WO2024021908A1 - 门锁安全评估方法以及相关设备 - Google Patents

门锁安全评估方法以及相关设备 Download PDF

Info

Publication number
WO2024021908A1
WO2024021908A1 PCT/CN2023/099363 CN2023099363W WO2024021908A1 WO 2024021908 A1 WO2024021908 A1 WO 2024021908A1 CN 2023099363 W CN2023099363 W CN 2023099363W WO 2024021908 A1 WO2024021908 A1 WO 2024021908A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
index
door lock
assessment
server
Prior art date
Application number
PCT/CN2023/099363
Other languages
English (en)
French (fr)
Inventor
罗康
黎明德
Original Assignee
深圳Tcl新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳Tcl新技术有限公司 filed Critical 深圳Tcl新技术有限公司
Publication of WO2024021908A1 publication Critical patent/WO2024021908A1/zh

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning

Definitions

  • This application relates to the technical field of intelligent electronic devices, and specifically to a door lock safety assessment method and related equipment.
  • Embodiments of the present application provide a door lock security assessment method and related equipment.
  • the related equipment may include a door lock security assessment device, electronic equipment, computer-readable storage media and computer program products, which can improve the accuracy of the security assessment results corresponding to the door lock. sex.
  • the embodiment of this application provides a door lock security assessment method, including:
  • the third security index is obtained by the control end after evaluating the local security environment, and receive the first security index sent by the door lock end;
  • the embodiment of this application provides another door lock security assessment method, including:
  • the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified time period;
  • the embodiment of this application provides another door lock security assessment method, including:
  • a door lock safety assessment device including:
  • the first sending unit is used to send a security assessment instruction to the door lock end to trigger the door lock end to perform a local security environment assessment and obtain the first security index corresponding to the door lock end;
  • An acquisition unit used to acquire historical behavior data for the door lock within a specified time period
  • the first assessment unit is used to conduct security assessment and analysis on the historical behavior data to obtain the second security index
  • the first receiving unit is used to receive the third security index sent by the control end, the third security index is obtained by the control end after evaluating the local security environment, and receive the first security index sent by the door lock end. index;
  • a determining unit configured to determine the security evaluation result of the door lock based on the first security index, the second security index and the third security index
  • the second sending unit is used to send the safety evaluation result of the door lock to the control terminal.
  • the embodiment of the present application provides another door lock safety evaluation device, including:
  • the second assessment unit is used to perform a security assessment on the local environment when receiving a security assessment instruction, and obtain the third security index;
  • the third sending unit is used to send the third security index to the server to trigger the server to obtain the first security index and the second security index, wherein the first security index is sent by the door lock end to the corresponding local
  • the second security index is obtained after a security assessment of the environment, and the second security index is obtained by the server after a security assessment of the historical behavior data of the door lock within a specified time period;
  • a second receiving unit configured to receive a security assessment result sent by the server, wherein the security assessment result is calculated by the server based on the first security index, the second security index and the third security index. get.
  • the embodiment of the present application provides another door lock safety evaluation device, including:
  • the third receiving unit is used to receive the security assessment instruction sent by the server, wherein the security assessment instruction is issued after the server receives the third security index, and the third security index is evaluated by the control end on the local security environment. get;
  • the third assessment unit is used to conduct a security assessment on the local environment according to the security assessment instruction to obtain the first security index
  • a fourth sending unit configured to send the first security index to the server to trigger the server to calculate the security assessment of the door lock based on the first security index, the second security index, and the third security index.
  • the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified period of time.
  • the historical behavior data includes at least one piece of historical interaction information
  • the first evaluation unit may include an analysis subunit and a first determination subunit, as follows:
  • the analysis subunit is used to perform abnormal analysis on the historical behavior data in at least one dimension based on the interaction time corresponding to each historical interaction information, and obtain abnormal results in the at least one dimension;
  • the first determined subunit is used according to the formula Determine the second safety index, where P2 represents the second safety index, R i represents the risk coefficient corresponding to each dimension, and D i represents each Abnormal results in dimensions, n represents the number of dimensions.
  • the analysis subunit may be used to detect whether there is historical interaction information in the historical behavior data whose interaction time belongs to a preset abnormal time, so as to obtain the first abnormality. result; or, based on the interaction time corresponding to each historical interaction information, analyze the abnormal frequency of the historical behavior data to obtain the second abnormal result.
  • the determination unit may include a calculation subunit and a second determination subunit, as follows:
  • the second determination subunit is used to determine the safety evaluation result of the door lock according to the safety evaluation score.
  • the second determination subunit may be configured to generate a first safety evaluation result for the door lock when the safety evaluation score is greater than a preset value; when When the safety evaluation score is not greater than the preset value, a second safety evaluation result for the door lock is generated.
  • the second evaluation unit may include a third determination subunit, a first detection subunit and a fourth determination subunit, as follows:
  • the third determination subunit is configured to determine, for the security attribute information in each dimension of the local environment, the risk coefficient corresponding to the security attribute information in the dimension when receiving the security assessment instruction;
  • the first detection subunit is used to detect whether the attribute value corresponding to the security attribute information in the dimension meets the preset security condition
  • the fourth determination subunit is used to obtain the third security index based on the detection results and risk coefficients of the security attribute information in each dimension.
  • the third evaluation unit may include a fifth determination subunit, a second detection subunit, and a sixth determination subunit, as follows:
  • the fifth determination subunit is configured to determine the risk coefficient corresponding to the security attribute information in each dimension of the local environment according to the security assessment instruction;
  • the second detection subunit is used to detect whether the attribute value corresponding to the security attribute information in the dimension meets the preset security condition
  • the sixth determination subunit is used to obtain the first safety index based on the detection results and risk coefficients of the safety attribute information in each dimension.
  • An electronic device provided by an embodiment of the present application includes a processor and a memory.
  • the memory stores a plurality of instructions.
  • the processor loads the instructions to execute the door lock safety assessment method provided by the embodiment of the present application. step.
  • Embodiments of the present application also provide a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium stores a plurality of computer-readable instructions.
  • the computer-readable instructions are suitable for loading by the processor. , to perform the steps in the door lock security assessment method provided by the embodiment of the present application.
  • embodiments of the present application also provide a computer program product, which includes a computer program or computer-readable instructions.
  • a computer program product which includes a computer program or computer-readable instructions.
  • Figure 1a is a schematic scene diagram of the door lock security assessment method provided by the embodiment of the present application.
  • Figure 1b is a flow chart of the door lock security assessment method provided by the embodiment of the present application.
  • Figure 1c is another flow chart of the door lock safety assessment method provided by the embodiment of the present application.
  • Figure 2a is another flow chart of the door lock safety assessment method provided by the embodiment of the present application.
  • Figure 2b is another flow chart of the door lock safety assessment method provided by the embodiment of the present application.
  • Figure 3a is another flow chart of the door lock safety assessment method provided by the embodiment of the present application.
  • Figure 3b is another flow chart of the door lock safety assessment method provided by the embodiment of the present application.
  • Figure 4a is a block diagram of a door lock safety evaluation device provided by an embodiment of the present application.
  • Figure 4b is a block diagram of a door lock safety evaluation device provided by an embodiment of the present application.
  • Figure 4c is a block diagram of the door lock safety evaluation device provided by the embodiment of the present application.
  • FIG. 5 is a block diagram of an electronic device provided by an embodiment of the present application.
  • Embodiments of the present application provide a door lock safety assessment method and related equipment.
  • the related equipment may include a door lock safety assessment device, electronic equipment, computer-readable storage media, and computer program products.
  • the door lock safety evaluation device can be integrated in an electronic device, and the electronic device can be a terminal or a server.
  • the door lock safety assessment system may include a control terminal 10 (ie, the control end of the door lock), a server 11, a door lock end 12, etc.; the control terminal 10 and the server 11 are connected through a network
  • the door lock terminal 12 and the server 11 are also connected through a network, for example, through a wired or wireless network connection, where the door lock safety evaluation device can be integrated in the server.
  • the control terminal 10 can be used to: when receiving the security assessment instruction, perform a security assessment on the local environment to obtain a third security index; send the third security index to the server 11 to trigger the server 11 to obtain A first security index and a second security index, wherein the first security index is obtained by the door lock end 12 performing a security assessment on the corresponding local environment, and the second security index is obtained by the server 11 within a specified time period.
  • the historical behavior data of the door lock terminal 12 is obtained after security assessment; the security assessment result sent by the server 11 is received, wherein the security assessment result is obtained by the server 11 based on the first security index, the third The second safety index and the third safety index are calculated.
  • the control terminal 10 may include a mobile phone, a tablet computer, an electronic watch, an electronic bracelet, etc.
  • a client can also be set on the control terminal 10, and the client can be an application client or the like.
  • the door lock terminal 12 can be used to: receive a security assessment instruction sent by the server 11, wherein the security assessment instruction is issued after the server 11 receives the third security index, and the third security index is determined by the control terminal. 10 is obtained after evaluating the local security environment; performs a security assessment on the local environment according to the security assessment instruction to obtain a first security index; sends the first security index to the server 11 to trigger the server 11 based on the The first safety index, the second safety index, the third safety index The full index is used to calculate the security assessment result of the door lock, where the second security index is obtained by the server 11 performing a security assessment on the historical behavior data of the door lock terminal 12 within a specified period of time.
  • the server 11 can be used to: send a security assessment instruction to the door lock terminal 12 to trigger the door lock terminal 12 to conduct a local security environment assessment and obtain the first security index corresponding to the door lock terminal 12; obtain the specified time historical behavior data for the door lock terminal 12 within the segment; conduct security assessment and analysis on the historical behavior data to obtain a second security index; receive the third security index sent by the control terminal 10, and the third security index is determined by the The control terminal 10 evaluates the local security environment and receives the first security index sent by the door lock end; based on the first security index, the second security index and the third security index, Determine the safety evaluation result of the door lock; send the safety evaluation result of the door lock to the control terminal 10 .
  • the server 11 may be a single server, or a server cluster or cloud server composed of multiple servers.
  • the above-mentioned steps of the server 11 performing door lock security assessment can also be executed by the control terminal 10 .
  • the first door lock safety evaluation device may be integrated in a first electronic device, and the electronic device may be a server or other equipment.
  • the specific process of the door lock security assessment method can be as follows:
  • the control end is also the control end of the door lock.
  • the control end of the door lock may be an electronic device capable of controlling unlocking.
  • the control end may be a mobile phone, etc., which is not limited in this embodiment. This embodiment can combine the security of the control end to determine the security of the door lock.
  • the historical behavior data includes at least one piece of historical interaction information
  • the step "Carry out security assessment and analysis on the historical behavior data to obtain the second security index” may include:
  • the designated time period corresponding to the historical behavior data can be set according to the actual situation, for example, it can be set to three months or half a year, etc.
  • the historical behavior data may specifically be unlocking data of the door lock, such as unlocking time information and related data such as whether the unlocking was successful.
  • This embodiment can determine the safety of the door lock based on recent door lock unlocking data and analyze it.
  • the unlocking data of each unlocking of the door lock can be regarded as a piece of interactive information.
  • the abnormal analysis of at least one dimension of the historical behavior data may include analyzing whether there have been multiple centralized unlocking failures in the recent past, whether there have been frequent issuance of one-time passwords, etc. This embodiment does not limit this.
  • the second safety index can be determined based on the risk coefficient corresponding to the abnormal analysis in each dimension and the abnormal results. For example, using the risk coefficient as the weight, weighting the abnormal results in each dimension is performed to obtain Second safety index. Among them, for the abnormal results in each dimension, if there is an abnormality, the abnormal result can be set to 0, if there is no abnormality, the abnormal result can be set to 1.
  • the step "based on the interaction time corresponding to each historical interaction information, perform abnormal analysis on the historical behavior data in at least one dimension to obtain abnormal results in the at least one dimension" may include:
  • the preset abnormal time can be set according to the actual situation. This embodiment is not limited. Specifically, the preset abnormal time can also be determined according to the interaction time corresponding to each historical interaction information. For example, the interaction time can be set as a time where the interaction time is not distributed. segment as the preset exception time.
  • the first abnormal result can be set to 0.
  • the historical behavior data is analyzed for abnormal frequency. Specifically, it can be analyzed whether there have been multiple centralized unlocking failures in the recent past, whether there have been frequent issuance of one-time passwords, etc. If the abnormality frequency exceeds the preset value, the second abnormality result can be set to 0.
  • user unlocking behavior information can be stored in the cloud, and recent door lock unlocking data can be obtained through the cloud and analyzed, such as analyzing whether there have been multiple centralized unlocking failures recently, whether there have been frequent issuance of one-time passwords, etc. , thereby calculating the second safety index P2 based on the analysis results.
  • the step "determine the security assessment result of the door lock based on the first security index, the second security index and the third security index” may include:
  • the security assessment result of the door lock is determined.
  • different security assessment scores may correspond to different security levels. For example, if the security assessment score is above 80 points, the security assessment result can be safe; if the security assessment score is 60-80 points, the security assessment result can be that there is a certain risk; if the security assessment score is below 60 points, the security assessment result can be The result can be greater risks.
  • the comprehensive security assessment Fraction P (P1+P2+P3)/3.
  • FIG. 1a a schematic diagram of a scenario for smart door lock security environment assessment is shown. The specific description is as follows:
  • the user starts the application corresponding to the door lock on the mobile phone and clicks to conduct the security environment assessment of the smart door lock. You can first conduct the security environment assessment on the mobile phone;
  • the cloud platform issues security assessment commands to the smart door lock
  • This application can enable users to have a clear understanding of the security of smart door locks through multi-dimensional security assessment of the mobile phone control terminal, smart door lock terminal, and cloud platform terminal corresponding to the smart door lock, and based on the security assessment results, it can provide users with Prompt some unsafe settings and behaviors to ensure the safety of users and property from loss, and improve the security of smart door locks.
  • the step "determine the security assessment result of the door lock based on the security assessment score” may include:
  • the preset value can be set according to actual conditions, which is not limited in this embodiment. Specifically, when the security assessment score is greater than the preset value, the first security assessment result can be determined to be safe; when the security assessment score is not greater than the preset value, the second security assessment result can be determined to be risky.
  • this embodiment can send a security assessment instruction to the door lock end to trigger the door lock end to conduct a local security environment assessment and obtain the first security index corresponding to the door lock end; obtain Describe the historical behavior data of the door lock end; conduct security assessment and analysis on the historical behavior data to obtain the second security index; receive the third security index sent by the control end, and the third security index is determined by the control end on the local security environment. Obtained after evaluation, and receiving the first safety index sent by the door lock end; based on the first safety index, the second safety index and the third safety index, determine the safety evaluation result of the door lock; Send the security evaluation result of the door lock to the control terminal.
  • This application can evaluate the security of the door lock by combining the three aspects of the door lock end, the control end and historical behavior data, which improves the accuracy of the security assessment results corresponding to the door lock.
  • the second door lock safety evaluation device may be integrated in a second electronic device.
  • the second electronic device may be a terminal or other equipment.
  • the step "when receiving the security assessment instruction, perform a security assessment on the local environment to obtain the third security index” may include:
  • the third security index is obtained.
  • the local environment here may be the environment corresponding to the control terminal of the door lock.
  • the control terminal of the door lock may be an electronic device capable of controlling unlocking.
  • the control terminal may be a mobile phone, etc. This embodiment does not limit this. This embodiment can combine the security of the control end to determine the security of the door lock.
  • the security attribute information in each dimension can include the system version of the control end, Trojans or vulnerabilities, the application version about unlocking, the networking environment, etc.
  • the risk coefficient corresponding to the security attribute information in each dimension can be specifically the risk coefficient when the attribute value of the security attribute information in each dimension does not pass the preset security conditions, which can also be understood as the security in each dimension.
  • the importance of attribute information can be specifically the risk coefficient when the attribute value of the security attribute information in each dimension does not pass the preset security conditions, which can also be understood as the security in each dimension.
  • the detection result of the security attribute information in each dimension can be recorded as D. If the attribute value corresponding to the security attribute information in this dimension meets the preset security conditions, then the security attribute information in this dimension can be regarded as passing the security Detection, set the detection result D to 1; if the attribute value corresponding to the security attribute information in this dimension does not meet the preset security conditions, the security attribute information in this dimension can be regarded as not passing the security detection, and its detection result D is set to 0.
  • the preset security conditions can be set according to actual conditions, and this embodiment does not limit this.
  • the security attribute information in a certain dimension is the mobile phone system version
  • its attribute value can be the version number
  • the preset security condition can be that the mobile phone system version is not lower than the latest released version.
  • the security attribute information in a certain dimension is system Trojans or vulnerabilities.
  • the attribute value can be whether there are Trojans or vulnerabilities in the system.
  • the preset security condition can be that there are no Trojans or vulnerabilities in the system.
  • the step "obtaining the third security index based on the detection results and risk coefficients of security attribute information in each dimension" may include:
  • a weighted operation is performed on the detection results of the security attribute information in each dimension to obtain a third security index corresponding to the control terminal.
  • the third safety index can also be obtained through other methods. This embodiment does not limit this.
  • the control terminal corresponding to the door lock can be a mobile phone.
  • the number n of its security assessment test items can be determined first, that is, the number of dimensions of the security attribute information.
  • the security assessment Assessment and testing items can include: mobile phone system version, Trojan or vulnerability detection, application version, mobile phone network environment, etc. If the detection results of each security assessment and testing item are recorded as D i , the risk The coefficient is recorded as R i and the third safety index is recorded as P3. Then the third safety index corresponding to the mobile phone can be Among them, the sum of the risk coefficients of each safety assessment and testing item can be 1.
  • FIG. 2b shows the flow chart of mobile phone security assessment.
  • the specific description is as follows:
  • the evaluation result is the third security index of the control end.
  • this embodiment can perform a security assessment on the local environment to obtain the third security index; and send the third security index to the server to trigger the server to obtain the first security index. and a second security index, wherein the first security index is obtained by the door lock end performing a security assessment on the corresponding local environment, and the second security index is obtained by the server analyzing the history of the door lock end within a specified period of time.
  • the behavioral data is obtained after security assessment; receiving the security assessment result sent by the server, wherein the security assessment result is obtained by the server based on the first security index, the second security index and the third security index. calculated.
  • This application can evaluate the security of the door lock by combining the three aspects of the door lock end, the control end and historical behavior data, improving the The accuracy of the security assessment results corresponding to the door lock.
  • the third door lock safety evaluation device may be integrated in a third electronic device, and the third electronic device may be a device corresponding to the door lock.
  • the step "Conduct a security assessment on the local environment according to the security assessment instruction to obtain the first security index” may include:
  • the security assessment instruction for the security attribute information in each dimension of the local environment, determine the risk coefficient corresponding to the security attribute information in the dimension;
  • the first security index is obtained.
  • the local environment here specifically refers to the environment corresponding to the door lock end.
  • the security attribute information of the door lock end in various dimensions can include MCU (Microcontroller Unit) module firmware version information, WiFi (wireless communication technology) module firmware Version information, fingerprint module fixed version information, etc.
  • the detection result of the security attribute information in each dimension can be recorded as D. If the attribute value corresponding to the security attribute information in this dimension meets the preset security conditions, then the security attribute information in this dimension can be regarded as passing the security Detection, set the detection result D to 1; if the attribute value corresponding to the security attribute information in this dimension does not meet the preset security conditions, the security attribute information in this dimension can be regarded as not passing the security detection, and its detection result D is set to 0.
  • the preset security conditions can be set according to actual conditions, and this embodiment does not limit this.
  • the security attribute information in a certain dimension is the MCU module firmware version information, and its attribute value can be the version number
  • the preset security condition can be that the MCU module firmware version is not lower than its latest released version.
  • the security attribute information in a certain dimension is the fixed version information of the fingerprint module, and its attribute value can be the version number.
  • the preset security condition can be that the fixed version of the fingerprint module is not lower than its latest released version.
  • the step "obtaining the first security index based on the detection results and risk coefficients of security attribute information in each dimension" may include:
  • a weighted operation is performed on the detection results of the security attribute information in each dimension to obtain a first security index.
  • the first safety index can also be obtained through other methods. This embodiment does not limit this.
  • the number n of its security assessment detection items is also determined, that is, the number of dimensions of the security attribute information of the door lock end, for example, the security assessment detection items (that is, the security attribute information in each dimension) It can include: MCU module firmware version information, WiFi module firmware version information, fingerprint module fixed version information, etc. If the test result of each security assessment test item is recorded as D i , the risk coefficient is recorded as R i , and the first security index is recorded as P1, then the first security index corresponding to the smart door lock can be Among them, the sum of the risk coefficients of each safety assessment and testing item can be 1.
  • FIG. 3b shows the flow chart of the security assessment of the smart door lock.
  • the specific description is as follows:
  • WiFi wireless network
  • the evaluation result is the first safety index of the door lock.
  • This application can enable users to have a clear understanding of the security of smart door locks through multi-dimensional security assessment of the mobile phone control terminal, smart door lock terminal, and cloud platform terminal corresponding to the smart door lock, and based on the security assessment results, it can provide users with Prompt some unsafe settings and behaviors to ensure the safety of users and property from loss, and improve the security of smart door locks.
  • this embodiment can receive a security assessment instruction sent by the server, wherein the security assessment instruction is issued after the server receives the third security index.
  • the third security index is evaluated by the control end on the local security environment. Then obtain; perform a security assessment on the local environment according to the security assessment instruction to obtain a first security index; send the first security index to the server to trigger the server to based on the first security index and the third security index.
  • the second security index and the third security index are used to calculate the security assessment result of the door lock, where the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified time period.
  • This application can evaluate the security of the door lock by combining the three aspects of the door lock end, the control end and historical behavior data, which improves the accuracy of the security assessment results corresponding to the door lock.
  • an embodiment of the present application also provides a door lock safety evaluation system.
  • the door lock safety evaluation system includes a first door lock safety evaluation device 41, a second door lock safety evaluation device 42 and a third door lock safety evaluation device.
  • Lock safety evaluation device 43 wherein the first door lock safety evaluation device 41 can be integrated in the server, the second door lock safety evaluation device 42 can be regarded as the control terminal of the door lock, and the third door lock safety evaluation device 43 can be regarded as the control terminal of the door lock.
  • the first door lock safety evaluation device 41 can be integrated in the server
  • the second door lock safety evaluation device 42 can be regarded as the control terminal of the door lock
  • the third door lock safety evaluation device 43 can be regarded as the control terminal of the door lock.
  • the first door lock safety evaluation device 41 may include a first sending unit 4101, an acquisition unit 4102, a first evaluation unit 4103, a first receiving unit 4104, a determination unit 4105, and a second sending unit 4106;
  • the second door lock safety evaluation device 42 may include a second evaluation unit 4201, a third sending unit 4202 and a second receiving unit 4203;
  • the third door lock safety evaluation device 43 may include The third receiving unit 4301, the third evaluation unit 4302 and the fourth sending unit 4303 are as follows:
  • the first sending unit is used to send a security assessment instruction to the door lock terminal to trigger the door lock terminal to perform a local security environment assessment and obtain the first security index corresponding to the door lock terminal.
  • An acquisition unit is used to acquire historical behavior data for the door lock within a specified time period.
  • the first evaluation unit is used to perform security assessment and analysis on the historical behavior data to obtain the second security index.
  • the historical behavior data includes at least one piece of historical interaction information
  • the first evaluation unit may include an analysis subunit and a first determination subunit, as follows:
  • the analysis subunit is used to perform abnormal analysis on the historical behavior data in at least one dimension based on the interaction time corresponding to each historical interaction information, and obtain abnormal results in the at least one dimension;
  • the first determined subunit is used according to the formula Determine the second safety index, where P2 represents the second safety index, R i represents the risk coefficient corresponding to each dimension, D i represents the abnormal results in each dimension, and n represents the number of dimensions.
  • the analysis subunit may be used to detect whether there is historical interaction information in the historical behavior data whose interaction time belongs to a preset abnormal time, so as to obtain the first abnormality. result; or, based on the interaction time corresponding to each historical interaction information, analyze the abnormal frequency of the historical behavior data to obtain the second abnormal result.
  • the first receiving unit is used to receive the third security index sent by the control end, the third security index is obtained by the control end after evaluating the local security environment, and receive the first security index sent by the door lock end. index.
  • a determining unit configured to determine a security evaluation result of the door lock based on the first security index, the second security index, and the third security index.
  • the determination unit may include a calculation subunit and a second determination subunit, as follows:
  • the second determination subunit is used to determine the safety evaluation result of the door lock according to the safety evaluation score.
  • the second determination subunit may be configured to generate a first safety evaluation result for the door lock when the safety evaluation score is greater than a preset value; when When the safety evaluation score is not greater than the preset value, a second safety evaluation result for the door lock is generated.
  • the second sending unit is used to send the safety evaluation result of the door lock to the control terminal.
  • the second assessment unit is used to perform a security assessment on the local environment and obtain the third security index when receiving the security assessment instruction.
  • the second evaluation unit may include a third determination subunit, a first detection subunit and a fourth determination subunit, as follows:
  • the third determination subunit is configured to determine, for the security attribute information in each dimension of the local environment, the risk coefficient corresponding to the security attribute information in the dimension when receiving the security assessment instruction;
  • the first detection subunit is used to detect whether the attribute value corresponding to the security attribute information in the dimension meets the preset security conditions
  • the fourth determination subunit is used to obtain the third security index based on the detection results and risk coefficients of the security attribute information in each dimension.
  • the third sending unit is used to send the third security index to the server to trigger the server to obtain the first security index and the second security index, wherein the first security index is sent by the door lock end to the corresponding local
  • the second security index is obtained by performing a security assessment on the environment, and the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified period of time.
  • the second receiving unit is configured to receive the security assessment result sent by the server, wherein the security assessment result is The full evaluation result is calculated by the server based on the first security index, the second security index and the third security index.
  • the third receiving unit is used to receive the security assessment instruction sent by the server, wherein the security assessment instruction is issued after the server receives the third security index, and the third security index is evaluated by the control end on the local security environment. get.
  • the third evaluation unit is used to perform a security assessment on the local environment according to the security assessment instruction to obtain the first security index.
  • the third evaluation unit may include a fifth determination subunit, a second detection subunit, and a sixth determination subunit, as follows:
  • the fifth determination subunit is configured to determine the risk coefficient corresponding to the security attribute information in each dimension of the local environment according to the security assessment instruction;
  • the second detection subunit is used to detect whether the attribute value corresponding to the security attribute information in the dimension meets the preset security condition
  • the sixth determination subunit is used to obtain the first safety index based on the detection results and risk coefficients of the safety attribute information in each dimension.
  • a fourth sending unit configured to send the first security index to the server to trigger the server to calculate the security assessment of the door lock based on the first security index, the second security index, and the third security index.
  • the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified period of time.
  • the first sending unit 4101 can send a security assessment instruction to the door lock end to trigger the door lock end to perform a local security environment assessment and obtain the first security index corresponding to the door lock end;
  • the acquisition unit 4102 obtains the historical behavior data for the door lock terminal within a specified period of time;
  • the first evaluation unit 4103 performs security assessment and analysis on the historical behavior data to obtain the second safety index;
  • the first receiving unit 4104 receives the control terminal
  • the third security index sent by the control end is obtained after evaluating the local security environment, and the third security index sent by the door lock end is received.
  • the first safety index; the determination unit 4105 determines the safety evaluation result of the door lock based on the first safety index, the second safety index and the third safety index; and the second sending unit 4106 sends the Send the security assessment results of said door lock;
  • the second assessment unit 4201 when receiving the security assessment instruction, performs a security assessment on the local environment to obtain a third security index; the third sending unit 4202 sends the third security index to the server to trigger the The server obtains a first security index and a second security index, wherein the first security index is obtained by the door lock end performing a security assessment on the corresponding local environment, and the second security index is obtained by the server within a specified time period.
  • the historical behavior data of the door lock end is obtained after security assessment; the security assessment result sent by the server is received through the second receiving unit 4203, wherein the security assessment result is obtained by the server based on the first security index and the The second safety index and the third safety index are calculated;
  • the third receiving unit 4301 receives the security assessment instruction sent by the server, wherein the security assessment instruction is issued after the server receives the third security index, and the third security index is evaluated by the control end on the local security environment.
  • the third evaluation unit 4302 performs a security assessment on the local environment according to the security assessment instruction to obtain the first security index;
  • the fourth sending unit 4303 sends the first security index to the server to trigger the
  • the server calculates the security evaluation result of the door lock based on the first security index, the second security index, and the third security index, where the second security index is determined by the server's historical behavior of the door lock end within a specified time period.
  • the data is obtained after security assessment;
  • This application can evaluate the security of the door lock by combining the three aspects of the door lock end, the door lock control end and historical behavior data, improving the accuracy of the security assessment results corresponding to the door lock.
  • An embodiment of the present application also provides an electronic device, as shown in Figure 5, which shows a schematic structural diagram of the electronic device involved in the embodiment of the present application.
  • the electronic device may be a terminal or a server, specifically:
  • the electronic device may include components such as a processor 501 of one or more processing cores, a memory 502 of one or more computer-readable storage media, a power supply 503, and an input unit 504.
  • a processor 501 of one or more processing cores a memory 502 of one or more computer-readable storage media
  • a power supply 503 a power supply 503
  • FIG. 5 does not constitute a limitation on the electronic device, and may include more or fewer components than shown in the figure, or combine certain components, or arrange different components. in:
  • the processor 501 is the control center of the electronic device, using various interfaces and lines to connect various parts of the entire electronic device, by running or executing software programs and/or modules stored in the memory 502, and calling software programs stored in the memory 502. Data, perform various functions of the electronic device and process the data to conduct overall monitoring of the electronic device.
  • the processor 501 may include one or more processing cores; preferably, the processor 501 may integrate an application processor and a modem processor, where the application processor mainly processes operating systems, user interfaces, application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 501.
  • the memory 502 can be used to store software programs and modules.
  • the processor 501 executes various functional applications and data processing by running the software programs and modules stored in the memory 502 .
  • the memory 502 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), etc.; the storage data area may store data based on Data created by the use of electronic devices, etc.
  • memory 502 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 501 with access to the memory 502 .
  • the electronic device also includes a power supply 503 that supplies power to various components.
  • the power supply 503 can be logically connected to the processor 501 through a power management system, so that functions such as charging, discharging, and power consumption management can be implemented through the power management system.
  • the power supply 503 may also include one or more DC or AC power supplies, recharging systems, power failure detection circuits, power converters or inverters, power status indicators, and other arbitrary components.
  • the electronic device may also include an input unit 504 that may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • an input unit 504 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • the electronic device may also include a display unit and the like, which will not be described again here.
  • the processor 501 in the electronic device will load the executable files corresponding to the processes of one or more application programs into the memory 502 according to the following instructions, and the processor 501 will run the executable files stored in The application program in the memory 502 implements various functions, as follows:
  • the terminal sends the security assessment result of the door lock;
  • the security assessment instruction When receiving the security assessment instruction, perform a security assessment on the local environment to obtain a third security index; send the third security index to the server to trigger the server to obtain the first security index and the second security index, where, The first security index is obtained by the door lock terminal performing a security assessment on the corresponding local environment, and the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock terminal within a specified time period; Receive the security assessment result sent by the server, wherein the security assessment result is calculated by the server based on the first security index, the second security index and the third security index;
  • Receive a security assessment instruction sent by the server wherein the security assessment instruction is issued after the server receives a third security index, which is obtained by the control end after evaluating the local security environment; according to the security assessment Instructing to perform a security assessment on the local environment to obtain a first security index; sending the first security index to the server to trigger the server to perform a security assessment based on the first security index, the second security index, and the third security index. , calculate the security assessment result of the door lock, where the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified period of time.
  • this embodiment can send a security assessment instruction to the door lock end to trigger the door lock end to conduct a local security environment assessment and obtain the first security index corresponding to the door lock end; obtain Describe the historical behavior data of the door lock end; conduct security assessment and analysis on the historical behavior data to obtain the second security index; receive the third security index sent by the control end, and the third security index is determined by the control end on the local security environment. Obtained after evaluation, and receiving the first safety index sent by the door lock end; based on the first safety index, the second safety index and the third safety index, determine the safety evaluation result of the door lock; Send the security evaluation result of the door lock to the control terminal.
  • This application can evaluate the security of the door lock by combining the three aspects of the door lock end, the control end and historical behavior data, which improves the accuracy of the security assessment results corresponding to the door lock.
  • embodiments of the present application provide a non-volatile computer-readable storage medium in which a plurality of computer-readable instructions are stored.
  • the computer-readable instructions can be loaded by the processor to execute the methods provided by the embodiments of the present application. steps in any door lock security assessment method.
  • the computer-readable instructions may perform the following steps:
  • the security assessment instruction When receiving the security assessment instruction, perform a security assessment on the local environment to obtain a third security index; send the third security index to the server to trigger the server to obtain the first security index and the second security index, where, The first security index is obtained by the door lock terminal performing a security assessment on the corresponding local environment, and the second security index is obtained by the server performing a security assessment on the historical behavior data of the door lock terminal within a specified time period; Receive the security assessment result sent by the server, wherein the security assessment result is calculated by the server based on the first security index, the second security index and the third security index;
  • Receive a security assessment instruction sent by the server wherein the security assessment instruction is issued after the server receives a third security index, which is obtained by the control end after evaluating the local security environment; according to the security assessment Instructs to conduct a security assessment on the local environment and obtain the first security index; Send the first security index to the server to trigger the server to calculate the security evaluation result of the door lock based on the first security index, the second security index, and the third security index, wherein the second The security index is obtained by the server performing a security assessment on the historical behavior data of the door lock within a specified period of time.
  • the non-volatile computer-readable storage medium can include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.
  • any of the steps provided by the embodiments of the present application can be implemented.
  • the beneficial effects that can be achieved by a door lock safety assessment method are detailed in the previous embodiments and will not be described again here.
  • a computer program product or computer program including computer readable instructions stored in a non-volatile computer readable storage medium.
  • the processor of the computer device reads the computer-readable instructions from the non-volatile computer-readable storage medium, and the processor executes the computer-readable instructions, causing the computer device to perform various optional implementations of the above door lock security assessment. methods provided in .

Abstract

一种门锁安全评估方法以及相关设备,可以向门锁端(12)发送安全评估指令,以触发门锁端(12)进行本地安全环境评估,得到门锁端(12)对应的第一安全指数;获取指定时间段内针对门锁端(12)的历史行为数据;对历史行为数据进行安全评估分析,得到第二安全指数;接收控制端(10)发送的第三安全指数,第三安全指数由控制端(10)对本地安全环境评估后得到,以及接收门锁端(12)发送的第一安全指数;基于第一安全指数、第二安全指数以及第三安全指数,确定门锁的安全评估结果;向控制端(10)发送门锁的安全评估结果。结合门锁端(12)、控制端(10)以及历史行为数据三个方面,对门锁的安全性进行评估,提高了门锁对应的安全评估结果的准确性。

Description

门锁安全评估方法以及相关设备
本申请要求于2022年7月27日提交中国专利局、申请号为202210894160.X、发明名称为“门锁安全评估方法以及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及智能电子设备技术领域,具体涉及一种门锁安全评估方法以及相关设备。
背景技术
随着智能门锁越来越普及,其安全性受到越来越多的挑战,消费者越来越关心智能门锁的安全性。
在目前的相关技术中,一般只对门锁端进行安全评估分析,得到安全评估结果,用户再根据安全评估结果对门锁进行安全设置;这样的评估方法较为简单,得到的安全评估结果的准确性相对较低。
发明内容
本申请实施例提供一种门锁安全评估方法以及相关设备,相关设备可以包括门锁安全评估装置、电子设备、计算机可读存储介质和计算机程序产品,可以提高门锁对应的安全评估结果的准确性。
本申请实施例提供一种门锁安全评估方法,包括:
向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;
获取指定时间段内针对所述门锁端的历史行为数据;
对所述历史行为数据进行安全评估分析,得到第二安全指数;
接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;
基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;及
向所述控制端发送所述门锁的安全评估结果。
本申请实施例提供另一种门锁安全评估方法,包括:
在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;
将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;及
接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
本申请实施例提供另一种门锁安全评估方法,包括:
接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;
根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;及
向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
相应的,本申请实施例提供一种门锁安全评估装置,包括:
第一发送单元,用于向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;
获取单元,用于获取指定时间段内针对所述门锁端的历史行为数据;
第一评估单元,用于对所述历史行为数据进行安全评估分析,得到第二安全指数;
第一接收单元,用于接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;
确定单元,用于基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;及
第二发送单元,用于向所述控制端发送所述门锁的安全评估结果。
相应的,本申请实施例提供另一种门锁安全评估装置,包括:
第二评估单元,用于在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;
第三发送单元,用于将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;及
第二接收单元,用于接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
相应的,本申请实施例提供另一种门锁安全评估装置,包括:
第三接收单元,用于接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;
第三评估单元,用于根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;及
第四发送单元,用于向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
可选的,在本申请的一些实施例中,所述历史行为数据包括至少一个历史互动信息;
所述第一评估单元可以包括分析子单元和第一确定子单元,如下:
所述分析子单元,用于基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果;及
第一确定子单元,用于根据公式确定第二安全指数,其中,P2表示第二安全指数,Ri表示各个维度对应的风险系数,Di表示各 个维度上的异常结果,n表示维度的数量。
可选的,在本申请的一些实施例中,所述分析子单元具体可以用于对所述历史行为数据中是否存在互动时间属于预设异常时间的历史互动信息进行检测,以得到第一异常结果;或,基于各个历史互动信息对应的互动时间,对所述历史行为数据进行异常频次的分析,得到第二异常结果。
可选的,在本申请的一些实施例中,所述确定单元可以包括计算子单元和第二确定子单元,如下:
所述计算子单元,用于基于公式P=(P1+P2+P3)/3,计算门锁对应的安全评估分数,其中,P表示安全评估分数,P1表示第一安全指数,P2表示第二安全指数,P3表示第一安全指数;及
第二确定子单元,用于根据所述安全评估分数,确定所述门锁的安全评估结果。
可选的,在本申请的一些实施例中,所述第二确定子单元具体可以用于当所述安全评估分数大于预设值时,生成针对所述门锁的第一安全评估结果;当所述安全评估分数不大于预设值时,生成针对所述门锁的第二安全评估结果。
可选的,在本申请的一些实施例中,所述第二评估单元可以包括第三确定子单元、第一检测子单元和第四确定子单元,如下:
所述第三确定子单元,用于在接收到安全评估指令时,针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
第一检测子单元,用于检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;及
第四确定子单元,用于基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数。
可选的,在本申请的一些实施例中,所述第三评估单元可以包括第五确定子单元、第二检测子单元和第六确定子单元,如下:
所述第五确定子单元,用于根据所述安全评估指令针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
第二检测子单元,用于检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;及
第六确定子单元,用于基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数。
本申请实施例提供的一种电子设备,包括处理器和存储器,所述存储器存储有多条指令,所述处理器加载所述指令,以执行本申请实施例提供的门锁安全评估方法中的步骤。
本申请实施例还提供一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质存储有多条计算机可读指令,所述计算机可读指令适于处理器进行加载,以执行本申请实施例提供的门锁安全评估方法中的步骤。
此外,本申请实施例还提供一种计算机程序产品,包括计算机程序或计算机可读指令,该计算机程序或计算机可读指令被处理器执行时实现本申请实施例提供的门锁安全评估方法中的步骤。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。。
图1a是本申请实施例提供的门锁安全评估方法的场景示意图;
图1b是本申请实施例提供的门锁安全评估方法的流程图;
图1c是本申请实施例提供的门锁安全评估方法的另一流程图;
图2a是本申请实施例提供的门锁安全评估方法的另一流程图;
图2b是本申请实施例提供的门锁安全评估方法的另一流程图;
图3a是本申请实施例提供的门锁安全评估方法的另一流程图;
图3b是本申请实施例提供的门锁安全评估方法的另一流程图;
图4a是本申请实施例提供的门锁安全评估装置的框图;
图4b是本申请实施例提供的门锁安全评估装置的框图;
图4c是本申请实施例提供的门锁安全评估装置的框图;
图5是本申请实施例提供的电子设备的框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供一种门锁安全评估方法以及相关设备,相关设备可以包括门锁安全评估装置、电子设备、计算机可读存储介质和计算机程序产品。该门锁安全评估装置具体可以集成在电子设备中,该电子设备可以是终端或服务器等设备。
如图1a所示,本申请实施例提供的门锁安全评估系统可以包括控制终端10(即门锁的控制端)、服务器11和门锁端12等;控制终端10与服务器11之间通过网络连接,门锁端12与服务器11之间也通过网络连接,比如,通过有线或无线网络连接等,其中,门锁安全评估装置可以集成在服务器中。
其中,控制终端10,可以用于:在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;将所述第三安全指数发送给服务器11,以触发所述服务器11获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端12对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器11对指定时间段内所述门锁端12的历史行为数据进行安全评估后得到;接收所述服务器11发送的安全评估结果,其中,所述安全评估结果由所述服务器11基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。其中,控制终端10可以包括手机、平板电脑、电子手表、电子手环等。其中,控制终端10上还可以设置客户端,该客户端可以是应用程序客户端等等。
其中,门锁端12,可以用于:接收服务器11发送的安全评估指令,其中,所述安全评估指令在所述服务器11接收到第三安全指数后发出,所述第三安全指数由控制终端10对本地安全环境评估后得到;根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;向所述服务器11发送所述第一安全指数,以触发所述服务器11基于所述第一安全指数、所述第二安全指数、第三安 全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器11对指定时间段内门锁端12的历史行为数据进行安全评估后得到。
其中,服务器11,可以用于:向门锁端12发送安全评估指令,以触发所述门锁端12进行本地安全环境评估,得到所述门锁端12对应的第一安全指数;获取指定时间段内针对所述门锁端12的历史行为数据;对所述历史行为数据进行安全评估分析,得到第二安全指数;接收控制终端10发送的第三安全指数,所述第三安全指数由所述控制终端10对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;向所述控制终端10发送所述门锁的安全评估结果。其中,服务器11可以是单台服务器,也可以是由多个服务器组成的服务器集群或云服务器。
上述服务器11进行门锁安全评估的步骤,也可以由控制终端10执行。
以下分别进行详细说明。需说明的是,以下实施例的描述顺序不作为对实施例优选顺序的限定。
本实施例将从第一门锁安全评估装置的角度进行描述,该第一门锁安全评估装置具体可以集成在第一电子设备中,该电子设备可以是服务器等设备。
如图1b所示,该门锁安全评估方法的具体流程可以如下:
101、向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;
102、获取指定时间段内针对所述门锁端的历史行为数据;
103、对所述历史行为数据进行安全评估分析,得到第二安全指数;
104、接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;
105、基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;
106、向所述控制端发送所述门锁的安全评估结果。
其中,该控制端也即门锁的控制端,门锁的控制端具体可以是能够控制开锁的电子设备,该控制端可以是手机等,本实施例对此不作限制。本实施例可以结合控制端的安全性,来确定门锁的安全性。
可选的,本实施例中,所述历史行为数据包括至少一个历史互动信息;
步骤“对所述历史行为数据进行安全评估分析,得到第二安全指数”,可以包括:
基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果;
根据公式确定第二安全指数,其中,P2表示第二安全指数,Ri表示各个维度对应的风险系数,Di表示各个维度上的异常结果,n表示维度的数量。
其中,历史行为数据对应的指定时间段可以根据实际情况进行设置,如可以设置为三个月或半年等。历史行为数据具体可以是门锁的开锁数据,如开锁时间信息以及开锁是否成功等相关数据。
本实施例可以根据近期门锁开锁数据,并对其进行分析,以确定门锁的安全性。
其中,门锁的每次开锁的开锁数据可以视为一条互动信息。
其中,对历史行为数据进行至少一个维度的异常分析,可以是分析近期是否存在多次集中开锁失败、以及是否存在频繁下发一次性密码等,本实施例对此不作限制。
其中,具体地,可以根据每个维度上的异常分析对应的风险系数、以及异常结果,来确定第二安全指数,比如,以风险系数作为权重,对各个维度上的异常结果进行加权运算,得到第二安全指数。其中,对于每个维度上的异常结果,若存在异常,其异常结果可以设置为0,若没有存在异常,其异常结果可以设置为1。
可选的,本实施例中,步骤“基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果”,可以包括:
对所述历史行为数据中是否存在互动时间属于预设异常时间的历史互动信息进行检测,以得到第一异常结果;
或,基于各个历史互动信息对应的互动时间,对所述历史行为数据进行异常频次的分析,得到第二异常结果。
其中,该预设异常时间可以根据实际情况进行设置,本实施例不作限制,具体地,预设异常时间也可以根据各历史互动信息对应的互动时间来确定,如可以将互动时间不分布的时间段作为预设异常时间。
其中,若历史行为数据中存在互动时间属于预设异常时间的历史互动信息,则第一异常结果可以设置为0。
其中,基于各个历史互动信息对应的互动时间,对历史行为数据进行异常频次的分析,具体可以是分析近期是否存在多次集中开锁失败、是否存在频繁下发一次性密码等。若异常频次超过预设值,则第二异常结果可以设置为0。
本实施例中,用户开锁行为信息可以存储在云端,可以通过云端获取近期门锁开锁数据,并对其进行分析,如分析近期是否存在多次集中开锁失败、是否存在频繁下发一次性密码等,从而根据分析结果,计算第二安全指数P2。
在一具体实施例中,如图1c所示,展示的是云平台安全评估的流程图,具体描述如下:
1、获取近期(半年或三个月)的门锁开锁数据及门锁日志信息,并生成趋势图、异常开锁结点及相关信息;
2、分析是否有多次集中开锁失败,若近期存在多次集中开锁失败情况,则该维度上的异常结果为不通过安全检测;
3、分析是否频繁下发一次性密码,若近期存在频繁下发一次性密码情况,则该维度上的异常结果为不通过安全检测;
4、分析是否不符合平时开锁行为,若近期的开锁行为存在异常,不符合平时的开锁行为,例如不符合用户平时的开锁时间,则该维度上的异常结果为不通过安全检测;
5、基于各个维度上的异常结果,计算评估分数,并生成评估结果,该评估结果即第二安全指数。
可选的,本实施例中,步骤“基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果”,可以包括:
基于公式P=(P1+P2+P3)/3,计算门锁对应的安全评估分数,其中,P表示安全评估分数,P1表示第一安全指数,P2表示第二安全指数,P3表示第一安全指数;
根据所述安全评估分数,确定所述门锁的安全评估结果。
一些实施例中,不同安全评估分数可以对应不同的安全等级。比如,安全评估分数在80分以上,其安全评估结果可以是安全,若安全评估分数在60-80分,其安全评估结果可以是存在一定风险,若安全评估分数在60分以下,其安全评估结果可以是存在较大的风险。
在一具体实施例中,设智能门锁端的第一安全指数记为P1,云平台对应的第二安全指数记为P2,手机控制端对应的第三安全指数记为P3,则综合的安全评估分数P=(P1+P2+P3)/3。
具体地,如图1a所示,展示的是智能门锁安全环境评估的场景示意图,具体描述如下:
1、用户在手机端启动门锁对应的应用程序,点击进行智能门锁安全环境评估,可以先进行手机端的安全环境评估;
2、将手机端的安全评估结果传输到云平台;
3、云平台下发安全评估命令到智能门锁;
4、进行智能门锁端的安全环境评估;
5、将智能门锁端的安全评估结果传输到云平台;
6、对云平台存储的用户开锁行为进行分析,再基于云平台,手机端和智能门锁端的安全评估结果,得出门锁总体的安全评估结果;
7、将最终评估结果及安全建议传输给用户手机。
本申请可以通过对智能门锁对应的手机控制端,智能门锁端,云平台端的多维安全评估,能够使用户对智能门锁的安全性有清晰的认识,且基于安全评估结果,可以对用户的一些不安全的设置和行为进行提示,确保用户的安全及财产不受损失,提高了智能门锁安全性。
可选的,本实施例中,步骤“根据所述安全评估分数,确定所述门锁的安全评估结果”,可以包括:
当所述安全评估分数大于预设值时,生成针对所述门锁的第一安全评估结果;
当所述安全评估分数不大于预设值时,生成针对所述门锁的第二安全评估结果。
其中,该预设值可以根据实际情况进行设置,本实施例对此不作限制。具体地,当安全评估分数大于预设值时,可以确定第一安全评估结果为安全;当安全评估分数不大于预设值时,可以确定第二安全评估结果为存在风险。
由上可知,本实施例可以向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;获取指定时间段内针对所述门锁端的历史行为数据;对所述历史行为数据进行安全评估分析,得到第二安全指数;接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;向所述控制端发送所述门锁的安全评估结果。本申请可以结合门锁端、控制端以及历史行为数据三个方面,对门锁的安全性进行评估,提高了门锁对应的安全评估结果的准确性。
本实施例将从第二门锁安全评估装置的角度进行描述,该第二门锁安全评估装置具体可以集成在第二电子设备中,该第二电子设备可以是终端等设备。
如图2a所示,该门锁安全评估方法的具体流程如下:
201、在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;
202、将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;
203、接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
可选的,本实施例中,步骤“在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数”,可以包括:
在接收到安全评估指令时,针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;
基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数。
其中,这里的本地环境可以是门锁的控制端对应的环境,门锁的控制端具体可以是能够控制开锁的电子设备,该控制端可以是手机等,本实施例对此不作限制。本实施例可以结合控制端的安全性,来确定门锁的安全性。
其中,每个维度上的安全属性信息可以包括控制端的系统版本、木马或漏洞、关于开锁的应用程序版本、联网环境等。
其中,每个维度上的安全属性信息对应的风险系数,具体可以是每个维度上的安全属性信息的属性值不通过预设安全条件时的风险系数,也可理解为每个维度上的安全属性信息的重要程度。
其中,每个维度上的安全属性信息的检测结果可以记为D,若该维度上的安全属性信息对应的属性值满足预设安全条件,则该维度上的安全属性信息可以视为通过了安全检测,将其检测结果D设置为1;若该维度上的安全属性信息对应的属性值不满足预设安全条件,则该维度上的安全属性信息可以视为不通过安全检测,将其检测结果D设置为0。
其中,预设安全条件可以根据实际情况进行设置,本实施例对此不作限制。比如,若某个维度上的安全属性信息为手机系统版本,其属性值可以是版本号,则预设安全条件可以是手机系统版本不低于最新发布版本。又比如,某个维度上的安全属性信息为系统木马或漏洞,其属性值可以是系统是否存在木马或漏洞,预设安全条件可以是系统没有存在木马或漏洞。
其中,步骤“基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数”,可以包括:
将各个维度上的安全属性信息的风险系数作为权重;
基于所述权重,对各个维度上的安全属性信息的检测结果进行加权运算,得到所述控制端对应的第三安全指数。
可以理解的是,也可以通过其他方式来获取第三安全指数本实施例对此不作限制。
在一具体场景中,门锁对应的控制端可以是手机端,对于手机端,可以先确定其安全评估检测项目数n,也即安全属性信息的维度数量,比如,安全评 估检测项目(即各个维度上的安全属性信息)可以包括:手机系统版本、木马或漏洞检测、应用程序版本、手机联网环境等,若每个安全评估检测项目的检测结果记为Di,风险系数记为Ri,第三安全指数记为P3,则手机端对应的第三安全指数可以为其中,各安全评估检测项目的风险系数之和可以为1。
如图2b所示,展示的是手机端安全评估的流程图,具体描述如下:
1、对手机系统版本进行检测,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
2、对手机系统木马或漏洞进行检测,若发现木马或严重漏洞,则该维度上的安全属性信息不通过安全检测;
3、对手机系统安全设置检测,若手机未开启SELinux(Security-Enhanced Linux,安全增强型Linux)或进入开发者模式,则该维度上的安全属性信息不通过安全检测;其中,Linux是一种操作系统;
4、对手机联网环境进行检测,若手机连接的是无密码网络,则该维度上的安全属性信息不通过安全检测;
5、对手机应用程序的版本进行检测,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
6、对手机应用程序的设置进行检测,若用户密码设置简单或很久没有更改密码,则该维度上的安全属性信息不通过安全检测;
7、基于各个维度上的安全属性信息的检测结果,计算评估分数,并生成评估结果,该评估结果即为控制端的第三安全指数。
由上可知,本实施例可以在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。本申请可以结合门锁端、控制端以及历史行为数据三个方面,对门锁的安全性进行评估,提高了 门锁对应的安全评估结果的准确性。
本实施例将从第三门锁安全评估装置的角度进行描述,该第三门锁安全评估装置具体可以集成在第三电子设备中,该第三电子设备可以为门锁端对应的设备。
如图3a所示,该门锁安全评估方法的具体流程如下:
301、接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;
302、根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;
303、向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
可选的,本实施例中,步骤“根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数”,可以包括:
根据所述安全评估指令针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;
基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数。
其中,这里的本地环境具体指门锁端对应的环境,门锁端在各个维度上的安全属性信息可以包括MCU(微控制单元,Microcontroller Unit)模块固件版本信息、WiFi(无线通信技术)模块固件版本信息、指纹模块固定版本信息等。
其中,每个维度上的安全属性信息的检测结果可以记为D,若该维度上的安全属性信息对应的属性值满足预设安全条件,则该维度上的安全属性信息可以视为通过了安全检测,将其检测结果D设置为1;若该维度上的安全属性信息对应的属性值不满足预设安全条件,则该维度上的安全属性信息可以视为不通过安全检测,将其检测结果D设置为0。
其中,预设安全条件可以根据实际情况进行设置,本实施例对此不作限制。比如,若某个维度上的安全属性信息为手MCU模块固件版本信息,其属性值可以是版本号,则预设安全条件可以是MCU模块固件版本不低于其最新发布版本。又比如,某个维度上的安全属性信息为指纹模块固定版本信息,其属性值可以是版本号,预设安全条件可以是指纹模块固定版本不低于其最新发布版本。
其中,步骤“基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数”,可以包括:
将各个维度上的安全属性信息的风险系数作为权重;
基于所述权重,对各个维度上的安全属性信息的检测结果进行加权运算,得到第一安全指数。
可以理解的是,也可以通过其他方式来获取第一安全指数本实施例对此不作限制。
在一具体场景中,对于智能门锁端,同样确定其安全评估检测项目数n,也即门锁端的安全属性信息的维度数量,比如,安全评估检测项目(即各个维度上的安全属性信息)可以包括:MCU模块固件版本信息、WiFi模块固件版本信息、指纹模块固定版本信息等,若每个安全评估检测项目的检测结果记为Di,风险系数记为Ri,第一安全指数记为P1,则智能门锁端对应的第一安全指数可以为其中,各安全评估检测项目的风险系数之和可以为1。
如图3b所示,展示的是智能门锁端安全评估的流程图,具体描述如下:
1、检测MCU(微控制单元)模块固件版本信息,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
2、检测WiFi(无线网络)模块固件版本信息,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
3、检测指纹模块固件版本信息,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
4、检测人脸模块固件版本信息,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
5、检测猫眼模块固件版本信息,若版本低于最新发布版本,则该维度上的安全属性信息不通过安全检测;
6、基于各个维度上的安全属性信息的检测结果,计算评估分数,并生成评估结果,该评估结果即为门锁端的第一安全指数。
本申请可以通过对智能门锁对应的手机控制端,智能门锁端,云平台端的多维安全评估,能够使用户对智能门锁的安全性有清晰的认识,且基于安全评估结果,可以对用户的一些不安全的设置和行为进行提示,确保用户的安全及财产不受损失,提高了智能门锁安全性。
由上可知,本实施例可以接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。本申请可以结合门锁端、控制端以及历史行为数据三个方面,对门锁的安全性进行评估,提高了门锁对应的安全评估结果的准确性。
为了更好地实施以上方法,本申请实施例还提供一种门锁安全评估系统,该门锁安全评估系统包括第一门锁安全评估装置41、第二门锁安全评估装置42和第三门锁安全评估装置43,其中,第一门锁安全评估装置41具体可以集成在服务器中,第二门锁安全评估装置42可以视为门锁的控制终端,第三门锁安全评估装置43可以视为门锁端。如图4a所示,该第一门锁安全评估装置41可以包括第一发送单元4101、获取单元4102、第一评估单元4103、第一接收单元4104、确定单元4105、以及第二发送单元4106;如图4b所示,第二门锁安全评估装置42可以包括第二评估单元4201、第三发送单元4202以及第二接收单元4203;如图4c所示,第三门锁安全评估装置43可以包括第三接收单元4301、第三评估单元4302以及第四发送单元4303,如下:
A、第一门锁安全评估装置41
(1)第一发送单元4101;
第一发送单元,用于向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数。
(2)获取单元4102;
获取单元,用于获取指定时间段内针对所述门锁端的历史行为数据。
(3)第一评估单元4103;
第一评估单元,用于对所述历史行为数据进行安全评估分析,得到第二安全指数。
可选的,在本申请的一些实施例中,所述历史行为数据包括至少一个历史互动信息;
所述第一评估单元可以包括分析子单元和第一确定子单元,如下:
所述分析子单元,用于基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果;
第一确定子单元,用于根据公式确定第二安全指数,其中,P2表示第二安全指数,Ri表示各个维度对应的风险系数,Di表示各个维度上的异常结果,n表示维度的数量。
可选的,在本申请的一些实施例中,所述分析子单元具体可以用于对所述历史行为数据中是否存在互动时间属于预设异常时间的历史互动信息进行检测,以得到第一异常结果;或,基于各个历史互动信息对应的互动时间,对所述历史行为数据进行异常频次的分析,得到第二异常结果。
(4)第一接收单元4104;
第一接收单元,用于接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数。
(5)确定单元4105;
确定单元,用于基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果。
可选的,在本申请的一些实施例中,所述确定单元可以包括计算子单元和第二确定子单元,如下:
所述计算子单元,用于基于公式P=(P1+P2+P3)/3,计算门锁对应的安全评估分数,其中,P表示安全评估分数,P1表示第一安全指数,P2表示第二安全指数,P3表示第一安全指数;
第二确定子单元,用于根据所述安全评估分数,确定所述门锁的安全评估结果。
可选的,在本申请的一些实施例中,所述第二确定子单元具体可以用于当所述安全评估分数大于预设值时,生成针对所述门锁的第一安全评估结果;当所述安全评估分数不大于预设值时,生成针对所述门锁的第二安全评估结果。
(6)第二发送单元4106;
第二发送单元,用于向所述控制端发送所述门锁的安全评估结果。
B、第二门锁安全评估装置42
(7)第二评估单元4201;
第二评估单元,用于在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数。
可选的,在本申请的一些实施例中,所述第二评估单元可以包括第三确定子单元、第一检测子单元和第四确定子单元,如下:
所述第三确定子单元,用于在接收到安全评估指令时,针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
第一检测子单元,用于检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;
第四确定子单元,用于基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数。
(8)第三发送单元4202;
第三发送单元,用于将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到。
(9)第二接收单元4203;
第二接收单元,用于接收所述服务器发送的安全评估结果,其中,所述安 全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
C、第三门锁安全评估装置43
(10)第三接收单元4301;
第三接收单元,用于接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到。
(11)第三评估单元4302;
第三评估单元,用于根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数。
可选的,在本申请的一些实施例中,所述第三评估单元可以包括第五确定子单元、第二检测子单元和第六确定子单元,如下:
所述第五确定子单元,用于根据所述安全评估指令针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
第二检测子单元,用于检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;
第六确定子单元,用于基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数。
(12)第四发送单元4303;
第四发送单元,用于向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
由上可知,本实施例可以通过第一发送单元4101向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;由获取单元4102获取指定时间段内针对所述门锁端的历史行为数据;通过第一评估单元4103对所述历史行为数据进行安全评估分析,得到第二安全指数;由第一接收单元4104接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述 第一安全指数;通过确定单元4105基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;由第二发送单元4106向所述控制端发送所述门锁的安全评估结果;
或者,在接收到安全评估指令时,通过第二评估单元4201对本地环境进行安全评估,得到第三安全指数;通过第三发送单元4202将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;通过第二接收单元4203接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到;
或者,由第三接收单元4301接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;通过第三评估单元4302根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;通过第四发送单元4303向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到;
本申请可以结合门锁端、门锁的控制端以及历史行为数据三个方面,对门锁的安全性进行评估,提高了门锁对应的安全评估结果的准确性。
本申请实施例还提供一种电子设备,如图5所示,其示出了本申请实施例所涉及的电子设备的结构示意图,该电子设备可以是终端或者服务器等,具体来讲:
该电子设备可以包括一个或者一个以上处理核心的处理器501、一个或一个以上计算机可读存储介质的存储器502、电源503和输入单元504等部件。本领域技术人员可以理解,图5中示出的电子设备结构并不构成对电子设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
处理器501是该电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器502内的软件程序和/或模块,以及调用存储在存储器502内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。可选的,处理器501可包括一个或多个处理核心;优选的,处理器501可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器501中。
存储器502可用于存储软件程序以及模块,处理器501通过运行存储在存储器502的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器502可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备的使用所创建的数据等。此外,存储器502可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器502还可以包括存储器控制器,以提供处理器501对存储器502的访问。
电子设备还包括给各个部件供电的电源503,优选的,电源503可以通过电源管理系统与处理器501逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源503还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
该电子设备还可包括输入单元504,该输入单元504可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。
尽管未示出,该电子设备还可以包括显示单元等,在此不再赘述。具体在本实施例中,电子设备中的处理器501会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器502中,并由处理器501来运行存储在存储器502中的应用程序,从而实现各种功能,如下:
向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;获取指定时间段内针对所述门锁端的历 史行为数据;对所述历史行为数据进行安全评估分析,得到第二安全指数;接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;向所述控制端发送所述门锁的安全评估结果;
或者,
在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到;
或者,
接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
以上各个操作的具体实施可参见前面的实施例,在此不再赘述。
由上可知,本实施例可以向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;获取指定时间段内针对所述门锁端的历史行为数据;对所述历史行为数据进行安全评估分析,得到第二安全指数;接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;向所述控制端发送所述门锁的安全评估结果。 本申请可以结合门锁端、控制端以及历史行为数据三个方面,对门锁的安全性进行评估,提高了门锁对应的安全评估结果的准确性。
本领域普通技术人员可以理解,上述实施例的各种方法中的全部或部分步骤可以通过计算机可读指令来完成,或通过计算机可读指令控制相关的硬件来完成,该计算机可读指令可以存储于一计算机可读存储介质中,并由处理器进行加载和执行。
为此,本申请实施例提供一种非易失性计算机可读存储介质,其中存储有多条计算机可读指令,该计算机可读指令能够被处理器进行加载,以执行本申请实施例所提供的任一种门锁安全评估方法中的步骤。例如,该计算机可读指令可以执行如下步骤:
向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;获取指定时间段内针对所述门锁端的历史行为数据;对所述历史行为数据进行安全评估分析,得到第二安全指数;接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;向所述控制端发送所述门锁的安全评估结果;
或者,
在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到;
或者,
接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数; 向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
以上各个操作的具体实施可参见前面的实施例,在此不再赘述。
其中,该非易失性计算机可读存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。
由于该非易失性计算机可读存储介质中所存储的指令,可以执行本申请实施例所提供的任一种门锁安全评估方法中的步骤,因此,可以实现本申请实施例所提供的任一种门锁安全评估方法所能实现的有益效果,详见前面的实施例,在此不再赘述。
根据本申请的一个方面,提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机可读指令,该计算机可读指令存储在非易失性计算机可读存储介质中。计算机设备的处理器从非易失性计算机可读存储介质读取该计算机可读指令,处理器执行该计算机可读指令,使得该计算机设备执行上述门锁安全评估方面的各种可选实现方式中提供的方法。
以上对本申请实施例所提供的一种门锁安全评估方法以及相关设备进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (17)

  1. 一种门锁安全评估方法,其特征在于,包括:
    向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;
    获取指定时间段内针对所述门锁端的历史行为数据;
    对所述历史行为数据进行安全评估分析,得到第二安全指数;
    接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;
    基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;及
    向所述控制端发送所述门锁的安全评估结果。
  2. 根据权利要求1所述的方法,其特征在于,所述历史行为数据包括至少一个历史互动信息;
    所述对所述历史行为数据进行安全评估分析,得到第二安全指数,包括:
    基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果;及
    根据公式确定第二安全指数,其中,P2表示第二安全指数,Ri表示各个维度对应的风险系数,Di表示各个维度上的异常结果,n表示维度的数量。
  3. 根据权利要求2所述的方法,其特征在于,所述基于各个历史互动信息对应的互动时间,对所述历史行为数据进行至少一个维度的异常分析,得到所述至少一个维度上的异常结果,包括:
    对所述历史行为数据中是否存在互动时间属于预设异常时间的历史互动信息进行检测,以得到第一异常结果;
    或,基于各个历史互动信息对应的互动时间,对所述历史行为数据进行异常频次的分析,得到第二异常结果。
  4. 根据权利要求1所述的方法,其特征在于,所述基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果,包括:
    基于公式P=(P1+P2+P3)/3,计算门锁对应的安全评估分数,其中,P表示安全评估分数,P1表示第一安全指数,P2表示第二安全指数,P3表示第一安全指数;及
    根据所述安全评估分数,确定所述门锁的安全评估结果。
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述安全评估分数,确定所述门锁的安全评估结果,包括:
    当所述安全评估分数大于预设值时,生成针对所述门锁的第一安全评估结果;及
    当所述安全评估分数不大于预设值时,生成针对所述门锁的第二安全评估结果。
  6. 一种门锁安全评估方法,其特征在于,包括:
    在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;
    将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;及
    接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
  7. 根据权利要求6所述的方法,其特征在于,所述在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数,包括:
    在接收到安全评估指令时,针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
    检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;及
    基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数。
  8. 根据权利要求7所述的方法,其特征在于,所述基于各个维度上的安全属性信息的检测结果和风险系数,得到第三安全指数,包括:
    将各个维度上的安全属性信息的风险系数作为权重;及
    基于所述权重,对各个维度上的安全属性信息的检测结果进行加权运算,得到所述控制端对应的第三安全指数。
  9. 一种门锁安全评估方法,其特征在于,包括:
    接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;
    根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;及向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数,包括:
    根据所述安全评估指令针对本地环境每个维度上的安全属性信息,确定所述维度上的安全属性信息对应的风险系数;
    检测所述维度上的安全属性信息对应的属性值是否满足预设安全条件;及
    基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数。
  11. 根据权利要求9所述的方法,其特征在于,所述基于各个维度上的安全属性信息的检测结果和风险系数,得到第一安全指数,包括:
    将各个维度上的安全属性信息的风险系数作为权重;及
    基于所述权重,对各个维度上的安全属性信息的检测结果进行加权运算,得到第一安全指数。
  12. 一种门锁安全评估装置,其特征在于,包括:
    第一发送单元,用于向门锁端发送安全评估指令,以触发所述门锁端进行本地安全环境评估,得到所述门锁端对应的第一安全指数;
    获取单元,用于获取指定时间段内针对所述门锁端的历史行为数据;
    第一评估单元,用于对所述历史行为数据进行安全评估分析,得到第二安全指数;
    第一接收单元,用于接收控制端发送的第三安全指数,所述第三安全指数由所述控制端对本地安全环境评估后得到,以及接收所述门锁端发送的所述第一安全指数;
    确定单元,用于基于所述第一安全指数、所述第二安全指数以及所述第三安全指数,确定门锁的安全评估结果;及
    第二发送单元,用于向所述控制端发送所述门锁的安全评估结果。
  13. 一种门锁安全评估装置,其特征在于,包括:
    第二评估单元,用于在接收到安全评估指令时,对本地环境进行安全评估,得到第三安全指数;
    第三发送单元,用于将所述第三安全指数发送给服务器,以触发所述服务器获取第一安全指数和第二安全指数,其中,所述第一安全指数由门锁端对相应的本地环境进行安全评估后得到,所述第二安全指数由所述服务器对指定时间段内所述门锁端的历史行为数据进行安全评估后得到;及
    第二接收单元,用于接收所述服务器发送的安全评估结果,其中,所述安全评估结果由所述服务器基于所述第一安全指数、所述第二安全指数以及所述第三安全指数计算得到。
  14. 一种门锁安全评估装置,其特征在于,包括:
    第三接收单元,用于接收服务器发送的安全评估指令,其中,所述安全评估指令在所述服务器接收到第三安全指数后发出,所述第三安全指数由控制端对本地安全环境评估后得到;
    第三评估单元,用于根据所述安全评估指令对本地环境进行安全评估,得到第一安全指数;及
    第四发送单元,用于向所述服务器发送所述第一安全指数,以触发所述服务器基于所述第一安全指数、所述第二安全指数、第三安全指数,计算门锁的安全评估结果,其中所述第二安全指数由所述服务器对指定时间段内门锁端的历史行为数据进行安全评估后得到。
  15. 一种电子设备,其特征在于,包括存储器和处理器;所述存储器存储有应用程序,所述处理器用于运行所述存储器内的应用程序,以执行权利要求1至11任一项所述的门锁安全评估方法中的操作。
  16. 一种非易失性计算机可读存储介质,其特征在于,所述非易失性计算机可读存储介质存储有多条计算机可读指令,所述计算机可读指令适于处理器进行加载,以执行权利要求1至11任一项所述的门锁安全评估方法中的步骤。
  17. 一种计算机程序产品,包括计算机程序或计算机可读指令,其特征在于,该计算机程序或计算机可读指令被处理器执行时实现权利要求1至11任一项所述的门锁安全评估方法中的步骤。
PCT/CN2023/099363 2022-07-27 2023-06-09 门锁安全评估方法以及相关设备 WO2024021908A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210894160.XA CN115311764A (zh) 2022-07-27 2022-07-27 门锁安全评估方法以及相关设备
CN202210894160.X 2022-07-27

Publications (1)

Publication Number Publication Date
WO2024021908A1 true WO2024021908A1 (zh) 2024-02-01

Family

ID=83859697

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/099363 WO2024021908A1 (zh) 2022-07-27 2023-06-09 门锁安全评估方法以及相关设备

Country Status (2)

Country Link
CN (1) CN115311764A (zh)
WO (1) WO2024021908A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311764A (zh) * 2022-07-27 2022-11-08 深圳Tcl新技术有限公司 门锁安全评估方法以及相关设备

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1504626A (zh) * 2002-12-03 2004-06-16 笙泉科技股份有限公司 光学式门锁安全辨识装置
CN203965141U (zh) * 2014-06-12 2014-11-26 慈溪市鑫昶工业产品设计有限公司 轿车安全门锁测试装置
US20150061859A1 (en) * 2013-03-14 2015-03-05 Google Inc. Security scoring in a smart-sensored home
CN107265226A (zh) * 2017-07-13 2017-10-20 上海辰竹仪表有限公司 应用于防爆电梯门锁的电路安全检测装置
WO2017203375A1 (ja) * 2016-05-27 2017-11-30 ローベルト ボッシュ ゲゼルシャフト ミット べシュレンクテル ハフツング シュトゥットガルト ポストファッハ 30 02 20 セキュリティ検査システム、セキュリティ検査方法、機能評価装置、及びプログラム
CN113282490A (zh) * 2021-05-17 2021-08-20 深圳Tcl新技术有限公司 智能门锁测试方法及电子设备
CN114399478A (zh) * 2021-12-29 2022-04-26 国能铁路装备有限责任公司 安全锁检测系统、方法、装置、计算机设备和存储介质
CN114758430A (zh) * 2020-12-29 2022-07-15 深圳绿米联创科技有限公司 门锁管理系统、智能门锁、网关设备、云设备及用户终端
CN115311764A (zh) * 2022-07-27 2022-11-08 深圳Tcl新技术有限公司 门锁安全评估方法以及相关设备

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1504626A (zh) * 2002-12-03 2004-06-16 笙泉科技股份有限公司 光学式门锁安全辨识装置
US20150061859A1 (en) * 2013-03-14 2015-03-05 Google Inc. Security scoring in a smart-sensored home
CN203965141U (zh) * 2014-06-12 2014-11-26 慈溪市鑫昶工业产品设计有限公司 轿车安全门锁测试装置
WO2017203375A1 (ja) * 2016-05-27 2017-11-30 ローベルト ボッシュ ゲゼルシャフト ミット べシュレンクテル ハフツング シュトゥットガルト ポストファッハ 30 02 20 セキュリティ検査システム、セキュリティ検査方法、機能評価装置、及びプログラム
CN107265226A (zh) * 2017-07-13 2017-10-20 上海辰竹仪表有限公司 应用于防爆电梯门锁的电路安全检测装置
CN114758430A (zh) * 2020-12-29 2022-07-15 深圳绿米联创科技有限公司 门锁管理系统、智能门锁、网关设备、云设备及用户终端
CN113282490A (zh) * 2021-05-17 2021-08-20 深圳Tcl新技术有限公司 智能门锁测试方法及电子设备
CN114399478A (zh) * 2021-12-29 2022-04-26 国能铁路装备有限责任公司 安全锁检测系统、方法、装置、计算机设备和存储介质
CN115311764A (zh) * 2022-07-27 2022-11-08 深圳Tcl新技术有限公司 门锁安全评估方法以及相关设备

Also Published As

Publication number Publication date
CN115311764A (zh) 2022-11-08

Similar Documents

Publication Publication Date Title
WO2022068645A1 (zh) 数据库故障发现方法、装置、电子设备及存储介质
CN110162976B (zh) 风险评估方法、装置及终端
CN104662517B (zh) 安全漏洞检测技术
US20150067845A1 (en) Detecting Anomalous User Behavior Using Generative Models of User Actions
US8516499B2 (en) Assistance in performing action responsive to detected event
RU2601148C1 (ru) Система и способ выявления аномалий при подключении устройств
JP6595718B2 (ja) クレジット点数モデルトレーニング方法、クレジット点数計算方法、装置及びサーバー
WO2024021908A1 (zh) 门锁安全评估方法以及相关设备
US11720825B2 (en) Framework for multi-tenant data science experiments at-scale
KR20170056876A (ko) 로그 분석을 기반으로 하는 보안 모니터링 방법, 장치 및 시스템
CN111931048A (zh) 基于人工智能的黑产账号检测方法及相关装置
JP2015108898A (ja) 異常検知システム及び異常検知方法
CN113037589A (zh) 网关设备的压力测试方法、装置、测试平台及存储介质
CN110659179B (zh) 一种评估系统运行状况的方法、装置及电子设备
CN110417751B (zh) 一种网络安全预警方法、装置和存储介质
CN107943666A (zh) 客户端性能趋势监测方法、装置及计算机可读存储介质
US10817601B2 (en) Hypervisor enforcement of cryptographic policy
CN114157480A (zh) 网络攻击方案的确定方法、装置、设备和存储介质
WO2020211251A1 (zh) 操作系统的监控方法和装置
CN117273450A (zh) 一种电力系统风险评估方法、装置、设备及存储介质
CN113419894B (zh) 数据检验方法、装置、存储介质及计算机设备
CN115204733A (zh) 数据审计方法、装置、电子设备及存储介质
CN115964701A (zh) 应用安全检测方法、装置、存储介质及电子设备
KR101770229B1 (ko) 사용자별 이용 프로파일에 기초한 위협탐지 방법, 장치, 및 컴퓨터-판독가능 매체
CN110928801A (zh) 角色权限的测试方法及装置、计算机介质和电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845121

Country of ref document: EP

Kind code of ref document: A1