WO2018076368A1 - 局域网内设备的安全操控方法、系统及其设备 - Google Patents

局域网内设备的安全操控方法、系统及其设备 Download PDF

Info

Publication number
WO2018076368A1
WO2018076368A1 PCT/CN2016/104117 CN2016104117W WO2018076368A1 WO 2018076368 A1 WO2018076368 A1 WO 2018076368A1 CN 2016104117 W CN2016104117 W CN 2016104117W WO 2018076368 A1 WO2018076368 A1 WO 2018076368A1
Authority
WO
WIPO (PCT)
Prior art keywords
security level
level mode
area network
local area
server
Prior art date
Application number
PCT/CN2016/104117
Other languages
English (en)
French (fr)
Inventor
邹伟
Original Assignee
美的智慧家居科技有限公司
美的集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 美的智慧家居科技有限公司, 美的集团股份有限公司 filed Critical 美的智慧家居科技有限公司
Priority to PCT/CN2016/104117 priority Critical patent/WO2018076368A1/zh
Publication of WO2018076368A1 publication Critical patent/WO2018076368A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a method, system and device for securely controlling devices in a local area network.
  • the terminal device can communicate in the local area network.
  • the home air conditioner and the like can communicate with the related server in the home local area network.
  • the object of the present invention is to solve at least one of the above technical problems to some extent.
  • the first object of the present invention is to provide a security control method for devices in a local area network, which realizes the interaction of devices in a local area network, and when one device is attacked, the other devices can be effectively reminded, and the device is improved.
  • the security protection efficiency of devices in the LAN is improved.
  • a second object of the present invention is to provide another method of securely controlling devices in a local area network.
  • a third object of the present invention is to provide a method for safely controlling devices in a local area network.
  • a fourth object of the present invention is to provide a terminal device.
  • a fifth object of the present invention is to propose another terminal device.
  • a sixth object of the present invention is to provide a terminal control device.
  • a seventh object of the present invention is to provide a security control system for devices in a local area network.
  • the first aspect of the present invention provides a method for securely controlling a device in a local area network, including the following steps:
  • the first authority key is obtained by using the first authority key to apply the first authority key to the interaction information between the first device and the server. Perform encryption processing;
  • the security control method of the device in the local area network in the embodiment of the present invention detects whether the first device is illegally attacked in the process of operating the first device in the first security level mode, and detects that the first device is illegally attacked, and the server Performing key agreement to obtain a first authority key, applying the first authority key to encrypt the interaction information between the first device and the server, and sending the second security to other devices in the local area network
  • the broadcast message of the hierarchical mode operation wherein the security level of the second security level mode is higher than the first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode.
  • the security control method of the device in the local area network according to the embodiment of the present invention further has the following additional technical features:
  • the detecting is illegally attacked, including:
  • the detection is that the first device is subjected to an illegal attack.
  • the target data packet number includes: a query data packet, or a control data packet;
  • the detecting is that the first device is subjected to an illegal attack, including:
  • the second aspect of the present invention provides another method for securely controlling devices in a local area network, including the following steps:
  • the second device in the local area network receives the broadcast message of the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode;
  • the second device in the local area network receives the broadcast message in the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first a security level mode, if the second device is currently running in the first security level mode, performing key agreement with the server to obtain a second authority key, to apply the second authority key to the second device and the server The interaction information between them is encrypted.
  • the interaction of the devices in the local area network is realized, when one device is attacked, the other The device can improve the security level mode by using the broadcast message of the attacked device, and improve the security protection efficiency of the devices in the local area network.
  • the third aspect of the present invention provides a security control method for a device in a local area network, including the following steps:
  • the terminal control device in the local area network receives the broadcast message of the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode;
  • the terminal control device in the local area network receives the broadcast message in the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first
  • the security level mode is configured to parse the identifier information of the first device from the broadcast message, send a token query request carrying the identifier information to the server, receive a token corresponding to the identifier information fed back by the server, and perform confidentiality according to the token with the first device.
  • the key negotiation obtains the third authority key, and applies the third authority key to encrypt the interaction information between the first device and the terminal control device. Thereby, the security of the communication data between the terminal control device and the terminal device is ensured.
  • the fourth aspect of the present invention provides a terminal device, including:
  • a detecting module configured to detect whether an illegal attack is performed during a process in which the terminal device in the local area network operates in the first security level mode
  • a first acquiring module configured to perform a key agreement with the server to obtain a first authority key when the terminal device is detected to be illegally attacked, to apply the first authority key to the first device and the The interaction information between the servers is encrypted;
  • a first sending module configured to send, to other devices in the local area network, a broadcast message that is run in a second security level mode, where a security level of the second security level mode is higher than the first security level mode, so that The device operating in the first security level mode in the local area network switches to the second security level mode, and then communicates with the terminal device through the authority key.
  • the terminal device in the embodiment of the present invention detects whether the first device in the local area network operates in the first security level mode, and detects that the first device is illegally attacked. Transmitting, by the first authority key, the interaction information between the first device and the server by using the first authority key, and transmitting the broadcast of the second security level mode to other devices in the local area network a message, wherein the second security level mode has a higher security level than the first security level mode, so that the first security level mode is transmitted in the local area network.
  • the device of the row switches to the second security level mode. Thereby, the interaction of the devices in the local area network is realized. When one device is attacked, the other devices can be effectively reminded, and the security protection efficiency of the devices in the local area network is improved.
  • the terminal device of the embodiment of the present invention further has the following additional technical features:
  • the detecting module comprises:
  • a first acquiring unit configured to acquire a target data packet quantity within a preset time
  • the detecting unit is configured to: when the number of the target data packets meets the preset condition, detect that the first device is illegally attacked.
  • the target data packet number includes: a query data packet, or a control data packet;
  • the detecting unit is configured to:
  • the detection is that the terminal device is subjected to an illegal attack.
  • the fifth aspect of the present invention provides another terminal device, including:
  • a first receiving module configured to receive, by the terminal device in the local area network, a broadcast message of a second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode ;
  • a second obtaining module configured to acquire a second authority key by performing key agreement with the server when the terminal device is currently running in the first security level mode, to apply the second authority key pair to the first
  • the interaction information between the two devices and the server is encrypted.
  • a communication module configured to perform communication interaction with the first device by using the permission key in the second security level mode.
  • the second device in the local area network receives the broadcast message of the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode, The second device is currently running in the first security level mode, and then performing key agreement with the server to obtain a second authority key, to apply the second authority key to the interaction information between the second device and the server.
  • a sixth aspect of the present invention provides a terminal control device, including:
  • a second receiving module configured to receive, by the terminal control device in the local area network, a broadcast message of a second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode;
  • a parsing module configured to parse the identifier information of the first device from the broadcast message
  • a second sending module configured to send, to the server, a token query request that carries the identifier information
  • the second receiving module is further configured to receive a token that is fed back by the server and corresponding to the identifier information
  • a third obtaining module configured to acquire a third authority key by performing key agreement with the first device according to the token, to apply the third authority key to the first device and the terminal control device The interaction information between them is encrypted.
  • the terminal control device in the embodiment of the present invention receives the broadcast message in the second security level mode sent by the first device in the terminal control device in the local area network, where the security level of the second security level mode is higher than the first security level mode.
  • the identifier information of the first device is parsed from the broadcast message, and the token query request carrying the identifier information is sent to the server, and the token corresponding to the identifier information fed back by the server is received, and the key is negotiated with the first device to obtain the first
  • the third authority key is used to encrypt the interaction information between the first device and the terminal control device by applying the third authority key. Thereby, the security of the communication data between the terminal control device and the terminal device is ensured.
  • the seventh aspect of the present invention provides a security control system for a device in a local area network, including: the terminal device according to the fourth embodiment of the present invention, and the terminal according to the fifth aspect of the present invention The device, the terminal control device, and the server according to the embodiment of the present invention.
  • the security control system of the device in the local area network in the embodiment of the present invention detects whether the first device is illegally attacked in the process of operating the first device in the first security level mode, and detects that the first device is illegally attacked, and the server Performing key agreement to obtain the first authority key, applying the first authority key to encrypt the interaction information between the first device and the server, and transmitting the broadcast message in the second security level mode to other devices in the local area network.
  • the security level of the second security level mode is higher than the first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode, and the terminal control device is between the first device Information is exchanged for encryption. Thereby, the interaction of the devices in the local area network is realized. When one device is attacked, the other devices can be effectively reminded, and the security protection efficiency of the devices in the local area network is improved.
  • FIG. 1 is a flow chart of a method of controlling a device in a local area network according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for controlling a device in a local area network according to another embodiment of the present invention
  • FIG. 3 is a flow chart of a method for securely controlling a device in a local area network according to still another embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal device according to another embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device according to still another embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a terminal control device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a security control system of a device in a local area network according to an embodiment of the present invention.
  • the Tesla Tesla Model S model has a design flaw in the application, which allows an attacker to remotely control the vehicle, including performing vehicle unlocking, whistling, flashing lights, and opening the sunroof while the vehicle is driving.
  • the hacker demonstrated at the PWN conference that the UAV drone was attacked and was not controlled by the remote control.
  • the present invention proposes a security control method for devices in the local area network, and the security control method of the devices in the local area network can realize interaction between devices in the local area network, when one device is attacked When it is used, it can effectively remind other devices, so that other devices take corresponding protective measures to improve the security protection efficiency of devices in the LAN.
  • FIG. 1 is a flow chart of a method of controlling a device in a local area network according to an embodiment of the present invention. As shown in FIG. 1, the method for controlling devices in the local area network includes:
  • different security level modes are usually set for the device, different security level modes correspond to different security protection strengths, and lower security level operation rights correspond to a safer environment.
  • the security protection capability is weak, and the higher security level operation authority corresponds to a less stable environment, and the security protection capability is stronger.
  • the device when the device is in a low security environment, it is vulnerable to attack. Therefore, in order to improve the detection efficiency, when the first device in the local area network operates in a lower security level mode, it is detected whether it is illegally attacked.
  • the above lower security level is expressed by the first security level.
  • the first device may include different devices according to different application scenarios.
  • the first device may be a home air conditioner, a refrigerator, or the like.
  • whether the first device receives an illegal attack may be determined according to the information transmission capability of the first device.
  • the number of target data packets in a preset time period can be obtained. If the target data packet number meets the preset condition, it indicates that the first device information transmission capability is damaged, and thus the detection is that the first device is illegally attacked.
  • the target data packet may include different data packets that characterize the data transmission situation, and may include, for example, query data packets, control data packets, and the like.
  • the target data packet includes the query data packet
  • the packet loss rate of the terminal device increases when the first device is attacked
  • the data volume of the query data packet increases, thereby detecting the first device.
  • Whether the illegal attack is detected may include: detecting whether the number of the query data packets is greater than a preset first threshold, and if greater than the preset first threshold, detecting that the first device is illegally attacked.
  • the first threshold is calibrated according to a large amount of experimental data. When the number of data packets is greater than the first threshold, it is proved that the first device frequently performs data query, and may be illegally attacked.
  • the packet loss rate of the terminal device increases when the first device is attacked, and the data volume of the corresponding control data packet is implemented in order to implement data retransmission. Will increase.
  • detecting whether the first device is subjected to the illegal attack may include: detecting whether the number of control data packets is greater than a preset second threshold, and if greater than the preset second threshold, obtaining that the first device is illegally attacked.
  • the second threshold is calibrated according to a large amount of experimental data. When the number of control packets is greater than the second threshold, it is proved that the first device may be illegally attacked.
  • the warning information including the device identifier may be reported to the relevant server, so that the device identifier in the warning information may be obtained from the server, by identifying whether the device identifier is the first device.
  • Device identification to detect whether the first device is illegally attacked.
  • the device performs key agreement with the server to obtain the first authority key, and applies the first authority key to encrypt the interaction information between the first device and the server. And improve the security level mode of the first device itself to protect the device security of the first device.
  • the foregoing privilege key is a key corresponding to the current security level mode, and is used to communicate with the server according to the privilege key, and the method for obtaining the privilege key by performing key negotiation with the server may be implemented by the prior art, and details are not described herein. .
  • S103 Send a broadcast message in a second security level mode to other devices in the local area network, where the second security
  • the security level of the full level mode is higher than the first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode.
  • the broadcast message of the second security level mode is sent to the other devices in the local area network, where the security level of the second security level mode is higher than the first security level mode.
  • the foregoing second security level mode may be one level higher than the first security level mode, or may be higher than the first security level mode. Multiple levels of security level mode, etc.
  • the security control method of the device in the local area network in the embodiment of the present invention detects whether the first device is illegally detected during the operation of the first device in the local area network in the first security level mode.
  • the attack is performed by performing key agreement with the server to obtain a first authority key, applying the first authority key to encrypt the interaction information between the first device and the server, and sending a second security level to other devices in the local area network.
  • the broadcast message of the mode operation wherein the security level of the second security level mode is higher than the first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode.
  • the interaction of the devices in the local area network is realized.
  • the other devices can be effectively reminded, and the security protection efficiency of the devices in the local area network is improved.
  • FIG. 2 is a flow chart of a method of controlling a device in a local area network according to another embodiment of the present invention. As shown in FIG. 2, the method for controlling the device in the local area network includes:
  • the second device in the local area network receives the broadcast message of the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode.
  • the second device in the local area network receives the broadcast message of the second security level mode sent by the first device, where The security level of the second security level mode is higher than the first security level mode.
  • the second authority key is used to encrypt the interaction information between the second device and the server.
  • the random number A may be sent to the server, and the server feeds back the random number B, so that the second device may perform corresponding splicing processing according to the random number A and the random number B to generate a second privilege key.
  • the second device in the local area network receives the broadcast message in the second security level mode sent by the first device, where the second security level mode is secure.
  • the level is higher than the first security level mode. If the second device is currently running in the first security level mode, performing key agreement with the server to obtain a second authority key to apply the second authority key pair to the second
  • the interaction information between the device and the server is encrypted. . Therefore, the interaction between the devices in the local area network is realized.
  • the other devices can improve the security level mode by using the broadcast message of the attacked device, thereby improving the security protection efficiency of the devices in the local area network.
  • FIG. 3 is a device in a local area network according to still another embodiment of the present invention.
  • a flowchart of the security control method, as shown in FIG. 3, the security control method of the device in the local area network includes:
  • the terminal control device in the local area network receives the broadcast message of the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode.
  • the terminal control device in the local area network can receive the broadcast message sent by the first device. Therefore, in order to enhance the security of the information exchange between the terminal control device and the terminal device, the terminal control in the local area network is controlled.
  • the device receives the broadcast message of the second security level mode operation sent by the first device, wherein the security level of the second security level mode is higher than the first security level mode.
  • the identifier information of the device and the token and the corresponding relationship are stored in the server in advance, wherein the identifier information of the device may include information indicating the uniqueness of the device, such as the device MAC code and the device production number, and the token may be controlled by the terminal.
  • the password of the communication between the device and the terminal device must be checked by a secret number before the relevant data is transmitted. Different passwords are authorized to operate with different data.
  • the identifier information of the first device is parsed from the broadcast message, and the token query request carrying the identifier information is sent to the server, so that the server queries the corresponding relationship according to the identifier information, and acquires a token corresponding to the identifier information.
  • the third authority key is obtained by performing key negotiation with the first device according to the token, to apply the third authority key to the first device and the terminal control device.
  • Interactive information Line encryption processing is performed by performing key negotiation with the first device according to the token, to apply the third authority key to the first device and the terminal control device.
  • the terminal control device in the local area network receives the broadcast message of the second security level mode sent by the first device, wherein the second security level mode is secure.
  • the level is higher than the first security level mode, and the identifier information of the first device is parsed from the broadcast message, and the token query request carrying the identifier information is sent to the server, and the token corresponding to the identifier information fed back by the server is received, and according to the token and
  • the first device performs key agreement to obtain a third authority key, and applies a third authority key to perform encryption processing on the interaction information between the first device and the terminal control device.
  • FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. As shown in FIG. 4, the terminal device includes a detection module 110 and a first acquisition module. 120 and a first sending module 130.
  • the detecting module 110 is configured to detect whether an illegal attack is performed during a process in which the terminal device in the local area network operates in the first security level mode.
  • the detecting module 110 includes a first acquiring unit 111 and a detecting unit 112.
  • the first obtaining unit 111 is configured to acquire the number of target data packets in a preset time.
  • the detecting unit 112 is configured to detect that the first device is illegally attacked when the target data packet quantity meets the preset condition.
  • the number of target data packets includes a query data packet, or a control data packet, so that if the number of target data packets meets a preset condition, the detecting unit 112 is configured to: when the number of query data packets is greater than a preset first threshold When the detection is that the terminal device is attacked illegally, or when the number of control data packets is greater than a preset second threshold, the detected terminal device is illegally attacked.
  • the first obtaining module 120 is configured to perform a key negotiation with the server to obtain a first authority key when the terminal device is detected to be illegally attacked, to apply the first authority key to perform interaction information between the first device and the server. Encryption processing.
  • the first sending module 130 is configured to send a broadcast message of the second security level mode to the other devices in the local area network, where the security level of the second security level mode is higher than the first security level mode, so that the first security in the local area network The device operating in level mode switches to the second security level mode.
  • the security control method of the device in the local area network described above in conjunction with FIG. 1 corresponds to the terminal device in the embodiment of the present invention, and details not disclosed in the embodiment of the terminal device of the present invention are not described herein.
  • the terminal device in the embodiment of the present invention detects whether an illegal attack is performed during the operation of the first device in the local area network in the first security level mode, and detects that the first device is illegally attacked, and the server Performing key agreement to obtain a first authority key, applying a first authority key to encrypt the interaction information between the first device and the server, and transmitting a broadcast message in a second security level mode to other devices in the local area network.
  • the second The security level mode has a higher security level than the first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode. Thereby, the interaction of the devices in the local area network is realized. When one device is attacked, the other devices can be effectively reminded, and the security protection efficiency of the devices in the local area network is improved.
  • FIG. 6 is a schematic structural diagram of a terminal device according to still another embodiment of the present invention. As shown in FIG. 6, the terminal device includes a first receiving module 210 and The second acquisition module 220.
  • the receiving module 210 is configured to receive, by the terminal device in the local area network, a broadcast message that is sent by the second security level mode sent by the first device, where the security level of the second security level mode is higher than the first security level mode.
  • the second obtaining module 220 is configured to perform a key agreement with the server to obtain a second authority key when the terminal device is currently running in the first security level mode, to apply the second authority key to the second device and the server.
  • the interaction information between the two is encrypted.
  • the security control method of the device in the local area network described above in conjunction with FIG. 2 corresponds to the terminal device in the embodiment of the present invention, and details not disclosed in the embodiment of the terminal device of the present invention are not described herein.
  • the terminal device in the embodiment of the present invention receives the broadcast message of the second security level mode sent by the first device in the second device in the local area network, wherein the second security level mode has a higher security level than the first device.
  • the security level mode if the second device is currently running in the first security level mode, performing key agreement with the server to obtain a second authority key, and applying the second authority key to perform interaction information between the second device and the server. Encryption processing. Therefore, the interaction between the devices in the local area network is realized.
  • the other devices can improve the security level mode by using the broadcast message of the attacked device, thereby improving the security protection efficiency of the devices in the local area network.
  • FIG. 7 is a schematic structural diagram of a terminal control device according to an embodiment of the present invention.
  • the terminal control device includes: a second receiving module. 310.
  • the second receiving module 310 is configured to receive, by the terminal control device in the local area network, a broadcast message that is sent by the first device in a second security level mode, where the security level of the second security level mode is higher than the first security level mode.
  • the parsing module 320 is configured to parse the identifier information of the first device from the broadcast message.
  • the second sending module 330 is configured to send a token query request that carries the identifier information to the server.
  • the second receiving module 310 is further configured to receive a token that is fed back by the server and corresponding to the identifier information.
  • the third obtaining module 340 is configured to obtain a third authority key by performing key agreement with the first device according to the token, and apply the third authority key to perform encryption processing on the interaction information between the first device and the terminal control device.
  • the security control method of the device in the local area network described above in conjunction with FIG. 3 corresponds to the terminal control device in the embodiment of the present invention, and details not disclosed in the embodiment of the terminal control device of the present invention are not described herein.
  • the terminal control device in the embodiment of the present invention receives the broadcast message in the second security level mode sent by the first device in the terminal control device in the local area network, wherein the security level of the second security level mode is higher than the first a security level mode, parsing the identifier information of the first device from the broadcast message, sending a token query request carrying the identifier information to the server, receiving a token corresponding to the identifier information fed back by the server, and performing the token with the first device according to the token
  • the key agreement obtains the third authority key, and applies the third authority key to encrypt the interaction information between the first device and the terminal control device. Thereby, the security of the communication data between the terminal control device and the terminal device is ensured.
  • FIG. 8 is a schematic structural diagram of a security control system for devices in a local area network according to an embodiment of the present invention, as shown in FIG.
  • the security control system of the internal device includes the terminal device 100, the terminal device 200, the terminal control device 300, and the server 400.
  • the terminal device described above with reference to FIG. 4 and FIG. 5 corresponds to the terminal device 100 of the embodiment of the present invention.
  • the terminal device described in connection with FIG. 6 corresponds to the terminal device 200 of the embodiment of the present invention, and the foregoing is described in conjunction with FIG. 7.
  • the terminal device is corresponding to the terminal control device 300 of the embodiment of the present invention. Details that are not disclosed in the embodiment of the security control system of the device in the local area network are not described herein.
  • the security control system of the device in the local area network in the embodiment of the present invention detects whether the first device is illegally detected during the operation of the first device in the local area network in the first security level mode.
  • the attack is performed by performing key agreement with the server to obtain a first authority key, applying the first authority key to encrypt the interaction information between the first device and the server, and sending a second security level to other devices in the local area network.
  • a broadcast message of a mode operation wherein a security level of the second security level mode is higher than a first security level mode, so that the device operating in the first security level mode in the local area network switches to the second security level mode, and the terminal control device is
  • the information exchange between a device is encrypted.
  • the interaction of the devices in the local area network is realized.
  • the other devices can be effectively reminded, and the security protection efficiency of the devices in the local area network is improved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明公开了一种局域网内设备的安全操控方法、系统及其设备,其中,方法包括:在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击;若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理;向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。该方法实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。

Description

局域网内设备的安全操控方法、系统及其设备 技术领域
本发明涉及信息安全技术领域,尤其涉及一种局域网内设备的安全操控方法、系统及其设备。
背景技术
随着互联网技术的发展,在很多应用场景下,终端设备可在局域网内进行通信,比如,在智能家居应用场景下,家用空调等设备可在家庭局域网内与相关服务器进行通信。
然而,近年来智能设备的安全事件频发,比如某智能车由于程序被入侵,使得攻击者可以远程控制车辆,比如远程控制车辆开锁、鸣笛、闪灯等。因而,如何提高局域网内设备的安全防护效率,成为亟待解决的问题。
发明内容
本发明的目的旨在至少在一定程度上解决上述的技术问题之一。
为此,本发明的第一个目的在于提出一种局域网内设备的安全操控方法,该方法实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
本发明的第二个目的在于提出另一种局域网内设备的安全操控方法。
本发明的第三个目的在于提出又一种局域网内设备的安全操控方法。
本发明的第四个目的在于提出一种终端设备。
本发明的第五个目的在于提出另一种终端设备。
本发明的第六个目的在于提出一种终端控制设备。
本发明的第七个目的在于提出一种局域网内设备的安全操控系统。
为了实现上述目的,本发明第一方面实施例提出了一种局域网内设备的安全操控方法,包括以下步骤:
在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击;
若检测到所述第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理;
向所述局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式,以便所述局域网内以所述第一安全 等级模式运行的设备切换到所述第二安全等级模式。
本发明实施例的局域网内设备的安全操控方法,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
另外,本发明实施例的局域网内设备的安全操控方法,还具有如下附加的技术特征:
在本发明的一个实施例中,所述检测是否受到非法攻击,包括:
获取预设时间内的目标数据包数量;
如果所述目标数据包数量满足预设条件,则检测获知所述第一设备受到非法攻击。
在本发明的一个实施例中,所述目标数据包数量包括:查询数据包、或者,控制数据包;
所述如果所述目标数据包数量满足预设条件,则检测获知所述第一设备受到非法攻击,包括:
如果所述查询数据包数量大于预设的第一阈值,则检测获知所述第一设备受到非法攻击;或者,
如果所述控制数据包数量大于预设的第二阈值,则检测获知所述第一设备受到非法攻击。
为了实现上述目的,本发明第二方面实施例提出了另一种局域网内设备的安全操控方法,包括以下步骤:
在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
若所述第二设备当前以所述第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。本发明实施例的局域网内设备的安全操控方法,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,其他 设备可通过被攻击设备的广播消息,提高安全等级模式,提高了局域网内设备的安全防护效率。
为了实现上述目的,本发明第三方面实施例提出了又一种局域网内设备的安全操控方法,包括以下步骤:
在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
从所述广播消息中解析所述第一设备的标识信息,向服务器发送携带所述标识信息的令牌查询请求;
接收所述服务器反馈的与所述标识信息对应的令牌;
根据所述令牌与所述第一设备进行密钥协商获取第三权限密钥,以应用所述第三权限密钥对所述第一设备与所述终端控制设备之间的交互信息进行加密处理。
本发明实施例的局域网内设备的安全操控方法,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求,接收服务器反馈的与标识信息对应的令牌,并根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。由此,保证了终端控制设备与终端设备之间通信数据的安全。
为了实现上述目的,本发明第四方面实施例提出了一种终端设备,包括:
检测模块,用于在局域网内的终端设备以第一安全等级模式运行的过程中,检测是否受到非法攻击;
第一获取模块,用于在检测到所述终端设备受到非法攻击时,与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理;
第一发送模块,用于向所述局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式,以便所述局域网内以所述第一安全等级模式运行的设备切换到所述第二安全等级模式,进而通过所述权限密钥与所述终端设备进行通信交互。
本发明实施例的终端设备,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运 行的设备切换到第二安全等级模式。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
另外,本发明实施例的终端设备,还具有如下附加的技术特征:
在本发明的一个实施例中,所述检测模块包括:
第一获取单元,用于获取预设时间内的目标数据包数量;
检测单元,用于在所述目标数据包数量满足预设条件时,检测获知所述第一设备受到非法攻击。
在本发明的一个实施例中,所述目标数据包数量包括:查询数据包、或者,控制数据包;
所述如果所述目标数据包数量满足预设条件,则所述检测单元用于:
在所述查询数据包数量大于预设的第一阈值时,检测获知所述终端设备受到非法攻击;或者,
在所述控制数据包数量大于预设的第二阈值时,检测获知所述终端设备受到非法攻击。
为了实现上述目的,本发明第五方面实施例提出了另一种终端设备,包括:
第一接收模块,用于在局域网内的终端设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
第二获取模块,用于在所述终端设备当前以所述第一安全等级模式运行时,与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。获取所述第一设备的权限密钥;
通信模块,用于通过所述权限密钥以所述第二安全等级模式与所述第一设备进行通信交互。本发明实施例的终端设备,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理获取第一设备的权限密钥,通过权限密钥以第二安全等级模式与第一设备进行通信交互。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,其他设备可通过被攻击设备的广播消息,提高安全等级模式,提高了局域网内设备的安全防护效率。为了实现上述目的,本发明第六方面实施例提出了一种终端控制设备,包括:
第二接收模块,用于在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
解析模块,用于从所述广播消息中解析所述第一设备的标识信息;
第二发送模块,用于向服务器发送携带所述标识信息的令牌查询请求;
所述第二接收模块,还用于接收所述服务器反馈的与所述标识信息对应的令牌;
第三获取模块,用于根据所述令牌与所述第一设备进行密钥协商获取第三权限密钥,以应用所述第三权限密钥对所述第一设备与所述终端控制设备之间的交互信息进行加密处理。
本发明实施例的终端控制设备,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求,接收服务器反馈的与标识信息对应的令牌,并根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。由此,保证了终端控制设备与终端设备之间通信数据的安全。
为了实现上述目的,本发明第七方面实施例提出了一种局域网内设备的安全操控系统,包括:本发明第四发明实施例所述的终端设备,本发明第五方面实施例所述的终端设备,本发明第刘方面实施例所述的终端控制设备,服务器。
本发明实施例的局域网内设备的安全操控系统,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式,以及终端控制设备对于第一设备之间的信息交互进行加密处理。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。
附图说明
本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1是根据本发明一个实施例的局域网内设备的操控方法的流程图;
图2是根据本发明另一个实施例的局域网内设备的操控方法的流程图;
图3是根据本发明还一个实施例的局域网内设备的安全操控方法的流程图;
图4是根据本发明一个实施例的终端设备的结构示意图;
图5是根据本发明另一个实施例的终端设备的结构示意图;
图6是根据本发明又一个实施例的终端设备的结构示意图;
图7是根据本发明一个实施例的终端控制设备的结构示意图;以及
图8是根据本发明一个实施例的局域网内设备的安全操控系统的结构示意图。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。
下面参考附图描述本发明实施例的局域网内设备的安全操控方法、系统及其设备。
近年来随着智能设备技术的增长,智能设备安全事件频发。比如,特斯拉Tesla Model S车型被爆应用程序存在设计漏洞,该漏洞致使攻击者可以远程控制车辆,包括执行车辆开锁、鸣笛、闪灯以及车辆行驶中开启天窗等操作。2015年10月,黑客在PWN大会上展示了大疆无人机受到攻击后,不受遥控控制的场景。
由于,广大民众对智能设备的使用需求不断增加,而对智能产品的攻击技术也在不断加强,攻击技术的快速发展,使得智能产品的安全成为时下最为热门的话题之一,安全防护的水平,直接影响到设备的安全、用户隐私的安全等。
因而,为了提高局域网内设备的安全防护效率,本发明提出了一种局域网内设备的安全操控方法,该局域网内设备的安全操控方法可实现局域网内设备之间的互动,当一台设备被攻击时,可有效提醒其他设备,使得其他设备采取相应的防护措施,提高了局域网内设备的安全防护效率。
为了便于说明,首先集中在首先受到攻击的设备侧进行描述,具体说明如下:
图1是根据本发明一个实施例的局域网内设备的操控方法的流程图。如图1所示,该局域网内设备的操控方法包括:
S101,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击。
具体地,为了在不同的环境下,保护终端的安全,通常为设备设置不同的安全等级模式,不同的安全等级模式对应不同的安全防护强度,较低安全等级的操作权限对应于较安全的环境,安全防护能力较弱,较高的安全等级的操作权限对应于较不稳定的环境,安全防护能力较强等。
也就是说,当设备处于安全等级较低的环境下,容易受到攻击,因而为了提高检测效率,在局域网内的第一设备以较低安全等级模式运行时,检测是否受到非法攻击。
其中,为了便于描述,以第一安全等级表述上述较低安全等级。
另外,根据应用场景的不同,上述第一设备可包括不同设备,比如,在智慧家居应用场景下,第一设备可以为家用空调、冰箱等设备。
需要说明的是,根据具体应用需求的不同,可采用不同的方式检测上述第一设备是否受到非法攻击。举例说明如下:
第一种示例,可根据第一设备的信息传输能力,判断第一设备是否收到非法攻击。
在本示例中,可获取预设时间内的目标数据包数量,如果目标数据包数量满足预设条件,则表明第一设备信息传输能力受到破坏,因而检测获知第一设备受到非法攻击。
具体而言,在不同的应用场景下,目标数据包可包括表征数据传输情况的不同数据包,比如,可包括查询数据包、控制数据包等。
作为一种实现方式,当目标数据包包括查询数据包时,则由于当第一设备受到攻击时,终端设备的丢包率会增加,因而查询数据包的数据量会增加,从而检测第一设备是否受到非法攻击可包括,检测查询数据包的数量是否大于预设的第一阈值,如果大于预设的第一阈值,则检测获知第一设备受到非法攻击。
其中,上述第一阈值是根据大量实验数据标定的,当数据包的数量大于第一阈值时,证明第一设备频繁进行数据的查询,可能受到非法攻击。
作为另一种实现方式,当目标数据包包括控制数据包,则由于当第一设备受到攻击时,终端设备的丢包率会增加,为了实现数据的重传,对应的控制数据包的数据量会增加。
从而检测第一设备是否受到非法攻击可包括,检测控制数据包的数量是否大于预设的第二阈值,如果大于预设的第二阈值,则获知第一设备受到非法攻击。
其中,上述第二阈值是根据大量实验数据标定的,当控制数据包的数量大于第二阈值时,证明第一设备可能受到非法攻击。
第二种示例,当第一设备受到非法攻击时,可向相关服务器上报包含设备标识的警告信息,从而,可从服务器中获取警告信息中的设备标识,通过识别该设备标识是否是第一设备的设备标识,检测第一设备是否受到非法攻击。
S102,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理。
具体地,如果检测到第一设备受到非法攻击,则与服务器进行密钥协商,以获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理,并提高第一设备自身的安全等级模式,以保护第一设备的设备安全。
其中,上述权限密钥为与当前安全等级模式对应的密钥,用以根据其与服务器进行通信,与服务器进行密钥协商获取权限密钥的方式,可由现有技术实现,在此不再赘述。
S103,向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安 全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。
具体地,在第一设备获取第一权限密钥后,向局域网内的其他设备,发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
从而,为了避免被恶意攻击,局域网内以第一安全等级模式运行的其他设备,在接收到第一设备已经以第二安全模式运行的广播消息后,为了避免被非法控制,切换到第二安全等级模式。
需要说明的是,在具体实施过程中,根据具体应用场景的不同,上述第二安全等级模式可以为比第一安全等级模式高一个级别的安全等级模式,也可以是比第一安全等级模式高多个级别的安全等级模式等。
综上所述,本发明实施例的局域网内设备的安全操控方法,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
下面集中在首先受到攻击的设备通知的其他设备侧进行描述,具体说明如下:
图2是根据本发明另一个实施例的局域网内设备的操控方法的流程图。如图2所示,该局域网内设备的操控方法包括:
S201,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
具体地,为了便于及时获知同一局域网内其他设备可能受到攻击,以便于及时提高安全等级模式,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
S202,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用第二权限密钥对第二设备与服务器之间的交互信息进行加密处理。。
具体地,在接收到第一设备发送的第二安全等级模式运行的广播消息后,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用第二权限密钥对第二设备与服务器之间的交互信息进行加密处理。
需要说明的是,根据具体应用场景的不同,获取第二权限密钥的方式不同,下面举例 说明如下:
作为一种实现方式,可向服务器发送随机数A,服务器反馈随机数B,从而第二设备可根据随机数A和随机数B进行相应的拼接处理,生成第二权限密钥。
综上所述,本发明实施例的局域网内设备的安全操控方法,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,其他设备可通过被攻击设备的广播消息,提高安全等级模式,提高了局域网内设备的安全防护效率。
下面集中于终端控制设备描述本发明实施例的局域网内设备的安全操控方法,其中,终端控制设备可为控制终端设备的应用程序等,图3是根据本发明还一个实施例的局域网内设备的安全操控方法的流程图,如图3所示,该局域网内设备的安全操控方法包括:
S301,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
具体地,当第一设备收到攻击后,局域网内的终端控制设备可接收到第一设备发送的广播消息,因而,为了加强终端控制设备与终端设备信息交互的安全,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
S302,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求。
S303,接收服务器反馈的与标识信息对应的令牌。
可以理解,预先在服务器中存储设备的标识信息与令牌以及其对应关系,其中,设备的标识信息可包括设备MAC码、设备生产编号等表征设备唯一性的信息,令牌其实可以为终端控制设备与终端设备通信的暗号,在相关数据传输之前,要先进行暗号的核对,不同的暗号被授权不同的数据操作。
具体地,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求,以便于服务器根据标识信息查询上述对应关系,获取与标识信息对应的令牌。
S304,根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。
具体地,在获取令牌后,为了保证传输数据的安全,根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进 行加密处理。
综上所述,本发明实施例的局域网内设备的安全操控方法,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求,接收服务器反馈的与标识信息对应的令牌,并根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。由此,保证了终端控制设备与终端设备之间通信数据的安全。为了实现上述实施例,本发明还提出了一种终端设备,图4是根据本发明一个实施例的终端设备的结构示意图,如图4所示,该终端设备包括检测模块110、第一获取模块120和第一发送模块130。
其中,检测模块110,用于在局域网内的终端设备以第一安全等级模式运行的过程中,检测是否受到非法攻击。
在本发明的一个实施例中,如图5所示,检测模块110包括第一获取单元111和检测单元112。
其中,第一获取单元111,用于获取预设时间内的目标数据包数量。
检测单元112,用于在目标数据包数量满足预设条件时,检测获知第一设备受到非法攻击。
在本实施例中,目标数据包数量包括查询数据包、或者,控制数据包,从而如果目标数据包数量满足预设条件,则检测单元112用于在查询数据包数量大于预设的第一阈值时,检测获知终端设备受到非法攻击,或者在控制数据包数量大于预设的第二阈值时,检测获知终端设备受到非法攻击。
第一获取模块120,用于在检测到终端设备受到非法攻击时,与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理。第一发送模块130,用于向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。
需要说明的是,前述结合图1描述的局域网内设备的安全操控方法,与本发明实施例的终端设备对应,本发明终端设备实施例中未披露的细节,在此不再赘述。
综上所述,本发明实施例的终端设备,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二 安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
为了实现上述实施例,本发明还提出了另一种终端设备,图6是根据本发明又一个实施例的终端设备的结构示意图,如图6所示,该终端设备包括第一接收模块210和第二获取模块220。
其中,接收模块210,用于在局域网内的终端设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
第二获取模块220,用于在终端设备当前以第一安全等级模式运行时,与服务器进行密钥协商获取第二权限密钥,以应用第二权限密钥对第二设备与所述服务器之间的交互信息进行加密处理。
需要说明的是,前述结合图2描述的局域网内设备的安全操控方法,与本发明实施例的终端设备对应,本发明终端设备实施例中未披露的细节,在此不再赘述。
综上所述,本发明实施例的终端设备,在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,若第二设备当前以第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用第二权限密钥对第二设备与服务器之间的交互信息进行加密处理。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,其他设备可通过被攻击设备的广播消息,提高安全等级模式,提高了局域网内设备的安全防护效率。
为了实现上述实施例,本发明还提出了一种终端控制设备,图7是根据本发明一个实施例的终端控制设备的结构示意图,如图7所示,该终端控制设备包括:第二接收模块310、解析模块320、第二发送模块330和第三获取模块340。
其中,第二接收模块310,用于在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式。
解析模块320,用于从广播消息中解析第一设备的标识信息。
第二发送模块330,用于向服务器发送携带标识信息的令牌查询请求。
在本发明的一个实施例中,第二接收模块310,还用于接收服务器反馈的与标识信息对应的令牌。
第三获取模块340,用于根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。
需要说明的是,前述结合图3描述的局域网内设备的安全操控方法,与本发明实施例的终端控制设备对应,本发明终端控制设备实施例中未披露的细节,在此不再赘述。
综上所述,本发明实施例的终端控制设备,在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,从广播消息中解析第一设备的标识信息,向服务器发送携带标识信息的令牌查询请求,接收服务器反馈的与标识信息对应的令牌,并根据令牌与第一设备进行密钥协商获取第三权限密钥,以应用第三权限密钥对第一设备与终端控制设备之间的交互信息进行加密处理。由此,保证了终端控制设备与终端设备之间通信数据的安全。
为了实现上述实施例,本发明还提出了一种局域网内设备的安全操控系统,图8是根据本发明一个实施例的局域网内设备的安全操控系统的结构示意图,如图8所示,该局域网内设备的安全操控系统包括终端设备100、终端设备200、终端控制设备300和服务器400。
其中,前述结合图4和图5描述的终端设备,与本发明实施例的终端设备100对应,前述结合图6描述的终端设备,与本发明实施例的终端设备200对应,前述结合图7描述的终端设备,与本发明实施例的终端控制设备300对应,本发明局域网内设备的安全操控系统实施例中未披露的细节,在此不再赘述。
综上所述,本发明实施例的局域网内设备的安全操控系统,在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击,若检测到第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用第一权限密钥对第一设备与服务器之间的交互信息进行加密处理,并向局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,第二安全等级模式的安全等级高于第一安全等级模式,以便局域网内以第一安全等级模式运行的设备切换到第二安全等级模式,以及终端控制设备对于第一设备之间的信息交互进行加密处理。由此,实现了局域网内的设备的互动性,当一台设备被攻击时,可有效提醒其他设备,提高了局域网内设备的安全防护效率。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。

Claims (11)

  1. 一种局域网内设备的安全操控方法,其特征在于,包括以下步骤:
    在局域网内的第一设备以第一安全等级模式运行的过程中,检测是否受到非法攻击;
    若检测到所述第一设备受到非法攻击,则与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理;
    向所述局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式,以便所述局域网内以所述第一安全等级模式运行的设备切换到所述第二安全等级模式。
  2. 如权利要求1所述的方法,其特征在于,所述检测是否受到非法攻击,包括:
    获取预设时间内的目标数据包数量;
    如果所述目标数据包数量满足预设条件,则检测获知所述第一设备受到非法攻击。
  3. 如权利要求1所述的方法,其特征在于,所述目标数据包数量包括:查询数据包、或者,控制数据包;
    所述如果所述目标数据包数量满足预设条件,则检测获知所述第一设备受到非法攻击,包括:
    如果所述查询数据包数量大于预设的第一阈值,则检测获知所述第一设备受到非法攻击;或者,
    如果所述控制数据包数量大于预设的第二阈值,则检测获知所述第一设备受到非法攻击。
  4. 一种局域网内设备的安全操控方法,其特征在于,包括以下步骤:
    在局域网内的第二设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
    若所述第二设备当前以所述第一安全等级模式运行,则与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。
  5. 一种局域网内设备的安全操控方法,其特征在于,包括以下步骤:
    在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
    从所述广播消息中解析所述第一设备的标识信息,向服务器发送携带所述标识信 息的令牌查询请求;
    接收所述服务器反馈的与所述标识信息对应的令牌;
    根据所述令牌与所述第一设备进行密钥协商获取第三权限密钥,以应用所述第三权限密钥对所述第一设备与所述终端控制设备之间的交互信息进行加密处理。
  6. 一种终端设备,其特征在于,包括:
    检测模块,用于在局域网内的终端设备以第一安全等级模式运行的过程中,检测是否受到非法攻击;
    第一获取模块,用于在检测到所述终端设备受到非法攻击时,与服务器进行密钥协商获取第一权限密钥,以应用所述第一权限密钥对所述第一设备与所述服务器之间的交互信息进行加密处理;
    第一发送模块,用于向所述局域网内的其他设备发送第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式,以便所述局域网内以所述第一安全等级模式运行的设备切换到所述第二安全等级模式。
  7. 如权利要求6所述的终端设备,其特征在于,所述检测模块包括:
    第一获取单元,用于获取预设时间内的目标数据包数量;
    检测单元,用于在所述目标数据包数量满足预设条件时,检测获知所述第一设备受到非法攻击。
  8. 如权利要求6所述的终端设备,其特征在于,所述目标数据包数量包括:查询数据包、或者,控制数据包;
    所述如果所述目标数据包数量满足预设条件,则所述检测单元用于:
    在所述查询数据包数量大于预设的第一阈值时,检测获知所述终端设备受到非法攻击;或者,
    在所述控制数据包数量大于预设的第二阈值时,检测获知所述终端设备受到非法攻击。
  9. 一种终端设备,其特征在于,包括:
    第一接收模块,用于在局域网内的终端设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
    第二获取模块,用于在所述终端设备当前以所述第一安全等级模式运行时,与服务器进行密钥协商获取第二权限密钥,以应用所述第二权限密钥对所述第二设备与所述服务器之间的交互信息进行加密处理。
  10. 一种终端控制设备,其特征在于,包括:
    第二接收模块,用于在局域网内的终端控制设备接收第一设备发送的第二安全等级模式运行的广播消息,其中,所述第二安全等级模式的安全等级高于所述第一安全等级模式;
    解析模块,用于从所述广播消息中解析所述第一设备的标识信息;
    第二发送模块,用于向服务器发送携带所述标识信息的令牌查询请求;
    所述第二接收模块,还用于接收所述服务器反馈的与所述标识信息对应的令牌;
    第三获取模块,用于根据所述令牌与所述第一设备进行密钥协商获取第三权限密钥,以应用所述第三权限密钥对所述第一设备与所述终端控制设备之间的交互信息进行加密处理。
  11. 一种局域网内设备的安全操控系统,其特征在于,包括:
    如权利要求6-8任一项所述的终端设备;
    如权利要求9所述的终端设备;
    如权利要求10所述的终端控制设备;以及
    服务器。
PCT/CN2016/104117 2016-10-31 2016-10-31 局域网内设备的安全操控方法、系统及其设备 WO2018076368A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/104117 WO2018076368A1 (zh) 2016-10-31 2016-10-31 局域网内设备的安全操控方法、系统及其设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/104117 WO2018076368A1 (zh) 2016-10-31 2016-10-31 局域网内设备的安全操控方法、系统及其设备

Publications (1)

Publication Number Publication Date
WO2018076368A1 true WO2018076368A1 (zh) 2018-05-03

Family

ID=62023018

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/104117 WO2018076368A1 (zh) 2016-10-31 2016-10-31 局域网内设备的安全操控方法、系统及其设备

Country Status (1)

Country Link
WO (1) WO2018076368A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110719583A (zh) * 2018-07-12 2020-01-21 中移(杭州)信息技术有限公司 一种通信方法及装置
CN111343131A (zh) * 2018-12-19 2020-06-26 中国移动通信集团湖南有限公司 一种数据传输方法及装置
CN113225334A (zh) * 2021-04-30 2021-08-06 中国工商银行股份有限公司 终端安全管理方法、装置、电子设备及存储介质
CN113741249A (zh) * 2021-08-16 2021-12-03 江苏荣辉信息科技有限公司 一种工业控制系统网络安全分析监测系统
WO2023284555A1 (zh) * 2021-07-14 2023-01-19 华为技术有限公司 安全调用服务的方法、安全注册服务的方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162992A (zh) * 2007-09-29 2008-04-16 中国人民解放军信息工程大学 容忍入侵的密码协议安全运行防护方法和系统
US20110231924A1 (en) * 2010-03-16 2011-09-22 Devdhar Rakendu Methods, systems, and computer readable media for providing application layer firewall and integrated deep packet inspection functions for providing early intrusion detection and intrusion prevention at an edge networking device
US20140189865A1 (en) * 2013-01-02 2014-07-03 International Business Machines Corporation Security management in a networked computing environment
CN104468632A (zh) * 2014-12-31 2015-03-25 北京奇虎科技有限公司 防御漏洞攻击的方法、设备及系统
CN105227564A (zh) * 2015-10-16 2016-01-06 山西大学 用于危险环境中的无线传感器网络主、被动防御的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162992A (zh) * 2007-09-29 2008-04-16 中国人民解放军信息工程大学 容忍入侵的密码协议安全运行防护方法和系统
US20110231924A1 (en) * 2010-03-16 2011-09-22 Devdhar Rakendu Methods, systems, and computer readable media for providing application layer firewall and integrated deep packet inspection functions for providing early intrusion detection and intrusion prevention at an edge networking device
US20140189865A1 (en) * 2013-01-02 2014-07-03 International Business Machines Corporation Security management in a networked computing environment
CN104468632A (zh) * 2014-12-31 2015-03-25 北京奇虎科技有限公司 防御漏洞攻击的方法、设备及系统
CN105227564A (zh) * 2015-10-16 2016-01-06 山西大学 用于危险环境中的无线传感器网络主、被动防御的方法

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110719583A (zh) * 2018-07-12 2020-01-21 中移(杭州)信息技术有限公司 一种通信方法及装置
CN110719583B (zh) * 2018-07-12 2022-12-16 中移(杭州)信息技术有限公司 一种通信方法及装置
CN111343131A (zh) * 2018-12-19 2020-06-26 中国移动通信集团湖南有限公司 一种数据传输方法及装置
CN111343131B (zh) * 2018-12-19 2022-06-14 中国移动通信集团湖南有限公司 一种数据传输方法及装置
CN113225334A (zh) * 2021-04-30 2021-08-06 中国工商银行股份有限公司 终端安全管理方法、装置、电子设备及存储介质
WO2023284555A1 (zh) * 2021-07-14 2023-01-19 华为技术有限公司 安全调用服务的方法、安全注册服务的方法及装置
CN113741249A (zh) * 2021-08-16 2021-12-03 江苏荣辉信息科技有限公司 一种工业控制系统网络安全分析监测系统
CN113741249B (zh) * 2021-08-16 2023-04-07 江苏荣辉信息科技有限公司 一种工业控制系统网络安全分析监测系统

Similar Documents

Publication Publication Date Title
WO2018076368A1 (zh) 局域网内设备的安全操控方法、系统及其设备
CN112260995B (zh) 接入认证方法、装置及服务器
CN108347331B (zh) 车联网系统中T_Box设备与ECU设备进行安全通信的方法与设备
CN103491072B (zh) 一种基于双单向隔离网闸的边界访问控制方法
US10911949B2 (en) Systems and methods for a vehicle authenticating and enrolling a wireless device
JP4621200B2 (ja) 通信装置、通信システム及び認証方法
CN105828332B (zh) 一种无线局域网认证机制的改进方法
CN105635147A (zh) 基于车载特种装备系统的数据安全传输方法及系统
CN108173822A (zh) 智能门锁管控方法、智能门锁及计算机可读存储介质
US10158608B2 (en) Key establishment for constrained resource devices
CN110545252B (zh) 一种认证和信息保护的方法、终端、控制功能实体及应用服务器
KR101675332B1 (ko) 차량용 데이터 통신 방법 및 그를 이용하는 차량용 전자 제어 장치 및 시스템
CN104753953A (zh) 访问控制系统
CN105553666A (zh) 一种智能电力终端安全认证系统及方法
CN106685775A (zh) 一种智能家电自检式防入侵方法及系统
WO2012171284A1 (zh) 一种三方认证方法、装置及支持双向认证的智能卡
KR101481403B1 (ko) 차량용 데이터의 인증 및 획득 방법
CN116321147A (zh) 基于零信任的多属性终端身份认证方法及系统
CN103152326A (zh) 一种分布式认证方法及认证系统
CN104994085B (zh) 一种无线传感器网络中身份认证方法及系统
CN106656984B (zh) 局域网内设备的安全操控方法、系统及其设备
CN111274570A (zh) 一种加密认证方法、装置、服务器、可读存储介质及空调器
CN113839782B (zh) 基于puf的车内网络can总线轻量级安全通信方法
US20150188918A1 (en) Method and system of authenticating a network device in a location based verification framework
JP7141723B2 (ja) 無線通信システムを介してアクチュエータを制御するための装置、システムおよび方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16920270

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16920270

Country of ref document: EP

Kind code of ref document: A1