CN112073422A - Intelligent home protection system and protection method thereof - Google Patents
Intelligent home protection system and protection method thereof Download PDFInfo
- Publication number
- CN112073422A CN112073422A CN202010966518.6A CN202010966518A CN112073422A CN 112073422 A CN112073422 A CN 112073422A CN 202010966518 A CN202010966518 A CN 202010966518A CN 112073422 A CN112073422 A CN 112073422A
- Authority
- CN
- China
- Prior art keywords
- control terminal
- module
- equipment
- protection system
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000004458 analytical method Methods 0.000 claims abstract description 74
- 230000001681 protective effect Effects 0.000 claims description 4
- 241000700605 Viruses Species 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Alarm Systems (AREA)
Abstract
The application discloses intelligent home protection system and protection method thereof, wherein the protection system comprises: the system comprises a collection module, an analysis module, a first sending module and a control terminal; the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment; the analysis module is used for carrying out safety analysis on the equipment data to obtain a safety analysis result; the first sending module is used for sending alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked; and the control terminal is used for sending a starting instruction of the security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent home equipment, the intelligent home equipment can conveniently start the protection measures corresponding to the security policy, and the technical problem that the existing intelligent home protection system is poor in security is solved.
Description
Technical Field
The application relates to the technical field of intelligent home, in particular to an intelligent home protection system and a protection method thereof.
Background
Driven by the rapid development of technologies such as the internet, the internet of things, AI, cloud computing, big data and the like, a new era of the household appliance industry has come. The smart home market is growing at a rate of 20% -30% per year, and smart homes are becoming an increasingly active consumption hotspot.
Along with the improvement of the safety consciousness of people, people also attach more and more importance to personal privacy and property safety, and higher requirements are put forward on the safety of smart homes. However, the number of smart home products in the current market exceeds 8, and the smart home products have no safety defense function. If the smart homes are attacked, safety measures cannot be started in time to stop the attack, and once the smart homes are controlled illegally, great harm is caused to users.
Therefore, providing an intelligent home protection system for solving the problem of poor safety of the existing intelligent home is a technical problem to be urgently solved by technical personnel in the field.
Disclosure of Invention
The application provides an intelligent home protection system and a protection method thereof, and solves the technical problem that an existing intelligent home protection system is poor in safety.
In view of this, the first aspect of the present application provides an intelligent home protection system, including: the system comprises a collection module, an analysis module, a first sending module and a control terminal;
the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment;
the analysis module is used for carrying out security analysis on the equipment data to obtain a security analysis result;
the first sending module is used for sending alarm information to the control terminal when the security analysis result shows that the intelligent household equipment is attacked;
the control terminal is configured to send a starting instruction of a security policy to the first sending module according to the warning information, so that the first sending module sends the security policy to the smart home device, so that the smart home device can start a safeguard measure corresponding to the security policy.
Alternatively,
the analysis module includes: comparing the submodule with the determining submodule;
the comparison submodule is used for comparing the consistency between the equipment data and preset equipment data to obtain a data comparison result;
and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result.
Alternatively,
the analysis module further comprises: a storage submodule;
and the storage submodule is used for storing the security policy.
Alternatively,
the intelligent home protection system further comprises: the first encryption and decryption module is connected with the control terminal, and the second encryption and decryption module is connected with the intelligent household equipment;
the first encryption and decryption module is used for signing a control terminal public key when the control terminal addresses the intelligent home equipment, and sending a connection request to the second encryption and decryption module based on the signed control terminal public key;
the second encryption and decryption module is used for verifying the signature of the connection request to obtain the public key of the control terminal; and the intelligent home equipment is also used for connecting the control terminal with the intelligent home equipment after the public key of the control terminal is compared with a preset public key.
Alternatively,
the first encryption and decryption module and the second encryption and decryption module adopt a state cryptographic algorithm to encrypt a chip USB Key.
Alternatively,
the configuration process of the public and private key pair corresponding to the preset public key is as follows:
and generating the public and private key pair according to the terminal information of the control terminal and/or the equipment ID of the intelligent household equipment.
Alternatively,
the terminal information includes: a user name and an identification number.
Alternatively,
the first sending module is further configured to send the security policy corresponding to the start instruction to a cloud computing platform when the start instruction is obtained, so that the cloud computing platform updates a local virus library according to the security policy.
Alternatively,
the device data includes: data source port, destination port, and device ID.
A second aspect of the present application provides an intelligent home protection method, which is applied to the intelligent home protection system according to the first aspect, and includes:
the acquisition module acquires equipment data from the intelligent household equipment;
the analysis module performs security analysis on the equipment data to obtain a security analysis result;
the first sending module sends alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked;
and the control terminal sends a starting instruction of a security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent household equipment, and the intelligent household equipment can conveniently start the protective measures corresponding to the security policy.
According to the technical scheme, the embodiment of the application has the following advantages:
the application provides an intelligence house protection system includes: the system comprises a collection module, an analysis module, a first sending module and a control terminal; the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment; the analysis module is used for carrying out safety analysis on the equipment data to obtain a safety analysis result; the first sending module is used for sending alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked; and the control terminal is used for sending a starting instruction of the security strategy to the first sending module according to the alarm information, so that the first sending module sends the security strategy to the intelligent home equipment, and the intelligent home equipment can conveniently start the protective measures corresponding to the security strategy.
The acquisition module in this application can gather the equipment data of intelligent home equipment, then analysis module carries out security analysis to the equipment data after, obtain intelligent home equipment's security analysis result, when security analysis result is that intelligent home equipment is attacked, first sending module sends alarm information to control terminal, control terminal sends the start instruction that is used for starting the security policy to first sending module according to alarm information, first sending module is after receiving the start instruction, send the security policy to intelligent home equipment for intelligent home equipment starts the safeguard measure that this security policy corresponds. Therefore, once the intelligent household equipment is attacked, the attack can be protected through the acquisition module, the analysis module, the first sending module and the control terminal, and the technical problem that the safety of the existing intelligent household protection system is poor is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of an embodiment of an intelligent home protection system in an embodiment of the present application;
fig. 2 is a schematic flowchart of an embodiment of a smart home protection method in an embodiment of the present application.
Detailed Description
The embodiment of the application provides an intelligent home protection system and a protection method thereof, and solves the technical problem that an existing intelligent home protection system is poor in safety.
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a schematic structural diagram of a first embodiment of an intelligent home protection system in an embodiment of the present application is shown.
Intelligent house protection system includes in this embodiment: the system comprises an acquisition module 1, an analysis module 2, a first sending module 3 and a control terminal 4; the acquisition module 1 is connected with the intelligent household equipment 5 and is used for acquiring equipment data from the intelligent household equipment 5; the analysis module 2 is used for carrying out security analysis on the equipment data to obtain a security analysis result; the first sending module 3 is used for sending alarm information to the control terminal 4 when the security analysis result shows that the intelligent household equipment 5 is attacked; and the control terminal 4 is configured to send a starting instruction of the security policy to the first sending module 3 according to the warning information, so that the first sending module 3 sends the security policy to the smart home device 5, and the smart home device 5 starts a protection measure corresponding to the security policy.
It should be noted that the control terminal 4 in this embodiment includes, but is not limited to: smart phone, Pad, gateway, PC. The smart home devices 5 include but are not limited to: intelligent lamp, intelligent door lock, intelligent (window) curtain, intelligent electric rice cooker, intelligent TV.
The acquisition module 1 in this embodiment may acquire device data of the smart home device 5, and then the analysis module 2 performs security analysis on the device data to obtain a security analysis result of the smart home device 5, when the security analysis result indicates that the smart home device 5 is attacked, the first sending module 3 sends an alarm message to the control terminal 4, the control terminal 4 sends a starting instruction for starting a security policy to the first sending module 3 according to the alarm message, and the first sending module 3 sends the security policy to the smart home device 5 after receiving the starting instruction, so that the smart home device 5 starts a safeguard measure corresponding to the security policy. So, once attacked, intelligent household equipment 5 alright protect the attack through collection module 1, analysis module 2, first sending module 3 and control terminal 4 to the technical problem that current intelligent household protection system security is poor has been solved.
The foregoing is a first embodiment of an intelligent home protection system provided in the embodiments of the present application, and the following is a second embodiment of an intelligent home protection system provided in the embodiments of the present application.
Referring to fig. 1, a schematic structural diagram of a first embodiment of an intelligent home protection system in an embodiment of the present application is shown.
Intelligent house protection system includes in this embodiment: the system comprises an acquisition module 1, an analysis module 2, a first sending module 3 and a control terminal 4; the acquisition module 1 is connected with the intelligent household equipment 5 and is used for acquiring equipment data from the intelligent household equipment 5; the analysis module 2 is used for carrying out security analysis on the equipment data to obtain a security analysis result; the first sending module 3 is used for sending alarm information to the control terminal 4 when the security analysis result shows that the intelligent household equipment 5 is attacked; and the control terminal 4 is configured to send a starting instruction of the security policy to the first sending module 3 according to the warning information, so that the first sending module 3 sends the security policy to the smart home device 5, and the smart home device 5 starts a protection measure corresponding to the security policy.
The security analysis of the device data by the analysis module 2 can be performed in various ways, and can be selected by those skilled in the art as required. Specifically, the analysis module 2 in the present embodiment includes: comparing the submodule with the determining submodule; the comparison submodule is used for comparing the consistency between the equipment data and the preset equipment data to obtain a data comparison result; and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result. And performing security analysis on the equipment data through the comparison submodule and the determination submodule to obtain a corresponding security analysis result.
Specifically, the analysis module 2 in this embodiment further includes a storage submodule for storing the security policy, and when the first sending module 3 obtains the start instruction, the security policy is obtained from the storage submodule, and the security policy is sent to the smart home device 5.
Further, in order to further improve the security of the smart home protection system and prevent the smart home device 5 from being attacked, the communication between the control terminal 4 and the smart home device 5 is performed based on encryption.
The encryption mode in this embodiment is to adopt a cryptographic algorithm architecture to construct a whole process architecture scheme of identity recognition, threat analysis, security control, and data protection of the smart home devices 5 and the control terminal 4. The end and the end in this embodiment use the hardware cryptographic module as an implementation basis, the hardware cryptographic module must be used as a main support in the smart home device 5, and the hardware cryptographic module + the periodic temporary secret key is used as an application basis in the control terminal 4. The use convenience of the user is improved, and meanwhile the protection strength of the secret key in the security period is ensured.
The intelligent household equipment 5 and the control terminal 4 configure a public and private key pair for the owner of the intelligent household equipment 5 respectively. The public and private key pair can take terminal data (equipment ID, Mac address of the intelligent household equipment 5, user name, identification number, telephone number and the like of the control terminal 4) as identification, and when the public and private key pair is generated by the identification, the public and private key pair is internally provided with the unique identification characteristic of the intelligent household equipment 5\ the control terminal 4. Namely, the public and private key pair corresponding to the preset public key is generated according to the terminal information of the control terminal 4 and/or the device ID of the smart home device 5.
Identification cryptography as with conventional public key cryptography, each user has an associated pair of public and private keys. In the identification password module, the identity of the user, such as name, IP address, email address, mobile phone number, etc., is used as a public key, and a corresponding user private key is generated through a mathematical way. The user identification is the public key of the user, no extra generation and storage are needed, the user identification only needs to be published in a certain mode, and the private key is stored secretly by the user.
The control terminal 4 completes the storage and protection of the allowed pairing public key, and adopts a hash algorithm and a signature mode to sign and prevent the public key in the control terminal 4 from being repudiated so as to ensure that the public key of the control terminal 4 is not illegally tampered.
According to the rule of communication between the smart home devices 5 and the control terminal 4, the smart home devices 5 in this embodiment send their Mac and other related information to the server, and keep the heartbeat, so as to ensure that the changed IP address is sent, so that the control terminal 4 can perform addressing. The control terminal 4 addresses to the server through Mac or device ID.
During addressing, the first encryption and decryption module 6 is used for signing the public key of the control terminal 4 when the control terminal 4 addresses the intelligent home device 5, and sending a connection request to the second encryption and decryption module 7 based on the signed public key of the control terminal 4; the second encryption and decryption module 7 checks the connection request to obtain a public key of the control terminal 4; and the intelligent home equipment is also used for connecting the control terminal 4 with the intelligent home equipment 5 after the public key of the control terminal 4 is compared with the preset public key to be consistent.
Specifically, the second encryption and decryption module 7 checks the received connection request, restores the public key of the control terminal 4, performs hash verification on the restored public key of the control terminal 4 to prevent malicious attack, counterfeiting and tampering, compares the public key stored in the smart home device 5 with the restored public key of the control terminal 4, and responds to the connection request sent by the control terminal 4 after the comparison is successful to perform encrypted data connection, otherwise, denies access.
After the comparison of the intelligent household equipment 5 is successful, a random number generator built in a cryptographic chip is adopted to generate a random number, and the random number is encrypted in a digital envelope mode and then sent to the control terminal 4.
It can be understood that the first encryption and decryption module 6 and the second encryption and decryption module 7 both adopt the cryptographic chip USB Key of the cryptographic algorithm.
It can be understood that the first sending module 3 is further configured to send, when the start instruction is obtained, the security policy corresponding to the start instruction to the cloud computing platform 8, so that the cloud computing platform 8 updates the local virus library according to the security policy.
Specifically, the device data includes: data source port, destination port, and device ID.
The embodiment further comprises a second sending module, and the second sending module is used for the transmission of the encrypted random number between the random number generator and the control terminal 4 and the transmission of the encrypted data between the intelligent household equipment 5 and the control terminal 4.
The working flow of the protection system in this embodiment is as follows:
the smart home device 5 starts data collection, encrypts collected device data by using a random number as a secret key, sends the encrypted device data to the control terminal 4, decrypts the encrypted device data by using a locally stored private key through the control terminal 4, decrypts the encrypted device data by using the decrypted random number as the secret key, obtains the device data, and outputs the device data.
When the user sends a control instruction for closing data acquisition, the control terminal 4 and the intelligent home equipment 5 clear the cache data and the random number key, and control and use of the intelligent safe intelligent home equipment 5 are completed.
The encryption and decryption of the control instruction data are consistent with the principle of the encryption and decryption of the equipment data, and are mainly initiated by the control terminal 4, and the intelligent household equipment 5 passively receives and executes instructions.
Compared with the prior art, the intelligent home protection system in the embodiment has the following advantages:
1) by adopting an identification password technology, a cipher machine is used for jointly generating a public and private key pair with a key chip 1D (or other serial numbers which can be identified as unique numbers) of the equipment, so that the public and private key pair implies the specific attribute of the product, and a user with a repudiation prevention function (or uniqueness function) does not use an account and a password when registering, logging in and communicating, but adopts a method for calculating and verifying the public and private key pair, thereby avoiding the possibility that the account password is cracked, and practically realizing the credible identity identification of the intelligent safe household equipment 5.
2) And a non-digital certificate mode is adopted, so that certificate management is not required, and the occupied resources are less: and bilinear pairing operation is not used, so that the calculation efficiency is high: the security level is improved by utilizing the national password chip USB Key capable of protecting the secret Key and adopting the identification cryptography to self-certify and mutually certify the public Key.
3) Public and private key password authentication is adopted to replace the current account/password authentication mode, the high-strength public and private key password enhances the strength and complexity of identity identification authentication, and the condition that the private data information of a user is leaked due to the existence of unsafe factors such as strength cracking, default passwords and the like caused only by account number and password modes between the conventional intelligent household equipment 5 and the control terminal 4 is avoided;
4) the user key is divided into an encryption key and a signature key by adopting a double-key mechanism, the two types of encryption keys and signature keys are in accordance with the national password management policy, the user key can be cancelled and replaced, meanwhile, the user signature key is generated by the user and the key generation center together, and the signature has legal effectiveness.
The foregoing is a second embodiment of the smart home protection system provided in the embodiment of the present application, and the following is an embodiment of the smart home protection method provided in the embodiment of the present application.
Referring to fig. 2, a flowchart of an embodiment of an intelligent home protection method in the embodiment of the present application is schematically shown.
The intelligent home protection method in the embodiment includes:
And 203, when the security analysis result shows that the intelligent household equipment is attacked, the first sending module sends alarm information to the control terminal.
And 204, the control terminal sends a starting instruction of the security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent home equipment, and the intelligent home equipment can conveniently start protective measures corresponding to the security policy.
The acquisition module in this embodiment can acquire device data of the smart home device, and then the analysis module performs security analysis on the device data to obtain a security analysis result of the smart home device, when the security analysis result indicates that the smart home device is attacked, the first sending module sends alarm information to the control terminal, the control terminal sends a starting instruction for starting a security policy to the first sending module according to the alarm information, and the first sending module sends the security policy to the smart home device after receiving the starting instruction, so that the smart home device starts a safeguard measure corresponding to the security policy. Therefore, once the intelligent household equipment is attacked, the attack can be protected through the acquisition module, the analysis module, the first sending module and the control terminal, and the technical problem that the safety of the existing intelligent household protection system is poor is solved.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (10)
1. The utility model provides an intelligence house protection system which characterized in that includes: the system comprises a collection module, an analysis module, a first sending module and a control terminal;
the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment;
the analysis module is used for carrying out security analysis on the equipment data to obtain a security analysis result;
the first sending module is used for sending alarm information to the control terminal when the security analysis result shows that the intelligent household equipment is attacked;
the control terminal is configured to send a starting instruction of a security policy to the first sending module according to the warning information, so that the first sending module sends the security policy to the smart home device, so that the smart home device can start a safeguard measure corresponding to the security policy.
2. The smart home protection system of claim 1, wherein the analysis module comprises: comparing the submodule with the determining submodule;
the comparison submodule is used for comparing the consistency between the equipment data and preset equipment data to obtain a data comparison result;
and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result.
3. The smart home protection system of claim 2, wherein the analysis module further comprises: a storage submodule;
and the storage submodule is used for storing the security policy.
4. The smart home protection system of claim 1, further comprising: the first encryption and decryption module is connected with the control terminal, and the second encryption and decryption module is connected with the intelligent household equipment;
the first encryption and decryption module is used for signing a control terminal public key when the control terminal addresses the intelligent home equipment, and sending a connection request to the second encryption and decryption module based on the signed control terminal public key;
the second encryption and decryption module is used for verifying the signature of the connection request to obtain the public key of the control terminal; and the intelligent home equipment is also used for connecting the control terminal with the intelligent home equipment after the public key of the control terminal is compared with a preset public key.
5. The smart home protection system according to claim 4, wherein the first encryption/decryption module and the second encryption/decryption module both employ cryptographic chip USB Key using a cryptographic algorithm.
6. The smart home protection system according to claim 4, wherein the configuration process of the public and private key pair corresponding to the preset public key is as follows:
and generating the public and private key pair according to the terminal information of the control terminal and/or the equipment ID of the intelligent household equipment.
7. The smart home protection system according to claim 6, wherein the terminal information includes: a user name and an identification number.
8. The smart home protection system according to claim 1, wherein the first sending module is further configured to send the security policy corresponding to the start instruction to a cloud computing platform when the start instruction is obtained, so that the cloud computing platform updates a local virus library according to the security policy.
9. The smart home protection system of claim 1, wherein the device data comprises: data source port, destination port, and device ID.
10. An intelligent home protection method applied to the intelligent home protection system according to any one of claims 1 to 9, comprising:
the acquisition module acquires equipment data from the intelligent household equipment;
the analysis module performs security analysis on the equipment data to obtain a security analysis result;
the first sending module sends alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked;
and the control terminal sends a starting instruction of a security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent household equipment, and the intelligent household equipment can conveniently start the protective measures corresponding to the security policy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010966518.6A CN112073422A (en) | 2020-09-15 | 2020-09-15 | Intelligent home protection system and protection method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010966518.6A CN112073422A (en) | 2020-09-15 | 2020-09-15 | Intelligent home protection system and protection method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112073422A true CN112073422A (en) | 2020-12-11 |
Family
ID=73695768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010966518.6A Pending CN112073422A (en) | 2020-09-15 | 2020-09-15 | Intelligent home protection system and protection method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112073422A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312674A (en) * | 2021-06-18 | 2021-08-27 | 北京泰立鑫科技有限公司 | Access security method and system based on multi-factor environment perception digital certificate |
CN114500020A (en) * | 2022-01-18 | 2022-05-13 | 成都网域探行科技有限公司 | Network security management method based on big data |
CN114884685A (en) * | 2021-02-05 | 2022-08-09 | 华为技术有限公司 | Security management method of electronic device, electronic device and readable medium thereof |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105824242A (en) * | 2016-03-14 | 2016-08-03 | 美的集团股份有限公司 | Intelligent household safety protection system and method |
CN108881960A (en) * | 2018-08-08 | 2018-11-23 | 江苏信源久安信息科技有限公司 | The method of intelligent video camera head security control and data confidentiality based on id password |
-
2020
- 2020-09-15 CN CN202010966518.6A patent/CN112073422A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105824242A (en) * | 2016-03-14 | 2016-08-03 | 美的集团股份有限公司 | Intelligent household safety protection system and method |
CN108881960A (en) * | 2018-08-08 | 2018-11-23 | 江苏信源久安信息科技有限公司 | The method of intelligent video camera head security control and data confidentiality based on id password |
Non-Patent Citations (1)
Title |
---|
张伟等: "浅析智能家居系统的安全性与防护", 《微型电脑应用》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114884685A (en) * | 2021-02-05 | 2022-08-09 | 华为技术有限公司 | Security management method of electronic device, electronic device and readable medium thereof |
CN114884685B (en) * | 2021-02-05 | 2023-08-22 | 华为技术有限公司 | Security management method of electronic equipment, electronic equipment and readable medium thereof |
CN113312674A (en) * | 2021-06-18 | 2021-08-27 | 北京泰立鑫科技有限公司 | Access security method and system based on multi-factor environment perception digital certificate |
CN114500020A (en) * | 2022-01-18 | 2022-05-13 | 成都网域探行科技有限公司 | Network security management method based on big data |
CN114500020B (en) * | 2022-01-18 | 2024-01-16 | 成都网域探行科技有限公司 | Network security management method based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rezaeighaleh et al. | New secure approach to backup cryptocurrency wallets | |
CN110572804B (en) | Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal | |
CN109361668A (en) | A method of reliable data transmission | |
CN108881960B (en) | Intelligent camera safety control and data confidentiality method based on identification password | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN103001976A (en) | A Safe Network Information Transmission Method | |
CN101695038A (en) | Method and device for detecting SSL enciphered data safety | |
CN112073422A (en) | Intelligent home protection system and protection method thereof | |
EP4465588A1 (en) | Quantum key transmission method, device and system | |
CN108965310A (en) | The anti-tamper encryption implementation method of crossing and device on a kind of batch data | |
CN118174921A (en) | Multi-factor SSH login authentication method based on national encryption algorithm and supporting bidirectional authentication | |
CN110224816A (en) | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number | |
CN110519222B (en) | External network access identity authentication method and system based on disposable asymmetric key pair and key fob | |
CN114024672B (en) | Safety protection method and system for power line carrier communication system | |
Natarajan et al. | Secure user authentication and data sharing for mobile cloud computing using BLAKE2 and Diffie-Hellman key exchange | |
WO2024139347A1 (en) | Method, system and apparatus for securely acquiring sensitive information, and electronic device | |
CN111274570A (en) | Encryption authentication method and device, server, readable storage medium and air conditioner | |
CN104579692A (en) | Information processing method on basis of intelligent card | |
CN110048920B (en) | Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob | |
CN110061895B (en) | Close-range energy-saving communication method and system for quantum computing resisting application system based on key fob | |
CN114448600A (en) | Key management method and system suitable for zero trust network | |
CN114374519A (en) | Data transmission method, system and equipment | |
CN108184230B (en) | System and method for realizing encryption of soft SIM | |
CN113676468A (en) | Three-party enhanced authentication system design method based on message verification technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201211 |