monitoring method, device monitoring apparatus, and program

A device and device list technology, applied in the direction of data exchange through path configuration, home automation network, remote connection/disconnection of sub-offices, etc., to achieve the effect of improving security countermeasures

Pending Publication Date: 2021-12-07
PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the hijacking of routers, PCs, smartphones, etc. means that attackers can also attack devices in cars or buildings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device monitoring method, device monitoring apparatus, and program
  • Device monitoring method, device monitoring apparatus, and program
  • Device monitoring method, device monitoring apparatus, and program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0118] [1. System configuration]

[0119] Here, as an embodiment of the present disclosure, a device control command monitoring system according to the present disclosure will be described with reference to the drawings. In addition, in this embodiment, the case where a home appliance (household electrical appliance) and a PC (personal computer) are connected to the network (in-house network 11) in a home (in-house) is shown. That is, in the present embodiment, the device control command monitoring system can also be said to be an in-house device monitoring system.

[0120] [1.1 The overall structure of the equipment control command monitoring system]

[0121] figure 1 It is a figure which shows the overall structure of the equipment control command monitoring system of this embodiment.

[0122] Such as figure 1 As shown, the device control command monitoring system includes the Internet 10 , a home network 11 , a home gateway 20 , a PC 30 , an electronic lock 40 , an air ...

Embodiment approach 2

[0180] In Embodiment 1 of the present disclosure, the home network 11 is a single network to which various devices are connected, and the home gateway 20 determines whether to forward the device control command based on the type of the source device.

[0181] In the present embodiment, the home network 11 is divided into a network 12 for IT devices to which a PC 30 or a terminal 50 (such as a smart phone) is connected and a network 13 for home appliances to which a home appliance is connected. Be explained.

[0182] Hereinafter, a device control command monitoring system according to Embodiment 2 of the present disclosure will be described.

[0183] [2. System configuration]

[0184] Here, as Embodiment 2 of the present disclosure, a device control command monitoring system according to the present disclosure will be described with reference to the drawings. In addition, the same code|symbol is used for the component which has the same function as Embodiment 1 of this disclo...

Embodiment approach 3

[0233] In Embodiment 1 of the present disclosure, the home gateway 20 determines whether to transfer the device control command based on the device type of the source.

[0234] Here, as Embodiment 3 of the present disclosure, a configuration is described in which it is determined whether to transfer a device control command based on the operating state of each home appliance, the state of a resident living in the home where the home gateway 20 is installed, and the like.

[0235] Hereinafter, a device control command monitoring system according to the present embodiment will be described.

[0236] [3. System configuration]

[0237] Here, a device control command monitoring system according to the present embodiment will be described with reference to the drawings. In addition, the same code|symbol is used for the component which has the same function as Embodiment 1 of this disclosure or Embodiment 2 of this disclosure, and detailed description is abbreviate|omitted.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a device monitoring method, a message transmitted from a first device to a second device and having the second device as a transmission destination is received (S3001), whether or not the message includes a device control command for controlling the second device is determined (S3004), and if the message includes the device control command (S3004: YES), further, on the basis of a predetermined condition, it is determined whether or not to transmit a message to the second device (S3005), and if it is determined that the message is transmitted to the second device (S3005: YES), the message is transmitted to the second device (S3006). The predetermined condition includes a first condition that is a condition in which the first device is registered as a device having a predetermined function in a device list containing information about whether or not the device is a device having a predetermined function for each of the plurality of devices, and determines that the message is transmitted to the second device when the predetermined condition is satisfied.

Description

technical field [0001] The present disclosure relates to a device monitoring method, a device monitoring device, and a program. Background technique [0002] In recent years, devices such as electronic control units in vehicles, home appliances in homes, equipment in buildings, and manufacturing equipment in factories have been connected to local networks in vehicles or buildings, and have begun to connect to the Internet via routers and the like. By connecting these devices to the Internet, functions such as remote control, status monitoring, and collaboration between devices in buildings are realized. On the other hand, there are also cyber attacks that target these connected devices. In current cyber attacks, routers, personal computers, smartphones, etc. are hijacked and forced to participate in attacks on other servers on the Internet. However, the hijacking of routers, PCs, smartphones, etc. means that attackers can also attack devices in cars or buildings. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L12/66H04L29/06
CPCH04L12/2803H04L12/66H04L63/1441H04L12/28H04L67/125H04L45/306H04W40/22H04L12/12
Inventor 前田学芳贺智之海上勇二
Owner PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA