[go: up one dir, main page]

CN112073422A - Intelligent home protection system and protection method thereof - Google Patents

Intelligent home protection system and protection method thereof Download PDF

Info

Publication number
CN112073422A
CN112073422A CN202010966518.6A CN202010966518A CN112073422A CN 112073422 A CN112073422 A CN 112073422A CN 202010966518 A CN202010966518 A CN 202010966518A CN 112073422 A CN112073422 A CN 112073422A
Authority
CN
China
Prior art keywords
control terminal
module
equipment
protection system
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010966518.6A
Other languages
Chinese (zh)
Inventor
崔超
肖勇
赵云
曾勇刚
林伟斌
蔡梓文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Original Assignee
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Power Grid International Co ltd, China Southern Power Grid Co Ltd filed Critical China South Power Grid International Co ltd
Priority to CN202010966518.6A priority Critical patent/CN112073422A/en
Publication of CN112073422A publication Critical patent/CN112073422A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses intelligent home protection system and protection method thereof, wherein the protection system comprises: the system comprises a collection module, an analysis module, a first sending module and a control terminal; the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment; the analysis module is used for carrying out safety analysis on the equipment data to obtain a safety analysis result; the first sending module is used for sending alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked; and the control terminal is used for sending a starting instruction of the security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent home equipment, the intelligent home equipment can conveniently start the protection measures corresponding to the security policy, and the technical problem that the existing intelligent home protection system is poor in security is solved.

Description

Intelligent home protection system and protection method thereof
Technical Field
The application relates to the technical field of intelligent home, in particular to an intelligent home protection system and a protection method thereof.
Background
Driven by the rapid development of technologies such as the internet, the internet of things, AI, cloud computing, big data and the like, a new era of the household appliance industry has come. The smart home market is growing at a rate of 20% -30% per year, and smart homes are becoming an increasingly active consumption hotspot.
Along with the improvement of the safety consciousness of people, people also attach more and more importance to personal privacy and property safety, and higher requirements are put forward on the safety of smart homes. However, the number of smart home products in the current market exceeds 8, and the smart home products have no safety defense function. If the smart homes are attacked, safety measures cannot be started in time to stop the attack, and once the smart homes are controlled illegally, great harm is caused to users.
Therefore, providing an intelligent home protection system for solving the problem of poor safety of the existing intelligent home is a technical problem to be urgently solved by technical personnel in the field.
Disclosure of Invention
The application provides an intelligent home protection system and a protection method thereof, and solves the technical problem that an existing intelligent home protection system is poor in safety.
In view of this, the first aspect of the present application provides an intelligent home protection system, including: the system comprises a collection module, an analysis module, a first sending module and a control terminal;
the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment;
the analysis module is used for carrying out security analysis on the equipment data to obtain a security analysis result;
the first sending module is used for sending alarm information to the control terminal when the security analysis result shows that the intelligent household equipment is attacked;
the control terminal is configured to send a starting instruction of a security policy to the first sending module according to the warning information, so that the first sending module sends the security policy to the smart home device, so that the smart home device can start a safeguard measure corresponding to the security policy.
Alternatively,
the analysis module includes: comparing the submodule with the determining submodule;
the comparison submodule is used for comparing the consistency between the equipment data and preset equipment data to obtain a data comparison result;
and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result.
Alternatively,
the analysis module further comprises: a storage submodule;
and the storage submodule is used for storing the security policy.
Alternatively,
the intelligent home protection system further comprises: the first encryption and decryption module is connected with the control terminal, and the second encryption and decryption module is connected with the intelligent household equipment;
the first encryption and decryption module is used for signing a control terminal public key when the control terminal addresses the intelligent home equipment, and sending a connection request to the second encryption and decryption module based on the signed control terminal public key;
the second encryption and decryption module is used for verifying the signature of the connection request to obtain the public key of the control terminal; and the intelligent home equipment is also used for connecting the control terminal with the intelligent home equipment after the public key of the control terminal is compared with a preset public key.
Alternatively,
the first encryption and decryption module and the second encryption and decryption module adopt a state cryptographic algorithm to encrypt a chip USB Key.
Alternatively,
the configuration process of the public and private key pair corresponding to the preset public key is as follows:
and generating the public and private key pair according to the terminal information of the control terminal and/or the equipment ID of the intelligent household equipment.
Alternatively,
the terminal information includes: a user name and an identification number.
Alternatively,
the first sending module is further configured to send the security policy corresponding to the start instruction to a cloud computing platform when the start instruction is obtained, so that the cloud computing platform updates a local virus library according to the security policy.
Alternatively,
the device data includes: data source port, destination port, and device ID.
A second aspect of the present application provides an intelligent home protection method, which is applied to the intelligent home protection system according to the first aspect, and includes:
the acquisition module acquires equipment data from the intelligent household equipment;
the analysis module performs security analysis on the equipment data to obtain a security analysis result;
the first sending module sends alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked;
and the control terminal sends a starting instruction of a security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent household equipment, and the intelligent household equipment can conveniently start the protective measures corresponding to the security policy.
According to the technical scheme, the embodiment of the application has the following advantages:
the application provides an intelligence house protection system includes: the system comprises a collection module, an analysis module, a first sending module and a control terminal; the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment; the analysis module is used for carrying out safety analysis on the equipment data to obtain a safety analysis result; the first sending module is used for sending alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked; and the control terminal is used for sending a starting instruction of the security strategy to the first sending module according to the alarm information, so that the first sending module sends the security strategy to the intelligent home equipment, and the intelligent home equipment can conveniently start the protective measures corresponding to the security strategy.
The acquisition module in this application can gather the equipment data of intelligent home equipment, then analysis module carries out security analysis to the equipment data after, obtain intelligent home equipment's security analysis result, when security analysis result is that intelligent home equipment is attacked, first sending module sends alarm information to control terminal, control terminal sends the start instruction that is used for starting the security policy to first sending module according to alarm information, first sending module is after receiving the start instruction, send the security policy to intelligent home equipment for intelligent home equipment starts the safeguard measure that this security policy corresponds. Therefore, once the intelligent household equipment is attacked, the attack can be protected through the acquisition module, the analysis module, the first sending module and the control terminal, and the technical problem that the safety of the existing intelligent household protection system is poor is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of an embodiment of an intelligent home protection system in an embodiment of the present application;
fig. 2 is a schematic flowchart of an embodiment of a smart home protection method in an embodiment of the present application.
Detailed Description
The embodiment of the application provides an intelligent home protection system and a protection method thereof, and solves the technical problem that an existing intelligent home protection system is poor in safety.
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a schematic structural diagram of a first embodiment of an intelligent home protection system in an embodiment of the present application is shown.
Intelligent house protection system includes in this embodiment: the system comprises an acquisition module 1, an analysis module 2, a first sending module 3 and a control terminal 4; the acquisition module 1 is connected with the intelligent household equipment 5 and is used for acquiring equipment data from the intelligent household equipment 5; the analysis module 2 is used for carrying out security analysis on the equipment data to obtain a security analysis result; the first sending module 3 is used for sending alarm information to the control terminal 4 when the security analysis result shows that the intelligent household equipment 5 is attacked; and the control terminal 4 is configured to send a starting instruction of the security policy to the first sending module 3 according to the warning information, so that the first sending module 3 sends the security policy to the smart home device 5, and the smart home device 5 starts a protection measure corresponding to the security policy.
It should be noted that the control terminal 4 in this embodiment includes, but is not limited to: smart phone, Pad, gateway, PC. The smart home devices 5 include but are not limited to: intelligent lamp, intelligent door lock, intelligent (window) curtain, intelligent electric rice cooker, intelligent TV.
The acquisition module 1 in this embodiment may acquire device data of the smart home device 5, and then the analysis module 2 performs security analysis on the device data to obtain a security analysis result of the smart home device 5, when the security analysis result indicates that the smart home device 5 is attacked, the first sending module 3 sends an alarm message to the control terminal 4, the control terminal 4 sends a starting instruction for starting a security policy to the first sending module 3 according to the alarm message, and the first sending module 3 sends the security policy to the smart home device 5 after receiving the starting instruction, so that the smart home device 5 starts a safeguard measure corresponding to the security policy. So, once attacked, intelligent household equipment 5 alright protect the attack through collection module 1, analysis module 2, first sending module 3 and control terminal 4 to the technical problem that current intelligent household protection system security is poor has been solved.
The foregoing is a first embodiment of an intelligent home protection system provided in the embodiments of the present application, and the following is a second embodiment of an intelligent home protection system provided in the embodiments of the present application.
Referring to fig. 1, a schematic structural diagram of a first embodiment of an intelligent home protection system in an embodiment of the present application is shown.
Intelligent house protection system includes in this embodiment: the system comprises an acquisition module 1, an analysis module 2, a first sending module 3 and a control terminal 4; the acquisition module 1 is connected with the intelligent household equipment 5 and is used for acquiring equipment data from the intelligent household equipment 5; the analysis module 2 is used for carrying out security analysis on the equipment data to obtain a security analysis result; the first sending module 3 is used for sending alarm information to the control terminal 4 when the security analysis result shows that the intelligent household equipment 5 is attacked; and the control terminal 4 is configured to send a starting instruction of the security policy to the first sending module 3 according to the warning information, so that the first sending module 3 sends the security policy to the smart home device 5, and the smart home device 5 starts a protection measure corresponding to the security policy.
The security analysis of the device data by the analysis module 2 can be performed in various ways, and can be selected by those skilled in the art as required. Specifically, the analysis module 2 in the present embodiment includes: comparing the submodule with the determining submodule; the comparison submodule is used for comparing the consistency between the equipment data and the preset equipment data to obtain a data comparison result; and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result. And performing security analysis on the equipment data through the comparison submodule and the determination submodule to obtain a corresponding security analysis result.
Specifically, the analysis module 2 in this embodiment further includes a storage submodule for storing the security policy, and when the first sending module 3 obtains the start instruction, the security policy is obtained from the storage submodule, and the security policy is sent to the smart home device 5.
Further, in order to further improve the security of the smart home protection system and prevent the smart home device 5 from being attacked, the communication between the control terminal 4 and the smart home device 5 is performed based on encryption.
The encryption mode in this embodiment is to adopt a cryptographic algorithm architecture to construct a whole process architecture scheme of identity recognition, threat analysis, security control, and data protection of the smart home devices 5 and the control terminal 4. The end and the end in this embodiment use the hardware cryptographic module as an implementation basis, the hardware cryptographic module must be used as a main support in the smart home device 5, and the hardware cryptographic module + the periodic temporary secret key is used as an application basis in the control terminal 4. The use convenience of the user is improved, and meanwhile the protection strength of the secret key in the security period is ensured.
The intelligent household equipment 5 and the control terminal 4 configure a public and private key pair for the owner of the intelligent household equipment 5 respectively. The public and private key pair can take terminal data (equipment ID, Mac address of the intelligent household equipment 5, user name, identification number, telephone number and the like of the control terminal 4) as identification, and when the public and private key pair is generated by the identification, the public and private key pair is internally provided with the unique identification characteristic of the intelligent household equipment 5\ the control terminal 4. Namely, the public and private key pair corresponding to the preset public key is generated according to the terminal information of the control terminal 4 and/or the device ID of the smart home device 5.
Identification cryptography as with conventional public key cryptography, each user has an associated pair of public and private keys. In the identification password module, the identity of the user, such as name, IP address, email address, mobile phone number, etc., is used as a public key, and a corresponding user private key is generated through a mathematical way. The user identification is the public key of the user, no extra generation and storage are needed, the user identification only needs to be published in a certain mode, and the private key is stored secretly by the user.
The control terminal 4 completes the storage and protection of the allowed pairing public key, and adopts a hash algorithm and a signature mode to sign and prevent the public key in the control terminal 4 from being repudiated so as to ensure that the public key of the control terminal 4 is not illegally tampered.
According to the rule of communication between the smart home devices 5 and the control terminal 4, the smart home devices 5 in this embodiment send their Mac and other related information to the server, and keep the heartbeat, so as to ensure that the changed IP address is sent, so that the control terminal 4 can perform addressing. The control terminal 4 addresses to the server through Mac or device ID.
During addressing, the first encryption and decryption module 6 is used for signing the public key of the control terminal 4 when the control terminal 4 addresses the intelligent home device 5, and sending a connection request to the second encryption and decryption module 7 based on the signed public key of the control terminal 4; the second encryption and decryption module 7 checks the connection request to obtain a public key of the control terminal 4; and the intelligent home equipment is also used for connecting the control terminal 4 with the intelligent home equipment 5 after the public key of the control terminal 4 is compared with the preset public key to be consistent.
Specifically, the second encryption and decryption module 7 checks the received connection request, restores the public key of the control terminal 4, performs hash verification on the restored public key of the control terminal 4 to prevent malicious attack, counterfeiting and tampering, compares the public key stored in the smart home device 5 with the restored public key of the control terminal 4, and responds to the connection request sent by the control terminal 4 after the comparison is successful to perform encrypted data connection, otherwise, denies access.
After the comparison of the intelligent household equipment 5 is successful, a random number generator built in a cryptographic chip is adopted to generate a random number, and the random number is encrypted in a digital envelope mode and then sent to the control terminal 4.
It can be understood that the first encryption and decryption module 6 and the second encryption and decryption module 7 both adopt the cryptographic chip USB Key of the cryptographic algorithm.
It can be understood that the first sending module 3 is further configured to send, when the start instruction is obtained, the security policy corresponding to the start instruction to the cloud computing platform 8, so that the cloud computing platform 8 updates the local virus library according to the security policy.
Specifically, the device data includes: data source port, destination port, and device ID.
The embodiment further comprises a second sending module, and the second sending module is used for the transmission of the encrypted random number between the random number generator and the control terminal 4 and the transmission of the encrypted data between the intelligent household equipment 5 and the control terminal 4.
The working flow of the protection system in this embodiment is as follows:
the smart home device 5 starts data collection, encrypts collected device data by using a random number as a secret key, sends the encrypted device data to the control terminal 4, decrypts the encrypted device data by using a locally stored private key through the control terminal 4, decrypts the encrypted device data by using the decrypted random number as the secret key, obtains the device data, and outputs the device data.
When the user sends a control instruction for closing data acquisition, the control terminal 4 and the intelligent home equipment 5 clear the cache data and the random number key, and control and use of the intelligent safe intelligent home equipment 5 are completed.
The encryption and decryption of the control instruction data are consistent with the principle of the encryption and decryption of the equipment data, and are mainly initiated by the control terminal 4, and the intelligent household equipment 5 passively receives and executes instructions.
Compared with the prior art, the intelligent home protection system in the embodiment has the following advantages:
1) by adopting an identification password technology, a cipher machine is used for jointly generating a public and private key pair with a key chip 1D (or other serial numbers which can be identified as unique numbers) of the equipment, so that the public and private key pair implies the specific attribute of the product, and a user with a repudiation prevention function (or uniqueness function) does not use an account and a password when registering, logging in and communicating, but adopts a method for calculating and verifying the public and private key pair, thereby avoiding the possibility that the account password is cracked, and practically realizing the credible identity identification of the intelligent safe household equipment 5.
2) And a non-digital certificate mode is adopted, so that certificate management is not required, and the occupied resources are less: and bilinear pairing operation is not used, so that the calculation efficiency is high: the security level is improved by utilizing the national password chip USB Key capable of protecting the secret Key and adopting the identification cryptography to self-certify and mutually certify the public Key.
3) Public and private key password authentication is adopted to replace the current account/password authentication mode, the high-strength public and private key password enhances the strength and complexity of identity identification authentication, and the condition that the private data information of a user is leaked due to the existence of unsafe factors such as strength cracking, default passwords and the like caused only by account number and password modes between the conventional intelligent household equipment 5 and the control terminal 4 is avoided;
4) the user key is divided into an encryption key and a signature key by adopting a double-key mechanism, the two types of encryption keys and signature keys are in accordance with the national password management policy, the user key can be cancelled and replaced, meanwhile, the user signature key is generated by the user and the key generation center together, and the signature has legal effectiveness.
The foregoing is a second embodiment of the smart home protection system provided in the embodiment of the present application, and the following is an embodiment of the smart home protection method provided in the embodiment of the present application.
Referring to fig. 2, a flowchart of an embodiment of an intelligent home protection method in the embodiment of the present application is schematically shown.
The intelligent home protection method in the embodiment includes:
step 201, an acquisition module acquires equipment data from the intelligent household equipment.
Step 202, the analysis module performs security analysis on the equipment data to obtain a security analysis result.
And 203, when the security analysis result shows that the intelligent household equipment is attacked, the first sending module sends alarm information to the control terminal.
And 204, the control terminal sends a starting instruction of the security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent home equipment, and the intelligent home equipment can conveniently start protective measures corresponding to the security policy.
The acquisition module in this embodiment can acquire device data of the smart home device, and then the analysis module performs security analysis on the device data to obtain a security analysis result of the smart home device, when the security analysis result indicates that the smart home device is attacked, the first sending module sends alarm information to the control terminal, the control terminal sends a starting instruction for starting a security policy to the first sending module according to the alarm information, and the first sending module sends the security policy to the smart home device after receiving the starting instruction, so that the smart home device starts a safeguard measure corresponding to the security policy. Therefore, once the intelligent household equipment is attacked, the attack can be protected through the acquisition module, the analysis module, the first sending module and the control terminal, and the technical problem that the safety of the existing intelligent household protection system is poor is solved.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. The utility model provides an intelligence house protection system which characterized in that includes: the system comprises a collection module, an analysis module, a first sending module and a control terminal;
the acquisition module is connected with the intelligent household equipment and is used for acquiring equipment data from the intelligent household equipment;
the analysis module is used for carrying out security analysis on the equipment data to obtain a security analysis result;
the first sending module is used for sending alarm information to the control terminal when the security analysis result shows that the intelligent household equipment is attacked;
the control terminal is configured to send a starting instruction of a security policy to the first sending module according to the warning information, so that the first sending module sends the security policy to the smart home device, so that the smart home device can start a safeguard measure corresponding to the security policy.
2. The smart home protection system of claim 1, wherein the analysis module comprises: comparing the submodule with the determining submodule;
the comparison submodule is used for comparing the consistency between the equipment data and preset equipment data to obtain a data comparison result;
and the determining submodule is used for determining a safety analysis result corresponding to the data comparison result based on the corresponding relation between the data comparison result and the safety analysis result according to the data comparison result.
3. The smart home protection system of claim 2, wherein the analysis module further comprises: a storage submodule;
and the storage submodule is used for storing the security policy.
4. The smart home protection system of claim 1, further comprising: the first encryption and decryption module is connected with the control terminal, and the second encryption and decryption module is connected with the intelligent household equipment;
the first encryption and decryption module is used for signing a control terminal public key when the control terminal addresses the intelligent home equipment, and sending a connection request to the second encryption and decryption module based on the signed control terminal public key;
the second encryption and decryption module is used for verifying the signature of the connection request to obtain the public key of the control terminal; and the intelligent home equipment is also used for connecting the control terminal with the intelligent home equipment after the public key of the control terminal is compared with a preset public key.
5. The smart home protection system according to claim 4, wherein the first encryption/decryption module and the second encryption/decryption module both employ cryptographic chip USB Key using a cryptographic algorithm.
6. The smart home protection system according to claim 4, wherein the configuration process of the public and private key pair corresponding to the preset public key is as follows:
and generating the public and private key pair according to the terminal information of the control terminal and/or the equipment ID of the intelligent household equipment.
7. The smart home protection system according to claim 6, wherein the terminal information includes: a user name and an identification number.
8. The smart home protection system according to claim 1, wherein the first sending module is further configured to send the security policy corresponding to the start instruction to a cloud computing platform when the start instruction is obtained, so that the cloud computing platform updates a local virus library according to the security policy.
9. The smart home protection system of claim 1, wherein the device data comprises: data source port, destination port, and device ID.
10. An intelligent home protection method applied to the intelligent home protection system according to any one of claims 1 to 9, comprising:
the acquisition module acquires equipment data from the intelligent household equipment;
the analysis module performs security analysis on the equipment data to obtain a security analysis result;
the first sending module sends alarm information to the control terminal when the safety analysis result shows that the intelligent household equipment is attacked;
and the control terminal sends a starting instruction of a security policy to the first sending module according to the alarm information, so that the first sending module sends the security policy to the intelligent household equipment, and the intelligent household equipment can conveniently start the protective measures corresponding to the security policy.
CN202010966518.6A 2020-09-15 2020-09-15 Intelligent home protection system and protection method thereof Pending CN112073422A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010966518.6A CN112073422A (en) 2020-09-15 2020-09-15 Intelligent home protection system and protection method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010966518.6A CN112073422A (en) 2020-09-15 2020-09-15 Intelligent home protection system and protection method thereof

Publications (1)

Publication Number Publication Date
CN112073422A true CN112073422A (en) 2020-12-11

Family

ID=73695768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010966518.6A Pending CN112073422A (en) 2020-09-15 2020-09-15 Intelligent home protection system and protection method thereof

Country Status (1)

Country Link
CN (1) CN112073422A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312674A (en) * 2021-06-18 2021-08-27 北京泰立鑫科技有限公司 Access security method and system based on multi-factor environment perception digital certificate
CN114500020A (en) * 2022-01-18 2022-05-13 成都网域探行科技有限公司 Network security management method based on big data
CN114884685A (en) * 2021-02-05 2022-08-09 华为技术有限公司 Security management method of electronic device, electronic device and readable medium thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824242A (en) * 2016-03-14 2016-08-03 美的集团股份有限公司 Intelligent household safety protection system and method
CN108881960A (en) * 2018-08-08 2018-11-23 江苏信源久安信息科技有限公司 The method of intelligent video camera head security control and data confidentiality based on id password

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824242A (en) * 2016-03-14 2016-08-03 美的集团股份有限公司 Intelligent household safety protection system and method
CN108881960A (en) * 2018-08-08 2018-11-23 江苏信源久安信息科技有限公司 The method of intelligent video camera head security control and data confidentiality based on id password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张伟等: "浅析智能家居系统的安全性与防护", 《微型电脑应用》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884685A (en) * 2021-02-05 2022-08-09 华为技术有限公司 Security management method of electronic device, electronic device and readable medium thereof
CN114884685B (en) * 2021-02-05 2023-08-22 华为技术有限公司 Security management method of electronic equipment, electronic equipment and readable medium thereof
CN113312674A (en) * 2021-06-18 2021-08-27 北京泰立鑫科技有限公司 Access security method and system based on multi-factor environment perception digital certificate
CN114500020A (en) * 2022-01-18 2022-05-13 成都网域探行科技有限公司 Network security management method based on big data
CN114500020B (en) * 2022-01-18 2024-01-16 成都网域探行科技有限公司 Network security management method based on big data

Similar Documents

Publication Publication Date Title
Rezaeighaleh et al. New secure approach to backup cryptocurrency wallets
CN110572804B (en) Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal
CN109361668A (en) A method of reliable data transmission
CN108881960B (en) Intelligent camera safety control and data confidentiality method based on identification password
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN103001976A (en) A Safe Network Information Transmission Method
CN101695038A (en) Method and device for detecting SSL enciphered data safety
CN112073422A (en) Intelligent home protection system and protection method thereof
EP4465588A1 (en) Quantum key transmission method, device and system
CN108965310A (en) The anti-tamper encryption implementation method of crossing and device on a kind of batch data
CN118174921A (en) Multi-factor SSH login authentication method based on national encryption algorithm and supporting bidirectional authentication
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN114024672B (en) Safety protection method and system for power line carrier communication system
Natarajan et al. Secure user authentication and data sharing for mobile cloud computing using BLAKE2 and Diffie-Hellman key exchange
WO2024139347A1 (en) Method, system and apparatus for securely acquiring sensitive information, and electronic device
CN111274570A (en) Encryption authentication method and device, server, readable storage medium and air conditioner
CN104579692A (en) Information processing method on basis of intelligent card
CN110048920B (en) Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob
CN110061895B (en) Close-range energy-saving communication method and system for quantum computing resisting application system based on key fob
CN114448600A (en) Key management method and system suitable for zero trust network
CN114374519A (en) Data transmission method, system and equipment
CN108184230B (en) System and method for realizing encryption of soft SIM
CN113676468A (en) Three-party enhanced authentication system design method based on message verification technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201211