CN110557318B - Method for realizing safe remote operation of IOT equipment - Google Patents
Method for realizing safe remote operation of IOT equipment Download PDFInfo
- Publication number
- CN110557318B CN110557318B CN201910773746.9A CN201910773746A CN110557318B CN 110557318 B CN110557318 B CN 110557318B CN 201910773746 A CN201910773746 A CN 201910773746A CN 110557318 B CN110557318 B CN 110557318B
- Authority
- CN
- China
- Prior art keywords
- vpn
- server
- client
- service
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L12/462—LAN interconnection over a bridge based backbone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a system for realizing safe remote operation of IOT equipment, which comprises a service server, a service client, IoT equipment, an ADB tool client, an ADB tool server, a VPN server and a VPN client. A method for realizing safe remote operation of IOT equipment comprises the following steps: s1: the service end sends a VPN tunnel establishment message to the IoT equipment; s2: the IoT equipment verifies and establishes the VPN tunnel message, if the message passes through, the step enters S3, otherwise, the message that the VPN tunnel cannot be established is sent to the service server; s3: the IoT equipment sends a VPN client request connection message to a VPN server by using a VPN client; s4: the VPN service end establishes VPN service and sends a VPN service establishment completion message to the VPN client end; s5: the IoT equipment sends an internal VPN address result to the service server; s6: connecting the IoT device by using a connect command of the ADB client; s7: entering an IoT device background command system by using a shell command of the ADB client; s8: and carrying out remote operation. The beneficial effect of the invention is to safely and remotely operate the android IoT equipment.
Description
Technical Field
The invention relates to an IoT (Internet of things) equipment safety remote operation method, in particular to a method for realizing IOT equipment safety remote operation.
Background
With the development of the internet of things technology, the application of the IoT device is more widespread, and the Linux platform based on the android system or based on the simple android system is widely applied to various IoT devices as a mainstream IoT device operating system, and how to timely and effectively maintain the content in the android system becomes the first thing in the operation process of the IoT device.
In the conventional application field of the Android system, ADB (Android Debug Bridge), which has the highest authority in the system, can be theoretically used for maintaining IoT devices based on the Android system, but in practice, ADB is generally used for performing daily system management on devices in which the Android system is installed, and applications such as Tencent App, pea pod and 360 mobile phone assistants perform daily system maintenance based on ADB, or Debug applications based on the Android platform in a development stage, and is generally not applied to performing remote operations on IoT devices based on the Android, for the following reasons:
one is as follows: the ADB system is connected with android equipment and is easy to be attacked by a man-in-the-middle, the man-in-the-middle can attack the IoT equipment in modes of DNS cheating, a proxy server, session hijacking and the like, and the control authority of the IoT equipment is obtained, so that the illegal purpose of the IoT equipment is realized;
the second step is as follows: if the system is remotely operated by directly using the ADB, which means that the IoT equipment needs to open ADB authority, illegal molecules can be connected with the IoT equipment through the USB line to easily acquire the ADB authority, so that an ADB command is input to the IoT equipment, and the control of the IoT equipment is realized.
For the above reasons, in the application field of the conventional android system, ADB is not generally used as a method for remotely operating the android-based IoT device, but ADB is a tool very suitable for remotely operating the android system, such as an IoT device based on the android system, which is not used for remote operation, and is not all the least.
There is a need in the market for a system and method that can use the ADB tool to implement secure remote operation of an android-based IoT device to implement secure maintenance of IoT device content.
Disclosure of Invention
In order to solve the technical problem, the invention discloses a method for realizing the safe remote operation of IOT equipment, and the technical scheme of the invention is implemented as follows:
a system for realizing IOT equipment safety remote operation is characterized by comprising a service server, a service client, IoT equipment, an ADB tool client, an ADB tool server, a VPN server and a VPN client; the service server runs on the service server; the service server is connected with the VPN server through the Internet; the VPN server and the ADB tool client run on a VPN server; the VPN server is connected with the ADB tool client through a VPN server; the VPN server is connected with the VPN client through the Internet; the VPN client, the business client and the ADB tool server run on the IoT equipment; the VPN client side is connected with the ADB tool server side through the IoT equipment, and the ADB tool server side is connected with the business server side through the IoT equipment; the IoT equipment is the Internet of things equipment running an android or android-like system.
Preferably, when an IoT device is operated, the service server sends a VPN tunnel establishment message to the service client through the internet, the service client receives the VPN tunnel establishment message and forwards the VPN tunnel establishment message to the VPN client through the IoT device, the VPN client sends a VPN client connection request message to the VPN server, the VPN server establishes a VPN tunnel after receiving the VPN client connection request message and sends a VPN service establishment completion message to the IoT device, and the IoT device receives the VPN service establishment completion message and then generates an internal VPN address result and sends the internal VPN address result to the service server.
Preferably, the VPN tunnel establishment message includes a platform operator name, a home organization, a VPN type ID, a VPN access user name and password generation method, an IoT device type, an IoT device SN, an IP address and a domain name for initiating an application, a request debugging duration, and an MD5 of the request.
Preferably, after receiving the VPN tunnel establishment message, the IoT device performs identity confirmation according to a configuration rule, where the content of the identity confirmation includes an IoT device type, an IoT device SN, an IP address and a domain name from which the application is initiated.
Preferably, if the identity confirmation fails, the IoT device sends a message that the VPN tunnel cannot be established to the traffic service.
Preferably, the ADB tool client connects with the ADB tool server using the internal VPN address result and enters an IoT device background command system.
Preferably, the VPN server is operated with a VPN manager; the VPN manager comprises a VPN access user name and a password list; the VPN access user name and password list generation mode comprises random generation and fixed generation.
Preferably, the IoT device shields the USB interface; and the ADB tool server shields the ADB operation of the IP address except the IP address of the VPN server.
A method for realizing the safe remote operation of the IOT equipment is operated in a system for realizing the safe remote operation of the IOT equipment and comprises the following steps: s1: the service end sends the VPN tunnel establishing message to the IoT equipment; s2: the IoT equipment verifies the message for establishing the VPN tunnel, if the message passes the verification, the next step is carried out, otherwise, the message for establishing the VPN tunnel is sent to a service server; s3: the IoT device sending the VPN client request connection message to the VPN server using the VPN client; s4: the VPN server side establishes the VPN service and sends a VPN service establishment completion message to a VPN client side; s5: the IoT equipment sends the internal VPN address result to the service end; s6: connecting the IoT device using a connect command of the ADB client; s7: entering the IoT device background command system by using a shell command of an ADB client; s8: and carrying out remote operation.
By implementing the technical scheme of the invention, the technical problem that the ADB cannot be used for safely remotely operating the IoT equipment based on the android in the prior art can be solved; by implementing the technical scheme of the invention, the VPN information transmission tunnel is established between the IoT equipment based on android and the operation terminal, so that the technical effect of safely remotely operating the IoT equipment based on android can be realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only one embodiment of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an overall architecture of a system for implementing secure remote operation of IOT devices;
FIG. 2 is a flow chart of a method of implementing secure remote operation of an IOT device.
In the above drawings, the reference numerals denote:
1-a service server;
11-a service server; 12-ADB tool client;
2-VPN server
21-VPN service end; 22-a VPN manager;
a 3-IoT device;
31-a service client; a 32-VPN client; 33-ADB tool service.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In a specific embodiment, as shown in fig. 1, a system for implementing secure remote operation of IOT devices is characterized by comprising a service server 11, a service client 31, an IOT device 3, an ADB tool client 12, an ADB tool server 33, a VPN server 21, and a VPN client 32; the service server 11 runs on the service server 1; the service server 11 is connected with the VPN server 21 through the Internet; the VPN server 21 and the ADB tool client 12 run on the VPN server 2; the VPN server 21 is connected with the ADB tool client 12 through a VPN server 2; the VPN server 21 is connected to the VPN client 32 via the internet; the VPN client 32, the service client 31 and the ADB tool server 33 run on the IoT device 3; the VPN client 32 is connected with the ADB tool server 33 through the IoT device 3, and the ADB tool server 33 is connected with the business server 11 through the IoT device 3; when an IoT device 3 is operated, a service server 11 sends a VPN tunnel establishment message to a service client 31 through the internet, the service client 31 receives the VPN tunnel establishment message and forwards the VPN tunnel establishment message to a VPN client 32 through the IoT device 3, the VPN client 32 sends a VPN client 32 connection request message to a VPN server 21, the VPN server 21 receives the VPN client 32 connection request message and then establishes a VPN tunnel and sends a VPN service establishment completion message to the IoT device 3, and the IoT device 3 receives the VPN service establishment completion message and then generates an internal VPN address result and sends the internal VPN address result to the service server 11; the IoT device 3 is an internet of things device running an android or android-like system.
In this specific embodiment, an operator uses the service end 11 to operate on the service server 1, the service end 11 sends a VPN tunnel establishment message to the IoT device 3 through the internet, the IoT device 3 forwards the VPN client 32 after receiving the VPN tunnel establishment message, the VPN client 32 sends the VPN tunnel establishment message to the VPN server 21, the VPN server 21 returns an internal VPN address result after establishing a tunnel in the VPN client 32, the operator uses the ADB tool client 12 to connect the ADB server through the tunnel between the VPN server 21 and the VPN client 32 according to the internal VPN address result, and the IoT device 3 is operated after the ADB tool client 12 enters the shell mode; the service server 1 and the VPN server 2 may be an entity machine, a virtual machine, or a cloud service provided by a cloud service provider; the service server 1 and the VPN server 2 may be one logical server or two logical servers, and may be virtual machines or physical machines; generally speaking, the service end 11 is connected to the VPN client 32 through the internet, and a local area network may be used when the local area network can meet the requirement, for example, when the IoT devices 3 are centrally distributed in a specific location; the VPN server 21 and the VPN client 32 establish a VPN tunnel, the VPN server 21 forwards the message to the VPN client 32, and confidentiality, integrity and reliability in the data transmission process are realized through the VPN tunnel; after the VPN tunnel is established between the VPN server 21 and the VPN client 32, an internal VPN address result is returned, the ADB client uses a connect command to connect the internal VPN address result, all operations are transmitted to the internal VPN address, that is, to the VPN server 21, the VPN server 21 transmits the operations to the VPN client 32 through the VPN tunnel, and the VPN client 32 transmits the operations to the ADB server by using the internal information transmission mechanism of the IoT device 3, thereby implementing the operation of the IoT device 3 itself; meanwhile, because the system depends on the ADB tool, the IoT devices related to the system must be IoT devices installed with an operating system based on android or at least having the ADB tool, and such devices occupy most IoT devices, so that the IoT devices can be effectively applied to most IoT devices circulating and existing in the market without modification; through the interaction and information transmission among the modules, the safe operation of the IoT equipment 3 is remotely realized, and an operator can perform operations such as modification, reading or writing after entering an IoT equipment background command system, so that the remote safe maintenance of the content of the IoT equipment is realized.
In a preferred embodiment, as shown in fig. 1, the VPN server 2 is operated with a VPN manager 22; VPN manager 22 includes a list of VPN access usernames and passwords; the VPN access user name and password list generation mode comprises random generation and fixed generation.
In this preferred embodiment, the VPN manager 22 is controlled by a cloud platform manager, the VPN manager 22 has the authority to increase and decrease the general VPN access account and configure the VPN account management authority, and the cloud platform manager uses the VPN manager 22 to manage the VPN access control and can modify the VPN account at any time; the random generation is generally used for temporary permission grant, when an operator needs to manage the IoT device 3, a cloud platform manager temporarily allocates a VPN access user name and a password with a time period attribute, issues the VPN access user name and the password to the IoT device 3, and automatically logs out the VPN access user name and the password after a certain time, where the time may be a fixed time period or a fixed time point, the fixed time period may be valid within 8 hours, and the fixed time point may be 18: failure after 00; the fixed generation is used for long-term use, a VPN connection operator name and a password are built in the IoT equipment 3, the password is periodically updated by cloud platform management personnel, the updating period can be random or fixed, the fixed updating period can be adjusted according to actual conditions and can be updated once every week, and a specific updating strategy can be selected according to practical actual conditions.
In a preferred embodiment, as shown in fig. 1, the VPN tunnel establishment message includes a platform operator name, a home organization, a VPN type ID, a VPN access user name and password, a password generation manner, an IoT device type, an IoT device SN, an IP address and domain name for initiating an application, a request debugging duration, and an MD5 of the request; after receiving the message for establishing the VPN tunnel, the IoT equipment 3 confirms the identity according to the configuration rule, wherein the content of the identity confirmation comprises the type of the IoT equipment, the SN of the IoT equipment, the IP address and the domain name for initiating the application; if the identity is not confirmed, the IoT device 3 sends a message that the VPN tunnel cannot be established to the service end 11.
In this preferred embodiment, the IoT device 3 may directly determine whether it has the possibility of performing the debugging this time through the IoT device type, the IoT device SN, the application-initiating IP address, the domain name, the platform operator name, and the affiliation organization, where, for example, the IoT device type, the IoT device SN, the application-initiating IP address, the domain name, the platform operator name, or the affiliation organization is incorrect, the service client 31 directly sends a message that the VPN tunnel cannot be established to the service server 11, and informs that it is wrong with the IoT device type, the IoT device SN, the application-initiating IP address, the domain name, the platform operator name, or the affiliation organization; each request has its own unique MD5, and each request and session can be uniquely identified by the MD5, thereby ensuring that each request and session is traceable, facilitating remediation after the fact and facilitating identification.
In a preferred embodiment, as shown in fig. 1, the ADB tool client 12 uses the internal VPN address result to connect with the ADB tool server 33 and enter the IoT device background command system.
In this preferred embodiment, the ADB tool client 12 connects the internal VPN address result to the ADB tool server 33 by using a connect command, which may be a connect program carried by the original ADB tool or a customized connect program; after the ADB tool client 12 is connected with the ADB tool server 33, the shell command is used to enter the IoT device background command system for remote operation.
In a preferred embodiment, as shown in fig. 1, the IoT device 3 shields the USB interface; the ADB tool service 33 masks ADB operations of IP addresses other than the IP address of the VPN server 2.
In the preferred embodiment, in the application field of the conventional IoT device 3 based on android, an ADB tool is generally not used, and the ADB tool is completely shielded, so that a lawless person can connect the IoT device 3 based on android through a USB cable, obtain the administrator authority of the IoT device 3 through an illegal means, and finally realize control over the IoT device 3 through an ADB tool command, so that a USB interface must be shielded, and the USB interface can only use a charging function, and a non-charging function cannot be used, so that protection over the IoT device 3 is realized; meanwhile, in order to prevent other types of attacks, it is necessary to ensure that the operation on the ADB client is not performed by the IP address other than the VPN server 2, and therefore, it is necessary to shield the IP address other than the VPN server 2 to ensure a safe operation, and if the IP address needs to be replaced due to server update or the like, it is necessary to uniformly replace the IP address using the VPN server 2.
In a specific embodiment, as shown in fig. 2, a method for implementing secure remote operation of an IOT device, executed in a system for implementing secure remote operation of an IOT device, includes: s1: the service end 11 sends a message of establishing the VPN tunnel to the IoT device 3; s2: the IoT equipment 3 verifies the message for establishing the VPN tunnel, if the message passes the verification, the next step is carried out, otherwise, the message for establishing the VPN tunnel is sent to the service server 11; s3: the IoT device 3 sends a VPN client 32 request connection message to the VPN server 21 using the VPN client 32; s4: the VPN server 21 establishes a VPN service and sends a VPN service establishment completion message to the VPN client 32; s5: the IoT device 3 sends the internal VPN address result to the service server 11; s6: connect the IoT device 3 using the ADB client's connect command; s7: entering an IoT device 3 background command system by using a shell command of the ADB client; s8: and carrying out remote operation.
In this specific embodiment, the service end 11 sends a message of establishing a VPN tunnel to the IoT device 3, informs the IoT device 3 of the target identity of the connection operation request, and informs the IoT device of the route of the connection request; the IoT device 3 uses the service client 31 to judge whether the service client has the qualification for establishing the VPN tunnel according to the message for establishing the VPN tunnel, if so, the next step is carried out, otherwise, the service client sends the message which can not establish the VPN tunnel to the device which sends the message for establishing the VPN tunnel and informs the rejection reason of the message, and the step is ended; after the verification is completed, the service client 31 transmits the relevant information to the VPN client 32 by using the IoT device 3, and the VPN client 32 requests the VPN server 2 to establish a VPN tunnel, where the request is sent in a form of a connection message requested by the VPN client 32; after receiving the connection request of the VPN client 32, the VPN server 21 establishes a VPN tunnel and informs the VPN client 32 that the VPN tunnel is established, including informing an internal VPN address; VPN client 32 sends the corresponding internal VPN address result to traffic client 31 through IoT device 3; the service end 11 uses the connect command of the ADB client to connect the VPN server 2 according to the returned internal VPN address result, and a VPN tunnel is being established between the VPN service end 21 on the VPN server 2 and the VPN client 32, thereby realizing indirect connection between the ADB client and the IoT device 3; the shell command of the ADB client is used to enter a shell mode, and enters the IoT device 3 background command system through the forwarding of the VPN server 21, all the commands of the ADB client enter the VPN client 32 through the forwarding of the VPN server 2, and then are forwarded into the ADB server by the VPN client 32, so that the operation of an operator on the IoT device 3 is realized.
It should be understood that the above-described embodiments are merely exemplary of the present invention, and are not intended to limit the present invention, and that any modification, equivalent replacement, or improvement made without departing from the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (6)
1. A system for realizing IOT equipment safety remote operation is characterized by comprising a service server, a service client, IoT equipment, an ADB tool client, an ADB tool server, a VPN server and a VPN client;
the service server runs on the service server; the service server is connected with the VPN server through the Internet;
the VPN server and the ADB tool client run on a VPN server; the VPN server is connected with the ADB tool client through a VPN server; the VPN server is connected with the VPN client through the Internet;
the VPN client, the business client and the ADB tool server run on the IoT equipment; the VPN client side is connected with the ADB tool server side through the IoT equipment, and the ADB tool server side is connected with the business server side through the IoT equipment;
the IoT equipment is Internet of things equipment running an android or android-like system;
when an IoT device is operated, the service server sends a VPN tunnel establishment message to the service client through the Internet, the service client receives the VPN tunnel establishment message and forwards the VPN tunnel establishment message to the VPN client through the IoT device, the VPN client sends a VPN client request connection message to the VPN server, the VPN server establishes a VPN tunnel and sends a VPN service establishment completion message to the IoT device after receiving the VPN client request connection message, and the IoT device generates an internal VPN address result and sends the internal VPN address result to the service server after receiving the VPN service establishment completion message;
the IoT device shields the USB interface;
and the ADB tool server shields the ADB operation of the IP address except the IP address of the VPN server.
2. The system of claim 1, wherein said VPN server is operative with a VPN manager;
the VPN manager comprises a VPN access user name and a password list;
the VPN access user name and password list generation mode comprises random generation and fixed generation.
3. The system of claim 2, wherein the message for establishing the VPN tunnel comprises a name of a platform operator, a home organization, a VPN type ID, a VPN access user name, a password generation method, an IOT device type, an IOT device SN, an IP address and a domain name for initiating an application, a request debugging duration, and the MD5 of the request.
4. The system of claim 2, wherein the IOT device performs identity validation according to configuration rules after receiving the VPN tunnel establishment message, and the content of the identity validation includes an IOT device type, an IOT device SN, an IP address and a domain name for initiating an application;
if the identity is not confirmed, the IoT equipment sends a message that the VPN tunnel cannot be established to a service end.
5. The system of claim 1, wherein the ADB tool client uses the internal VPN address result to connect with an ADB tool server and enter an IOT device background command system.
6. A method for implementing secure remote operation of IOT devices, running on the system for implementing secure remote operation of IOT devices described in any one of claims 1-5, comprising:
s1: the service end sends a VPN tunnel establishing message to the IoT equipment;
s2: the IoT equipment verifies the message for establishing the VPN tunnel, if the message passes the verification, the next step is carried out, and if the message does not pass the verification, the message for establishing the VPN tunnel is sent to a service server side;
s3: the IoT device sending the VPN client request connection message to the VPN server using the VPN client;
s4: the VPN server side establishes the VPN service and sends a VPN service establishment completion message to a VPN client side;
s5: the IoT equipment sends an internal VPN address result to the service server;
s6: connecting the IoT device using a connect command of the ADB tool client;
s7: entering the IoT device background command system by using a shell command of an ADB tool client;
s8: and carrying out remote operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910773746.9A CN110557318B (en) | 2019-08-21 | 2019-08-21 | Method for realizing safe remote operation of IOT equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910773746.9A CN110557318B (en) | 2019-08-21 | 2019-08-21 | Method for realizing safe remote operation of IOT equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110557318A CN110557318A (en) | 2019-12-10 |
CN110557318B true CN110557318B (en) | 2022-06-24 |
Family
ID=68737892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910773746.9A Active CN110557318B (en) | 2019-08-21 | 2019-08-21 | Method for realizing safe remote operation of IOT equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110557318B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111541573A (en) * | 2020-04-27 | 2020-08-14 | 上海容易网电子商务股份有限公司 | Remote management method for intelligent equipment |
CN113259996A (en) * | 2021-05-17 | 2021-08-13 | 上海龙旗科技股份有限公司 | IOT wireless debugging method and equipment |
CN114461289B (en) * | 2022-02-21 | 2024-06-07 | 重庆长安汽车股份有限公司 | Method and system for remotely starting ADB tool of vehicle-mounted information entertainment system |
US20230300118A1 (en) * | 2022-03-18 | 2023-09-21 | Arris Enterprises Llc | Tunnelled remote intent mechanism |
CN115314484A (en) * | 2022-06-15 | 2022-11-08 | 广州九尾信息科技有限公司 | Local area network android test package automatic distribution device based on MQTT protocol |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188308A (en) * | 2011-12-30 | 2013-07-03 | 北大方正集团有限公司 | Remote diagnosis method and system |
CN105306536A (en) * | 2015-09-22 | 2016-02-03 | 上海斐讯数据通信技术有限公司 | Method for intelligent terminal to remotely execute service command based on WiFi (Wireless Fidelity) |
CN108712301A (en) * | 2018-04-03 | 2018-10-26 | 四川斐讯信息技术有限公司 | A kind of adjustment method and debugging system of terminal device |
CN108874677A (en) * | 2018-06-27 | 2018-11-23 | 万达百汇科技(深圳)有限公司 | A kind of android terminal and its test method and system |
CN109564539A (en) * | 2016-08-03 | 2019-04-02 | 英特尔公司 | Remote debugging and management |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180262388A1 (en) * | 2006-09-25 | 2018-09-13 | Weaved, Inc. | Remote device deployment |
-
2019
- 2019-08-21 CN CN201910773746.9A patent/CN110557318B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188308A (en) * | 2011-12-30 | 2013-07-03 | 北大方正集团有限公司 | Remote diagnosis method and system |
CN105306536A (en) * | 2015-09-22 | 2016-02-03 | 上海斐讯数据通信技术有限公司 | Method for intelligent terminal to remotely execute service command based on WiFi (Wireless Fidelity) |
CN109564539A (en) * | 2016-08-03 | 2019-04-02 | 英特尔公司 | Remote debugging and management |
CN108712301A (en) * | 2018-04-03 | 2018-10-26 | 四川斐讯信息技术有限公司 | A kind of adjustment method and debugging system of terminal device |
CN108874677A (en) * | 2018-06-27 | 2018-11-23 | 万达百汇科技(深圳)有限公司 | A kind of android terminal and its test method and system |
Non-Patent Citations (1)
Title |
---|
基于IPSec的VPN网关设计与实现;冯妮娜;《中国优秀硕士学位论文全文数据库》;20060715;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110557318A (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110557318B (en) | Method for realizing safe remote operation of IOT equipment | |
CN113572738B (en) | Zero trust network architecture and construction method | |
CN110324338B (en) | Data interaction method, device, fort machine and computer readable storage medium | |
CN103379185B (en) | A kind of method, apparatus and system of network address translation | |
CN106911648B (en) | Environment isolation method and equipment | |
CN114826754B (en) | Communication method and system between different networks, storage medium and electronic device | |
EP1950931A1 (en) | Devices, system and method for distributing and synchronizing service data | |
CN104811433A (en) | Distributed IoT (Internet of Things) solution scheme of C/S configuration | |
CN110764871A (en) | Cloud platform-based mimicry application packaging and control system and method | |
CN112838951B (en) | Operation and maintenance method, device and system of terminal equipment and storage medium | |
CN101621523A (en) | User security access control method as well as device and system thereof | |
CN112422348B (en) | Power information data acquisition communication system and method | |
CN113783871A (en) | Micro-isolation protection system adopting zero trust architecture and protection method thereof | |
CN102740296A (en) | Trusted network access method and system for mobile terminal | |
CN112187532A (en) | Node control method and system | |
WO2024021703A1 (en) | Server control method, server, and storage medium | |
CN103957194B (en) | A kind of procotol IP cut-in methods and access device | |
CN114513326B (en) | Method and system for realizing communication audit based on dynamic proxy | |
CN104821951A (en) | Safety communication method and device | |
CN107342972B (en) | Method and device for realizing remote access | |
CN102752752B (en) | base station maintenance method and apparatus | |
CN106165367B (en) | A kind of access control method of storage device, storage device and control system | |
CN116579019B (en) | Computer information safety supervision system | |
KR20220041706A (en) | Authentication method and device, computing equipment and medium | |
CN109344584B (en) | Safety management method for initial account of intelligent equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |