CN109040313A - A kind of Internet of things system with network mask based on Object representation method - Google Patents

A kind of Internet of things system with network mask based on Object representation method Download PDF

Info

Publication number
CN109040313A
CN109040313A CN201811085334.8A CN201811085334A CN109040313A CN 109040313 A CN109040313 A CN 109040313A CN 201811085334 A CN201811085334 A CN 201811085334A CN 109040313 A CN109040313 A CN 109040313A
Authority
CN
China
Prior art keywords
internet
equipment
things
management platform
device management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811085334.8A
Other languages
Chinese (zh)
Other versions
CN109040313B (en
Inventor
李赟
康子路
刘佩云
马超
龚军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC Information Science Research Institute
Original Assignee
CETC Information Science Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC Information Science Research Institute filed Critical CETC Information Science Research Institute
Priority to CN201811085334.8A priority Critical patent/CN109040313B/en
Publication of CN109040313A publication Critical patent/CN109040313A/en
Application granted granted Critical
Publication of CN109040313B publication Critical patent/CN109040313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The Internet of things system with network mask based on Object representation method, including device management platform, multiple equipment are served by and multiple internet of things equipment;Wherein internet of things equipment is based on Object representation template, it forms real-world object and describes file and pseudo- Object representation file, access request is sent to device management platform, to be registered, and receive the calling of the device management platform by Object representation file, wherein, the interaction between device management platform and equipment discovery platform and device service application is based on the pseudo- Object representation file, and the calling between device management platform and internet of things equipment is based on real-world object and describes file.The present invention can be used for describing all objects in Internet of Things using Object representation method, have compatibility and universality;Method and pseudo- Object representation method are described by real-world object, malice attacker is avoided due to obtaining equipment calls information and the direct malice attack for equipment itself is unfolded.

Description

A kind of Internet of things system with network mask based on Object representation method
Technical field
This application involves internet of things field, specifically, being related to a kind of using the network mask based on Object representation method Internet of things system can protect such as all kinds of basic Internet of Things of sensor, gateway, intelligent terminal, server in Internet of things system Safety of the net equipment in network activity, makes it from the attack of information leakage or malice.
Background technique
Internet of Things (The Internet of Things) is in simple terms by all items by radio frequency identification message Sensing apparatus and many articles and internet device such as cloud are connected, so as to provide Weigh sensor and management.Internet of Things Net incorporates information induction equipment, such as infrared sensor, global positioning system device make various articles in conjunction with internet Upper such as production, logistics, process of consumption manufacturing, the process using upper such as use, management, coordination can be subject to information integration With communication.
The Internet of Things security solution of current main-stream thinks that the safety of Internet of Things is the extension of internet security more, utilizes The actual needs of the existing safe practice combination Internet of Things safety problem in internet, by improved technical application to Internet of Things In, to solve the safety problem of Internet of Things.Such as: the firewall technology in internet environment, mainly to ICP/IP protocol number It is parsed according to packet, and in the internet of things environment, firewall also needs to parse the specific protocol in Internet of Things, such as industry control The agreements such as Modbus, PROFIBUS in environment.
Since Internet of Things is there are also its uniqueness, existing technology is difficult to solve problems in internet: as 1) terminal is set It is standby numerous, lack between equipment and trusts;2) many scripts and the equipment of Network Isolation are connected in network by Internet of Things, are increased greatly The risk that equipment is attacked is added;3) device resource in Internet of Things is limited, many equipment less consideration safety in design Problem;4) agreement is numerous in Internet of Things, do not seek unity of standard etc..Above-mentioned security risk may all be utilized by hacker, cause pole Big safety problem.
The main path of the current safety problem for solving Internet of Things includes that equipment is encrypted, and eliminates the protection such as loophole and arranges It applies.But hacker attack towards from the point of view of, generally can be divided into hardware device, network connectivity for the object of attack of Internet of Things, And application program three parts.Hardware refer to be more than internet of things equipment itself, also include related facility, such as gateway with And mobile phone of executing application etc., hacker can pass through these equipment offensive attacks.Connectivity refers to the stage of any connection And process, include the API etc. between the connection or application program between network flow, communication and equipment.Using journey Sequence then includes the software of internet of things equipment itself, cloud webpage interface or administrator interface etc..
The prior art one " a kind of safety method suitable for Intelligent terminal for Internet of things " discloses a kind of suitable for Internet of Things The safety method of intelligent terminal, mainly using user/user biological information of acquisition intelligent terminal, such as sound, face Information and finger print data judge whether intelligent terminal can access net by the safety of the user data of verifying encryption Network.But the technology is served only for intelligent terminal access phase, can not ensure the safety of the intelligent terminal of accessed network, and And intelligent terminal must have the sensor of the corresponding biomedical information acquisition of user/user, applicable intelligent terminal type has Limit.
The prior art two " the Internet of Things safety certifying method based on pseudo- ID " discloses a kind of Internet of Things peace based on pseudo- ID Full authentication method mainly carries out safety certification using puppet ID, and the technology of facility information verifying and update is carried out using puppet ID. But this method is not suitable for malicious attacker and attacks the control that article/equipment carries out, and is added and is individually based on " smart-tag authentication number The certification link of word " will increase network information expense, meanwhile, corresponding application server need to save additional id information, occupy Network storage space.It can not applicability of the safeguards technique under large-scale environment of internet of things.
The prior art three " method of Certificate Authority and safe handling for Internet of Things sensing equipment " discloses a kind of use In the Certificate Authority of Internet of Things sensing equipment and the method and system of safe handling, the program is for internet-of-things terminal sensor The access authority of equipment has " owner " of sensor device to manage and initiate using the authorization method of " social networks " formula Authorization.But the program is not suitable for malicious attacker and attacks the access control that article/equipment level carries out, and only in sensing class It is applied in equipment.It can not applicability of the safeguards technique under large-scale environment of internet of things.
Therefore, how comprehensive defect of the existing technology expands the applicable range of internet of things equipment, guarantees public network And all kinds of internet of things equipment under private network can not only normal queries range, but also avoid core recalls information not in Internet of Things ring It is protected completely under border, while reducing network overhead, enhance confidentiality, avoided equipment from becoming malice attack object and avoid equipment It is illegal calling become the prior art urgent need to resolve the technical issues of.
Summary of the invention
It is an object of the invention to propose a kind of Internet of things system with network mask based on Object representation method, energy Reaching use includes peace of all kinds of basic internet of things equipment of such as sensor, gateway, intelligent terminal, server in network activity Entirely, make it from the attack of information leakage or malice.
To achieve this purpose, the present invention adopts the following technical scheme:
The Internet of things system with network mask based on Object representation method, including device management platform, at least one Device service application and at least one internet of things equipment;
The device management platform, the safety of registration and device service application for receiving the internet of things equipment Purview certification forwards according to the legal calling that the device service is applied and calls the internet of things equipment;
At least one described device service application can initiate security permission to the device management platform and authenticate, and to The device management platform calls the internet of things equipment;
At least one internet of things equipment forms Object representation text wherein the internet of things equipment is based on Object representation template Part sends access request to the device management platform using the Object representation file, to be registered, and passes through the object Body describes the calling that file receives the device management platform, and the Object representation file includes that real-world object describes file and puppet Object representation file, the real-world object describe the true call instruction that file includes the internet of things equipment and true letter Breath, the puppet Object representation file include the pseudo- call instruction or puppet description information of the internet of things equipment, pseudo- description information packet Include incomplete description information or false description information;
Wherein, the interaction base between the device management platform and equipment discovery platform and device service application In the pseudo- Object representation file, the calling between the device management platform and the internet of things equipment is based on the true object Body describes file.
Optionally, the internet of things equipment includes public internet of things equipment,
The Internet of things system further includes the equipment discovery platform, for obtaining public object from the device management platform The information of networked devices, and the public internet of things equipment issued for calling;
The device management platform finds that platform is set by public Internet of Things described in pseudo- Object representation file distribution to equipment Standby information,
The device service application can find that platform obtains the information of the public internet of things equipment from the equipment.
Optionally, the communication between the internet of things equipment and the device management platform encrypts progress.
Optionally, when calling privately owned internet of things equipment, the device service is applied between the device management platform Communication encryption carry out, when calling public internet of things equipment, the device service is using between the device management platform Communication do not encrypt progress.
Optionally, the encryption includes the encryption technology based on key.
Optionally, the device management platform is applied to the device service not authenticated by security permission and utilizes the pseudo- object Body describes file return information.
Optionally, the communication between device service application, device management platform, equipment discovery platform and internet of things equipment Content is the content and format of Object representation file.
Therefore, the present invention has the advantage that
(1) Object representation method meets national Internet of Things Object representation standard, can be used for describing the property in Internet of Things Body has compatibility and universality;
(2) method and pseudo- Object representation method are described by real-world object, avoids malice attacker due to obtaining equipment Recalls information and the direct malice attack for equipment itself is unfolded;
(3) pseudo- Object representation method can be used for the reply to malicious attack and illegal connection, to enhance itself Camouflage property has taken precautions against the dynamics that illegal device service application further upgrades the illegal invasion or illegally registers;
(4) in order to enable common equipment can be convenient being found and using, setting equipment find console module, share Load, realizes modularization;
(5) safe encryption mechanism is used between internet of things equipment and device management platform, is avoided from device network level Security attack, all common equipments of equipment in platform, the no safety certification of the interaction of application layer and device management platform, Reduce network overhead.
Detailed description of the invention
Fig. 1 is the Internet of things system with network mask based on Object representation method of specific embodiment according to the present invention Framework map;
Fig. 2 is the register flow path of the internet of things equipment of the Internet of things system of specific embodiment according to the present invention;
Fig. 3 is the call flow of the internet of things equipment of the Internet of things system of specific embodiment according to the present invention;
Fig. 4 is the Internet of Things with network mask based on Object representation method of another specific embodiment according to the present invention The framework map of net system.
The technical characteristic in appended drawing reference the respectively referred to generation in figure are as follows:
1, device management platform;2, device service application;3, internet of things equipment;4, equipment finds platform.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
It, can be using Object representation method to the attribute of internet of things equipment, perception, control and intelligence for internet of things equipment The canonical representation that energy ability carries out.Object representation establishes unified Object representation element and description scheme, defines the basic of object Common information and extension mechanism, including public attribute, dynamic behaviour, initiative ability and boundary condition etc..Object representation is by giving Out under environment of internet of things physical entity Object representation model, realization the physical entity in physical world is interacted with information network The abstract and normalization description of feature, enables Internet of things system to form consistent reason to the interactive information of isomery object and network It solves, the interoperability between raising system.
Object representation is based on expansible descriptive language, including XML, JASON etc., it then follows expansible and platform is unrelated Property.Unified Object representation is that the object access for realizing different vendor's isomery Internet of Things, equipment management, service call and information are handed over The important means of the functions such as mutual, while also new resolving ideas is provided safely for guarantee internet of things equipment.
Object representation file passes through control as the information carrier and tool of communications of realizing equipment, connection and application intercommunication The core equipment information or instruction for obtaining or interacting can be extracted from description file by making in each link, may be implemented to Internet of Things The safety guarantee of equipment, connection and application program.
The present invention mainly as the registration of internet of things equipment and calls file using using Object representation method, and Internet of Things Net equipment provides two sets of Object representation files when registering to platform of internet of things, a set of to describe file, Yi Taowei for real-world object Pseudo- Object representation file describes file by the real-world object between device management platform and internet of things equipment and carries out equipment Calling, using pseudo- Object representation file between device management platform and device service application and equipment discovery platform, from And make only device management platform just grasp real-world object and describe file, avoid application layer device service application and Equipment finds that platform passes through the information of the true internet of things equipment of pseudo- Object representation file acquisition, thus directly to the Internet of Things Equipment is attacked,;Furthermore the pseudo- Object representation file can also be used to the device management platform under attack or False information can be discharged when non-security link, concealed attacker, re-initiated attack to avoid attacker.I.e. with pseudo- object Description file protects internet of things equipment and device management platform as network mask.
Specifically, referring to Fig. 1, show specific embodiment according to the present invention has net based on Object representation method The framework map of the Internet of things system of network mask shows the pass between the component and correlation that the Internet of things system includes in the figure System, comprising: device management platform 1, at least one device service apply 2 and at least one internet of things equipment 3;
The device management platform 1, the registration and the device service for receiving the internet of things equipment 3 are using 2 Security permission certification, forwards using 2 legal calling according to the device service and calls the internet of things equipment;
At least one described device service applies 2, and security permission certification can be initiated to the device management platform 1, and Internet of things equipment is called to the device management platform;
At least one internet of things equipment 3 forms Object representation wherein the internet of things equipment 3 is based on Object representation template File sends access request to the device management platform using the Object representation file, to be registered, and by described Object representation file receives the calling of the device management platform, specifically, the Object representation file includes that real-world object is retouched File and pseudo- Object representation file are stated, the real-world object describes the true call instruction that file includes the internet of things equipment And real information, the puppet Object representation file include that the pseudo- call instruction of the internet of things equipment or pseudo- description information, puppet are retouched Stating information includes incomplete description information or false description information.
Referring to fig. 2, the register flow path of the internet of things equipment of Internet of things system is shown, real-world object is contained and describes file With pseudo- Object representation file.
Referring to Fig. 3, the call flow of the internet of things equipment of Internet of things system is shown.
Wherein, the device management platform 1 and equipment discovery platform 3 and the device service apply the friendship between 2 Mutually, it including finds or calls, based on the pseudo- Object representation file, the device management platform 1 and the internet of things equipment 3 Between calling be based on the real-world object file is described.
Therefore, the present invention is by the internet of things equipment network mask based on Object representation method, i.e., in the facility registration stage By providing mask of the pseudo- Object representation file comprising pseudo- call instruction as internet of things equipment in a network, equipment management is flat Interaction between platform and internet of things equipment is based on real-world object and describes file, and user can only be obtained by device service application in public network Pseudo- call instruction or pseudo- description information in pseudo- Object representation file, pseudo- description information includes that incomplete description information or falseness are retouched State information, and device management platform real-world object can be described the information between file and pseudo- Object representation file and instruct into Row corresponds to, in this way, calling internet of things equipment that can be legal, and can guarantee that the recalls information of internet of things equipment is not exposed to In network, thus avoid malice attacker due to obtain equipment calls information and be unfolded for equipment itself it is direct maliciously into It attacks.
Network only can be penetrated by pseudo- Object representation file by the legitimate user of device management platform authentication Mask is obtained true equipment calls instruction from true Object representation file by device management platform, device service is answered True call instruction is converted to the pseudo-device call instruction issued, successfully calls functions of the equipments, and illegal user can not obtain True device description file.To realize the calling protection of internet of things equipment, prevent equipment from being called by malicious attacker.
Further, the internet of things equipment includes public internet of things equipment, i.e. the internet of things equipment belongs to common equipment, Support the search discovery of public network, the Internet of things system further includes the equipment discovery platform 4, for flat from the equipment management Platform 1 obtains the information of public internet of things equipment, and the public internet of things equipment issued for calling;I.e. user can pass through equipment The realization that interacts with equipment discovery platform is served by inquire the discovery of public internet of things equipment and information;
The device management platform issues the information of the public internet of things equipment to equipment discovery platform 3,
The device service application can find that platform 3 obtains the information of the public internet of things equipment from the equipment.
The interaction of the device management platform and equipment discovery platform is also based on pseudo- Object representation file.
Wherein, the device management platform can describe the position letter of file acquisition internet of things equipment from the real-world object Breath, user information, functional information etc., and equipment discovery platform is merely capable of obtaining from device management platform for equipment It is served by location information, user information required for the public internet of things equipment of discovery, and only by pseudo- Object representation text Part obtains.The i.e. described equipment discovery platform only has the discovery feature to public internet of things equipment, and the equipment management is flat Platform not only has the discovery feature of public internet of things equipment, also directed to privately owned internet of things equipment, and is directed to all Internet of Things The calling of the function of equipment.
It should be noted that between device service application, device management platform, equipment discovery platform and internet of things equipment Content of Communication be Object representation file content and format.
Further, in the present invention, although the device management platform and equipment discovery platform are marked as two A different platform, but this is used only for the difference of both statements function, and the two is practical to may be mounted at the same physical equipment On or different physical equipments on, on the one hand realize load balancing, still further aspect realize function modularization.
Further, the pseudo- Object representation file is used not only for the device management platform and passes through security permission Communication between the device service application of certification, additionally it is possible to for the device service application to not authenticated by security permission Return information.Accordingly, with respect to the device service application reply refusal information not authenticated by security permission or directly eventually Only interact, it is described device management platform not learnt whether it has been found that certainly by the device service application that security permission authenticates As illegal, to enhance the camouflage of itself, illegal device service application taken precautions against and has further upgraded the illegal invasion Or the dynamics illegally registered, so that the request or attack of permission are not unable to control equipment and take facility information.
In order to reinforce confidentiality, the communication between the internet of things equipment and the device management platform encrypts progress, The encryption includes but is not limited to the encryption technology based on key.Successfully resolved can then interact, and parsing is unsuccessful, return to mistake Information.
When calling privately owned internet of things equipment, the device service is using the communication energy between the device management platform Enough encryptions carry out, and when calling public internet of things equipment, the device service is using logical between the device management platform Letter can not also encrypt progress, and the encryption includes but is not limited to the encryption technology based on key.
Therefore, the present invention has the advantage that
(1) Object representation method meets national Internet of Things Object representation standard, can be used for describing the property in Internet of Things Body has compatibility and universality;
(2) method and pseudo- Object representation method are described by real-world object, avoids malice attacker due to obtaining equipment Recalls information and the direct malice attack for equipment itself is unfolded;
(3) pseudo- Object representation method can be used for the reply to malicious attack and illegal connection, to enhance itself Camouflage property has taken precautions against the dynamics that illegal device service application further upgrades the illegal invasion or illegally registers;
(4) in order to enable common equipment can be convenient being found and using, setting equipment find console module, share Load, realizes modularization;
(5) safe encryption mechanism is used between internet of things equipment and device management platform, is avoided from device network level Security attack, all common equipments of equipment in platform, the no safety certification of the interaction of application layer and device management platform, Reduce network overhead.
Obviously, it will be understood by those skilled in the art that above-mentioned each unit of the invention or each step can be with general Computing device realizes that they can concentrate on single computing device, and optionally, they can be executable with computer installation Program code realize, be performed by computing device so as to be stored in storage device, or by they point It is not fabricated to each integrated circuit modules, or makes multiple modules or steps in them to single integrated circuit module It realizes.In this way, the present invention is not limited to the combinations of any specific hardware and software.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that A specific embodiment of the invention is only limitted to this, for those of ordinary skill in the art to which the present invention belongs, is not taking off Under the premise of from present inventive concept, several simple deduction or replace can also be made, all shall be regarded as belonging to the present invention by institute Claims of submission determine protection scope.

Claims (7)

1. the Internet of things system with network mask based on Object representation method, including device management platform, at least one sets It is standby to be served by and at least one internet of things equipment;
The device management platform, the security permission of registration and device service application for receiving the internet of things equipment Certification forwards according to the legal calling that the device service is applied and calls the internet of things equipment;
At least one described device service application can initiate security permission certification to the device management platform, and to described Device management platform calls the internet of things equipment;
At least one internet of things equipment forms Object representation file, benefit wherein the internet of things equipment is based on Object representation template Access request is sent to the device management platform with the Object representation file, to be registered, and is retouched by the object The calling that file receives the device management platform is stated, the Object representation file includes that real-world object describes file and pseudo- object File is described, the real-world object describes the true call instruction and real information that file includes the internet of things equipment, institute The pseudo- call instruction or pseudo- description information that pseudo- Object representation file includes the internet of things equipment are stated, pseudo- description information includes endless Full description information or false description information;
Wherein, the interaction between the device management platform and equipment discovery platform and device service application is based on institute Pseudo- Object representation file is stated, the calling between the device management platform and the internet of things equipment is based on the real-world object and retouches State file.
2. Internet of things system according to claim 1, it is characterised in that:
The internet of things equipment includes public internet of things equipment,
The Internet of things system further includes the equipment discovery platform, for obtaining public Internet of Things from the device management platform The information of equipment, and the public internet of things equipment issued for calling;
The device management platform passes through public internet of things equipment described in pseudo- Object representation file distribution to equipment discovery platform Information,
The device service application can find that platform obtains the information of the public internet of things equipment from the equipment.
3. Internet of things system according to claim 1 or 2, it is characterised in that:
Communication between the internet of things equipment and the device management platform encrypts progress.
4. Internet of things system according to claim 3, it is characterised in that:
When calling privately owned internet of things equipment, the device service using between the device management platform communication encryption into Row, when calling public internet of things equipment, the device service is not encrypted using the communication between the device management platform It carries out.
5. Internet of things system according to claim 3 or 4, it is characterised in that:
The encryption includes the encryption technology based on key.
6. Internet of things system according to claim 1 or 2, it is characterised in that:
The device management platform is applied to the device service not authenticated by security permission and utilizes the pseudo- Object representation file Return information.
7. Internet of things system according to claim 3 or 4, it is characterised in that:
Content of Communication between device service application, device management platform, equipment discovery platform and internet of things equipment is object Body describes the content and format of file.
CN201811085334.8A 2018-09-18 2018-09-18 Internet of things system with network mask based on object description method Active CN109040313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811085334.8A CN109040313B (en) 2018-09-18 2018-09-18 Internet of things system with network mask based on object description method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811085334.8A CN109040313B (en) 2018-09-18 2018-09-18 Internet of things system with network mask based on object description method

Publications (2)

Publication Number Publication Date
CN109040313A true CN109040313A (en) 2018-12-18
CN109040313B CN109040313B (en) 2021-03-16

Family

ID=64616881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811085334.8A Active CN109040313B (en) 2018-09-18 2018-09-18 Internet of things system with network mask based on object description method

Country Status (1)

Country Link
CN (1) CN109040313B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065744A (en) * 2014-07-07 2014-09-24 上海斐讯数据通信技术有限公司 Controlling and managing method of intelligent far-end device and remote terminal
CN104640237A (en) * 2013-11-13 2015-05-20 中国电子科技集团公司第十五研究所 Internet of things system
CN106406897A (en) * 2016-09-29 2017-02-15 汉兴德创(武汉)科技有限公司 Method for dynamically constructing interfaces in dependence on IOT (Internet of things) equipment capability set by mobile terminal
CN106416130A (en) * 2014-02-14 2017-02-15 英特托拉斯技术公司 Network security systems and methods
US20180041566A1 (en) * 2016-08-04 2018-02-08 National Central University Description Files and Web Service Protocols for Tasking Capability on Internet of Things
CN107800752A (en) * 2016-09-06 2018-03-13 北京京东尚科信息技术有限公司 Data query method, system and electronic equipment
CN107888644A (en) * 2016-09-30 2018-04-06 中国电子科技集团公司信息科学研究院 Internet of Things open system framework and plateform system based on object ability

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640237A (en) * 2013-11-13 2015-05-20 中国电子科技集团公司第十五研究所 Internet of things system
CN106416130A (en) * 2014-02-14 2017-02-15 英特托拉斯技术公司 Network security systems and methods
CN104065744A (en) * 2014-07-07 2014-09-24 上海斐讯数据通信技术有限公司 Controlling and managing method of intelligent far-end device and remote terminal
US20180041566A1 (en) * 2016-08-04 2018-02-08 National Central University Description Files and Web Service Protocols for Tasking Capability on Internet of Things
CN107800752A (en) * 2016-09-06 2018-03-13 北京京东尚科信息技术有限公司 Data query method, system and electronic equipment
CN106406897A (en) * 2016-09-29 2017-02-15 汉兴德创(武汉)科技有限公司 Method for dynamically constructing interfaces in dependence on IOT (Internet of things) equipment capability set by mobile terminal
CN107888644A (en) * 2016-09-30 2018-04-06 中国电子科技集团公司信息科学研究院 Internet of Things open system framework and plateform system based on object ability

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
康子路: "物联网开放体系架构研究", 《信息技术与标准化》 *
潘博文,马超: "物联网物体描述方法与物体标识", 《物联网学报》 *

Also Published As

Publication number Publication date
CN109040313B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
US20210360399A1 (en) Mobile authentication in mobile virtual network
US20230049177A1 (en) System, Apparatus And Method For Scalable Internet Of Things (IOT) Device On-Boarding With Quarantine Capabilities
CN114553568B (en) Resource access control method based on zero-trust single-package authentication and authorization
CN104754582B (en) Safeguard the client and method of BYOD safety
US9769172B2 (en) Method of accessing a network securely from a personal device, a personal device, a network server and an access point
CN104539598B (en) A kind of improvement Tor secure anonymous network communicating system and method
JP2014215802A (en) Mobile network connection system, and mobile network connection method
CN102571811A (en) User access authority control system and method thereof
US20240089300A1 (en) Applying overlay network policy based on users
US8793782B1 (en) Enforcing a health policy in a local area network
KR20100060130A (en) System for protecting private information and method thereof
CN109040313A (en) A kind of Internet of things system with network mask based on Object representation method
CN115277237A (en) Control method and device for accessing mobile terminal to enterprise intranet
KR102284183B1 (en) Access control system and method using SQL tool based on web
Detken et al. Leveraging trusted network connect for secure connection of mobile devices to corporate networks
Su et al. Research of single sign-on in mobile RFID middleware based on dynamic tokens and WMMP
CN104053153B (en) The method and system of wireless Mesh netword access authentication
US11784973B2 (en) Edge-based enterprise network security appliance and system
WO2023216084A1 (en) Authentication method and device, medium and chip
CN109598114A (en) Cross-platform unification user account management method and system
CN116032637A (en) Monitoring method, device and equipment based on RADIUS authentication
He-Hua et al. Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant