CN114615047A - Information security system - Google Patents

Information security system Download PDF

Info

Publication number
CN114615047A
CN114615047A CN202210224470.0A CN202210224470A CN114615047A CN 114615047 A CN114615047 A CN 114615047A CN 202210224470 A CN202210224470 A CN 202210224470A CN 114615047 A CN114615047 A CN 114615047A
Authority
CN
China
Prior art keywords
information
distributed system
user
platform
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210224470.0A
Other languages
Chinese (zh)
Inventor
罗晓
黄泽鑫
王智栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202210224470.0A priority Critical patent/CN114615047A/en
Publication of CN114615047A publication Critical patent/CN114615047A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention provides an information security system, which comprises the following steps: distributed systems and platform systems; the distributed system is used for storing user information, and the user information comprises personal information, equipment information and/or engineering information; the platform system is associated with the distributed system and used for remotely viewing the equipment information and/or engineering information through the platform system. The scheme provided by the invention can prevent the personal information of the user from being stolen or leaked.

Description

Information security system
Technical Field
The invention relates to the field of control, in particular to an information security system.
Background
At present, when a user uses applications such as WeChat, QQ or Paibao, the user can require to provide personal privacy information such as personal head portrait, mobile phone number and identification number. Even when monitoring systems such as intelligent home, entrance guard and security are used, information such as personal head portraits and mobile phone numbers can be required to be collected. In a conventional application or monitoring system, engineering data, equipment data and personal data are stored by establishing a platform, personal information is easy to steal under the internet environment, and the personal information is often leaked.
Disclosure of Invention
The main objective of the present invention is to overcome the above-mentioned drawbacks of the related art, and to provide an information security system to solve the problem of personal information security in the related art.
One aspect of the present invention provides an information security system, including: distributed systems and platform systems; the distributed system is used for storing user information, and the user information comprises personal information, equipment information and/or engineering information; the platform system is associated with the distributed system and used for remotely viewing the equipment information and/or engineering information through the platform system.
Optionally, the distributed system is associated with the platform system through a user virtual ID; viewing the device information and/or engineering information through the platform system, including: and matching the corresponding distributed system through the user virtual ID to check the equipment information and/or the engineering information.
Optionally, creating, by the distributed system, the user virtual ID includes: the user unique virtual ID is generated with the GUID code.
Optionally, viewing the device information and/or the engineering information through the platform system includes: the user terminal sends a viewing request for viewing the equipment information and/or the engineering information to the platform system through the Internet; after receiving the viewing request sent by the user terminal, the platform system forwards the viewing request to the distributed system; the distributed system returns the equipment information and/or engineering information to the platform system according to the viewing request; and the platform system returns the equipment information and/or the engineering information returned by the distributed system to the user terminal after receiving the equipment information and/or the engineering information returned by the distributed system.
Optionally, the distributed system is connected with a user terminal through a local area network, and the user information is entered into the distributed system through the user terminal.
Optionally, the user terminal may perform device monitoring on a device local to the distributed system.
Optionally, the personal information includes: personal head portrait, identification information and mobile phone number.
Optionally, the platform system is further configured to receive device information and/or engineering information in the user information uploaded by the distributed system.
According to the technical scheme of the invention, the information security system is formed by the distributed system and the platform system, the distributed system and the platform system respectively store different data, the user personal information is stored in the distributed system, and the distributed system and the platform system are associated through the user virtual ID which is unique for a person, so that the user personal information can be prevented from being stolen or leaked.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention without limiting the invention to the right. In the drawings:
FIG. 1 is a block diagram illustrating the structure of one embodiment of an information security system provided by the present invention;
FIG. 2 illustrates an architectural diagram of a conventional application or monitoring system;
fig. 3 is a system architecture diagram of an embodiment of an information security system provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It should be apparent that the described embodiments are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Information safety is more and more emphasized, in a conventional application or monitoring system, information such as personal identification numbers, mobile phone numbers, head portraits and the like is uploaded to a platform system through an app or a pc or a pad through the internet, face recognition, identity verification and the like are realized through the internet during application, personal information is transmitted back and forth through the internet, even if an encryption algorithm is used in the transmission process, the information is easy to be stolen by others, and the personal information has the risk of being revealed by management personnel, and the matters are rare, such as telecommunication frauds which often occur. Fig. 2 shows the architecture of a conventional application or monitoring system. All data are stored in a platform system (the platform system can be a system comprising a large amount of data storage and a data interface, and can store a large amount of data), the mobile terminal app, the PC terminal and the tablet personal computer (pad) access the platform system through the internet, personal information (such as identity numbers, mobile phone numbers and the like) is recorded, and a head portrait is uploaded, and the operation is completed through the internet.
The invention provides an information security system.
Fig. 1 shows a block diagram of an embodiment of an information security system provided by the present invention.
As shown in fig. 1, the information security system includes a distributed system and a platform system according to an embodiment of the present invention. The platform system is connected with at least one distributed system. For example, as shown in fig. 1, the platform system is connected to N distributed systems, which are distributed system 1, distributed systems 2 and …, and distributed system N.
The distributed system is deployed locally and used for storing user information. The user information comprises: engineering information, personal information, and/or equipment information. The personal information comprises at least one of identity information (such as an identity card number), communication information (such as a mobile phone number, a social account number (such as WeChat and QQ account numbers), and user characteristic information (such as head portrait information).
The platform system is associated with the distributed system and used for viewing the equipment information and/or engineering information through the platform system. For example, the cloud platform may be specifically a cloud platform server. The distributed system may be a monitoring system, for example, a home intelligent home monitoring system, and more than two distributed systems are connected to one platform system. The local monitoring of the equipment (such as household equipment and electrical equipment) can be realized through a distributed system, and the remote monitoring of the equipment can be realized through a platform system.
The distributed system is connected with a user terminal through a local area network, and the user information is input into the distributed system through the user terminal. Specifically, a local self-forming local area network (a local area network may be self-formed through a router or a switch), and a user terminal (for example, a mobile phone terminal app) may access the local area network to implement personal information entry. Optionally, the user terminal may further perform device monitoring on a device local to the distributed system. The equipment realizes communication through the data communication module, and the system can monitor the equipment state and control the equipment. The device may specifically be a device monitored in a distributed system, such as an appliance, which may include an air conditioner, a lamp, a refrigerator, and the like. Connected through a local area network.
For example, fig. 3 shows a system diagram of an embodiment of an information security system provided by the present invention. Referring to fig. 3, user information is entered into the distributed system 1 or the distributed system 2 through the mobile phone app. Specifically, a distributed system deployed locally is a complete system, and device access, device data analysis, data storage, personal information entry and identification (e.g., avatar entry, face identification), and the like are all completed in the local distributed system. Taking a home door control system with a camera as an example, the head portrait information of family members is stored in a local distributed system through a local user terminal (such as a mobile phone app), and when a door is opened by swiping a face, the local distributed system identifies the face matching condition.
In one embodiment, the platform system is coupled to at least one distributed system. Namely, the information security system includes a platform system and at least one distributed system. The distributed system is connected with the platform system through the internet. For example, fig. 3 is a system architecture diagram illustrating an embodiment of an information security system provided by the present invention. Referring to fig. 3, the platform system is connected to the distribution system 1 and the distribution system 2 via the internet.
The distributed system is associated with the platform system through a user virtual ID; and creating the user virtual ID by the distributed system and uploading the user virtual ID to a platform system. In one embodiment, the local distribution system generates a user-unique virtual ID with a GUID code. The GUID code is globally unique and can be generated by a program tool, and the GUID code is used as a virtual ID of a user. For example, when the local distributed system starts to be started and account roles are created, the system automatically generates a user virtual ID unique to a person and uploads the user virtual ID together with engineering information, equipment data and the like to the platform system.
And matching the corresponding distributed system through the user virtual ID to check the equipment information and/or the engineering information. The platform system may be further operable to: and carrying out equipment monitoring and/or remote control on equipment local to the distributed system through the distributed system. For example, referring to fig. 3, a user terminal connected through the internet, such as a mobile phone (app) or a PC or a tablet computer (pad), matches a corresponding local distributed system in a platform system with a user virtual ID, so as to view status data of a local device (the status data refers to specific data of a device, such as air conditioner temperature, mode, wind speed, and the like. The distributed system and the platform system are associated through the user virtual ID which is unique to a person, so that the personal information of the user can be prevented from being stolen or leaked. The equipment can be controlled locally or remotely, and the platform system and the local distributed system establish a data link channel to realize remote control of the local equipment through the platform system. The app can access the local area network to realize personal information entry, equipment monitoring and the like. The local distributed system is a complete system, and equipment access, analysis, storage, head portrait input, face recognition and the like are completed in the local distributed system. Taking a home door control system with a camera as an example, the head portrait information of family members is stored in a local distributed system through local app, and when a user swipes the face to open the door, the face matching condition is identified by the local distributed system.
The platform system is further used for receiving the equipment information and/or the engineering information in the user information uploaded by the distributed system. For example, the local distribution system generates a personally unique user virtual ID with the GUID code (the GUID code is globally unique and can be generated by the facility, with the GUID code as the user's virtual ID), along with project information and/or device data, for uploading to the platform system.
The project information is uploaded to the platform system, so that a user can know which projects can be monitored, the equipment data is uploaded to the platform system, remote checking can be achieved, and the virtual ID is uploaded to the platform system, so that remote checking can be achieved.
The platform system mainly realizes the storage of the incidence relation of the local distributed system and the transfer of the equipment data. Specifically, the user terminal sends a viewing request for viewing the equipment information and/or the engineering information to the platform system through the internet; after receiving the viewing request sent by the user terminal, the platform system forwards the viewing request to the distributed system; the distributed system returns the equipment information and/or the engineering information to the platform system according to the viewing request; and the platform system returns the equipment information and/or the engineering information returned by the distributed system to the user terminal after receiving the equipment information and/or the engineering information returned by the distributed system.
For example, a user terminal of an internet end, such as a mobile phone (app) or a PC end or a tablet computer (pad), needs to check device history data, a data query request is sent to a platform system by the user terminal of the internet end, the platform system is transferred to a corresponding local distributed system through a unique user virtual ID, and the local distributed system queries and returns data to the platform system and then to the user terminal of the internet end.
Therefore, according to the scheme provided by the invention, the information safety system is formed by the distributed system and the platform system, the local monitoring of the equipment can be realized by the distributed system, and the remote monitoring of the equipment can be realized by the platform system. The distributed system and the platform system are respectively used for storing different data, the user personal information is stored in the distributed system, and the distributed system and the platform system are associated through the user virtual ID which is unique for a person, so that the user personal information can be prevented from being stolen or leaked.
The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the invention and the following claims. For example, due to the nature of software, the functions described above may be implemented using software executed by a processor, hardware, firmware, hardwiring, or a combination of any of these. In addition, each functional unit may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and the parts serving as the control device may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above description is only an example of the present invention, and is not intended to limit the present invention, and various modifications and changes may be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (9)

1. An information security system, comprising: distributed systems and platform systems;
the distributed system is used for storing user information, and the user information comprises personal information, equipment information and/or engineering information;
the platform system is associated with the distributed system and used for remotely viewing the equipment information and/or engineering information through the platform system.
2. The information security system of claim 1, wherein the distributed system is associated with the platform system by a user virtual ID;
viewing the device information and/or engineering information through the platform system, including:
and matching the corresponding distributed system through the user virtual ID to check the equipment information and/or the engineering information.
3. The information security system of claim 2, wherein creating the user virtual ID by the distributed system comprises:
the user unique virtual ID is generated with the GUID code.
4. The information security system of any one of claims 1-3, wherein viewing the equipment information and/or engineering information through the platform system comprises:
the user terminal sends a viewing request for viewing the equipment information and/or the engineering information to the platform system through the Internet;
after receiving the viewing request sent by the user terminal, the platform system forwards the viewing request to the distributed system;
the distributed system returns the equipment information and/or engineering information to the platform system according to the viewing request;
and the platform system returns the equipment information and/or the engineering information returned by the distributed system to the user terminal after receiving the equipment information and/or the engineering information returned by the distributed system.
5. The information security system according to any one of claims 1 to 4,
the distributed system is connected with a user terminal through a local area network, and the user information is input into the distributed system through the user terminal.
6. The information security system according to any one of claims 1 to 5,
the distributed system is connected with the user terminal through a local area network, and the user terminal can monitor the local equipment of the distributed system.
7. The information security system according to any one of claims 1 to 6,
the platform system is further configured to: and carrying out equipment monitoring and/or remote control on equipment local to the distributed system through the distributed system.
8. The information security system of any one of claims 1-7, wherein the personal information comprises: personal head portrait, identification information and mobile phone number.
9. The information security system according to any one of claims 1 to 8,
the platform system is further configured to receive device information and/or engineering information in the user information uploaded by the distributed system.
CN202210224470.0A 2022-03-07 2022-03-07 Information security system Pending CN114615047A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210224470.0A CN114615047A (en) 2022-03-07 2022-03-07 Information security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210224470.0A CN114615047A (en) 2022-03-07 2022-03-07 Information security system

Publications (1)

Publication Number Publication Date
CN114615047A true CN114615047A (en) 2022-06-10

Family

ID=81860441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210224470.0A Pending CN114615047A (en) 2022-03-07 2022-03-07 Information security system

Country Status (1)

Country Link
CN (1) CN114615047A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202153753U (en) * 2010-12-02 2012-02-29 上海可鲁系统软件有限公司 Remote communication service device of industrial Internet distributed system
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN102884774A (en) * 2010-03-17 2013-01-16 Abb技术有限公司 Method for configuring and distributing access rights in a distributed system
CN105469075A (en) * 2015-12-24 2016-04-06 青岛海尔股份有限公司 Refrigerator and control method thereof
CN107102559A (en) * 2017-04-14 2017-08-29 昆山优自在智能科技有限公司 A kind of intelligent home control system and method
CN108900502A (en) * 2018-06-27 2018-11-27 佛山市云米电器科技有限公司 It is a kind of based on home furnishings intelligent interconnection communication means, system
CN111510425A (en) * 2020-03-06 2020-08-07 珠海格力电器股份有限公司 Intelligent household equipment management method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102884774A (en) * 2010-03-17 2013-01-16 Abb技术有限公司 Method for configuring and distributing access rights in a distributed system
CN202153753U (en) * 2010-12-02 2012-02-29 上海可鲁系统软件有限公司 Remote communication service device of industrial Internet distributed system
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN105469075A (en) * 2015-12-24 2016-04-06 青岛海尔股份有限公司 Refrigerator and control method thereof
CN107102559A (en) * 2017-04-14 2017-08-29 昆山优自在智能科技有限公司 A kind of intelligent home control system and method
CN108900502A (en) * 2018-06-27 2018-11-27 佛山市云米电器科技有限公司 It is a kind of based on home furnishings intelligent interconnection communication means, system
CN111510425A (en) * 2020-03-06 2020-08-07 珠海格力电器股份有限公司 Intelligent household equipment management method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
EP2849066B1 (en) Anonymous decisions in an access control system
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN103116922B (en) Networking management system and management method for wireless gate lock
CN102413456B (en) User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
KR101242122B1 (en) Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
US20050240712A1 (en) Remote USB security system and method
CN104733008A (en) Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN104751545A (en) System, method and device for processing permissions of door lock
CN106687982B (en) Personal data management system and management method thereof
CN101272242A (en) Mobile memory system and method based on network
CN112526892B (en) Method and device for controlling intelligent household equipment and electronic equipment
CN106559213B (en) Equipment management method, equipment and system
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN103985169B (en) Handheld terminal and USB port is utilized to carry out door lock open and close system and control method
EP3937040B1 (en) Systems and methods for securing login access
CN105577911A (en) Terminal management method and terminal
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN103686688A (en) Method and device for protecting user address list of mobile terminal and mobile terminal
CN106598813B (en) Work monitoring keyboard and mouse device and method for monitoring computer using process thereof
CN108390819A (en) IM information protecting methods, device, equipment and computer storage media
KR102303254B1 (en) Authentication system for blockchain did
CN106067198B (en) A kind of method and system for verifying gate inhibition's password
CN114615047A (en) Information security system
CN106296926A (en) A kind of based on the Intelligent entrance guard control system authorized in limited time and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220610