Security processing method and device

A technology for securely processing and accessing equipment, which is applied in the Internet field and can solve security problems, real security risks, etc.

Active Publication Date: 2020-07-17
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In this scenario, the following security problems are likely to arise: In one case, illegal devices can interact with the corresponding server cloud through the application on the user terminal, and perform unauthorized, illegal, and malicious behaviors, that is, from the source of the access device In another case, during the normal communication process between the access device and the corresponding server cloud through the application on the user terminal, the illegal party can intercept, tamper, forge and other illegal acts on the data in the transmission process , which creates security issues during data transmission
For various access devices in the Internet of Things that are closely related to users' lives, especially access devices with high security requirements such as smart door locks, the above security issues bring great hidden dangers to the actual safety of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security processing method and device
  • Security processing method and device
  • Security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0057] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security processing method. The security processing method comprises the following steps: verifying a binding state of access equipment in a server; when the access device isnot bound in the server, assisting the access device and the server to perform bidirectional authentication based on a preset rule; and when the bidirectional authentication succeeds, obtaining binding data about the access device from the server and sending the binding data to the access device, and allowing the access device and the server to perform working data communication based on a processkey, the process key being generated based on the binding data. The invention further provides a security processing device, computer equipment and a computer readable storage medium.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and more specifically, to a security processing method and device. Background technique [0002] With the continuous development of the Internet of Things technology, in the fields of smart home and smart wearables, many devices are connected to the Internet of Things, and the application on the user terminal needs to interact with the corresponding server cloud to complete the corresponding functions. [0003] In this scenario, the following security problems are likely to arise: In one case, illegal devices can interact with the corresponding server cloud through the application on the user terminal, and perform unauthorized, illegal, and malicious behaviors, that is, from the source of the access device In another case, during the normal communication process between the access device and the corresponding server cloud through the application on the user terminal, the illegal par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06H04L9/32
CPCH04L63/0869H04L63/0876H04L63/0442H04W12/02H04W12/06H04L9/3273H04L9/3247H04L9/3239
Inventor 孟祥亮孙敏刚李志伟廖入贤
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products