CN113949513B - Alarm system and alarm method - Google Patents

Alarm system and alarm method Download PDF

Info

Publication number
CN113949513B
CN113949513B CN202111090969.9A CN202111090969A CN113949513B CN 113949513 B CN113949513 B CN 113949513B CN 202111090969 A CN202111090969 A CN 202111090969A CN 113949513 B CN113949513 B CN 113949513B
Authority
CN
China
Prior art keywords
alarm
public key
cloud platform
information
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111090969.9A
Other languages
Chinese (zh)
Other versions
CN113949513A (en
Inventor
张勇
孔庆新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing BlueSky Technologies Co Ltd
Original Assignee
Beijing BlueSky Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing BlueSky Technologies Co Ltd filed Critical Beijing BlueSky Technologies Co Ltd
Priority to CN202111090969.9A priority Critical patent/CN113949513B/en
Publication of CN113949513A publication Critical patent/CN113949513A/en
Application granted granted Critical
Publication of CN113949513B publication Critical patent/CN113949513B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention provides an alarm system and an alarm method, wherein the alarm system comprises: the alarm device monitors the cloud platform and the alarm terminal; the alarm device is used for generating a key pair, generating alarm information based on the acquired monitoring information, encrypting the alarm information by using a private key in the key pair, sending the encrypted alarm information to the alarm terminal, and sending a public key in the key pair to the monitoring cloud platform; the monitoring cloud platform is used for receiving and storing the public key sent by the alarm equipment and sending the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal; and the alarm terminal is used for receiving the encrypted alarm information sent by the alarm equipment and decrypting the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform. The invention can improve the reliability and safety of the alarm system.

Description

Alarm system and alarm method
Technical Field
The invention relates to the technical field of information security, in particular to an alarm system and an alarm method.
Background
In the security field, a large number of alarm devices are connected with a monitoring cloud platform in a network mode, and the monitoring cloud platform can process alarm information generated and uploaded by various alarm devices so as to realize the alarm of the devices and guarantee the information security.
In the related technology, the alarm device can collect related information to generate alarm information, wherein the related information can be information such as pictures, audios and videos collected by the alarm device, and the alarm information is uploaded to the monitoring cloud platform in a plaintext manner through a private network between the alarm device and the monitoring cloud platform; the monitoring cloud platform performs unified processing on alarm information uploaded by various alarm devices, converts various alarm information into information which can be identified by the alarm terminal, and further forwards the various alarm information obtained after conversion to the corresponding alarm terminal to realize alarm.
However, in the related art, the alarm information is transmitted in a plaintext manner through a private network between the alarm device and the monitoring cloud platform, wherein the alarm information is easily stolen in the transmission process by the manner of information transmission through the private network, and the alarm information is in a plaintext state in the transmission process, so that the alarm information is easily tampered, and the reliability and the safety of an alarm system consisting of the monitoring cloud platform, the alarm device and the alarm terminal are not high.
Disclosure of Invention
The embodiment of the invention aims to provide an alarm system and an alarm method so as to improve the reliability and safety of the alarm system. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides an alarm system, including: the alarm device monitors the cloud platform and the alarm terminal;
the alarm equipment is used for generating a key pair, generating alarm information based on the collected monitoring information, encrypting the alarm information by utilizing a private key of the key pair, sending the encrypted alarm information to the alarm terminal, and sending a public key of the key pair to the monitoring cloud platform;
the monitoring cloud platform is used for receiving and storing the public key sent by the alarm equipment and sending the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal;
and the alarm terminal is used for receiving the encrypted alarm information sent by the alarm equipment and decrypting the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
Optionally, the alarm device is specifically configured to:
exchanging a public key in the key pair to the monitoring cloud platform based on an ECDHE-RSA algorithm;
the monitoring cloud platform is specifically configured to:
and sending the public key to the alarm terminal based on an ECDHE-RSA algorithm.
Optionally, the alarm terminal is specifically configured to:
and sending a public key acquisition request to the monitoring cloud platform, acquiring the public key returned by the monitoring cloud platform, and decrypting the encrypted alarm information by using the public key.
Optionally, the alarm device is further configured to:
and updating the key pair according to a preset period, and sending the public key in the updated key pair to the monitoring cloud platform.
Optionally, the alarm terminal is further configured to,
and under the condition that the public key cannot decrypt the encrypted alarm information, sending a public key acquisition request to the monitoring cloud platform, acquiring the public key returned by the monitoring cloud platform, and decrypting the encrypted alarm information by using the public key.
In a second aspect, an embodiment of the present invention provides an alarm method, applied to an alarm system, where the alarm system includes: the method comprises the following steps of:
the alarm equipment generates a key pair, generates alarm information based on the collected monitoring information, encrypts the alarm information by using a private key of the key pair, sends the encrypted alarm information to the alarm terminal, and sends a public key of the key pair to the monitoring cloud platform;
the monitoring cloud platform receives and stores the public key sent by the alarm equipment, and sends the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal;
and the alarm terminal receives the encrypted alarm information sent by the alarm equipment and decrypts the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
Optionally, the sending, by the alarm device, the public key in the key pair to the monitoring cloud platform includes:
the alarm device exchanges a public key in the key pair to the monitoring cloud platform based on an ECDHE-RSA algorithm;
the monitoring cloud platform sends the public key to the alarm terminal, and the monitoring cloud platform comprises:
and the monitoring cloud platform sends the public key to the alarm terminal based on an ECDHE-RSA algorithm.
Optionally, the alarm terminal decrypts the encrypted alarm information by using the public key acquired from the monitoring cloud platform, including:
and the alarm terminal sends a public key acquisition request to the monitoring cloud platform, acquires the public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
Optionally, the method further comprises:
and the alarm equipment updates the key pair according to a preset period and sends the public key in the updated key pair to the monitoring cloud platform.
Optionally, the method further comprises:
and the alarm terminal sends a public key acquisition request to the monitoring cloud platform under the condition that the public key cannot decrypt the encrypted alarm information, acquires the public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
The embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the method steps executed by any equipment end in the alarm system when being executed by a processor.
The embodiment of the invention also provides a computer program product containing instructions, which when run on a computer, cause the computer to execute the method steps executed by any equipment end of the alarm system.
The embodiment of the invention has the beneficial effects that:
according to the alarm system and the alarm method provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by utilizing the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of the alarm system are improved.
Of course, it is not necessary for any one product or method of practicing the invention to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the invention, and other embodiments may be obtained according to these drawings to those skilled in the art.
FIG. 1 is a schematic diagram of an alarm system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an alarm method according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, those of ordinary skill in the art will be able to devise all other embodiments that are obtained based on this application and are within the scope of the present invention.
In order to solve the problems that in the related art, alarm information is transmitted in a plaintext manner through a private network between an alarm device and a monitoring cloud platform, wherein the alarm information is easy to steal in the transmission process and is in a plaintext state in the transmission process by the information transmission manner of the private network, so that the alarm information is easy to tamper, and the reliability and the safety of an alarm system consisting of the monitoring cloud platform, the alarm device and an alarm terminal are low.
The alarm system provided by the embodiment of the invention comprises: the alarm device monitors the cloud platform and the alarm terminal;
the alarm device is used for generating a key pair, generating alarm information based on the acquired monitoring information, encrypting the alarm information by using a private key in the key pair, sending the encrypted alarm information to the alarm terminal, and sending a public key in the key pair to the monitoring cloud platform;
the monitoring cloud platform is used for receiving and storing the public key sent by the alarm equipment and sending the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal;
and the alarm terminal is used for receiving the encrypted alarm information sent by the alarm equipment and decrypting the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
According to the alarm system provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by using the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of the alarm system are improved.
The following describes a detailed description of an alarm system provided in the embodiments of the present invention:
the alarm system provided by the embodiment of the invention can be applied to the field of security protection. As shown in fig. 1, the alarm system 100 may include: an alarm device 110 that monitors the cloud platform 120 and an alarm terminal 130; the alarm device 110, the monitoring cloud platform 120 and the alarm terminal 130 may be connected to each other through a network.
The alarm device 110 is configured to generate a key pair, generate alarm information based on the collected monitoring information, encrypt the alarm information with a private key in the key pair, send the encrypted alarm information to the alarm terminal 130, and send a public key in the key pair to the monitoring cloud platform 120.
The monitoring cloud platform 120 is configured to receive and store a public key sent by the alarm device 110, and send the public key to the alarm terminal 130 when receiving a public key acquisition request sent by the alarm terminal 130.
The alarm terminal 130 is configured to receive the encrypted alarm information sent by the alarm device 110, and decrypt the encrypted alarm information by using the public key acquired from the monitoring cloud platform 120.
Specifically, the alarm device 110 may include: the system comprises network camera equipment, access control equipment, protection cabin equipment, parking lot detection equipment, audio or audio-video acquisition equipment, sensor equipment and other equipment capable of alarming and monitoring.
The alarm terminal 130 may include: electronic equipment terminals, such as mobile phones, computers and the like, or large screens of terminals, alarm equipment capable of giving an alarm and the like.
In practical application, the alarm device 110 may be provided with a corresponding monitoring information threshold, and further after the alarm device 110 collects the monitoring information, it may be determined whether the collected monitoring information reaches the corresponding monitoring information threshold. If so, it is determined that the alarm terminal 130 is required to alarm, and at this time, the alarm device 110 may generate alarm information based on the collected monitoring information, specifically, may generate alarm information including the monitoring information.
The alarm device 110 may also generate a key pair locally, specifically, the key pair may be generated by using hardware or software of the alarm device 110 itself, or may generate the key pair by a trusted authority, where the key pair includes a public key and a private key, where the private key may be used to encrypt alarm information, and the public key may be used to decrypt encrypted alarm information. Illustratively, the alarm device 110 may generate the key pair using an RSA (Rivest-Shamir-Adleman) algorithm or the like.
Alternatively, the alarm device 110 may also set a validity period for the key pair when generating the key pair, during which the key pair is valid.
After the alarm device 110 generates the key pair, the public key in the key pair is sent to the monitoring cloud platform 120 for storage through the network connection between the alarm device 110 and the monitoring cloud platform 120. For example, the alerting device 110 may send the public key of the key pair to a cluster or server in the monitoring cloud platform 120 for key management to be stored.
After the alarm device 110 generates the alarm information, the alarm information may be encrypted by using a private key in the key pair generated by the alarm device 110 to obtain encrypted alarm information, and further, the encrypted alarm information ciphertext is sent to the alarm terminal 130 through a network connection between the alarm device 110 and the alarm terminal 130.
In the embodiment of the invention, the alarm device 110 stores the private key in the key pair, which is used for encrypting the generated alarm information, and the alarm device 110 sends the public key in the key pair to the monitoring cloud platform 120 for storage, so that the distribution management of the key is realized, and the security of the key is ensured.
The monitoring cloud platform 120 receives and stores the public key sent by the alarm device 110, and when the monitoring cloud platform 120 receives the public key acquisition request sent by the alarm terminal 130 in the case that the alarm terminal 130 needs to decrypt the received encrypted alarm information, the public key is sent to the alarm terminal 130.
Illustratively, the encrypted alarm information sent by the alarm device 110 to the alarm terminal 130 and the public key sent to the monitoring cloud platform 120 both include the identification information of the alarm device 110, and the public key acquisition request received by the monitoring cloud platform 120 also includes the identification information of the alarm device 110, so that the monitoring cloud platform 120 may send the public key corresponding to the public key acquisition request including the identification information of the alarm device 110 requested by the alarm terminal 130 to the alarm terminal 130 by matching the identification information of the alarm device 110.
The alarm terminal 130 receives the encrypted alarm information transmitted from the alarm device 110, further decrypts the encrypted alarm information using the public key acquired from the monitoring cloud platform 120, and then alarms based on the decrypted alarm information.
As an alternative implementation manner of the embodiment of the present invention, the alarm terminal 130 is specifically configured to:
and sending a public key acquisition request to the monitoring cloud platform 120, acquiring a public key returned by the monitoring cloud platform 120, and decrypting the encrypted alarm information by using the public key.
The alarm terminal 130 may send a public key obtaining request to the monitoring cloud platform 120 after receiving the encrypted alarm information sent by the alarm device 110, and further receive a public key returned by the monitoring cloud platform 120, and decrypt the encrypted alarm information by using the public key.
Illustratively, the alarm terminal 130 receives encrypted alarm information sent by the alarm device 110, where the encrypted alarm information may include identification information of the alarm device 110, and further sends a public key obtaining request including the identification information of the alarm device 110 to the monitoring cloud platform 120, the monitoring cloud platform 120 searches for a corresponding public key based on the identification information of the alarm device 110 carried in the public key obtaining request, and returns the corresponding public key to the alarm terminal 130, and the alarm terminal 130 decrypts the encrypted alarm information by using the public key.
According to the alarm system provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by using the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of the alarm system are improved.
As an alternative implementation manner of the embodiment of the present invention, the alarm device 110 is specifically configured to:
and exchanging the public key in the key pair to the monitoring cloud platform based on the ECDHE-RSA algorithm.
The ECDHE-RSA algorithm is a key exchange algorithm, and can ensure the security in the key transmission process. In the embodiment of the invention, the alarm device 110 exchanges the public key in the key pair to the monitoring cloud platform 120 based on the ECDHE-RSA algorithm, so that the security of public key transmission is ensured, and the encrypted alarm message is not easy to tamper and steal in the transmission process.
ECDHE is an elliptic curve key exchange algorithm, and can also ensure security in the key transmission process. As an alternative implementation manner of the embodiment of the present invention, the alarm device 110 may be specifically used for:
based on the ECDHE algorithm, the public key in the key pair is exchanged to the monitoring cloud platform.
Accordingly, the monitoring cloud platform 120 may be specifically configured to:
and sending the public key to the alarm terminal based on the ECDHE-RSA algorithm.
After receiving the public key obtaining request sent by the alarm terminal 130, the monitoring cloud platform 120 sends the public key to the alarm terminal 130 based on the ECDHE-RSA algorithm, so that the security of public key transmission is ensured, and the alarm terminal 130 can decrypt the encrypted alarm information by using the public key.
Alternatively, the monitoring cloud platform 120 may be further specifically configured to:
and sending the public key to the alarm terminal based on the ECDHE algorithm.
As an alternative implementation of the embodiment of the present invention, the alarm device 110 is further configured to:
and updating the key pair according to a preset period, and sending the public key in the updated key pair to the monitoring cloud platform.
The alarm device 110 may update the key pair at a preset period, which may be one hour, one day, one week, or the like, to improve the security of the key pair. For example, the alerting device 110 may generate a key pair once a day to update the key pair.
After the alarm device 110 updates the key pair, the public key in the updated key pair may be sent to the monitoring cloud platform 120, so that the public key stored in the monitoring cloud platform 120 corresponds to the private key in the alarm device 110 in real time, which ensures that the alarm terminal 130 can acquire the accurate public key from the monitoring cloud platform 120 in time, and decrypt the alarm information.
As an optional implementation manner of the embodiment of the present invention, the alarm device 110 may further update the key pair when the device is started or replaced, and send the public key in the updated key pair to the monitoring cloud platform 120.
As an alternative implementation of the embodiment of the present invention, the alarm terminal 130 is further configured to,
and under the condition that the public key cannot decrypt the encrypted alarm information, sending a public key acquisition request to the monitoring cloud platform, acquiring a public key returned by the monitoring cloud platform, and decrypting the encrypted alarm information by using the public key.
Because the alarm device 110 updates the key pair according to a preset period, or when the device is started or replaced, and sends the public key in the updated key pair to the monitoring cloud platform 120, the alarm terminal 130 cannot continuously decrypt the alarm information encrypted by the private key after updating the key pair, and at this time, the alarm terminal 130 can send a public key obtaining request to the monitoring cloud platform 120 again, obtain the public key returned by the monitoring cloud platform 120, and decrypt the encrypted alarm information by using the public key.
According to the alarm system provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by using the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of the alarm system are improved.
Corresponding to the embodiment of the system shown in fig. 1, the embodiment of the invention also provides an alarm method, as shown in fig. 2, which may include the following steps:
s201, the alarm equipment generates a key pair, generates alarm information based on the collected monitoring information, encrypts the alarm information by using a private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends a public key in the key pair to the monitoring cloud platform.
S202, the monitoring cloud platform receives and stores the public key sent by the alarm device, and sends the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal.
S203, the alarm terminal receives the encrypted alarm information sent by the alarm device and decrypts the encrypted alarm information by using the public key acquired from the monitoring cloud platform.
According to the alarm method provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by using the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of an alarm system are improved.
As an optional implementation manner of the embodiment of the present invention, step S201 of the alarm device sending the public key in the key pair to the monitoring cloud platform includes:
the alarm device exchanges the public key in the key pair to the monitoring cloud platform based on the ECDHE-RSA algorithm;
the monitoring cloud platform sends the public key to the alarm terminal, and the monitoring cloud platform comprises:
and the monitoring cloud platform sends the public key to the alarm terminal based on the ECDHE-RSA algorithm.
As an optional implementation manner of the embodiment of the present invention, the step S203 of the alarm terminal decrypting the encrypted alarm information by using the public key obtained from the monitoring cloud platform includes:
the alarm terminal sends a public key acquisition request to the monitoring cloud platform, acquires a public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
As an optional implementation manner of the embodiment of the present invention, the method further includes:
the alarm device updates the key pair according to a preset period, and sends the public key in the updated key pair to the monitoring cloud platform.
As an optional implementation manner of the embodiment of the present invention, the method further includes:
and the alarm terminal sends a public key acquisition request to the monitoring cloud platform under the condition that the public key cannot decrypt the encrypted alarm information, acquires the public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
In yet another embodiment of the present invention, there is further provided a computer readable storage medium, in which a computer program is stored, the computer program, when executed by a processor, implementing the following steps performed by each device side in the alarm system:
the alarm equipment generates a key pair, generates alarm information based on the acquired monitoring information, encrypts the alarm information by using a private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends a public key in the key pair to the monitoring cloud platform;
the monitoring cloud platform receives and stores the public key sent by the alarm equipment, and sends the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal;
and the alarm terminal receives the encrypted alarm information sent by the alarm equipment and decrypts the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
According to the computer readable storage medium provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by utilizing the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of an alarm system are improved.
In yet another embodiment of the present invention, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform the following steps performed by the device sides of the alarm system:
the alarm equipment generates a key pair, generates alarm information based on the acquired monitoring information, encrypts the alarm information by using a private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends a public key in the key pair to the monitoring cloud platform;
the monitoring cloud platform receives and stores the public key sent by the alarm equipment, and sends the public key to the alarm terminal when receiving a public key acquisition request sent by the alarm terminal;
and the alarm terminal receives the encrypted alarm information sent by the alarm equipment and decrypts the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
According to the computer program product provided by the embodiment of the invention, the alarm equipment encrypts the alarm information by utilizing the generated private key in the key pair, sends the encrypted alarm information to the alarm terminal, and sends the public key in the key pair to the monitoring cloud platform for storage, so that the private key and the public key in the key pair are distributed and managed, the encrypted alarm information is not easy to steal and tamper, and the reliability and the safety of an alarm system are improved.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system/method/electronic device embodiments, since they are substantially similar to method embodiments, the description is relatively simple, with reference to the description of method embodiments in part.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (10)

1. An alarm system, the alarm system comprising: the alarm device monitors the cloud platform and the alarm terminal;
the alarm device is used for generating a key pair, collecting monitoring information, judging whether the collected monitoring information reaches a set monitoring information threshold value, generating alarm information based on the collected monitoring information when the monitoring information reaches the monitoring information threshold value, encrypting the alarm information by using a private key of the key pair, sending the encrypted alarm information to the alarm terminal, and sending a public key of the key pair to the monitoring cloud platform; the encrypted alarm information and the public key sent to the monitoring cloud platform both contain identification information of the alarm equipment;
the monitoring cloud platform is used for receiving and storing the public key sent by the alarm device, and sending a public key, which is matched with the identification information of the alarm device and is contained in the public key acquisition request, to the alarm terminal when the public key acquisition request sent by the alarm terminal is received;
and the alarm terminal is used for receiving the encrypted alarm information sent by the alarm equipment and decrypting the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
2. The system according to claim 1, characterized in that the alarm device is specifically adapted to:
exchanging a public key in the key pair to the monitoring cloud platform based on an ECDHE-RSA algorithm;
the monitoring cloud platform is specifically configured to:
and sending the public key to the alarm terminal based on an ECDHE-RSA algorithm.
3. The system according to claim 1, characterized in that said alarm terminal is specifically adapted to:
and sending a public key acquisition request to the monitoring cloud platform, acquiring the public key returned by the monitoring cloud platform, and decrypting the encrypted alarm information by using the public key.
4. The system of claim 1, wherein the alarm device is further configured to:
and updating the key pair according to a preset period, and sending the public key in the updated key pair to the monitoring cloud platform.
5. The system of claim 4, wherein the alarm terminal is further configured to,
and under the condition that the public key cannot decrypt the encrypted alarm information, sending a public key acquisition request to the monitoring cloud platform, acquiring the public key returned by the monitoring cloud platform, and decrypting the encrypted alarm information by using the public key.
6. An alarm method, characterized by being applied to an alarm system, the alarm system comprising: the method comprises the following steps of:
the alarm equipment generates a key pair, collects monitoring information, judges whether the collected monitoring information reaches a set monitoring information threshold, generates alarm information based on the collected monitoring information when the monitoring information reaches the monitoring information threshold, encrypts the alarm information by using a private key of the key pair, sends the encrypted alarm information to the alarm terminal, and sends a public key of the key pair to the monitoring cloud platform; the encrypted alarm information and the public key sent to the monitoring cloud platform both contain identification information of the alarm equipment;
the monitoring cloud platform receives and stores the public key sent by the alarm device, and sends a public key matched with the identification information of the alarm device contained in the public key acquisition request to the alarm terminal when receiving the public key acquisition request sent by the alarm terminal;
and the alarm terminal receives the encrypted alarm information sent by the alarm equipment and decrypts the encrypted alarm information by utilizing the public key acquired from the monitoring cloud platform.
7. The method of claim 6, wherein the alerting device sends a public key of the key pair to the monitoring cloud platform, comprising:
the alarm device exchanges a public key in the key pair to the monitoring cloud platform based on an ECDHE-RSA algorithm;
the monitoring cloud platform sends the public key to the alarm terminal, and the monitoring cloud platform comprises:
and the monitoring cloud platform sends the public key to the alarm terminal based on an ECDHE-RSA algorithm.
8. The method of claim 6, wherein the alert terminal decrypts the encrypted alert information using the public key obtained from the monitoring cloud platform, comprising:
and the alarm terminal sends a public key acquisition request to the monitoring cloud platform, acquires the public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
9. The method of claim 6, wherein the method further comprises:
and the alarm equipment updates the key pair according to a preset period and sends the public key in the updated key pair to the monitoring cloud platform.
10. The method according to claim 9, wherein the method further comprises:
and the alarm terminal sends a public key acquisition request to the monitoring cloud platform under the condition that the public key cannot decrypt the encrypted alarm information, acquires the public key returned by the monitoring cloud platform, and decrypts the encrypted alarm information by using the public key.
CN202111090969.9A 2021-09-17 2021-09-17 Alarm system and alarm method Active CN113949513B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111090969.9A CN113949513B (en) 2021-09-17 2021-09-17 Alarm system and alarm method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111090969.9A CN113949513B (en) 2021-09-17 2021-09-17 Alarm system and alarm method

Publications (2)

Publication Number Publication Date
CN113949513A CN113949513A (en) 2022-01-18
CN113949513B true CN113949513B (en) 2024-03-01

Family

ID=79328243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111090969.9A Active CN113949513B (en) 2021-09-17 2021-09-17 Alarm system and alarm method

Country Status (1)

Country Link
CN (1) CN113949513B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253691A (en) * 2013-09-25 2014-12-31 深圳市华傲数据技术有限公司 Logistics information transmission method, device and system
CN104732701A (en) * 2015-04-08 2015-06-24 鹰潭嘉坤云计算科技有限公司 Method and system for monitoring fire warning information
CN106372531A (en) * 2016-08-30 2017-02-01 福建联迪商用设备有限公司 Method and system for authorizing to acquire terminal attack alarming information log

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253691A (en) * 2013-09-25 2014-12-31 深圳市华傲数据技术有限公司 Logistics information transmission method, device and system
CN104732701A (en) * 2015-04-08 2015-06-24 鹰潭嘉坤云计算科技有限公司 Method and system for monitoring fire warning information
CN106372531A (en) * 2016-08-30 2017-02-01 福建联迪商用设备有限公司 Method and system for authorizing to acquire terminal attack alarming information log

Also Published As

Publication number Publication date
CN113949513A (en) 2022-01-18

Similar Documents

Publication Publication Date Title
US9959413B2 (en) Security and data privacy for lighting sensory networks
US8307214B2 (en) Method for restricting access to media data generated by a camera
US20120054485A1 (en) Terminal device, server, data processing system, data processing method, and program
US20130254544A1 (en) Method and Apparatus for Provisioning a Temporary Identity Module Using a Key-Sharing Scheme
US20090122988A1 (en) Method and apparatus for securely registering hardware and/or software components in a computer system
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
CN111835774A (en) Data processing method, device, equipment and storage medium
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN113259933A (en) Key updating method, gateway, control device, electronic equipment and medium
CN115225673A (en) Vehicle monitoring method, apparatus and storage medium
CN109951294B (en) Information updating management method in electronic label system and related equipment
US9548969B2 (en) Encryption/decryption method, system and device
CN113259722A (en) Secure video Internet of things key management method, device and system
CN113949513B (en) Alarm system and alarm method
JP7191999B2 (en) Mini-program package transmission method, apparatus, electronics computer readable medium and computer program product
CN111628987B (en) Authentication method, device, system, electronic equipment and computer readable storage medium
US11336461B2 (en) Method for controlling by a server the use of at least one data element of a data owner
US20150040222A1 (en) Detecting and reacting to inappropriate equipment and programming in a computer system without generating alerts to unauthorized users of the detection
CN117194334B (en) Log storage method, device, equipment and medium of distributed log storage system
CN110476432A (en) Monitor the protection of media
KR20180000607A (en) System for security key managing of video file and method for key generating thereof
CN114710336A (en) Safe communication method and system independent of Internet of things platform
CN117077174A (en) Target object authorization method and device, electronic equipment and storage medium
CN115114082A (en) Method, apparatus and program product for backing up data in the internet of things
CN117390654A (en) Electronic certificate storage method, electronic certificate storage device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant