CN115913664A - Method, system and equipment for controlling intelligent access of equipment - Google Patents

Method, system and equipment for controlling intelligent access of equipment Download PDF

Info

Publication number
CN115913664A
CN115913664A CN202211350087.6A CN202211350087A CN115913664A CN 115913664 A CN115913664 A CN 115913664A CN 202211350087 A CN202211350087 A CN 202211350087A CN 115913664 A CN115913664 A CN 115913664A
Authority
CN
China
Prior art keywords
accessed
rule
information
equipment
blacklist rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211350087.6A
Other languages
Chinese (zh)
Inventor
李树彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Oribo Technology Co Ltd
Original Assignee
Shenzhen Oribo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Oribo Technology Co Ltd filed Critical Shenzhen Oribo Technology Co Ltd
Priority to CN202211350087.6A priority Critical patent/CN115913664A/en
Publication of CN115913664A publication Critical patent/CN115913664A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, a system and equipment for controlling intelligent access of equipment. The method comprises the following steps: receiving an access request signal of equipment to be accessed; judging whether the equipment to be accessed accords with a first blacklist rule set in a control device or not according to the access request signal; if the device to be accessed does not accord with the first blacklist rule, generating a check signal, and sending the check signal to a server to judge whether the device to be accessed accords with a second blacklist rule of the server; if the device to be accessed is not in accordance with the second blacklist rule, determining that the device to be accessed is legal according to a passing signal sent by the server, and allowing the device to be accessed to access the control device. By implementing the method and the device, when the access request of the equipment to be accessed is received, the access is allowed after the equipment is judged to be legal by the first blacklist rule and the second blacklist rule, and the safety of the equipment accessed to the control device can be improved.

Description

Method, system and equipment for controlling intelligent access of equipment
Technical Field
The present invention relates to the field of communication control, and in particular, to a method, a system, and a device for controlling intelligent access of a device.
Background
With the rapid development of the internet of things and infrastructure communication systems, the tendency of networking mass devices is. The intelligent home is embodied by Internet of things. The intelligent home is connected with various devices in the home through the Internet of things technology, and provides multiple functions and means such as household appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, heating and ventilation control, infrared forwarding and programmable timing control.
When an illegal device is accessed to the gateway device, the access bandwidth of the legal device is occupied, or the user information is leaked due to data stealing, and the like, if the illegal device cannot be found in time and is prevented from being accessed to the intelligent home network, huge risks can be brought to the safety of the intelligent home.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method, a system and equipment for controlling intelligent access of equipment.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for controlling intelligent access of equipment is constructed, and the method comprises the following steps:
receiving an access request signal of equipment to be accessed;
judging whether the equipment to be accessed accords with a first blacklist rule set in a control device or not according to the access request signal;
if the device to be accessed does not accord with the first blacklist rule, generating a check signal, and sending the check signal to a server to judge whether the device to be accessed accords with a second blacklist rule of the server;
if the device to be accessed is not in accordance with the second blacklist rule, determining that the device to be accessed is legal according to a passing signal sent by the server, and allowing the device to be accessed to access the control device.
Preferably, after the step of determining whether the device to be accessed meets the first blacklist rule of the control apparatus, the method further includes:
if the first blacklist rule is met, determining that the equipment to be accessed is illegal equipment, and refusing the equipment to be accessed to access the control device; and generating the marking data of the equipment to be accessed, and sending the marking data to the server.
Preferably, after the step of determining whether the device to be accessed meets the second blacklist rule of the server, the method further includes:
and if the second blacklist rule is met, determining that the equipment to be accessed is illegal equipment according to a first rejection signal sent by the server, and rejecting the equipment to be accessed to access the control device.
Preferably, the access request signal includes at least: first information and second information;
a first white list rule is set in the control device;
in the step of determining whether the device to be accessed meets a first blacklist rule set in a control device, the method includes:
comparing the first information and the second information with the first blacklist rule;
when the first information and the second information do not accord with the first blacklist rule, judging that the first information and the second information do not accord with the first blacklist rule;
when the first information or the second information accords with the first blacklist rule, comparing the first information and the second information with the first white list rule, and when the first information or the second information accords with the first white list rule, judging that the first information or the second information does not accord with the first blacklist rule; when the first information and the second information do not accord with the first white list rule, judging that the first information and the second information accord with the first black list rule; and/or
The check signal includes at least: first verification information and second verification information;
a second white list rule is set in the server;
in the step of determining whether the device to be accessed meets a second blacklist rule of the server, the method includes:
comparing the first and second inspection information with the second blacklist rule;
when the first inspection information and the second inspection information do not accord with the second blacklist rule, judging that the first inspection information and the second inspection information do not accord with the second blacklist rule;
when the first check information or the second check information accords with the second blacklist rule, comparing the first check information and the second check information with the second white list rule, and when the first check information or the second check information accords with the second white list rule, judging that the first check information or the second check information does not accord with the second blacklist rule; and when the first check information and the second check information do not accord with the second white list rule, judging that the first check information and the second check information accord with the second black list rule.
Preferably, the method for controlling intelligent access of the device further includes: and counting the illegal equipment according to the marking data, judging whether the marking data exist in the second blacklist rule, and if not, updating the second blacklist rule according to the marking data.
Preferably, when the verification signal at least includes the first verification information and the second verification information, and the server is provided with the second white list rule, the method further includes:
and if the first check information or the second check information accords with the second white list rule, generating a modification signal, and updating the second black list rule according to the modification signal.
Preferably, the method further comprises the following steps:
when the equipment to be accessed accords with the second blacklist rule, updating the first blacklist rule according to the second blacklist rule sent by the server;
or the second blacklist rule is regularly acquired from the server according to second preset time, and the first blacklist rule is updated according to the second blacklist rule;
or when the variation of the second blacklist rule in the server reaches a trigger condition, acquiring the second blacklist rule sent by the server, and updating the first blacklist rule according to the second blacklist rule.
Preferably, the method for controlling intelligent access of the device further includes: checking all accessed devices, if illegal devices exist, disconnecting the devices from the illegal devices, and refusing the illegal devices to access the control device;
in the step of checking all the accessed devices, the method includes:
checking all accessed devices according to the first blacklist rule regularly according to a first preset time;
or after the step of judging whether the equipment to be accessed accords with the first blacklist rule of the control device, checking all accessed equipment according to the first blacklist rule;
or after the equipment to be accessed accords with the second blacklist rule and the step of updating the first blacklist rule according to the second blacklist rule sent by the server, checking all accessed equipment according to the first blacklist rule.
The invention also constructs a system for controlling the intelligent access of the equipment, which can be used for the method for controlling the intelligent access of the equipment, and comprises a control device and a server;
the control device is used for receiving an access request signal of the equipment to be accessed; judging whether the equipment to be accessed accords with a first blacklist rule, if not, generating a check signal, and sending the check signal to a server; determining the equipment to be accessed as legal equipment according to a passing signal sent by the server, and allowing the equipment to be accessed;
the server is configured to receive the check signal sent by the control device, determine whether the device to be accessed meets a second blacklist rule, and send the pass signal to the control device if the device to be accessed does not meet the second blacklist rule.
The present invention also constructs a computer apparatus comprising: a memory, a processor and a bus, wherein the memory stores a computer program executable by the processor, the processor and the memory communicate with each other via the bus, and the processor executes the computer program to perform the steps of the method for controlling intelligent access of a device as described in any one of the above.
By implementing the method, the system and the equipment for controlling the intelligent access of the equipment, when the access request of the equipment to be accessed is received, the access is allowed after the equipment is judged to be legal through the first blacklist rule and the second blacklist rule, so that the safety of the equipment accessed to the control device can be improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
fig. 1 is a flowchart illustrating an embodiment of a method for controlling intelligent access of a device according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating an embodiment of a method for controlling intelligent access of a device according to the present invention. The method for controlling the intelligent access of the equipment comprises the following steps:
s1, receiving an access request signal of equipment to be accessed.
Specifically, when the device to be accessed needs to access the control device for communication, an access request signal needs to be sent to establish connection with the control device. The access request signal often carries characteristic parameters of the device to be accessed, such as an IP address, a serial number, a device model, manufacturer information, and the like, and it can be understood that the access request signal may also include other characteristic parameters.
S2, judging whether the equipment to be accessed accords with a first blacklist rule set in the control device or not according to the access request signal.
Specifically, the blacklist rule refers to a rule set for a device that cannot pass through. By reading the characteristic parameters in the access request signal and comparing the characteristic parameters with the first blacklist rule set in the control device, whether the equipment to be accessed accords with the first blacklist rule set in the control device can be judged.
Further, in an optional embodiment, when the access request signal at least includes the first information and the second information, and the control device sets a first white list rule, in the step S2 of determining whether the device to be accessed conforms to the first black list rule set in the control device, the method includes: comparing the first information and the second information with the first blacklist rule; when the first information and the second information do not accord with the first blacklist rule, judging that the first information does not accord with the first blacklist rule; when the first information or the second information accords with the first blacklist rule, comparing the first information and the second information with the first white list rule, and when the first information or the second information accords with the first white list rule, judging that the first information or the second information does not accord with the first blacklist rule; and when the first information and the second information do not accord with the first white list rule, judging that the first information and the second information accord with the first black list rule.
For example, the first information is the device model, and the second information is manufacturer information; the first blacklist rule sets that the equipment with the equipment model X10 is illegal equipment, and the equipment with the manufacturer information C10 is illegal equipment; the first white list rule sets that the device with the device model X2 is a legal device, and the device with the manufacturer information C2 is a legal device. And when the equipment type of the equipment I is X1 and the manufacturer information is C1, judging that the equipment I does not accord with the first blacklist rule. And when the equipment model of the second equipment is X10 and the manufacturer information is C2, judging that the second equipment does not accord with the first blacklist rule. And when the equipment model of the equipment III is X10 and the manufacturer information is C1, judging that the equipment type accords with a first blacklist rule.
Further, in an optional embodiment, after step S2, the method further includes: if the first blacklist rule is met, determining that the equipment to be accessed is illegal equipment, and rejecting an access control device of the equipment to be accessed; and generating marking data of the equipment to be accessed, and sending the marking data to the server. Specifically, when the device to be accessed meets the first blacklist rule, the device to be accessed is judged to be an illegal device, the request of accessing the control device is rejected, and connection is not allowed to be established for communication. And meanwhile, generating mark data containing the equipment to be accessed, namely the illegal equipment, and sending the mark data to the server.
Further, in an optional embodiment, the method further comprises: and counting the illegal equipment according to the marking data, judging whether the marking data exist in the second blacklist rule, and if not, updating the second blacklist rule according to the marking data. Specifically, after the server receives the tag data, the server counts the illegal devices according to the tag data, and can analyze the illegal devices trying to access, so as to know the situation of the illegal devices, thereby further strengthening the prevention of the illegal devices. And meanwhile, judging whether the illegal equipment has the same record in the second blacklist rule or not according to the marking data, and if not, updating the characteristics of the illegal equipment into the second blacklist rule so as to perfect the second blacklist rule.
And S3, if the device does not accord with the first blacklist rule, generating a check signal, and sending the check signal to the server to judge whether the device to be accessed accords with a second blacklist rule of the server.
Specifically, when the device to be accessed does not conform to the first blacklist rule, a check signal is generated according to the access request signal, and the check signal includes but is not limited to a characteristic parameter of the device; and sending the detection signal to a server, reading the characteristic parameters in the detection signal by the server, comparing the characteristic parameters with the second blacklist rule, and judging whether the equipment to be accessed accords with the second blacklist rule of the server, so that errors caused by inconsistent blacklist rules of the control equipment due to the increase of the blacklist rule of the server are prevented. The server may be a cloud server or an entity server.
Further, in an optional embodiment, when the check signal at least includes the first check information and the second check information, and a second white list rule is set in the server, the determining, in step S3, whether the device to be accessed meets a second black list rule of the server includes: comparing the first and second inspection information with a second blacklist rule; when the first check information and the second check information do not accord with the second blacklist rule, judging that the first check information and the second check information do not accord with the second blacklist rule; when the first check information or the second check information accords with the second blacklist rule, comparing the first check information and the second check information with the second white list rule, and if the first check information or the second check information accords with the second white list rule, judging that the first check information or the second check information does not accord with the second blacklist rule; and if the first check information and the second check information do not accord with the second white list rule, judging that the first check information and the second check information accord with the second black list rule.
For example, the first check information is the device model, and the second check information is the manufacturer information; the second blacklist rule sets that the equipment with the equipment types of X10 and X11 is illegal equipment, and the equipment with the manufacturer information of C10 is illegal equipment; the second white list rule sets that the device with the device model X2 is a legal device, and the device with the manufacturer information C2 is a legal device. The equipment type of the equipment I is X1, the manufacturer information is C1, and the equipment I is judged not to accord with the second blacklist rule. The device type of the device number two is X10, the manufacturer information is C2, and the device number two is judged not to accord with the second blacklist rule. The device type of the device number four is X10, the manufacturer information is C20, and the device type is judged to be in accordance with the second blacklist rule.
In some other optional embodiments, when the access request signal includes at least the first information and the second information, and the check signal includes at least the first check information and the second check information, the first white list rule may also be set in the control apparatus at the same time, so as to determine whether the device to be accessed meets the first black list rule; and setting a second white list rule in the server so as to judge whether the equipment to be accessed accords with the second black list rule and further enhance the accuracy of intelligent access of the control equipment.
Further, in an optional embodiment, when the verification signal includes at least first verification information and second verification information, and a second white list rule is set in the server, the method further includes: and if the first check information or the second check information conforms to the second white list rule, generating a modification signal, and updating the second black list rule according to the modification signal. Specifically, when the first check information or the second check information conforms to the second blacklist rule, the first check information and the second check information are compared with the second white list rule, so that when any one of the first check information or the second check information conforms to the second white list rule, it is indicated that a rule of the second blacklist rule for the illegal device and a rule of the second white list rule for the legal device have a contradiction. A modification signal needs to be generated, and the second blacklist rule is updated according to the second whitelist rule.
Further, in an optional embodiment, after step S3, the method further includes: and if the first blacklist rule is met, determining the equipment to be accessed as illegal equipment according to the first rejection signal sent by the server, and rejecting the access control device of the equipment to be accessed. Specifically, when the device to be accessed meets the second blacklist rule, the device to be accessed is judged to be an illegal device, the server sends a first rejection signal to the control device, the control device determines that the device to be accessed is the illegal device according to the first rejection signal, then rejects the request of accessing the control device, and does not allow the connection to be established for communication.
And S4, if the device does not accord with the second blacklist rule, determining the device to be accessed as legal device according to the passing signal sent by the server, and allowing the access control device of the device to be accessed.
Specifically, when the device to be accessed is judged not to be in accordance with the second blacklist rule of the server, the device to be accessed is a legal device, the server sends a passing signal to the control device, the control device determines that the device to be accessed is the legal device according to the passing signal, and then the request of the device to be accessed to the control device is allowed, so that connection can be established for communication.
Further, in an optional embodiment, the method for controlling intelligent access of a device further includes: when the equipment to be accessed accords with the second blacklist rule, updating the first blacklist rule according to the second blacklist rule sent by the server; or acquiring a second blacklist rule from the server regularly according to a second preset time, and updating the first blacklist rule according to the second blacklist rule; or when the variation of the second blacklist rule in the server reaches the trigger condition, acquiring the second blacklist rule sent by the server, and updating the first blacklist rule according to the second blacklist rule.
Specifically, in order to ensure that the control device can accurately determine whether the device to be accessed is legal, it is necessary to ensure consistency between a first blacklist rule of the control device and a second blacklist rule of the server, and the first blacklist rule should be updated according to the second blacklist rule. Only when the equipment to be accessed does not accord with the first blacklist rule, the second blacklist is used for judgment; therefore, if the device to be accessed accords with the second blacklist rule, it is indicated that the first blacklist rule is inconsistent with the second blacklist rule, and the first blacklist rule needs to be updated. The first blacklist rule can also be updated by setting a second preset time to regularly acquire a second blacklist rule from the server; this update mode may be performed, for example, every 24 hours. And a threshold value can be set for the variation of the second blacklist rule, and the server pushes the second blacklist rule to the control device after the variation reaches the threshold value.
Further, in an optional embodiment, the method further comprises: and an access control device for checking all accessed devices, and if an illegal device exists, disconnecting the illegal device and rejecting the illegal device.
In the step of checking all the accessed devices, the method comprises the following steps: checking all accessed devices according to a first blacklist rule periodically according to a first preset time; or after judging whether the equipment to be accessed accords with the first blacklist rule of the control device, checking all accessed equipment according to the first blacklist rule; or after the equipment to be accessed accords with the second blacklist rule and the first blacklist rule is updated according to the second blacklist rule sent by the server, checking all accessed equipment according to the first blacklist rule.
Specifically, since there may be an unauthorized device among all devices that have accessed the control apparatus, it is necessary to check all devices that have accessed the control apparatus, thereby preventing the unauthorized device from continuing to access the control apparatus.
The present invention also contemplates a system for controlling intelligent access to a device, operable to perform a method for controlling intelligent access to a device as any of the above. The system comprises: controlling means and server. The control device is used for receiving an access request signal of the equipment to be accessed; judging whether the equipment to be accessed accords with a first blacklist rule, if not, generating a check signal, and sending the check signal to a server; and determining the equipment to be accessed as legal equipment according to the passing signal sent by the server, and allowing the equipment to be accessed to access. And the server is used for receiving the check signal sent by the control device, judging whether the equipment to be accessed accords with the second blacklist rule, and sending a passing signal to the control device if the equipment to be accessed does not accord with the second blacklist rule.
Furthermore, the control device and the server transmit data through the encrypted https interface, and meanwhile, the transmitted data are also encrypted and subjected to tamper-resistant processing, so that the safety of the system is guaranteed.
The present invention also constructs a computer apparatus comprising: the system comprises a memory, a processor and a bus, wherein the memory stores a computer program executable by the processor, the processor and the memory are communicated through the bus, and the processor executes the computer program to execute the method steps for controlling the intelligent access of the equipment. In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as a computer software program. For example, embodiments of the invention include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such embodiments, the computer program may be downloaded and installed by an electronic device and executed to perform the above-described functions defined in the methods of embodiments of the present invention. The electronic equipment can be a notebook, a desktop, a tablet computer, a smart phone and other terminals.
It is to be understood that the above examples merely represent some embodiments of the present invention, and the description thereof is more specific and detailed, but not to be construed as limiting the scope of the present invention; it should be noted that, for those skilled in the art, the above technical features can be freely combined, and several changes and modifications can be made without departing from the concept of the present invention, which all belong to the protection scope of the present invention; therefore, all equivalent changes and modifications made within the scope of the claims of the present invention should be covered by the claims of the present invention.

Claims (10)

1. A method for controlling intelligent access of equipment is characterized by comprising the following steps:
receiving an access request signal of equipment to be accessed;
judging whether the equipment to be accessed accords with a first blacklist rule set in a control device or not according to the access request signal;
if the device to be accessed does not accord with the first blacklist rule, generating a check signal, and sending the check signal to a server to judge whether the device to be accessed accords with a second blacklist rule of the server;
if the device to be accessed is not in accordance with the second blacklist rule, determining that the device to be accessed is legal according to a passing signal sent by the server, and allowing the device to be accessed to access the control device.
2. The method according to claim 1, wherein after the step of determining whether the device to be accessed complies with the first blacklist rule of the control apparatus, the method further comprises:
if the first blacklist rule is met, determining that the equipment to be accessed is illegal equipment, and refusing the equipment to be accessed to access the control device; and generating the marking data of the equipment to be accessed, and sending the marking data to the server.
3. The method according to claim 2, wherein after the step of determining whether the device to be accessed complies with the second blacklist rule of the server, the method further comprises:
and if the second blacklist rule is met, determining that the equipment to be accessed is illegal equipment according to a first rejection signal sent by the server, and rejecting the equipment to be accessed to access the control device.
4. The method of claim 3, wherein the access request signal comprises at least: first information and second information;
a first white list rule is set in the control device;
in the step of determining whether the device to be accessed meets a first blacklist rule set in the control device, the method includes:
comparing the first information and the second information with the first blacklist rule;
when the first information and the second information do not accord with the first blacklist rule, judging that the first information does not accord with the first blacklist rule;
when the first information or the second information accords with the first blacklist rule, comparing the first information and the second information with the first white list rule, and when the first information or the second information accords with the first white list rule, judging that the first information does not accord with the first blacklist rule; when the first information and the second information do not accord with the first white list rule, judging that the first information accords with the first black list rule; and/or
The check signal includes at least: first verification information and second verification information;
a second white list rule is set in the server;
in the step of judging whether the device to be accessed meets the second blacklist rule of the server, the method includes:
comparing the first and second inspection information with the second blacklist rule;
when the first inspection information and the second inspection information do not accord with the second blacklist rule, judging that the first inspection information and the second inspection information do not accord with the second blacklist rule;
when the first check information or the second check information conforms to the second blacklist rule, comparing the first check information and the second check information with the second whitelist rule, and when the first check information or the second check information conforms to the second whitelist rule, judging that the first check information or the second check information does not conform to the second blacklist rule; and when the first check information and the second check information do not accord with the second white list rule, judging that the first check information and the second check information accord with the second black list rule.
5. The method for controlling intelligent access of equipment according to any one of claims 3-4, wherein the method for controlling intelligent access of equipment further comprises: and counting the illegal equipment according to the marking data, judging whether the marking data exist in the second blacklist rule, and if not, updating the second blacklist rule according to the marking data.
6. The method for controlling intelligent access to equipment according to claim 4, wherein when the verification signal includes at least the first verification information and the second verification information, and the second white list rule is set in the server, the method further includes:
and if the first check information or the second check information conforms to the second white list rule, generating a modification signal, and updating the second black list rule according to the modification signal.
7. The method for controlling intelligent access of equipment according to claim 3, further comprising:
when the equipment to be accessed accords with the second blacklist rule, updating the first blacklist rule according to the second blacklist rule sent by the server;
or acquiring the second blacklist rule from the server periodically according to a second preset time, and updating the first blacklist rule according to the second blacklist rule;
or when the variation of the second blacklist rule in the server reaches a trigger condition, acquiring the second blacklist rule sent by the server, and updating the first blacklist rule according to the second blacklist rule.
8. The method for controlling intelligent access of equipment according to claim 7, wherein the method for controlling intelligent access of equipment further comprises: checking all accessed devices, if the illegal device exists, disconnecting the illegal device, and refusing the illegal device to access the control device;
in the step of checking all the accessed devices, the method includes:
checking all accessed devices according to the first blacklist rule regularly according to a first preset time;
or after the step of judging whether the equipment to be accessed accords with the first blacklist rule of the control device, checking all accessed equipment according to the first blacklist rule;
or after the equipment to be accessed accords with the second blacklist rule and the step of updating the first blacklist rule according to the second blacklist rule sent by the server, checking all accessed equipment according to the first blacklist rule.
9. A system for controlling intelligent access of equipment, which can be used in the method for controlling intelligent access of equipment of claims 1-8, and is characterized by comprising a control device and a server;
the control device is used for receiving an access request signal of the equipment to be accessed; judging whether the equipment to be accessed accords with a first blacklist rule, if not, generating a check signal, and sending the check signal to a server; determining the equipment to be accessed as legal equipment according to the passing signal sent by the server, and allowing the equipment to be accessed;
the server is configured to receive the check signal sent by the control device, determine whether the device to be accessed meets a second blacklist rule, and send the pass signal to the control device if the device to be accessed does not meet the second blacklist rule.
10. A computer device, comprising: memory, a processor and a bus, the memory having stored therein a computer program executable by the processor, the processor communicating with the memory via the bus, the processor executing the computer program to perform the steps of the method according to any one of claims 1 to 8.
CN202211350087.6A 2022-10-31 2022-10-31 Method, system and equipment for controlling intelligent access of equipment Pending CN115913664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211350087.6A CN115913664A (en) 2022-10-31 2022-10-31 Method, system and equipment for controlling intelligent access of equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211350087.6A CN115913664A (en) 2022-10-31 2022-10-31 Method, system and equipment for controlling intelligent access of equipment

Publications (1)

Publication Number Publication Date
CN115913664A true CN115913664A (en) 2023-04-04

Family

ID=86477036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211350087.6A Pending CN115913664A (en) 2022-10-31 2022-10-31 Method, system and equipment for controlling intelligent access of equipment

Country Status (1)

Country Link
CN (1) CN115913664A (en)

Similar Documents

Publication Publication Date Title
CN111274583A (en) Big data computer network safety protection device and control method thereof
JP2021515498A (en) Attribute-based policies for integrity monitoring and network intrusion detection
CN104580133A (en) Malicious program protection method and system and filtering table updating method thereof
CN108092970B (en) Wireless network maintenance method and equipment, storage medium and terminal thereof
CN112671870B (en) Data processing method and device, electronic equipment and storage medium
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN112969167A (en) Equipment network distribution method, device and system, electronic equipment and storage medium
CN105718792A (en) Sandbox based two-dimensional code detection method and system
CN104540135A (en) Safety access method of wireless network, device and terminal
CN111371803B (en) Smart home permission control method and device, smart home system and server
CN109347785A (en) A kind of terminal type recognition methods and device
CN108667802A (en) A kind of monitoring method and system of electric power application network safety
CN109474540B (en) Method and device for identifying OPC (optical proximity correction) flow
CN111193727A (en) Operation monitoring system and operation monitoring method
CN110572296A (en) Internet of things terminal equipment communication protocol consistency safety detection method
CN111866995B (en) WeChat applet-based intelligent device network distribution method and system
CN112699369A (en) Method and device for detecting abnormal login through stack backtracking
CN112583674A (en) Data processing method and device, electronic equipment and storage medium
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
CN115913664A (en) Method, system and equipment for controlling intelligent access of equipment
CN114567678B (en) Resource calling method and device for cloud security service and electronic equipment
CN113992437B (en) Access control management method, device and system for Modbus equipment
CN116232571A (en) Vehicle encryption method, device, equipment, storage medium and vehicle
US10019582B1 (en) Detecting application leaks
CN110769010B (en) Data management authority processing method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination